Unknown
CVE-2018-11927
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Improper input validation on input which is used as an array index will lead to an out of bounds issue while processing AP find event from firmware in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, SD 210/SD 212/SD 205, SD 625, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 845 / SD 850, SD 855, SDX20, SDX24, SM7150
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- mdm9150 firmware -,
- mdm9206 firmware -,
- mdm9607 firmware -,
- mdm9640 firmware -,
- mdm9650 firmware -,
- msm8996au firmware -,
- qca6174a firmware -,
- qca6574au firmware -,
- qca9377 firmware -,
- qca9379 firmware -,
- sd 205 firmware -,
- sd 210 firmware -,
- sd 212 firmware -,
- sd 625 firmware -,
- sd 670 firmware -,
- sd 675 firmware -,
- sd 710 firmware -,
- sd 712 firmware -,
- sd 820 firmware -,
- sd 820a firmware -,
- sd 845 firmware -,
- sd 850 firmware -,
- sd 855 firmware -,
- sdx20 firmware -,
- sdx24 firmware -,
- sm7150 firmware -
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: