| Title | 複数の Qualcomm 製品上で稼動する Android におけるセッションの固定化の脆弱性 |
|---|---|
| Summary | 複数の Qualcomm 製品上で稼動する Android には、セッションの固定化の脆弱性が存在します。 |
| Possible impacts | 情報を改ざんされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | April 2, 2018, midnight |
| Registration Date | June 8, 2018, 10:45 a.m. |
| Last Update | June 8, 2018, 10:45 a.m. |
| CVSS3.0 : 重要 | |
| Score | 7.5 |
|---|---|
| Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
| CVSS2.0 : 警告 | |
| Score | 5 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:N/I:P/A:N |
| クアルコム |
| MDM9206 ファームウェア |
| MDM9607 ファームウェア |
| MDM9650 ファームウェア |
| SD 205 ファームウェア |
| SD 210 ファームウェア |
| SD 212 ファームウェア |
| SD 835 ファームウェア |
| SD 845 ファームウェア |
| SD 850 ファームウェア |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2018年06月08日] 掲載 |
June 8, 2018, 10:45 a.m. |
| Summary | In Android before security patch level 2018-04-05 on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 835, SD 845, SD 850, when secure camera is activated it stores captured data in protected buffers. The TEE application which uses secure camera expects those buffers to contain data captured during the current camera session. It is possible though for HLOS to put aside and reuse one or more of the protected buffers with previously captured data during next camera session. Such data reuse must be prevented as the TEE applications expects to receive valid data captured during the current session only. |
|---|---|
| Publication Date | April 12, 2018, 12:29 a.m. |
| Registration Date | Jan. 26, 2021, 1:20 p.m. |
| Last Update | Nov. 21, 2024, 12:19 p.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:* | ||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:* | ||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:* | ||||
| Configuration4 | or higher | or less | more than | less than | |
| cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:* | ||||
| Configuration5 | or higher | or less | more than | less than | |
| cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:* | ||||
| Configuration6 | or higher | or less | more than | less than | |
| cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:* | ||||
| Configuration7 | or higher | or less | more than | less than | |
| cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:* | ||||
| Configuration8 | or higher | or less | more than | less than | |
| cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:* | ||||
| Configuration9 | or higher | or less | more than | less than | |
| cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:* | ||||