Vulnerability
CVE-2018-13927
Component: TRUST
Debug policy with invalid signature can be loaded when the debug policy functionality is disabled by using the parallel image loading in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in MDM9206, MDM9607, MDM9650, MDM9655, MSM8996AU, QCS404, QCS605, SD 410/12, SD 636, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM630, SDM660, SXR1130
Impact
Severity (Manufact.)
N/A
Severity (NIST)
7.8
Severity (Android)
N/A
Chipsets
15
Devices
936
Affected Hardware
Name | Also known as | Manufacturer |
---|---|---|
MSM8916 | Snapdragon 410 | Qualcomm |
SDM630 | Snapdragon 630 | Qualcomm |
SDM636 | Snapdragon 636 | Qualcomm |
SDM660 | Snapdragon 660 | Qualcomm |
SDM670 | Snapdragon 670 | Qualcomm |
SDM710 | Snapdragon 710 | Qualcomm |
SDM712 | Snapdragon 712 | Qualcomm |
MSM8996Lite | Snapdragon 820 | Qualcomm |
MSM8996 | Snapdragon 820 | Qualcomm |
MSM8998 | Snapdragon 835 Snapdragon 835 Mobile PC Platform | Qualcomm |
15 of 15 row(s) shown.
Rows per page
Page 1 of 2
Information reliability
The information on this website is intended to provide information on the big picture of chipset security and measure trends within the industry. Our information is obtained from several vantage points, checked for consistency, and automatically cross-referenced. However, this process may not always yield reliable information. Do not use the information on a particular vulnerability, chipset or device to verify your individual exposure in cases where inaccuracies are inacceptable, for instance to assess risks if you are a Politically Exposed Person.
Timeline
Introduced (est):
Jan 1, 2014
Reported:
Unknown
Advisory Published:
Jun 3, 2019
CVE Published:
Jul 22, 2019
Android Patch Level:
None