Vulnerability
CVE-2018-5383
Component: BLUETOOTH
Location: FIRMWARE
Bluetooth firmware or operating system software drivers in macOS versions before 10.13, High Sierra and iOS versions before 11.4, and Android versions before the 2018-06-05 patch may not sufficiently validate elliptic curve parameters used to generate public keys during a Diffie-Hellman key exchange, which may allow a remote attacker to obtain the encryption key used by the device.
Impact
Severity (Manufact.)
HIGH
Severity (NIST)
6.8
Severity (Android)
N/A
Chipsets
29
Devices
1478
Affected Hardware
Name | Also known as | Manufacturer |
---|---|---|
MSM8909 | Snapdragon 210 | Qualcomm |
MSM8909AA | Snapdragon 212 | Qualcomm |
MSM8916 | Snapdragon 410 | Qualcomm |
MSM8929 | Snapdragon 415 | Qualcomm |
MSM8917 | Snapdragon 425 | Qualcomm |
MSM8920 | Snapdragon 427 | Qualcomm |
MSM8937 | Snapdragon 430 | Qualcomm |
MSM8940 | Snapdragon 435 | Qualcomm |
SDM429 | Snapdragon 429 | Qualcomm |
SDM439 | Snapdragon 439 | Qualcomm |
29 of 29 row(s) shown.
Rows per page
Page 1 of 3
Information reliability
The information on this website is intended to provide information on the big picture of chipset security and measure trends within the industry. Our information is obtained from several vantage points, checked for consistency, and automatically cross-referenced. However, this process may not always yield reliable information. Do not use the information on a particular vulnerability, chipset or device to verify your individual exposure in cases where inaccuracies are inacceptable, for instance to assess risks if you are a Politically Exposed Person.
Timeline
Introduced (est):
Jan 1, 2014
Reported:
Jan 18, 2018
Advisory Published:
Apr 1, 2024
CVE Published:
Aug 7, 2018
Android Patch Level:
Aug 2018