Vulnerability

CVE-2019-10513

Component: TRUST
Possibility of Null pointer access if the SPDM commands are executed in the non-standard way in Trustzone in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096, APQ8096AU, APQ8098, IPQ8074, MDM9150, MDM9205, MDM9206, MDM9207C, MDM9607, MDM9650, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA8081, QCS404, QCS605, QM215, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130, SXR2130

Impact

Severity (Manufact.)

N/A

Severity (NIST)

5.5

Severity (Android)

N/A

Chipsets

25

Devices

1306

Affected Hardware

NameAlso known asManufacturer
MSM8905
Qualcomm 205
Qualcomm
MSM8909
Snapdragon 210
Qualcomm
QM215
Qualcomm 215
Qualcomm
MSM8917
Snapdragon 425
Qualcomm
MSM8920
Snapdragon 427
Qualcomm
MSM8937
Snapdragon 430
Qualcomm
MSM8940
Snapdragon 435
Qualcomm
SDM429
Snapdragon 429
Qualcomm
SDM439
Snapdragon 439
Qualcomm
SDM450
Snapdragon 450
Qualcomm
25 of 25 row(s) shown.

Rows per page

Page 1 of 3

Timeline

Introduced (est):
Jan 1, 2014
Reported:
Nov 19, 2018
Advisory Published:
Dec 2, 2019
CVE Published:
Dec 18, 2019
Android Patch Level:
None
For more information and a detailed analysis of the data presented on this website, please see our paper, to be presented at NDSS'25.
Follow us on Twitter