Vulnerability
CVE-2019-10562
Component: TRUST
Location: FIRMWARE
u'Improper authentication and signature verification of debug polices in secure boot loader will allow unverified debug policies to be loaded into secure memory and leads to memory corruption' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in IPQ6018, Kamorta, MSM8998, Nicobar, QCS404, QCS605, QCS610, Rennell, SA415M, SA6155P, SC7180, SDA660, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
Impact
Severity (Manufact.)
N/A
Severity (NIST)
7.8
Severity (Android)
N/A
Chipsets
11
Devices
610
Affected Hardware
Name | Also known as | Manufacturer |
---|---|---|
SDM630 | Snapdragon 630 | Qualcomm |
SDM636 | Snapdragon 636 | Qualcomm |
SDM660 | Snapdragon 660 | Qualcomm |
SDM670 | Snapdragon 670 | Qualcomm |
SM6150 | Snapdragon 675 | Qualcomm |
SDM710 | Snapdragon 710 | Qualcomm |
MSM8998 | Snapdragon 835 Snapdragon 835 Mobile PC Platform | Qualcomm |
SDM845 | Snapdragon 845 | Qualcomm |
SM8150 | Snapdragon 855 | Qualcomm |
SDM850 | Snapdragon 850 Mobile Compute Platform | Qualcomm |
11 of 11 row(s) shown.
Rows per page
Page 1 of 2
Information reliability
The information on this website is intended to provide information on the big picture of chipset security and measure trends within the industry. Our information is obtained from several vantage points, checked for consistency, and automatically cross-referenced. However, this process may not always yield reliable information. Do not use the information on a particular vulnerability, chipset or device to verify your individual exposure in cases where inaccuracies are inacceptable, for instance to assess risks if you are a Politically Exposed Person.
Timeline
Introduced (est):
Apr 1, 2017
Reported:
Unknown
Advisory Published:
Aug 5, 2020
CVE Published:
Sep 8, 2020
Android Patch Level:
Aug 2020