Vulnerability

CVE-2019-10562

Component: TRUST
Location: FIRMWARE
u'Improper authentication and signature verification of debug polices in secure boot loader will allow unverified debug policies to be loaded into secure memory and leads to memory corruption' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in IPQ6018, Kamorta, MSM8998, Nicobar, QCS404, QCS605, QCS610, Rennell, SA415M, SA6155P, SC7180, SDA660, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

Impact

Severity (Manufact.)

N/A

Severity (NIST)

7.8

Severity (Android)

N/A

Chipsets

11

Devices

610

Affected Hardware

NameAlso known asManufacturer
SDM630
Snapdragon 630
Qualcomm
SDM636
Snapdragon 636
Qualcomm
SDM660
Snapdragon 660
Qualcomm
SDM670
Snapdragon 670
Qualcomm
SM6150
Snapdragon 675
Qualcomm
SDM710
Snapdragon 710
Qualcomm
MSM8998
Snapdragon 835
Snapdragon 835 Mobile PC Platform
Qualcomm
SDM845
Snapdragon 845
Qualcomm
SM8150
Snapdragon 855
Qualcomm
SDM850
Snapdragon 850 Mobile Compute Platform
Qualcomm
11 of 11 row(s) shown.

Rows per page

Page 1 of 2

Timeline

Introduced (est):
Apr 1, 2017
Reported:
Unknown
Advisory Published:
Aug 5, 2020
CVE Published:
Sep 8, 2020
Android Patch Level:
Aug 2020
For more information and a detailed analysis of the data presented on this website, please see our paper, to be presented at NDSS'25.
Follow us on Twitter