Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2019-2338 : Security Advisory and Response

Learn about CVE-2019-2338, a vulnerability in Snapdragon platforms allowing unauthorized access to secure world memory. Find out affected systems, versions, and mitigation steps.

A carefully designed image with a valid signature from a non-QC entity can be uploaded, enabling it to access and modify the memory that belongs to the secure world in various Snapdragon platforms such as Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking. This includes specific chipsets like MDM9205, MSM8998, QCS404, QCS605, SDA660, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SM6150, SM7150, SM8150, SXR1130, SXR2130.

Understanding CVE-2019-2338

Crafted image that has a valid signature from a non-QC entity can be loaded which can read/write memory that belongs to the secure world in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in MDM9205, MSM8998, QCS404, QCS605, SDA660, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SM6150, SM7150, SM8150, SXR1130, SXR2130.

What is CVE-2019-2338?

        Vulnerability in Snapdragon platforms allows a crafted image to access and modify secure world memory.

The Impact of CVE-2019-2338

        Unauthorized access and modification of secure world memory in various Snapdragon platforms.

Technical Details of CVE-2019-2338

A crafted image with a valid signature from a non-QC entity can exploit this vulnerability.

Vulnerability Description

        Use of Out-of-range Pointer Offset in QTEE.

Affected Systems and Versions

        Vendor: Qualcomm, Inc.
        Products: Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking.
        Versions: MDM9205, MSM8998, QCS404, QCS605, SDA660, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SM6150, SM7150, SM8150, SXR1130, SXR2130.

Exploitation Mechanism

        Crafted image with a valid signature from a non-QC entity can be uploaded to exploit the vulnerability.

Mitigation and Prevention

Immediate Steps to Take:

        Apply patches provided by Qualcomm.
        Monitor for any unauthorized access or modifications.

Long-Term Security Practices:

        Regularly update software and firmware.
        Implement secure boot mechanisms.

Patching and Updates:

        Stay informed about security bulletins and updates from Qualcomm.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now