7.5
CVE-2018-11291
- EPSS 0.22%
- Published 20.09.2018 13:29:01
- Last modified 21.11.2024 03:43:04
- Source product-security@qualcomm.com
- Teams watchlist Login
- Open Login
In Snapdragon (Automobile, Mobile, Wear) in version IPQ8074, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA4531, QCA6174A, QCA6564, QCA6574, QCA6574AU, QCA6584, QCA6584AU, QCA9377, QCA9378, QCA9379, SD 425, SD 427, SD 430, SD 435, SD 450, SD 600, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, SDM630, SDM632, SDM636, SDM660, SDX20, Snapdragon_High_Med_2016, cryptographic issues due to the random number generator was not a strong one in NAN.
Data is provided by the National Vulnerability Database (NVD)
Qualcomm ≫ Ipq8074 Firmware Version-
Qualcomm ≫ Mdm9206 Firmware Version-
Qualcomm ≫ Mdm9607 Firmware Version-
Qualcomm ≫ Mdm9640 Firmware Version-
Qualcomm ≫ Mdm9650 Firmware Version-
Qualcomm ≫ Msm8996au Firmware Version-
Qualcomm ≫ Qca4531 Firmware Version-
Qualcomm ≫ Qca6174a Firmware Version-
Qualcomm ≫ Qca6564 Firmware Version-
Qualcomm ≫ Qca6574 Firmware Version-
Qualcomm ≫ Qca6574au Firmware Version-
Qualcomm ≫ Qca6584 Firmware Version-
Qualcomm ≫ Qca6584au Firmware Version-
Qualcomm ≫ Qca9377 Firmware Version-
Qualcomm ≫ Qca9378 Firmware Version-
Qualcomm ≫ Qca9379 Firmware Version-
Qualcomm ≫ Sd425 Firmware Version-
Qualcomm ≫ Sd427 Firmware Version-
Qualcomm ≫ Sd430 Firmware Version-
Qualcomm ≫ Sd435 Firmware Version-
Qualcomm ≫ Sd450 Firmware Version-
Qualcomm ≫ Sd600 Firmware Version-
Qualcomm ≫ Sd625 Firmware Version-
Qualcomm ≫ Sd650 Firmware Version-
Qualcomm ≫ Sd652 Firmware Version-
Qualcomm ≫ Sd810 Firmware Version-
Qualcomm ≫ Sd820 Firmware Version-
Qualcomm ≫ Sd820a Firmware Version-
Qualcomm ≫ Sd835 Firmware Version-
Qualcomm ≫ Sd845 Firmware Version-
Qualcomm ≫ Sd850 Firmware Version-
Qualcomm ≫ Sdm630 Firmware Version-
Qualcomm ≫ Sdm632 Firmware Version-
Qualcomm ≫ Sdm636 Firmware Version-
Qualcomm ≫ Sdm660 Firmware Version-
Qualcomm ≫ Sdx20 Firmware Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.22% | 0.446 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:P/A:N
|
CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
The product uses a Pseudo-Random Number Generator (PRNG) in a security context, but the PRNG's algorithm is not cryptographically strong.