7.8

CVE-2019-14047

While IPA driver processes route add rule IOCTL, there is no input validation of the rule ID prior to adding the rule to the IPA HW commit list in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8053, APQ8096AU, MDM9607, MSM8909W, MSM8996, MSM8996AU, QCN7605, QCS605, SC8180X, SDA845, SDX20, SDX24, SDX55, SM8150, SXR1130

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
QualcommApq8053 Firmware Version-
   QualcommApq8053 Version-
QualcommApq8096au Firmware Version-
   QualcommApq8096au Version-
QualcommMdm9607 Firmware Version-
   QualcommMdm9607 Version-
QualcommMsm8909w Firmware Version-
   QualcommMsm8909w Version-
QualcommMsm8996 Firmware Version-
   QualcommMsm8996 Version-
QualcommMsm8996au Firmware Version-
   QualcommMsm8996au Version-
QualcommQcn7605 Firmware Version-
   QualcommQcn7605 Version-
QualcommQcs605 Firmware Version-
   QualcommQcs605 Version-
QualcommSc8180x Firmware Version-
   QualcommSc8180x Version-
QualcommSda845 Firmware Version-
   QualcommSda845 Version-
QualcommSdx20 Firmware Version-
   QualcommSdx20 Version-
QualcommSdx24 Firmware Version-
   QualcommSdx24 Version-
QualcommSdx55 Firmware Version-
   QualcommSdx55 Version-
QualcommSm8150 Firmware Version-
   QualcommSm8150 Version-
QualcommSxr1130 Firmware Version-
   QualcommSxr1130 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.06
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.2 3.9 10
AV:L/AC:L/Au:N/C:C/I:C/A:C
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.