Vulnerability Details : CVE-2018-5871
In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016, MAC address randomization performed during probe requests (for privacy reasons) is not done properly due to a flawed RNG which produces repeating output much earlier than expected.
Products affected by CVE-2018-5871
- cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sd210_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sd212_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sd205_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sd425_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sd427_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sd430_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sd435_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sd450_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sd650_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sd652_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sd820a_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sd845_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sd615_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sd616_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sd415_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sd850_firmware:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-5871
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 29 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-5871
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.3
|
LOW | AV:A/AC:L/Au:N/C:N/I:P/A:N |
6.5
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2018-5871
-
The product uses a Pseudo-Random Number Generator (PRNG) in a security context, but the PRNG's algorithm is not cryptographically strong.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-5871
-
https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components
Android Security Bulletin—September 2018 | Android Open Source ProjectThird Party Advisory
-
https://www.qualcomm.com/company/product-security/bulletins
Security Advisories | Product Security | QualcommVendor Advisory
Jump to