7.8
CVSSv3

CVE-2019-10492

CVSSv4: NA | CVSSv3: 7.8 | CVSSv2: 7.2 | VMScore: 880 | EPSS: 0.00017 | KEV: Not Included
Published: 30/09/2019 Updated: 21/11/2024

Vulnerability Summary

Boot image not getting verified by AVB in Snapdragon Auto, Snapdragon Mobile, Snapdragon Wearables in MDM9607, MSM8909W, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 820, SD 820A, SDM439

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qualcomm, inc. snapdragon auto, snapdragon mobile, snapdragon wearables

qualcomm mdm9607 firmware -

qualcomm msm8909w firmware -

qualcomm qualcomm 215 firmware -

qualcomm sd 210 firmware -

qualcomm sd 212 firmware -

qualcomm sd 205 firmware -

qualcomm sd 425 firmware -

qualcomm sd 427 firmware -

qualcomm sd 430 firmware -

qualcomm sd 435 firmware -

qualcomm sd 439 firmware -

qualcomm sd 429 firmware -

qualcomm sd 450 firmware -

qualcomm sd 625 firmware -

qualcomm sd 632 firmware -

qualcomm sd 820 firmware -

qualcomm sd 820a firmware -

qualcomm sdm439 firmware -

Recent Articles

It's 2019 – and you can completely pwn millions of Qualcomm-powered Androids over the air
The Register • Shaun Nichols in San Francisco • 06 Aug 2019

Grab security patches now from chip designer, Google Exposed: Lazy Android mobe makers couldn't care less about security

Black Hat It is possible to thoroughly hijack a nearby vulnerable Qualcomm-based Android phone, tablet, or similar gadget, via Wi-Fi, we learned on Monday. This likely affects millions of Android devices. Specifically, the following two security holes, dubbed Qualpwn and found by Tencent's Blade Team, can be leveraged one after the other to potentially take over a handheld: Thus, it is possible for a miscreant to join a nearby wireless network, seek out a vulnerable Qualcomm-powered Android devi...

It's 2019 – and you can completely pwn millions of Qualcomm-powered Androids over the air
The Register • Shaun Nichols in San Francisco • 06 Aug 2019

Grab security patches now from chip designer, Google Exposed: Lazy Android mobe makers couldn't care less about security

Black Hat It is possible to thoroughly hijack a nearby vulnerable Qualcomm-based Android phone, tablet, or similar gadget, via Wi-Fi, we learned on Monday. This likely affects millions of Android devices. Specifically, the following two security holes, dubbed Qualpwn and found by Tencent's Blade Team, can be leveraged one after the other to potentially take over a handheld: Thus, it is possible for a miscreant to join a nearby wireless network, seek out a vulnerable Qualcomm-powered Android devi...