CVE-2017-18072

In Android before security patch level 2018-04-05 on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9640, MDM9650, QCA4531, QCA6174A, QCA6564, QCA6574, QCA6574AU, QCA6584, QCA6584AU, QCA9377, QCA9378, QCA9379, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 808, SD 810, SD 820, SD 835, SD 845, SDM630, SDM636, SDM660, Snapdragon_High_Med_2016, the probe requests originated from user's phone contains the information elements which specifies the supported wifi features. This shall impact the user's privacy if someone sniffs the probe requests originated by this DUT. Hence, control the presence of which information elements is supported.
References
Link Resource
http://www.securityfocus.com/bid/103671 Third Party Advisory VDB Entry
https://source.android.com/security/bulletin/2018-04-01 Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:qualcomm:qca6584_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qca6584:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd_412:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*

Configuration 17 (hide)

AND
cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*

Configuration 18 (hide)

AND
cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*

Configuration 19 (hide)

AND
cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*

Configuration 20 (hide)

AND
cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*

Configuration 21 (hide)

AND
cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*

Configuration 22 (hide)

AND
cpe:2.3:o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:*

Configuration 23 (hide)

AND
cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*

Configuration 24 (hide)

AND
cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*

Configuration 25 (hide)

AND
cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*

Configuration 26 (hide)

AND
cpe:2.3:o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd_427:-:*:*:*:*:*:*:*

Configuration 27 (hide)

AND
cpe:2.3:o:qualcomm:sd_808_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd_808:-:*:*:*:*:*:*:*

Configuration 28 (hide)

AND
cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*

Configuration 29 (hide)

AND
cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*

Configuration 30 (hide)

AND
cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*

Configuration 31 (hide)

AND
cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*

Configuration 32 (hide)

AND
cpe:2.3:o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd_435:-:*:*:*:*:*:*:*

Configuration 33 (hide)

AND
cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*

Configuration 34 (hide)

AND
cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*

Configuration 35 (hide)

AND
cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*

Configuration 36 (hide)

AND
cpe:2.3:o:qualcomm:qca9378_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qca9378au:-:*:*:*:*:*:*:*

Configuration 37 (hide)

AND
cpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qca6564:-:*:*:*:*:*:*:*

Configuration 38 (hide)

AND
cpe:2.3:o:qualcomm:qca4531_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qca4531:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-04-11 15:29

Updated : 2023-12-10 12:30


NVD link : CVE-2017-18072

Mitre link : CVE-2017-18072

CVE.ORG link : CVE-2017-18072


JSON object : View

Products Affected

qualcomm

  • sd_415_firmware
  • sd_810
  • sdm636_firmware
  • mdm9640
  • sd_652
  • sd_835_firmware
  • sd_615_firmware
  • mdm9607
  • mdm9206
  • sd_412
  • sd_450_firmware
  • sdm630_firmware
  • sdm660_firmware
  • sd_410_firmware
  • qca9377
  • sd_616_firmware
  • qca4531
  • qca6584au
  • qca6574
  • sd_845
  • sd_210
  • sd_425
  • sdm636
  • qca6564
  • sd_625
  • sd_412_firmware
  • sd_212_firmware
  • sd_427_firmware
  • qca6574au
  • qca9379
  • sd_425_firmware
  • sd_616
  • sd_808_firmware
  • qca9377_firmware
  • sd_625_firmware
  • qca9378_firmware
  • sd_820_firmware
  • sd_835
  • qca6584_firmware
  • sd_430
  • sd_450
  • sd_808
  • sd_435
  • qca9378au
  • sd_210_firmware
  • qca6574au_firmware
  • mdm9650
  • sd_212
  • mdm9607_firmware
  • sd_205_firmware
  • mdm9650_firmware
  • sd_205
  • sd_430_firmware
  • mdm9206_firmware
  • sd_415
  • qca6584au_firmware
  • mdm9640_firmware
  • qca6584
  • sd_650_firmware
  • qca6174a_firmware
  • sd_652_firmware
  • sd_427
  • sd_820
  • sd_435_firmware
  • qca6564_firmware
  • sdm660
  • qca9379_firmware
  • qca6574_firmware
  • sd_410
  • qca6174a
  • sd_845_firmware
  • sd_650
  • qca4531_firmware
  • sd_810_firmware
  • sd_615
  • sdm630
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor