Vulnerability Details CVE-2019-14071
Compromised reset handler may bypass access control due to AC config is being reset if debug path is enabled to collect secure or non-secure ram dumps in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8017, APQ8053, APQ8096, APQ8096AU, IPQ6018, MDM9205, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS404, QCS405, QCS605, QM215, Rennell, SA6155P, SC8180X, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130, SXR2130
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 8.1%
CVSS Severity
CVSS v3 Score 7.8
CVSS v2 Score 6.9
Products affected by CVE-2019-14071
-
cpe:2.3:h:qualcomm:apq8017:-
-
cpe:2.3:h:qualcomm:apq8053:-
-
cpe:2.3:h:qualcomm:apq8096:-
-
cpe:2.3:h:qualcomm:apq8096au:-
-
cpe:2.3:h:qualcomm:ipq6018:-
-
cpe:2.3:h:qualcomm:mdm9205:-
-
cpe:2.3:h:qualcomm:msm8917:-
-
cpe:2.3:h:qualcomm:msm8920:-
-
cpe:2.3:h:qualcomm:msm8937:-
-
cpe:2.3:h:qualcomm:msm8940:-
-
cpe:2.3:h:qualcomm:msm8953:-
-
cpe:2.3:h:qualcomm:msm8996:-
-
cpe:2.3:h:qualcomm:msm8996au:-
-
cpe:2.3:h:qualcomm:msm8998:-
-
cpe:2.3:h:qualcomm:nicobar:-
-
cpe:2.3:h:qualcomm:qcm2150:-
-
cpe:2.3:h:qualcomm:qcs404:-
-
cpe:2.3:h:qualcomm:qcs405:-
-
cpe:2.3:h:qualcomm:qcs605:-
-
cpe:2.3:h:qualcomm:qm215:-
-
cpe:2.3:h:qualcomm:rennell:-
-
cpe:2.3:h:qualcomm:sa6155p:-
-
cpe:2.3:h:qualcomm:sc8180x:-
-
cpe:2.3:h:qualcomm:sda660:-
-
cpe:2.3:h:qualcomm:sda845:-
-
cpe:2.3:h:qualcomm:sdm429:-
-
cpe:2.3:h:qualcomm:sdm439:-
-
cpe:2.3:h:qualcomm:sdm450:-
-
cpe:2.3:h:qualcomm:sdm630:-
-
cpe:2.3:h:qualcomm:sdm632:-
-
cpe:2.3:h:qualcomm:sdm636:-
-
cpe:2.3:h:qualcomm:sdm660:-
-
cpe:2.3:h:qualcomm:sdm670:-
-
cpe:2.3:h:qualcomm:sdm710:-
-
cpe:2.3:h:qualcomm:sdm845:-
-
cpe:2.3:h:qualcomm:sdm850:-
-
cpe:2.3:h:qualcomm:sdx24:-
-
cpe:2.3:h:qualcomm:sdx55:-
-
cpe:2.3:h:qualcomm:sm6150:-
-
cpe:2.3:h:qualcomm:sm7150:-
-
cpe:2.3:h:qualcomm:sm8150:-
-
cpe:2.3:h:qualcomm:sxr1130:-
-
cpe:2.3:h:qualcomm:sxr2130:-
-
cpe:2.3:o:qualcomm:apq8017_firmware:-
-
cpe:2.3:o:qualcomm:apq8053_firmware:-
-
cpe:2.3:o:qualcomm:apq8096_firmware:-
-
cpe:2.3:o:qualcomm:apq8096au_firmware:-
-
cpe:2.3:o:qualcomm:ipq6018_firmware:-
-
cpe:2.3:o:qualcomm:mdm9205_firmware:-
-
cpe:2.3:o:qualcomm:msm8917_firmware:-
-
cpe:2.3:o:qualcomm:msm8920_firmware:-
-
cpe:2.3:o:qualcomm:msm8937_firmware:-
-
cpe:2.3:o:qualcomm:msm8940_firmware:-
-
cpe:2.3:o:qualcomm:msm8953_firmware:-
-
cpe:2.3:o:qualcomm:msm8996_firmware:-
-
cpe:2.3:o:qualcomm:msm8996au_firmware:-
-
cpe:2.3:o:qualcomm:msm8998_firmware:-
-
cpe:2.3:o:qualcomm:nicobar_firmware:-
-
cpe:2.3:o:qualcomm:qcm2150_firmware:-
-
cpe:2.3:o:qualcomm:qcs404_firmware:-
-
cpe:2.3:o:qualcomm:qcs405_firmware:-
-
cpe:2.3:o:qualcomm:qcs605_firmware:-
-
cpe:2.3:o:qualcomm:qm215_firmware:-
-
cpe:2.3:o:qualcomm:rennell_firmware:-
-
cpe:2.3:o:qualcomm:sa6155p_firmware:-
-
cpe:2.3:o:qualcomm:sc8180x_firmware:-
-
cpe:2.3:o:qualcomm:sda660_firmware:-
-
cpe:2.3:o:qualcomm:sda845_firmware:-
-
cpe:2.3:o:qualcomm:sdm429_firmware:-
-
cpe:2.3:o:qualcomm:sdm439_firmware:-
-
cpe:2.3:o:qualcomm:sdm450_firmware:-
-
cpe:2.3:o:qualcomm:sdm630_firmware:-
-
cpe:2.3:o:qualcomm:sdm632_firmware:-
-
cpe:2.3:o:qualcomm:sdm636_firmware:-
-
cpe:2.3:o:qualcomm:sdm660_firmware:-
-
cpe:2.3:o:qualcomm:sdm670_firmware:-
-
cpe:2.3:o:qualcomm:sdm710_firmware:-
-
cpe:2.3:o:qualcomm:sdm845_firmware:-
-
cpe:2.3:o:qualcomm:sdm850_firmware:-
-
cpe:2.3:o:qualcomm:sdx24_firmware:-
-
cpe:2.3:o:qualcomm:sdx55_firmware:-
-
cpe:2.3:o:qualcomm:sm6150_firmware:-
-
cpe:2.3:o:qualcomm:sm7150_firmware:-
-
cpe:2.3:o:qualcomm:sm8150_firmware:-
-
cpe:2.3:o:qualcomm:sxr1130_firmware:-
-
cpe:2.3:o:qualcomm:sxr2130_firmware:-