{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-16T03:59:09.631","vulnerabilities":[{"cve":{"id":"CVE-2016-10442","sourceIdentifier":"product-security@qualcomm.com","published":"2018-04-18T14:29:11.573","lastModified":"2024-11-21T02:44:01.170","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile MDM9640, SDM630, MSM8976, MSM8937, SDM845, MSM8976, and MSM8952, when running module or kernel code with improper access control allowing writing to arbitrary regions of memory, the user may utilize this vector to alter module executable code."},{"lang":"es","value":"En Android, antes del nivel de parche de seguridad del 2018-04-05 o antes en Qualcomm Snapdragon Mobile MDM9640, SDM630, MSM8976, MSM8937, SDM845, MSM8976 y MSM8952, al ejecutar un módulo o código del kernel con un control de acceso incorrecto que permite la escritura en regiones arbitrarias de memoria, el usuario podría utilizar este vector para alterar el código ejecutable del módulo."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":true,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-284"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"7FD1C359-C79B-4CE8-A192-5AA34D0BF05B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*","matchCriteriaId":"716B747E-672C-4B95-9D8E-1262338E67EA"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"8EA0D645-80F6-48C3-AF0D-99198ADC8778"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*","matchCriteriaId":"814FF3F3-CD5A-45A3-988C-6457D2CEB48C"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"35B7E25E-FA92-4C36-883C-CFF36F4B3507"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*","matchCriteriaId":"ECD99C6F-2444-4A5E-A517-0C8023DDF23D"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qualcomm:msm8976_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"ED6D7455-A154-4BAD-BAD1-1EFCB2F28599"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:qualcomm:msm8976:-:*:*:*:*:*:*:*","matchCriteriaId":"0E8FF0C6-C7C9-425D-B1C8-90658629EC69"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qualcomm:msm8937_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"F3D56596-D726-44FD-ADEA-901D972AC66A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:qualcomm:msm8937:-:*:*:*:*:*:*:*","matchCriteriaId":"A58B5A6E-84B9-4356-9CFE-4E80BD81FB33"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"DED4B719-53B5-4D16-B3FA-ADE29D28ED86"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*","matchCriteriaId":"D342C86B-E184-457C-9F72-BD853ED79425"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qualcomm:msm8976_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"ED6D7455-A154-4BAD-BAD1-1EFCB2F28599"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:qualcomm:msm8976:-:*:*:*:*:*:*:*","matchCriteriaId":"0E8FF0C6-C7C9-425D-B1C8-90658629EC69"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qualcomm:msm8952_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"B551DB82-5C86-4853-8D92-2148FB4B4DC0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:qualcomm:msm8952:-:*:*:*:*:*:*:*","matchCriteriaId":"9031848F-0BD7-48F1-893D-82E48048F91D"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/103671","source":"product-security@qualcomm.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://source.android.com/security/bulletin/2018-04-01","source":"product-security@qualcomm.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/103671","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://source.android.com/security/bulletin/2018-04-01","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}