Vulnerability Name: CVE-2020-11153 (CCN-191092) Assigned: 2020-10-05 Published: 2020-10-05 Updated: 2020-11-03 Summary: u'Out of bound memory access while processing GATT data received due to lack of check of pdu data length and leads to remote code execution' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in APQ8053, QCA6390, QCA9379, QCN7605, SC8180X, SDX55 CVSS v3 Severity: 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H )8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
9.8 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H )8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-787 Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2020-11153 Source: XF Type: UNKNOWNqualcomm-cve202011153-bo(191092) Source: CONFIRM Type: Broken Linkhttps://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin Source: CCN Type: Qualcomm Web siteQualcomm Source: MISC Type: Vendor Advisoryhttps://www.qualcomm.com/company/product-security/bulletins/october-2020-security-bulletin Vulnerable Configuration: Configuration 1 :cpe:/o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:apq8053:-:*:*:*:*:*:*:* Configuration 2 :cpe:/o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:qca6390:-:*:*:*:*:*:*:* Configuration 3 :cpe:/o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:qca9379:-:*:*:*:*:*:*:* Configuration 4 :cpe:/o:qualcomm:qcn7605_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:qcn7605:-:*:*:*:*:*:*:* Configuration 5 :cpe:/o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sc8180x:-:*:*:*:*:*:*:* Configuration 6 :cpe:/o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sdx55:-:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/h:qualcomm:snapdragon_mobile:-:*:*:*:*:*:*:* OR cpe:/h:qualcomm:snapdragon_auto:-:*:*:*:*:*:*:* OR cpe:/h:qualcomm:snapdragon_compute:-:*:*:*:*:*:*:* OR cpe:/h:qualcomm:snapdragon_connectivity:-:*:*:*:*:*:*:* OR cpe:/h:qualcomm:snapdragon_consumer_electronics_connectivity:-:*:*:*:*:*:*:* OR cpe:/h:qualcomm:snapdragon_consumer_internet_of_things:-:*:*:*:*:*:*:* OR cpe:/h:qualcomm:snapdragon_industrial_internet_of_things:-:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
qualcomm apq8053 firmware -
qualcomm apq8053 -
qualcomm qca6390 firmware -
qualcomm qca6390 -
qualcomm qca9379 firmware -
qualcomm qca9379 -
qualcomm qcn7605 firmware -
qualcomm qcn7605 -
qualcomm sc8180x firmware -
qualcomm sc8180x -
qualcomm sdx55 firmware -
qualcomm sdx55 -
qualcomm snapdragon mobile -
qualcomm snapdragon auto -
qualcomm snapdragon compute -
qualcomm snapdragon connectivity -
qualcomm snapdragon consumer electronics connectivity -
qualcomm snapdragon consumer internet of things -
qualcomm snapdragon industrial internet of things -