Vulnerability Name: CVE-2020-11154 (CCN-191090) Assigned: 2020-10-05 Published: 2020-10-05 Updated: 2020-11-03 Summary: u'Buffer overflow while processing a crafted PDU data packet in bluetooth due to lack of check of buffer size before copying' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8053, QCA6390, QCN7605, QCN7606, SA415M, SA515M, SA6155P, SA8155P, SC8180X, SDX55 CVSS v3 Severity: 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H )7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): AdjacentAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
9.8 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H )8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 8.3 High (CVSS v2 Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): Adjacent_NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-120 Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2020-11154 Source: XF Type: UNKNOWNqualcomm-cve202011154-bo(191090) Source: CONFIRM Type: Broken Linkhttps://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin Source: CCN Type: Qualcomm Web siteQualcomm Source: MISC Type: Vendor Advisoryhttps://www.qualcomm.com/company/product-security/bulletins/october-2020-security-bulletin Vulnerable Configuration: Configuration 1 :cpe:/o:qualcomm:apq8009_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:apq8009:-:*:*:*:*:*:*:* Configuration 2 :cpe:/o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:apq8053:-:*:*:*:*:*:*:* Configuration 3 :cpe:/o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:qca6390:-:*:*:*:*:*:*:* Configuration 4 :cpe:/o:qualcomm:qcn7605_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:qcn7605:-:*:*:*:*:*:*:* Configuration 5 :cpe:/o:qualcomm:qcn7606_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:qcn7606:-:*:*:*:*:*:*:* Configuration 6 :cpe:/o:qualcomm:sa415m_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sa415m:-:*:*:*:*:*:*:* Configuration 7 :cpe:/o:qualcomm:sa515m_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sa515m:-:*:*:*:*:*:*:* Configuration 8 :cpe:/o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sa6155p:-:*:*:*:*:*:*:* Configuration 9 :cpe:/o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sa8155p:-:*:*:*:*:*:*:* Configuration 10 :cpe:/o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sc8180x:-:*:*:*:*:*:*:* Configuration 11 :cpe:/o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sdx55:-:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/h:qualcomm:snapdragon_mobile:-:*:*:*:*:*:*:* OR cpe:/h:qualcomm:snapdragon_auto:-:*:*:*:*:*:*:* OR cpe:/h:qualcomm:snapdragon_compute:-:*:*:*:*:*:*:* OR cpe:/h:qualcomm:snapdragon_connectivity:-:*:*:*:*:*:*:* OR cpe:/h:qualcomm:snapdragon_consumer_electronics_connectivity:-:*:*:*:*:*:*:* OR cpe:/h:qualcomm:snapdragon_consumer_internet_of_things:-:*:*:*:*:*:*:* OR cpe:/h:qualcomm:snapdragon_industrial_internet_of_things:-:*:*:*:*:*:*:* OR cpe:/h:qualcomm:snapdragon_voice_&_music:-:*:*:*:*:*:*:* OR cpe:/o:qualcomm:snapdragon_wired_infrastructure_&_networking:-:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
qualcomm apq8009 firmware -
qualcomm apq8009 -
qualcomm apq8053 firmware -
qualcomm apq8053 -
qualcomm qca6390 firmware -
qualcomm qca6390 -
qualcomm qcn7605 firmware -
qualcomm qcn7605 -
qualcomm qcn7606 firmware -
qualcomm qcn7606 -
qualcomm sa415m firmware -
qualcomm sa415m -
qualcomm sa515m firmware -
qualcomm sa515m -
qualcomm sa6155p firmware -
qualcomm sa6155p -
qualcomm sa8155p firmware -
qualcomm sa8155p -
qualcomm sc8180x firmware -
qualcomm sc8180x -
qualcomm sdx55 firmware -
qualcomm sdx55 -
qualcomm snapdragon mobile -
qualcomm snapdragon auto -
qualcomm snapdragon compute -
qualcomm snapdragon connectivity -
qualcomm snapdragon consumer electronics connectivity -
qualcomm snapdragon consumer internet of things -
qualcomm snapdragon industrial internet of things -
qualcomm snapdragon voice & music -
qualcomm snapdragon wired infrastructure & networking -