Vulnerability Name:

CVE-2020-11169 (CCN-191038)

Assigned:2020-10-30
Published:2020-10-30
Updated:2021-07-21
Summary:u'Buffer over-read while processing received L2CAP packet due to lack of integer overflow check' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8053, QCA6390, QCN7605, QCN7606, SA415M, SA515M, SA6155P, SA8155P, SC8180X, SDX55
CVSS v3 Severity:9.1 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H)
7.9 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): High
9.8 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): Partial
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-190
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2020-11169

Source: XF
Type: UNKNOWN
qualcomm-cve202011169-overflow(191038)

Source: CONFIRM
Type: Broken Link
https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin

Source: CCN
Type: Qualcomm Web site
Qualcomm

Source: MISC
Type: Vendor Advisory
https://www.qualcomm.com/company/product-security/bulletins/october-2020-security-bulletin

Vulnerable Configuration:Configuration 1:
  • cpe:/o:qualcomm:apq8009_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:apq8009:-:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:apq8053:-:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:qca6390:-:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/o:qualcomm:qcn7605_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:qcn7605:-:*:*:*:*:*:*:*

  • Configuration 5:
  • cpe:/o:qualcomm:qcn7606_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:qcn7606:-:*:*:*:*:*:*:*

  • Configuration 6:
  • cpe:/o:qualcomm:sa415m_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sa415m:-:*:*:*:*:*:*:*

  • Configuration 7:
  • cpe:/o:qualcomm:sa515m_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sa515m:-:*:*:*:*:*:*:*

  • Configuration 8:
  • cpe:/o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sa6155p:-:*:*:*:*:*:*:*

  • Configuration 9:
  • cpe:/o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sa8155p:-:*:*:*:*:*:*:*

  • Configuration 10:
  • cpe:/o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sc8180x:-:*:*:*:*:*:*:*

  • Configuration 11:
  • cpe:/o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sdx55:-:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/h:qualcomm:snapdragon_mobile:-:*:*:*:*:*:*:*
  • OR cpe:/h:qualcomm:snapdragon_auto:-:*:*:*:*:*:*:*
  • OR cpe:/h:qualcomm:snapdragon_compute:-:*:*:*:*:*:*:*
  • OR cpe:/h:qualcomm:snapdragon_connectivity:-:*:*:*:*:*:*:*
  • OR cpe:/h:qualcomm:snapdragon_consumer_electronics_connectivity:-:*:*:*:*:*:*:*
  • OR cpe:/h:qualcomm:snapdragon_consumer_internet_of_things:-:*:*:*:*:*:*:*
  • OR cpe:/h:qualcomm:snapdragon_industrial_internet_of_things:-:*:*:*:*:*:*:*
  • OR cpe:/h:qualcomm:snapdragon_voice_&_music:-:*:*:*:*:*:*:*
  • OR cpe:/o:qualcomm:snapdragon_wired_infrastructure_&_networking:-:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    qualcomm apq8009 firmware -
    qualcomm apq8009 -
    qualcomm apq8053 firmware -
    qualcomm apq8053 -
    qualcomm qca6390 firmware -
    qualcomm qca6390 -
    qualcomm qcn7605 firmware -
    qualcomm qcn7605 -
    qualcomm qcn7606 firmware -
    qualcomm qcn7606 -
    qualcomm sa415m firmware -
    qualcomm sa415m -
    qualcomm sa515m firmware -
    qualcomm sa515m -
    qualcomm sa6155p firmware -
    qualcomm sa6155p -
    qualcomm sa8155p firmware -
    qualcomm sa8155p -
    qualcomm sc8180x firmware -
    qualcomm sc8180x -
    qualcomm sdx55 firmware -
    qualcomm sdx55 -
    qualcomm snapdragon mobile -
    qualcomm snapdragon auto -
    qualcomm snapdragon compute -
    qualcomm snapdragon connectivity -
    qualcomm snapdragon consumer electronics connectivity -
    qualcomm snapdragon consumer internet of things -
    qualcomm snapdragon industrial internet of things -
    qualcomm snapdragon voice & music -
    qualcomm snapdragon wired infrastructure & networking -