Vulnerability Name: | CVE-2020-11169 (CCN-191038) |
Assigned: | 2020-10-30 |
Published: | 2020-10-30 |
Updated: | 2021-07-21 |
Summary: | u'Buffer over-read while processing received L2CAP packet due to lack of integer overflow check' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8053, QCA6390, QCN7605, QCN7606, SA415M, SA515M, SA6155P, SA8155P, SC8180X, SDX55
|
CVSS v3 Severity: | 9.1 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H) 7.9 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): None Availibility (A): High | 9.8 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High |
|
CVSS v2 Severity: | 6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): None Availibility (A): Partial | 10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete |
|
Vulnerability Type: | CWE-190
|
Vulnerability Consequences: | Gain Access |
References: | Source: MITRE Type: CNA CVE-2020-11169
Source: XF Type: UNKNOWN qualcomm-cve202011169-overflow(191038)
Source: CONFIRM Type: Broken Link https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin
Source: CCN Type: Qualcomm Web site Qualcomm
Source: MISC Type: Vendor Advisory https://www.qualcomm.com/company/product-security/bulletins/october-2020-security-bulletin
|
Vulnerable Configuration: | Configuration 1: cpe:/o:qualcomm:apq8009_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:apq8009:-:*:*:*:*:*:*:* Configuration 2: cpe:/o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:apq8053:-:*:*:*:*:*:*:* Configuration 3: cpe:/o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:qca6390:-:*:*:*:*:*:*:* Configuration 4: cpe:/o:qualcomm:qcn7605_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:qcn7605:-:*:*:*:*:*:*:* Configuration 5: cpe:/o:qualcomm:qcn7606_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:qcn7606:-:*:*:*:*:*:*:* Configuration 6: cpe:/o:qualcomm:sa415m_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sa415m:-:*:*:*:*:*:*:* Configuration 7: cpe:/o:qualcomm:sa515m_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sa515m:-:*:*:*:*:*:*:* Configuration 8: cpe:/o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sa6155p:-:*:*:*:*:*:*:* Configuration 9: cpe:/o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sa8155p:-:*:*:*:*:*:*:* Configuration 10: cpe:/o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sc8180x:-:*:*:*:*:*:*:* Configuration 11: cpe:/o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdx55:-:*:*:*:*:*:*:* Configuration CCN 1: cpe:/h:qualcomm:snapdragon_mobile:-:*:*:*:*:*:*:*OR cpe:/h:qualcomm:snapdragon_auto:-:*:*:*:*:*:*:*OR cpe:/h:qualcomm:snapdragon_compute:-:*:*:*:*:*:*:*OR cpe:/h:qualcomm:snapdragon_connectivity:-:*:*:*:*:*:*:*OR cpe:/h:qualcomm:snapdragon_consumer_electronics_connectivity:-:*:*:*:*:*:*:*OR cpe:/h:qualcomm:snapdragon_consumer_internet_of_things:-:*:*:*:*:*:*:*OR cpe:/h:qualcomm:snapdragon_industrial_internet_of_things:-:*:*:*:*:*:*:*OR cpe:/h:qualcomm:snapdragon_voice_&_music:-:*:*:*:*:*:*:*OR cpe:/o:qualcomm:snapdragon_wired_infrastructure_&_networking:-:*:*:*:*:*:*:*
Denotes that component is vulnerable |
BACK |
qualcomm apq8009 firmware -
qualcomm apq8009 -
qualcomm apq8053 firmware -
qualcomm apq8053 -
qualcomm qca6390 firmware -
qualcomm qca6390 -
qualcomm qcn7605 firmware -
qualcomm qcn7605 -
qualcomm qcn7606 firmware -
qualcomm qcn7606 -
qualcomm sa415m firmware -
qualcomm sa415m -
qualcomm sa515m firmware -
qualcomm sa515m -
qualcomm sa6155p firmware -
qualcomm sa6155p -
qualcomm sa8155p firmware -
qualcomm sa8155p -
qualcomm sc8180x firmware -
qualcomm sc8180x -
qualcomm sdx55 firmware -
qualcomm sdx55 -
qualcomm snapdragon mobile -
qualcomm snapdragon auto -
qualcomm snapdragon compute -
qualcomm snapdragon connectivity -
qualcomm snapdragon consumer electronics connectivity -
qualcomm snapdragon consumer internet of things -
qualcomm snapdragon industrial internet of things -
qualcomm snapdragon voice & music -
qualcomm snapdragon wired infrastructure & networking -