Vulnerability Name:

CVE-2020-11173 (CCN-191036)

Assigned:2020-10-30
Published:2020-10-30
Updated:2021-07-21
Summary:u'Two threads running simultaneously from user space can lead to race condition in fastRPC driver' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in Agatti, APQ8053, Bitra, IPQ4019, IPQ5018, IPQ6018, IPQ8064, IPQ8074, Kamorta, MDM9607, MSM8953, Nicobar, QCA6390, QCS404, QCS405, QCS610, Rennell, SA515M, SA6155P, SA8155P, Saipan, SC8180X, SDA845, SDM429, SDM429W, SDM632, SDM660, SDX55, SM6150, SM7150, SM8150, SM8250, SXR2130
CVSS v3 Severity:7.0 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)
6.1 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
6.2 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
5.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:4.4 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.9 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-416
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2020-11173

Source: XF
Type: UNKNOWN
qualcomm-cve202011173-dos(191036)

Source: CONFIRM
Type: Broken Link
https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin

Source: CCN
Type: Qualcomm Web site
Qualcomm

Source: MISC
Type: Patch, Vendor Advisory
https://www.qualcomm.com/company/product-security/bulletins/october-2020-security-bulletin

Vulnerable Configuration:Configuration 1:
  • cpe:/o:qualcomm:agatti_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:agatti:-:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:apq8053:-:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:qualcomm:bitra_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:bitra:-:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/o:qualcomm:ipq4019_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:ipq4019:-:*:*:*:*:*:*:*

  • Configuration 5:
  • cpe:/o:qualcomm:ipq5018_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:ipq5018:-:*:*:*:*:*:*:*

  • Configuration 6:
  • cpe:/o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:ipq6018:-:*:*:*:*:*:*:*

  • Configuration 7:
  • cpe:/o:qualcomm:ipq8064_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:ipq8064:-:*:*:*:*:*:*:*

  • Configuration 8:
  • cpe:/o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:ipq8074:-:*:*:*:*:*:*:*

  • Configuration 9:
  • cpe:/o:qualcomm:kamorta_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:kamorta:-:*:*:*:*:*:*:*

  • Configuration 10:
  • cpe:/o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:mdm9607:-:*:*:*:*:*:*:*

  • Configuration 11:
  • cpe:/o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:msm8953:-:*:*:*:*:*:*:*

  • Configuration 12:
  • cpe:/o:qualcomm:nicobar_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:nicobar:-:*:*:*:*:*:*:*

  • Configuration 13:
  • cpe:/o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:qca6390:-:*:*:*:*:*:*:*

  • Configuration 14:
  • cpe:/o:qualcomm:qcs404_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:qcs404:-:*:*:*:*:*:*:*

  • Configuration 15:
  • cpe:/o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:qcs405:-:*:*:*:*:*:*:*

  • Configuration 16:
  • cpe:/o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:qcs610:-:*:*:*:*:*:*:*

  • Configuration 17:
  • cpe:/o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:rennell:-:*:*:*:*:*:*:*

  • Configuration 18:
  • cpe:/o:qualcomm:sa515m_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sa515m:-:*:*:*:*:*:*:*

  • Configuration 19:
  • cpe:/o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sa6155p:-:*:*:*:*:*:*:*

  • Configuration 20:
  • cpe:/o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sa8155p:-:*:*:*:*:*:*:*

  • Configuration 21:
  • cpe:/o:qualcomm:saipan_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:saipan:-:*:*:*:*:*:*:*

  • Configuration 22:
  • cpe:/o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sc8180x:-:*:*:*:*:*:*:*

  • Configuration 23:
  • cpe:/o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sda845:-:*:*:*:*:*:*:*

  • Configuration 24:
  • cpe:/o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sdm429:-:*:*:*:*:*:*:*

  • Configuration 25:
  • cpe:/o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sdm429w:-:*:*:*:*:*:*:*

  • Configuration 26:
  • cpe:/o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sdm632:-:*:*:*:*:*:*:*

  • Configuration 27:
  • cpe:/o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sdm660:-:*:*:*:*:*:*:*

  • Configuration 28:
  • cpe:/o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sdx55:-:*:*:*:*:*:*:*

  • Configuration 29:
  • cpe:/o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sm6150:-:*:*:*:*:*:*:*

  • Configuration 30:
  • cpe:/o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sm7150:-:*:*:*:*:*:*:*

  • Configuration 31:
  • cpe:/o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sm8150:-:*:*:*:*:*:*:*

  • Configuration 32:
  • cpe:/o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sm8250:-:*:*:*:*:*:*:*

  • Configuration 33:
  • cpe:/o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sxr2130:-:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/h:qualcomm:snapdragon_mobile:-:*:*:*:*:*:*:*
  • OR cpe:/h:qualcomm:snapdragon_auto:-:*:*:*:*:*:*:*
  • OR cpe:/h:qualcomm:snapdragon_compute:-:*:*:*:*:*:*:*
  • OR cpe:/h:qualcomm:snapdragon_connectivity:-:*:*:*:*:*:*:*
  • OR cpe:/h:qualcomm:snapdragon_consumer_internet_of_things:-:*:*:*:*:*:*:*
  • OR cpe:/h:qualcomm:snapdragon_industrial_internet_of_things:-:*:*:*:*:*:*:*
  • OR cpe:/h:qualcomm:snapdragon_voice_&_music:-:*:*:*:*:*:*:*
  • OR cpe:/o:qualcomm:snapdragon_wired_infrastructure_&_networking:-:*:*:*:*:*:*:*
  • OR cpe:/o:qualcomm:snapdragon_wearables:-:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    qualcomm agatti firmware -
    qualcomm agatti -
    qualcomm apq8053 firmware -
    qualcomm apq8053 -
    qualcomm bitra firmware -
    qualcomm bitra -
    qualcomm ipq4019 firmware -
    qualcomm ipq4019 -
    qualcomm ipq5018 firmware -
    qualcomm ipq5018 -
    qualcomm ipq6018 firmware -
    qualcomm ipq6018 -
    qualcomm ipq8064 firmware -
    qualcomm ipq8064 -
    qualcomm ipq8074 firmware -
    qualcomm ipq8074 -
    qualcomm kamorta firmware -
    qualcomm kamorta -
    qualcomm mdm9607 firmware -
    qualcomm mdm9607 -
    qualcomm msm8953 firmware -
    qualcomm msm8953 -
    qualcomm nicobar firmware -
    qualcomm nicobar -
    qualcomm qca6390 firmware -
    qualcomm qca6390 -
    qualcomm qcs404 firmware -
    qualcomm qcs404 -
    qualcomm qcs405 firmware -
    qualcomm qcs405 -
    qualcomm qcs610 firmware -
    qualcomm qcs610 -
    qualcomm rennell firmware -
    qualcomm rennell -
    qualcomm sa515m firmware -
    qualcomm sa515m -
    qualcomm sa6155p firmware -
    qualcomm sa6155p -
    qualcomm sa8155p firmware -
    qualcomm sa8155p -
    qualcomm saipan firmware -
    qualcomm saipan -
    qualcomm sc8180x firmware -
    qualcomm sc8180x -
    qualcomm sda845 firmware -
    qualcomm sda845 -
    qualcomm sdm429 firmware -
    qualcomm sdm429 -
    qualcomm sdm429w firmware -
    qualcomm sdm429w -
    qualcomm sdm632 firmware -
    qualcomm sdm632 -
    qualcomm sdm660 firmware -
    qualcomm sdm660 -
    qualcomm sdx55 firmware -
    qualcomm sdx55 -
    qualcomm sm6150 firmware -
    qualcomm sm6150 -
    qualcomm sm7150 firmware -
    qualcomm sm7150 -
    qualcomm sm8150 firmware -
    qualcomm sm8150 -
    qualcomm sm8250 firmware -
    qualcomm sm8250 -
    qualcomm sxr2130 firmware -
    qualcomm sxr2130 -
    qualcomm snapdragon mobile -
    qualcomm snapdragon auto -
    qualcomm snapdragon compute -
    qualcomm snapdragon connectivity -
    qualcomm snapdragon consumer internet of things -
    qualcomm snapdragon industrial internet of things -
    qualcomm snapdragon voice & music -
    qualcomm snapdragon wired infrastructure & networking -
    qualcomm snapdragon wearables -