Vulnerability Name: CVE-2020-11202 (CCN-191679) Assigned: 2020-11-02 Published: 2020-11-02 Updated: 2021-12-22 Summary: Buffer overflow/underflow occurs when typecasting the buffer passed by CPU internally in the library which is not aligned with the actual size of the structure' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in QCM6125, QCS410, QCS603, QCS605, QCS610, QCS6125, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SDA640, SDA670, SDA845, SDM640, SDM670, SDM710, SDM830, SDM845, SDX50M, SDX55, SDX55M, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM7125, SM7150, SM7150P, SM8150, SM8150P CVSS v3 Severity: 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H )6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): LowUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
8.4 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H )7.3 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-787 Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2020-11202 Source: MISC Type: Third Party Advisoryhttps://blog.checkpoint.com/2020/08/06/achilles-small-chip-big-peril/ Source: XF Type: UNKNOWNqualcomm-cve202011202-bo(191679) Source: MISC Type: Exploit, Third Party Advisoryhttps://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/ Source: CONFIRM Type: Broken Link, Vendor Advisoryhttps://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin Source: CCN Type: Qualcomm Web siteNovember 2020 Security Bulletin Vulnerable Configuration: Configuration 1 :cpe:/o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:qcm6125:-:*:*:*:*:*:*:* Configuration 2 :cpe:/o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:qcs410:-:*:*:*:*:*:*:* Configuration 3 :cpe:/o:qualcomm:qcs603_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:qcs603:-:*:*:*:*:*:*:* Configuration 4 :cpe:/o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:qcs605:-:*:*:*:*:*:*:* Configuration 5 :cpe:/o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:qcs610:-:*:*:*:*:*:*:* Configuration 6 :cpe:/o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:qcs6125:-:*:*:*:*:*:*:* Configuration 7 :cpe:/o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sa6145p:-:*:*:*:*:*:*:* Configuration 8 :cpe:/o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sa6155:-:*:*:*:*:*:*:* Configuration 9 :cpe:/o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sa6155p:-:*:*:*:*:*:*:* Configuration 10 :cpe:/o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sa8155:-:*:*:*:*:*:*:* Configuration 11 :cpe:/o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sa8155p:-:*:*:*:*:*:*:* Configuration 12 :cpe:/o:qualcomm:sda640_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sda640:-:*:*:*:*:*:*:* Configuration 13 :cpe:/o:qualcomm:sda670_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sda670:-:*:*:*:*:*:*:* Configuration 14 :cpe:/o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sda845:-:*:*:*:*:*:*:* Configuration 15 :cpe:/o:qualcomm:sdm640_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sdm640:-:*:*:*:*:*:*:* Configuration 16 :cpe:/o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sdm670:-:*:*:*:*:*:*:* Configuration 17 :cpe:/o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sdm710:-:*:*:*:*:*:*:* Configuration 18 :cpe:/o:qualcomm:sdm830_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sdm830:-:*:*:*:*:*:*:* Configuration 19 :cpe:/o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sdm845:-:*:*:*:*:*:*:* Configuration 20 :cpe:/o:qualcomm:sdx50m_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sdx50m:-:*:*:*:*:*:*:* Configuration 21 :cpe:/o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sdx55:-:*:*:*:*:*:*:* Configuration 22 :cpe:/o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sdx55m:-:*:*:*:*:*:*:* Configuration 23 :cpe:/o:qualcomm:sm6125_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sm6125:-:*:*:*:*:*:*:* Configuration 24 :cpe:/o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sm6150:-:*:*:*:*:*:*:* Configuration 25 :cpe:/o:qualcomm:sm6150p_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sm6150p:-:*:*:*:*:*:*:* Configuration 26 :cpe:/o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sm6250:-:*:*:*:*:*:*:* Configuration 27 :cpe:/o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sm6250p:-:*:*:*:*:*:*:* Configuration 28 :cpe:/o:qualcomm:sm7125_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sm7125:-:*:*:*:*:*:*:* Configuration 29 :cpe:/o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sm7150:-:*:*:*:*:*:*:* Configuration 30 :cpe:/o:qualcomm:sm7150p_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sm7150p:-:*:*:*:*:*:*:* Configuration 31 :cpe:/o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sm8150:-:*:*:*:*:*:*:* Configuration 32 :cpe:/o:qualcomm:sm8150p_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sm8150p:-:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/h:qualcomm:snapdragon_mobile:-:*:*:*:*:*:*:* OR cpe:/h:qualcomm:snapdragon_auto:-:*:*:*:*:*:*:* OR cpe:/h:qualcomm:snapdragon_compute:-:*:*:*:*:*:*:* OR cpe:/h:qualcomm:snapdragon_consumer_internet_of_things:-:*:*:*:*:*:*:* OR cpe:/h:qualcomm:snapdragon_industrial_internet_of_things:-:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
qualcomm qcm6125 firmware -
qualcomm qcm6125 -
qualcomm qcs410 firmware -
qualcomm qcs410 -
qualcomm qcs603 firmware -
qualcomm qcs603 -
qualcomm qcs605 firmware -
qualcomm qcs605 -
qualcomm qcs610 firmware -
qualcomm qcs610 -
qualcomm qcs6125 firmware -
qualcomm qcs6125 -
qualcomm sa6145p firmware -
qualcomm sa6145p -
qualcomm sa6155 firmware -
qualcomm sa6155 -
qualcomm sa6155p firmware -
qualcomm sa6155p -
qualcomm sa8155 firmware -
qualcomm sa8155 -
qualcomm sa8155p firmware -
qualcomm sa8155p -
qualcomm sda640 firmware -
qualcomm sda640 -
qualcomm sda670 firmware -
qualcomm sda670 -
qualcomm sda845 firmware -
qualcomm sda845 -
qualcomm sdm640 firmware -
qualcomm sdm640 -
qualcomm sdm670 firmware -
qualcomm sdm670 -
qualcomm sdm710 firmware -
qualcomm sdm710 -
qualcomm sdm830 firmware -
qualcomm sdm830 -
qualcomm sdm845 firmware -
qualcomm sdm845 -
qualcomm sdx50m firmware -
qualcomm sdx50m -
qualcomm sdx55 firmware -
qualcomm sdx55 -
qualcomm sdx55m firmware -
qualcomm sdx55m -
qualcomm sm6125 firmware -
qualcomm sm6125 -
qualcomm sm6150 firmware -
qualcomm sm6150 -
qualcomm sm6150p firmware -
qualcomm sm6150p -
qualcomm sm6250 firmware -
qualcomm sm6250 -
qualcomm sm6250p firmware -
qualcomm sm6250p -
qualcomm sm7125 firmware -
qualcomm sm7125 -
qualcomm sm7150 firmware -
qualcomm sm7150 -
qualcomm sm7150p firmware -
qualcomm sm7150p -
qualcomm sm8150 firmware -
qualcomm sm8150 -
qualcomm sm8150p firmware -
qualcomm sm8150p -
qualcomm snapdragon mobile -
qualcomm snapdragon auto -
qualcomm snapdragon compute -
qualcomm snapdragon consumer internet of things -
qualcomm snapdragon industrial internet of things -