Vulnerability Name:

CVE-2020-3652 (CCN-180063)

Assigned:2019-12-17
Published:2020-04-06
Updated:2021-07-21
Summary:Possible buffer over-read issue in windows x86 wlan driver function while processing beacon or request frame due to lack of check of length of variable received. in Snapdragon Compute, Snapdragon Connectivity in MSM8998, QCA6390, SC7180, SC8180X, SDM850
CVSS v3 Severity:9.1 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H)
7.9 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): High
9.8 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.4 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): None
Availibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-125
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2020-3652

Source: XF
Type: UNKNOWN
qualcomm-cve20203652-code-exec(180063)

Source: CCN
Type: Qualcomm Web site
April 2020 Security Bulletin

Source: CONFIRM
Type: Vendor Advisory
https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin

Vulnerable Configuration:Configuration 1:
  • cpe:/o:qualcomm:msm8998_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:msm8998:-:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:qca6390:-:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:qualcomm:sc7180_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sc7180:-:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sc8180x:-:*:*:*:*:*:*:*

  • Configuration 5:
  • cpe:/o:qualcomm:sdm850_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sdm850:-:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/h:qualcomm:snapdragon_compute:-:*:*:*:*:*:*:*
  • OR cpe:/h:qualcomm:snapdragon_connectivity:-:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    qualcomm msm8998 firmware -
    qualcomm msm8998 -
    qualcomm qca6390 firmware -
    qualcomm qca6390 -
    qualcomm sc7180 firmware -
    qualcomm sc7180 -
    qualcomm sc8180x firmware -
    qualcomm sc8180x -
    qualcomm sdm850 firmware -
    qualcomm sdm850 -
    qualcomm snapdragon compute -
    qualcomm snapdragon connectivity -