Vulnerability Name: | CVE-2020-3680 (CCN-183093) |
Assigned: | 2019-12-17 |
Published: | 2020-05-04 |
Updated: | 2020-06-03 |
Summary: | A race condition can occur when using the fastrpc memory mapping API. in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8009, APQ8053, MSM8909W, MSM8917, MSM8953, QCS605, QM215, SA415M, SDM429, SDM429W, SDM439, SDM450, SDM632, SDM670, SDM710, SDM845, SDX24, SXR1130
|
CVSS v3 Severity: | 7.0 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.1 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): High Privileges Required (PR): Low User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High | 8.4 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 7.3 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High |
|
CVSS v2 Severity: | 6.9 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Medium Authentication (Au): None | Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete | 7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete |
|
Vulnerability Type: | CWE-367
|
Vulnerability Consequences: | Gain Access |
References: | Source: MITRE Type: CNA CVE-2020-3680
Source: XF Type: UNKNOWN qualcomm-cve20203680-code-exec(183093)
Source: CONFIRM Type: Patch, Vendor Advisory https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin
Source: CCN Type: Qualcomm Web site May 2020 Security Bulletin
|
Vulnerable Configuration: | Configuration 1: cpe:/o:qualcomm:apq8009_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:apq8009:-:*:*:*:*:*:*:* Configuration 2: cpe:/o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:apq8053:-:*:*:*:*:*:*:* Configuration 3: cpe:/o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:msm8909w:-:*:*:*:*:*:*:* Configuration 4: cpe:/o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:msm8917:-:*:*:*:*:*:*:* Configuration 5: cpe:/o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:msm8953:-:*:*:*:*:*:*:* Configuration 6: cpe:/o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:qcs605:-:*:*:*:*:*:*:* Configuration 7: cpe:/o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:qm215:-:*:*:*:*:*:*:* Configuration 8: cpe:/o:qualcomm:sa415m_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sa415m:-:*:*:*:*:*:*:* Configuration 9: cpe:/o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm429:-:*:*:*:*:*:*:* Configuration 10: cpe:/o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm429w:-:*:*:*:*:*:*:* Configuration 11: cpe:/o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm439:-:*:*:*:*:*:*:* Configuration 12: cpe:/o:qualcomm:sdm450_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm450:-:*:*:*:*:*:*:* Configuration 13: cpe:/o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm632:-:*:*:*:*:*:*:* Configuration 14: cpe:/o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm670:-:*:*:*:*:*:*:* Configuration 15: cpe:/o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm710:-:*:*:*:*:*:*:* Configuration 16: cpe:/o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm845:-:*:*:*:*:*:*:* Configuration 17: cpe:/o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdx24:-:*:*:*:*:*:*:* Configuration 18: cpe:/o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sxr1130:-:*:*:*:*:*:*:* Configuration CCN 1: cpe:/h:qualcomm:snapdragon_mobile:-:*:*:*:*:*:*:*OR cpe:/h:qualcomm:snapdragon_auto:-:*:*:*:*:*:*:*OR cpe:/h:qualcomm:snapdragon_compute:-:*:*:*:*:*:*:*OR cpe:/h:qualcomm:snapdragon_consumer_internet_of_things:-:*:*:*:*:*:*:*OR cpe:/h:qualcomm:snapdragon_industrial_internet_of_things:-:*:*:*:*:*:*:*OR cpe:/o:qualcomm:snapdragon_wearables:-:*:*:*:*:*:*:*
Denotes that component is vulnerable |
BACK |
qualcomm apq8009 firmware -
qualcomm apq8009 -
qualcomm apq8053 firmware -
qualcomm apq8053 -
qualcomm msm8909w firmware -
qualcomm msm8909w -
qualcomm msm8917 firmware -
qualcomm msm8917 -
qualcomm msm8953 firmware -
qualcomm msm8953 -
qualcomm qcs605 firmware -
qualcomm qcs605 -
qualcomm qm215 firmware -
qualcomm qm215 -
qualcomm sa415m firmware -
qualcomm sa415m -
qualcomm sdm429 firmware -
qualcomm sdm429 -
qualcomm sdm429w firmware -
qualcomm sdm429w -
qualcomm sdm439 firmware -
qualcomm sdm439 -
qualcomm sdm450 firmware -
qualcomm sdm450 -
qualcomm sdm632 firmware -
qualcomm sdm632 -
qualcomm sdm670 firmware -
qualcomm sdm670 -
qualcomm sdm710 firmware -
qualcomm sdm710 -
qualcomm sdm845 firmware -
qualcomm sdm845 -
qualcomm sdx24 firmware -
qualcomm sdx24 -
qualcomm sxr1130 firmware -
qualcomm sxr1130 -
qualcomm snapdragon mobile -
qualcomm snapdragon auto -
qualcomm snapdragon compute -
qualcomm snapdragon consumer internet of things -
qualcomm snapdragon industrial internet of things -
qualcomm snapdragon wearables -