Vulnerability Name: | CVE-2020-3690 (CCN-191021) |
Assigned: | 2019-12-17 |
Published: | 2020-10-30 |
Updated: | 2020-11-06 |
Summary: | u'Due to an incorrect SMMU configuration, the modem crypto engine can potentially compromise the hypervisor' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in Agatti, Bitra, Kamorta, Nicobar, QCA6390, QCS404, QCS605, QCS610, Rennell, SA415M, SA515M, SA6155P, SA8155P, Saipan, SC7180, SC8180X, SDA845, SDM670, SDM710, SDM845, SDM850, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
|
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): Low User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High | 6.2 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) 5.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): High Availibility (A): None |
|
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete | 4.9 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:C/A:N)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): Complete Availibility (A): None |
|
Vulnerability Type: | CWE-Other
|
Vulnerability Consequences: | Bypass Security |
References: | Source: MITRE Type: CNA CVE-2020-3690
Source: XF Type: UNKNOWN qualcomm-cve20203690-sec-bypass(191021)
Source: CONFIRM Type: Broken Link https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin
Source: CCN Type: Qualcomm Web site Qualcomm
Source: MISC Type: Vendor Advisory https://www.qualcomm.com/company/product-security/bulletins/october-2020-security-bulletin
|
Vulnerable Configuration: | Configuration 1: cpe:/o:qualcomm:agatti_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:agatti:-:*:*:*:*:*:*:* Configuration 2: cpe:/o:qualcomm:bitra_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:bitra:-:*:*:*:*:*:*:* Configuration 3: cpe:/o:qualcomm:kamorta_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:kamorta:-:*:*:*:*:*:*:* Configuration 4: cpe:/o:qualcomm:nicobar_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:nicobar:-:*:*:*:*:*:*:* Configuration 5: cpe:/o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:qca6390:-:*:*:*:*:*:*:* Configuration 6: cpe:/o:qualcomm:qcs404_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:qcs404:-:*:*:*:*:*:*:* Configuration 7: cpe:/o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:qcs605:-:*:*:*:*:*:*:* Configuration 8: cpe:/o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:qcs610:-:*:*:*:*:*:*:* Configuration 9: cpe:/o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:rennell:-:*:*:*:*:*:*:* Configuration 10: cpe:/o:qualcomm:sa415m_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sa415m:-:*:*:*:*:*:*:* Configuration 11: cpe:/o:qualcomm:sa515m_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sa515m:-:*:*:*:*:*:*:* Configuration 12: cpe:/o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sa6155p:-:*:*:*:*:*:*:* Configuration 13: cpe:/o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sa8155p:-:*:*:*:*:*:*:* Configuration 14: cpe:/o:qualcomm:saipan_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:saipan:-:*:*:*:*:*:*:* Configuration 15: cpe:/o:qualcomm:sc7180_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sc7180:-:*:*:*:*:*:*:* Configuration 16: cpe:/o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sc8180x:-:*:*:*:*:*:*:* Configuration 17: cpe:/o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sda845:-:*:*:*:*:*:*:* Configuration 18: cpe:/o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm670:-:*:*:*:*:*:*:* Configuration 19: cpe:/o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm710:-:*:*:*:*:*:*:* Configuration 20: cpe:/o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm845:-:*:*:*:*:*:*:* Configuration 21: cpe:/o:qualcomm:sdm850_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm850:-:*:*:*:*:*:*:* Configuration 22: cpe:/o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdx24:-:*:*:*:*:*:*:* Configuration 23: cpe:/o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdx55:-:*:*:*:*:*:*:* Configuration 24: cpe:/o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sm6150:-:*:*:*:*:*:*:* Configuration 25: cpe:/o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sm7150:-:*:*:*:*:*:*:* Configuration 26: cpe:/o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sm8150:-:*:*:*:*:*:*:* Configuration 27: cpe:/o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sm8250:-:*:*:*:*:*:*:* Configuration 28: cpe:/o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sxr1130:-:*:*:*:*:*:*:* Configuration 29: cpe:/o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sxr2130:-:*:*:*:*:*:*:* Configuration CCN 1: cpe:/h:qualcomm:snapdragon_mobile:-:*:*:*:*:*:*:*OR cpe:/h:qualcomm:snapdragon_auto:-:*:*:*:*:*:*:*OR cpe:/h:qualcomm:snapdragon_compute:-:*:*:*:*:*:*:*OR cpe:/h:qualcomm:snapdragon_connectivity:-:*:*:*:*:*:*:*OR cpe:/h:qualcomm:snapdragon_consumer_internet_of_things:-:*:*:*:*:*:*:*OR cpe:/h:qualcomm:snapdragon_industrial_internet_of_things:-:*:*:*:*:*:*:*OR cpe:/h:qualcomm:snapdragon_voice_&_music:-:*:*:*:*:*:*:*OR cpe:/o:qualcomm:snapdragon_wired_infrastructure_&_networking:-:*:*:*:*:*:*:*
Denotes that component is vulnerable |
BACK |
qualcomm agatti firmware -
qualcomm agatti -
qualcomm bitra firmware -
qualcomm bitra -
qualcomm kamorta firmware -
qualcomm kamorta -
qualcomm nicobar firmware -
qualcomm nicobar -
qualcomm qca6390 firmware -
qualcomm qca6390 -
qualcomm qcs404 firmware -
qualcomm qcs404 -
qualcomm qcs605 firmware -
qualcomm qcs605 -
qualcomm qcs610 firmware -
qualcomm qcs610 -
qualcomm rennell firmware -
qualcomm rennell -
qualcomm sa415m firmware -
qualcomm sa415m -
qualcomm sa515m firmware -
qualcomm sa515m -
qualcomm sa6155p firmware -
qualcomm sa6155p -
qualcomm sa8155p firmware -
qualcomm sa8155p -
qualcomm saipan firmware -
qualcomm saipan -
qualcomm sc7180 firmware -
qualcomm sc7180 -
qualcomm sc8180x firmware -
qualcomm sc8180x -
qualcomm sda845 firmware -
qualcomm sda845 -
qualcomm sdm670 firmware -
qualcomm sdm670 -
qualcomm sdm710 firmware -
qualcomm sdm710 -
qualcomm sdm845 firmware -
qualcomm sdm845 -
qualcomm sdm850 firmware -
qualcomm sdm850 -
qualcomm sdx24 firmware -
qualcomm sdx24 -
qualcomm sdx55 firmware -
qualcomm sdx55 -
qualcomm sm6150 firmware -
qualcomm sm6150 -
qualcomm sm7150 firmware -
qualcomm sm7150 -
qualcomm sm8150 firmware -
qualcomm sm8150 -
qualcomm sm8250 firmware -
qualcomm sm8250 -
qualcomm sxr1130 firmware -
qualcomm sxr1130 -
qualcomm sxr2130 firmware -
qualcomm sxr2130 -
qualcomm snapdragon mobile -
qualcomm snapdragon auto -
qualcomm snapdragon compute -
qualcomm snapdragon connectivity -
qualcomm snapdragon consumer internet of things -
qualcomm snapdragon industrial internet of things -
qualcomm snapdragon voice & music -
qualcomm snapdragon wired infrastructure & networking -