CVE-2020-11157 (GCVE-0-2020-11157)
Vulnerability from cvelistv5 – Published: 2020-11-02 06:21 – Updated: 2024-08-04 11:28
VLAI?
Summary
u'Lack of handling unexpected control messages while encryption was in progress can terminate the connection and thus leading to a DoS' in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8053, APQ8076, MDM9640, MDM9650, MSM8905, MSM8917, MSM8937, MSM8940, MSM8953, QCA6174A, QCA9886, QCM2150, QM215, SDM429, SDM439, SDM450, SDM632
Severity ?
No CVSS data available.
CWE
- Improper Input Validation in Bluetooth SOC
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Qualcomm, Inc. | Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables |
Affected:
APQ8053, APQ8076, MDM9640, MDM9650, MSM8905, MSM8917, MSM8937, MSM8940, MSM8953, QCA6174A, QCA9886, QCM2150, QM215, SDM429, SDM439, SDM450, SDM632
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T11:28:12.551Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables",
"vendor": "Qualcomm, Inc.",
"versions": [
{
"status": "affected",
"version": "APQ8053, APQ8076, MDM9640, MDM9650, MSM8905, MSM8917, MSM8937, MSM8940, MSM8953, QCA6174A, QCA9886, QCM2150, QM215, SDM429, SDM439, SDM450, SDM632"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "u\u0027Lack of handling unexpected control messages while encryption was in progress can terminate the connection and thus leading to a DoS\u0027 in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables in APQ8053, APQ8076, MDM9640, MDM9650, MSM8905, MSM8917, MSM8937, MSM8940, MSM8953, QCA6174A, QCA9886, QCM2150, QM215, SDM429, SDM439, SDM450, SDM632"
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Input Validation in Bluetooth SOC",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-11-02T06:21:24",
"orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f",
"shortName": "qualcomm"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "product-security@qualcomm.com",
"ID": "CVE-2020-11157",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables",
"version": {
"version_data": [
{
"version_value": "APQ8053, APQ8076, MDM9640, MDM9650, MSM8905, MSM8917, MSM8937, MSM8940, MSM8953, QCA6174A, QCA9886, QCM2150, QM215, SDM429, SDM439, SDM450, SDM632"
}
]
}
}
]
},
"vendor_name": "Qualcomm, Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "u\u0027Lack of handling unexpected control messages while encryption was in progress can terminate the connection and thus leading to a DoS\u0027 in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables in APQ8053, APQ8076, MDM9640, MDM9650, MSM8905, MSM8917, MSM8937, MSM8940, MSM8953, QCA6174A, QCA9886, QCM2150, QM215, SDM429, SDM439, SDM450, SDM632"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Input Validation in Bluetooth SOC"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin",
"refsource": "CONFIRM",
"url": "https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f",
"assignerShortName": "qualcomm",
"cveId": "CVE-2020-11157",
"datePublished": "2020-11-02T06:21:24",
"dateReserved": "2020-03-31T00:00:00",
"dateUpdated": "2024-08-04T11:28:12.551Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B052615D-857A-46D4-9098-1CBFA14687C6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19B59B60-A298-4A56-A45A-E34B7AAB43D7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qualcomm:apq8076_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A4CAA77-CC4D-49CF-9696-6C2542B31415\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:qualcomm:apq8076:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E19E8B60-4C5C-4D1C-B9F0-AB1FC1F58949\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7FD1C359-C79B-4CE8-A192-5AA34D0BF05B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"716B747E-672C-4B95-9D8E-1262338E67EA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"35B7E25E-FA92-4C36-883C-CFF36F4B3507\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ECD99C6F-2444-4A5E-A517-0C8023DDF23D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qualcomm:msm8905_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C9E095A-71DB-4386-827A-53846236AD00\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:qualcomm:msm8905:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E981922-BB71-46E0-96C4-4CF75DF221F6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BD0305A-E31C-4888-B97E-CE571D40560A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"369295A2-8236-44B6-A09F-7CB0BD20527F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qualcomm:msm8937_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3D56596-D726-44FD-ADEA-901D972AC66A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:qualcomm:msm8937:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A58B5A6E-84B9-4356-9CFE-4E80BD81FB33\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qualcomm:msm8940_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"372B5A77-74D4-437F-A228-040963861232\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:qualcomm:msm8940:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68AF5243-40F1-4C9A-BBCD-FA259C0B008B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE4E0E39-0081-4261-8350-149E763AB462\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94F76229-1A4A-4306-A4CC-C823A99F041A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FF653D0-15CF-4A10-8D8E-BE56F4DAB890\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C31FA74C-6659-4457-BC32-257624F43C66\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qualcomm:qca9886_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"311229F9-4A32-462D-AE8D-E5E2B2C416CE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:qualcomm:qca9886:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A523C3F-FB62-4728-8173-4C117C28AC5A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qualcomm:qcm2150_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"723EAD03-6C32-4B1C-95C1-6FDA94F08151\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:qualcomm:qcm2150:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FBB4BB6E-8AF2-433A-A36C-0711598602BC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F18CD1F1-C36A-4840-88CD-8F00BD68EF1A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:qualcomm:qm215:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A01800E-994E-4095-AD86-F02DC9D9C86E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9DFD2C9A-6C25-4B8F-BE64-DAD3DCCDEADD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DE61FCE-CA87-46E1-981D-B44697E54CB1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84289E6D-DA2A-4D04-9DDA-E8C46DDDD056\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C0B56360-7AC3-410A-B7F8-1BE8514B3781\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qualcomm:sdm450_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F3B5AFF-4AD4-4C10-9E39-C553C7E9E16E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:qualcomm:sdm450:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A09E7B90-DD7B-4617-90FD-29FF5BB190A9\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A02E12AC-F845-4164-9D95-ACD7167B6DD6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"321F7DE7-E6E9-449F-867B-04A9F53334B0\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"u\u0027Lack of handling unexpected control messages while encryption was in progress can terminate the connection and thus leading to a DoS\u0027 in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables in APQ8053, APQ8076, MDM9640, MDM9650, MSM8905, MSM8917, MSM8937, MSM8940, MSM8953, QCA6174A, QCA9886, QCM2150, QM215, SDM429, SDM439, SDM450, SDM632\"}, {\"lang\": \"es\", \"value\": \"Una falta de manejo de mensajes de control inesperados mientras el cifrado estaba en progreso puede terminar la conexi\\u00f3n y, por lo tanto, conllevar a un DoS en los productos Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026amp; Music, Snapdragon Wearables en versiones APQ8053, APQ8076, MDM9640, MDM9650, MSM8905, MSM8917, MSM8937, MSM8940, MSM8953, QCA6174A, QCA9886, QCM2150, QM215, SDM429, SDM439, SDM450, SDM632\"}]",
"id": "CVE-2020-11157",
"lastModified": "2024-11-21T04:56:57.463",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2020-11-02T07:15:13.797",
"references": "[{\"url\": \"https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin\", \"source\": \"product-security@qualcomm.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}]",
"sourceIdentifier": "product-security@qualcomm.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2020-11157\",\"sourceIdentifier\":\"product-security@qualcomm.com\",\"published\":\"2020-11-02T07:15:13.797\",\"lastModified\":\"2024-11-21T04:56:57.463\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"u\u0027Lack of handling unexpected control messages while encryption was in progress can terminate the connection and thus leading to a DoS\u0027 in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables in APQ8053, APQ8076, MDM9640, MDM9650, MSM8905, MSM8917, MSM8937, MSM8940, MSM8953, QCA6174A, QCA9886, QCM2150, QM215, SDM429, SDM439, SDM450, SDM632\"},{\"lang\":\"es\",\"value\":\"Una falta de manejo de mensajes de control inesperados mientras el cifrado estaba en progreso puede terminar la conexi\u00f3n y, por lo tanto, conllevar a un DoS en los productos Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026amp; Music, Snapdragon Wearables en versiones APQ8053, APQ8076, MDM9640, MDM9650, MSM8905, MSM8917, MSM8937, MSM8940, MSM8953, QCA6174A, QCA9886, QCM2150, QM215, SDM429, SDM439, SDM450, SDM632\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B052615D-857A-46D4-9098-1CBFA14687C6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19B59B60-A298-4A56-A45A-E34B7AAB43D7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:apq8076_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A4CAA77-CC4D-49CF-9696-6C2542B31415\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:apq8076:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E19E8B60-4C5C-4D1C-B9F0-AB1FC1F58949\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FD1C359-C79B-4CE8-A192-5AA34D0BF05B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"716B747E-672C-4B95-9D8E-1262338E67EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35B7E25E-FA92-4C36-883C-CFF36F4B3507\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECD99C6F-2444-4A5E-A517-0C8023DDF23D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:msm8905_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C9E095A-71DB-4386-827A-53846236AD00\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:msm8905:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E981922-BB71-46E0-96C4-4CF75DF221F6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BD0305A-E31C-4888-B97E-CE571D40560A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"369295A2-8236-44B6-A09F-7CB0BD20527F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:msm8937_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3D56596-D726-44FD-ADEA-901D972AC66A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:msm8937:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A58B5A6E-84B9-4356-9CFE-4E80BD81FB33\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:msm8940_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"372B5A77-74D4-437F-A228-040963861232\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:msm8940:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68AF5243-40F1-4C9A-BBCD-FA259C0B008B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE4E0E39-0081-4261-8350-149E763AB462\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94F76229-1A4A-4306-A4CC-C823A99F041A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FF653D0-15CF-4A10-8D8E-BE56F4DAB890\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C31FA74C-6659-4457-BC32-257624F43C66\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qca9886_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"311229F9-4A32-462D-AE8D-E5E2B2C416CE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qca9886:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A523C3F-FB62-4728-8173-4C117C28AC5A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qcm2150_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"723EAD03-6C32-4B1C-95C1-6FDA94F08151\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qcm2150:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBB4BB6E-8AF2-433A-A36C-0711598602BC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F18CD1F1-C36A-4840-88CD-8F00BD68EF1A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qm215:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A01800E-994E-4095-AD86-F02DC9D9C86E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DFD2C9A-6C25-4B8F-BE64-DAD3DCCDEADD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DE61FCE-CA87-46E1-981D-B44697E54CB1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84289E6D-DA2A-4D04-9DDA-E8C46DDDD056\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0B56360-7AC3-410A-B7F8-1BE8514B3781\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sdm450_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F3B5AFF-4AD4-4C10-9E39-C553C7E9E16E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sdm450:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A09E7B90-DD7B-4617-90FD-29FF5BB190A9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A02E12AC-F845-4164-9D95-ACD7167B6DD6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"321F7DE7-E6E9-449F-867B-04A9F53334B0\"}]}]}],\"references\":[{\"url\":\"https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin\",\"source\":\"product-security@qualcomm.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…