Lucene search

K
cve[email protected]CVE-2020-11132
HistoryNov 12, 2020 - 10:15 a.m.

CVE-2020-11132

2020-11-1210:15:12
CWE-125
web.nvd.nist.gov
18
cve-2020-11132
buffer over read
boot
snapdragon
nvd
security issue

3.6 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:N/A:P

7.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

7.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.8%

uโ€™Buffer over read in boot due to size check ignored before copying GUID attribute from request to responseโ€™ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8096AU, APQ8098, MDM8207, MDM9150, MDM9205, MDM9206, MDM9207, MDM9250, MDM9607, MDM9628, MDM9650, MSM8108, MSM8208, MSM8209, MSM8608, MSM8905, MSM8909, MSM8998, QCM4290, QCS405, QCS410, QCS4290, QCS603, QCS605, QCS610, QSM8250, SA415M, SA515M, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SC8180X, SC8180X+SDX55, SC8180XP, SDA640, SDA670, SDA845, SDA855, SDM1000, SDM640, SDM670, SDM710, SDM712, SDM830, SDM845, SDM850, SDX24, SDX50M, SDX55, SDX55M, SM4125, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SXR1120, SXR1130, SXR2130, SXR2130P, WCD9330

Affected configurations

NVD
Node
qualcommapq8009_firmwareMatch-
AND
qualcommapq8009Match-
Node
qualcommapq8096au_firmwareMatch-
AND
qualcommapq8096auMatch-
Node
qualcommapq8098_firmwareMatch-
AND
qualcommapq8098Match-
Node
qualcommmdm8207_firmwareMatch-
AND
qualcommmdm8207Match-
Node
qualcommmdm9150_firmwareMatch-
AND
qualcommmdm9150Match-
Node
qualcommmdm9205_firmwareMatch-
AND
qualcommmdm9205Match-
Node
qualcommmdm9206_firmwareMatch-
AND
qualcommmdm9206Match-
Node
qualcommmdm9207_firmwareMatch-
AND
qualcommmdm9207Match-
Node
qualcommmdm9250_firmwareMatch-
AND
qualcommmdm9250Match-
Node
qualcommmdm9607_firmwareMatch-
AND
qualcommmdm9607Match-
Node
qualcommmdm9628_firmwareMatch-
AND
qualcommmdm9628Match-
Node
qualcommmdm9650_firmwareMatch-
AND
qualcommmdm9650Match-
Node
qualcommmsm8108_firmwareMatch-
AND
qualcommmsm8108Match-
Node
qualcommmsm8208_firmwareMatch-
AND
qualcommmsm8208Match-
Node
qualcommmsm8209_firmwareMatch-
AND
qualcommmsm8209Match-
Node
qualcommmsm8608_firmwareMatch-
AND
qualcommmsm8608Match-
Node
qualcommmsm8905_firmwareMatch-
AND
qualcommmsm8905Match-
Node
qualcommmsm8909_firmwareMatch-
AND
qualcommmsm8909Match-
Node
qualcommmsm8998_firmwareMatch-
AND
qualcommmsm8998Match-
Node
qualcommqcm4290_firmwareMatch-
AND
qualcommqcm4290Match-
Node
qualcommqcs405_firmwareMatch-
AND
qualcommqcs405Match-
Node
qualcommqcs410_firmwareMatch-
AND
qualcommqcs410Match-
Node
qualcommqcs4290_firmwareMatch-
AND
qualcommqcs4290Match-
Node
qualcommqcs603_firmwareMatch-
AND
qualcommqcs603Match-
Node
qualcommqcs605_firmwareMatch-
AND
qualcommqcs605Match-
Node
qualcommqcs610_firmwareMatch-
AND
qualcommqcs610Match-
Node
qualcommqsm8250_firmwareMatch-
AND
qualcommqsm8250Match-
Node
qualcommsa415m_firmwareMatch-
AND
qualcommsa415mMatch-
Node
qualcommsa515m_firmwareMatch-
AND
qualcommsa515mMatch-
Node
qualcommsa6145p_firmwareMatch-
AND
qualcommsa6145pMatch-
Node
qualcommsa6150p_firmwareMatch-
AND
qualcommsa6150pMatch-
Node
qualcommsa6155_firmwareMatch-
AND
qualcommsa6155Match-
Node
qualcommsa6155p_firmwareMatch-
AND
qualcommsa6155pMatch-
Node
qualcommsa8150p_firmwareMatch-
AND
qualcommsa8150pMatch-
Node
qualcommsa8155_firmwareMatch-
AND
qualcommsa8155Match-
Node
qualcommsa8155p_firmwareMatch-
AND
qualcommsa8155pMatch-
Node
qualcommsa8195p_firmwareMatch-
AND
qualcommsa8195pMatch-
Node
qualcommsc7180_firmwareMatch-
AND
qualcommsc7180Match-
Node
qualcommsc8180x_firmwareMatch-
AND
qualcommsc8180xMatch-
Node
qualcommsc8180x_firmwareMatch-
AND
qualcommsc8180xMatch-
Node
qualcommsdx55_firmwareMatch-
AND
qualcommsdx55Match-
Node
qualcommsc8180xp_firmwareMatch-
AND
qualcommsc8180xpMatch-
Node
qualcommsda640_firmwareMatch-
AND
qualcommsda640Match-
Node
qualcommsda670_firmwareMatch-
AND
qualcommsda670Match-
Node
qualcommsda845_firmwareMatch-
AND
qualcommsda845Match-
Node
qualcommsda855_firmwareMatch-
AND
qualcommsda855Match-
Node
qualcommsdm1000_firmwareMatch-
AND
qualcommsdm1000Match-
Node
qualcommsdm640_firmwareMatch-
AND
qualcommsdm640Match-
Node
qualcommsdm670_firmwareMatch-
AND
qualcommsdm670Match-
Node
qualcommsdm710_firmwareMatch-
AND
qualcommsdm710Match-
Node
qualcommsdm712_firmwareMatch-
AND
qualcommsdm712Match-
Node
qualcommsdm830_firmwareMatch-
AND
qualcommsdm830Match-
Node
qualcommsdm845_firmwareMatch-
AND
qualcommsdm845Match-
Node
qualcommsdm850_firmwareMatch-
AND
qualcommsdm850Match-
Node
qualcommsdx24_firmwareMatch-
AND
qualcommsdx24Match-
Node
qualcommsdx50m_firmwareMatch-
AND
qualcommsdx50mMatch-
Node
qualcommsdx55_firmwareMatch-
AND
qualcommsdx55Match-
Node
qualcommsdx55m_firmwareMatch-
AND
qualcommsdx55mMatch-
Node
qualcommsm4125_firmwareMatch-
AND
qualcommsm4125Match-
Node
qualcommsm4250_firmwareMatch-
AND
qualcommsm4250Match-
Node
qualcommsm4250p_firmwareMatch-
AND
qualcommsm4250pMatch-
Node
qualcommsm6115_firmwareMatch-
AND
qualcommsm6115Match-
Node
qualcommsm6115p_firmwareMatch-
AND
qualcommsm6115pMatch-
Node
qualcommsm6125_firmwareMatch-
AND
qualcommsm6125Match-
Node
qualcommsm6150_firmwareMatch-
AND
qualcommsm6150Match-
Node
qualcommsm6150p_firmwareMatch-
AND
qualcommsm6150pMatch-
Node
qualcommsm6250_firmwareMatch-
AND
qualcommsm6250Match-
Node
qualcommsm6250p_firmwareMatch-
AND
qualcommsm6250pMatch-
Node
qualcommsm6350_firmwareMatch-
AND
qualcommsm6350Match-
Node
qualcommsm7125_firmwareMatch-
AND
qualcommsm7125Match-
Node
qualcommsm7150_firmwareMatch-
AND
qualcommsm7150Match-
Node
qualcommsm7150p_firmwareMatch-
AND
qualcommsm7150pMatch-
Node
qualcommsm7225_firmwareMatch-
AND
qualcommsm7225Match-
Node
qualcommsm7250_firmwareMatch-
AND
qualcommsm7250Match-
Node
qualcommsm7250p_firmwareMatch-
AND
qualcommsm7250pMatch-
Node
qualcommsm8150_firmwareMatch-
AND
qualcommsm8150Match-
Node
qualcommsm8150p_firmwareMatch-
AND
qualcommsm8150pMatch-
Node
qualcommsm8250_firmwareMatch-
AND
qualcommsm8250Match-
Node
qualcommsxr1120_firmwareMatch-
AND
qualcommsxr1120Match-
Node
qualcommsxr1130_firmwareMatch-
AND
qualcommsxr1130Match-
Node
qualcommsxr2130_firmwareMatch-
AND
qualcommsxr2130Match-
Node
qualcommsxr2130p_firmwareMatch-
AND
qualcommsxr2130pMatch-
Node
qualcommwcd9330_firmwareMatch-
AND
qualcommwcd9330Match-

CNA Affected

[
  {
    "product": "Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking",
    "vendor": "Qualcomm, Inc.",
    "versions": [
      {
        "status": "affected",
        "version": "APQ8009, APQ8096AU, APQ8098, MDM8207, MDM9150, MDM9205, MDM9206, MDM9207, MDM9250, MDM9607, MDM9628, MDM9650, MSM8108, MSM8208, MSM8209, MSM8608, MSM8905, MSM8909, MSM8998, QCM4290, QCS405, QCS410, QCS4290, QCS603, QCS605, QCS610, QSM8250, SA415M, SA515M, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SC8180X, SC8180X+SDX55, SC8180XP, SDA640, SDA670, SDA845, SDA855, SDM1000, SDM640, SDM670, SDM710, SDM712, SDM830, SDM845, SDM850, SDX24, SDX50M, SDX55, SDX55M, SM4125, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SXR1120, SXR1130, SXR2130, SXR2130P, WCD9330"
      }
    ]
  }
]

3.6 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:N/A:P

7.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

7.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.8%

Related for CVE-2020-11132