cve/2020/CVE-2020-11281.md

19 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-11281](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11281)
![](https://img.shields.io/static/v1?label=Product&message=Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20Electronics%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Voice%20%26%20Music%2C%20Snapdragon%20Wired%20Infrastructure%20and%20Networking&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20Exposure%20in%20WLAN&color=brighgreen)
### Description
Allowing RTT frames to be linked with non randomized MAC address by comparing the sequence numbers can lead to information disclosure. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
### POC
#### Reference
- https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin
2024-06-09 00:33:16 +00:00
- https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin
2024-05-25 21:48:12 +02:00
#### Github
- https://github.com/TinyNiko/android_bulletin_notes