2024-11-23 13:10:58 +00:00

265 lines
7.6 KiB
JSON

{
"id": "CVE-2020-11153",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2020-11-02T07:15:13.530",
"lastModified": "2024-11-21T04:56:56.977",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "u'Out of bound memory access while processing GATT data received due to lack of check of pdu data length and leads to remote code execution' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in APQ8053, QCA6390, QCA9379, QCN7605, SC8180X, SDX55"
},
{
"lang": "es",
"value": "Un acceso a la memoria fuera de l\u00edmite mientras se procesan unos datos GATT recibidos debido a una falta de comprobaci\u00f3n de la longitud de los datos pdu y que conlleva a una ejecuci\u00f3n de c\u00f3digo remota en los productos Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile en versiones APQ8053, QCA6390, QCA9379, QCN7605, SC8180X, SDX55"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 10.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B052615D-857A-46D4-9098-1CBFA14687C6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19B59B60-A298-4A56-A45A-E34B7AAB43D7"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96FBD6DF-F174-4690-AA3D-1E8974E3627F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3BF86E1-3FAC-4A42-8C01-5944C6C30AE5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25565FDA-651D-4A05-8B1E-2188B6921253"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8D49750-BBEA-4A3D-9898-28B7A50A7F42"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qcn7605_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C9D1966-30F0-414D-BE75-0A14B12A1457"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qcn7605:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD28C87D-1D28-4C84-BFE4-56EE3BF2C6B0"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30A45C1A-C921-42B5-9237-367245023B45"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sc8180x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56C9D979-F214-4CD4-8CF9-43BC804BB179"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E93FB34B-3674-404D-9687-E092E9A246AB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3FF5A9A-A34A-499C-B6E0-D67B496C5454"
}
]
}
]
}
],
"references": [
{
"url": "https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin",
"source": "product-security@qualcomm.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.qualcomm.com/company/product-security/bulletins/october-2020-security-bulletin",
"source": "nvd@nist.gov",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
}
]
}