Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-11217 (GCVE-0-2020-11217)
Vulnerability from cvelistv5 – Published: 2021-01-21 09:41 – Updated: 2024-08-04 11:28
VLAI?
EPSS
Summary
A possible double free or invalid memory access in audio driver while reading Speaker Protection parameters in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
Severity ?
No CVSS data available.
CWE
- Double Free Issue in Audio
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Qualcomm, Inc. | Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile |
Affected:
PM3003A, PM4125, PM6125, PM6150A, PM6150L, PM6350, PM660, PM660A, PM660L, PM7150A, PM7150L, PM7250, PM7250B, PM7350C, PM8008, PM8009, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM8350, PM8350B, PM8350BH, PM8350BHS, PM8350C, PMI632, PMK7350, PMK8002, PMK8003, PMK8350, PMR525, PMR735A, PMR735B, PMX55, QAT3514, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QAT5568, QBT2000, QCA6390, QCA6391, QCA6421, QCA6426, QCA6431, QCA6436, QCM2290, QCM4290, QCS2290, QCS4290, QDM2301, QDM2305, QDM2307, QDM2308, QDM2310, QDM3301, QDM3302, QDM4643, QDM4650, QDM5579, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4100, QET4101, QET5100, QET5100M, QET6100, QET6110, QFS2530, QFS2580, QFS2608, QFS2630, QLN4642, QLN4650, QLN5020, QLN5030, QLN5040, QPA2625, QPA4340, QPA4360, QPA5461, QPA5580, QPA5581, QPA6560, QPA8673, QPA8686, QPA8801, QPA8802, QPA8803, QPA8821, QPA8842, QPM4621, QPM4630, QPM4640, QPM4641, QPM4650, QPM5620, QPM5621, QPM5641, QPM ...[truncated*]
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T11:28:13.356Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile",
"vendor": "Qualcomm, Inc.",
"versions": [
{
"status": "affected",
"version": "PM3003A, PM4125, PM6125, PM6150A, PM6150L, PM6350, PM660, PM660A, PM660L, PM7150A, PM7150L, PM7250, PM7250B, PM7350C, PM8008, PM8009, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM8350, PM8350B, PM8350BH, PM8350BHS, PM8350C, PMI632, PMK7350, PMK8002, PMK8003, PMK8350, PMR525, PMR735A, PMR735B, PMX55, QAT3514, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QAT5568, QBT2000, QCA6390, QCA6391, QCA6421, QCA6426, QCA6431, QCA6436, QCM2290, QCM4290, QCS2290, QCS4290, QDM2301, QDM2305, QDM2307, QDM2308, QDM2310, QDM3301, QDM3302, QDM4643, QDM4650, QDM5579, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4100, QET4101, QET5100, QET5100M, QET6100, QET6110, QFS2530, QFS2580, QFS2608, QFS2630, QLN4642, QLN4650, QLN5020, QLN5030, QLN5040, QPA2625, QPA4340, QPA4360, QPA5461, QPA5580, QPA5581, QPA6560, QPA8673, QPA8686, QPA8801, QPA8802, QPA8803, QPA8821, QPA8842, QPM4621, QPM4630, QPM4640, QPM4641, QPM4650, QPM5620, QPM5621, QPM5641, QPM ...[truncated*]"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A possible double free or invalid memory access in audio driver while reading Speaker Protection parameters in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile"
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Double Free Issue in Audio",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-21T09:41:28.000Z",
"orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f",
"shortName": "qualcomm"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin"
}
],
"x_ConverterErrors": {
"version_name": {
"error": "version_name too long. Use array of versions to record more than one version.",
"message": "Truncated!"
}
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "product-security@qualcomm.com",
"ID": "CVE-2020-11217",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile",
"version": {
"version_data": [
{
"version_value": "PM3003A, PM4125, PM6125, PM6150A, PM6150L, PM6350, PM660, PM660A, PM660L, PM7150A, PM7150L, PM7250, PM7250B, PM7350C, PM8008, PM8009, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM8350, PM8350B, PM8350BH, PM8350BHS, PM8350C, PMI632, PMK7350, PMK8002, PMK8003, PMK8350, PMR525, PMR735A, PMR735B, PMX55, QAT3514, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QAT5568, QBT2000, QCA6390, QCA6391, QCA6421, QCA6426, QCA6431, QCA6436, QCM2290, QCM4290, QCS2290, QCS4290, QDM2301, QDM2305, QDM2307, QDM2308, QDM2310, QDM3301, QDM3302, QDM4643, QDM4650, QDM5579, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4100, QET4101, QET5100, QET5100M, QET6100, QET6110, QFS2530, QFS2580, QFS2608, QFS2630, QLN4642, QLN4650, QLN5020, QLN5030, QLN5040, QPA2625, QPA4340, QPA4360, QPA5461, QPA5580, QPA5581, QPA6560, QPA8673, QPA8686, QPA8801, QPA8802, QPA8803, QPA8821, QPA8842, QPM4621, QPM4630, QPM4640, QPM4641, QPM4650, QPM5620, QPM5621, QPM5641, QPM5657, QPM5658, QPM5670, QPM5677, QPM5679, QPM5870, QPM5875, QPM6582, QPM6585, QPM6621, QPM6670, QPM8820, QPM8830, QPM8870, QPM8895, QSM7250, QTC800H, QTC800S, QTC801S, QTM525, RSW8577, SD460, SD660, SD662, SD690 5G, SD750G, SD765, SD765G, SD768G, SD865 5G, SD888 5G, SDR425, SDR660, SDR735, SDR735G, SDR8250, SDR865, SDX55M, SDXR2 5G, SM4125, SM4350, SM7250P, SM7350, SMB1351, SMB1354, SMB1355, SMB1390, SMB1394, SMB1395, SMB1396, SMB1398, SMR525, SMR526, SMR545, SMR546, WCD9335, WCD9341, WCD9370, WCD9375, WCD9380, WCD9385, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN6740, WCN6750, WCN6850, WCN6851, WCN6856, WGR7640, WSA8810, WSA8815, WSA8830, WSA8835, WTR2965, WTR3925"
}
]
}
}
]
},
"vendor_name": "Qualcomm, Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A possible double free or invalid memory access in audio driver while reading Speaker Protection parameters in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Double Free Issue in Audio"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin",
"refsource": "CONFIRM",
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f",
"assignerShortName": "qualcomm",
"cveId": "CVE-2020-11217",
"datePublished": "2021-01-21T09:41:28.000Z",
"dateReserved": "2020-03-31T00:00:00.000Z",
"dateUpdated": "2024-08-04T11:28:13.356Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
FKIE_CVE-2020-11217
Vulnerability from fkie_nvd - Published: 2021-01-21 10:15 - Updated: 2024-11-21 04:57
Severity ?
Summary
A possible double free or invalid memory access in audio driver while reading Speaker Protection parameters in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:pm3003a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BEF03FD6-E0DF-4216-8639-BCD58F56E646",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm4125:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B57C9D36-323E-4982-BFEF-32734A46FB28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm6125:-:*:*:*:*:*:*:*",
"matchCriteriaId": "988554E5-F881-4DA5-BF68-7FEB1E41EB1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm6150a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7BAEEB4E-8C21-4DE3-8230-0E64DA8BCF31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm6150l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD92FEFB-EFAF-4622-BEEB-16D828E87C2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm6350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "629AC2EB-637D-493A-913A-66989EE2BB91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm660:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2EA4BC14-3A93-42C9-A51F-54C229FB2617",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm660a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE38E9BD-E0A7-4B34-AE3B-41363F90487A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm660l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5E2BC76-B6BB-44A0-9023-116EAA66B388",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm7150a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B66F085D-874B-43D3-A965-FCAC14657A69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm7150l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9E3064A-C411-4097-8E4D-4984C5769126",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm7250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B20B944-46FA-4D10-8B50-E31D1E08EC4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm7250b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3AD9E23-148B-4AF7-BE79-A1324CC6F546",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm7350c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96E65C30-DEE4-4E34-BBD1-824AFCD06FBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm8008:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97A128D0-9E32-4B88-B92B-E15D56CE30E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm8009:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE2D27C4-B364-4991-AE9E-4F3DC486D581",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm8150a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6151FB45-F8F7-4F92-ACB7-57272CCAD255",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm8150b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5AF5EE00-7002-4190-BCCF-8B63ACA70CEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm8150c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "660ADC5A-799B-42C4-B7E1-52539AD994D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm8150l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C5ABEF07-694B-47E8-A3A9-8164EF6E45BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm8250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB6FFB29-7370-43CD-8410-2A17D9A3BD64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm8350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87FEDC09-E1DE-49A5-8EDF-E895467CD8C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm8350b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7AFEEAC-A37D-497F-B9D0-BE7CB673F92F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm8350bh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3F13F5A7-FD3E-499F-863D-A1BEADB0D06E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm8350bhs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A97CA505-D827-48C1-A46B-7B82DE719C95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm8350c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D137B13B-24D1-41C4-BC8C-2F6F51CEBCFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pmi632:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0AA5F089-6FBC-4B6B-8980-6BFEB6670BDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pmk7350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB7918E9-FFD6-4041-88FB-975A708D8EA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pmk8002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E43ED5B2-BE32-4650-9726-970135570455",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pmk8003:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA7350FB-760C-41D1-A72F-A1FD65F7CE60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pmk8350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C9E197C-4C9E-4B76-A9DC-78BF0325C764",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pmr525:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1AA1D854-AD1B-4732-AEF3-321936B5DF7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pmr735a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "728A6173-6582-4153-A040-70FF40516A8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pmr735b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1E4545F-B38C-4535-BF0E-6A9FC0579265",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pmx55:-:*:*:*:*:*:*:*",
"matchCriteriaId": "01E63676-6E36-4B26-88C6-36CF73B5FBA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qat3514:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53A0FCE5-32EE-4999-8D63-B438862B49A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qat3516:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D80915F-096A-4B69-B6B8-6C6609B463DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qat3518:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49400DEF-EB72-419F-AD00-37BF7C30F2BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qat3519:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04842F87-AA4D-43BF-8148-FE7BD521C975",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qat3522:-:*:*:*:*:*:*:*",
"matchCriteriaId": "298034D1-85C6-42AF-BC06-7B19A8C84FBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qat3550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FAF6F7AF-9839-46A1-8552-ED6F9F246E98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qat3555:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4FDC5240-C134-44E6-8E90-63C09BA01970",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qat5515:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D209F276-3539-4231-9735-B31C22AE8E5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qat5516:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6919C289-456D-4A2F-A508-4C1E41E9ACC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qat5522:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5098C94E-4146-4D68-BCE6-D860B9A62BBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qat5533:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87A58C3D-B9C1-4155-9FF1-C5312D699164",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qat5568:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A345E2B6-0DD7-454C-B9ED-33469866A217",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qbt2000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEA626EC-59F1-43CC-835C-1E4F3FE579BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3BF86E1-3FAC-4A42-8C01-5944C6C30AE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE9115A0-0D87-49BE-9A9B-091DBF8D9E6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FF5EC23-4884-4C2B-8E77-50B1E8E28A3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34661A30-92C3-4F0D-ABD1-8DA8E928DFF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A34D021D-C043-4EFD-9AB3-B2174528CBA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*",
"matchCriteriaId": "214A053F-D80C-4AD9-B4F1-83384095A3F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74EBA77E-69A5-4145-9BEC-CD39BA132309",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76E03AE9-2485-449B-BCFD-3E452BB01FC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FFCB9F22-57F2-4327-95B9-B2342A02E45E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qdm2301:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2430E3C4-89EA-41F2-9A19-DBCB69A4F91D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qdm2305:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30F2396C-5527-4E03-B005-029F020A095F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qdm2307:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19B485D6-7BA1-4B48-9F35-02CC03F0F1BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qdm2308:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE93D494-6DF3-41AC-BF66-BD6C2822DA19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qdm2310:-:*:*:*:*:*:*:*",
"matchCriteriaId": "907EC235-3B08-4F42-9B5E-676D4CAD4A11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qdm3301:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8CA76C6A-0988-436A-B93A-273AB8E0226A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qdm3302:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C396A7DA-25F1-417D-96F2-E3500EF42498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qdm4643:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45CE8949-77E4-4D3C-8C88-8A2BE892ADA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qdm4650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F822A512-FEC8-49AB-A763-0684BB304252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qdm5579:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E6AD633-267E-48A4-ACF5-6307E427CD74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qdm5620:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF4ED992-0B17-433A-82FD-B94DE482DB65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qdm5621:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45EE0BDE-155D-4F1D-B4A5-DFD21C5502FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qdm5650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A850430E-BA5F-4A79-BCC0-346014064A9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qdm5652:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3F1AEEB3-DE39-429B-A373-8BFB51BD21FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qdm5670:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF219397-DA5D-4758-BE04-35B56C3891F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qdm5671:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AF9895A-1A99-49B6-B89A-C6C2170CB9CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qdm5677:-:*:*:*:*:*:*:*",
"matchCriteriaId": "151E59EF-A5F1-4378-8A34-4AAFB074E879",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qdm5679:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D2DFD77-3D15-4156-BADC-F48F73AF7C68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qet4100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "546B6CD2-AED0-41D4-B641-03CCAE9FEF50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qet4101:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7872ACFC-C2BF-43EC-B061-A100EF25A70D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qet5100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42AF43F3-26C1-4CB0-98D4-F98AA6B4A5FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qet5100m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "661B3675-83F6-439E-A256-06D7E45ED8B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qet6100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6A9CE9A-1323-480C-BFE6-BEA5B176D748",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qet6110:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC427584-98A2-4842-9EE8-72AF8AD2B912",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qfs2530:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98E5B822-FCBC-48F4-AB60-B9AF73A8D58C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qfs2580:-:*:*:*:*:*:*:*",
"matchCriteriaId": "55BEA113-FA98-4BB3-B92C-71FF6C2F6310",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qfs2608:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2AC694AC-EF51-40BA-9EB7-10A3889BB4F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qfs2630:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E9AD07C-1CCA-4E36-9AB7-772E4F2C4192",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qln4642:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45F730FA-3E02-47A5-BDB3-9E132183DB95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qln4650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F83D75FB-822D-420A-9069-28E55091C05C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qln5020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E8D7085-36BE-4E13-B34B-9D5E9AEC7673",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qln5030:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7AE158C6-5444-4B17-9848-7F9876F8F2DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qln5040:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8EB46FAF-E84E-4007-9B47-EE13E8E31B4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpa2625:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65A30903-7531-42C4-B0CD-2B0D45EA6481",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpa4340:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A798933-E2CA-439F-B4C7-D99327C5E598",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpa4360:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0724FE57-87D4-45FB-B189-D45A80C679D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpa5461:-:*:*:*:*:*:*:*",
"matchCriteriaId": "440234CE-FF87-476D-9E4A-128850D967B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpa5580:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8C1E390-8B11-4DC7-ACF7-87B7F7C21EE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpa5581:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36BE6C57-84D7-4CA7-BDC6-0407D6AFC365",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpa6560:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF7AC75C-65EC-48E8-AECD-77F41EA60D06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpa8673:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E9669EE-515D-40E1-A260-118B9F0D1DD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpa8686:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DC94A215-4CF9-4F95-B25B-3DCDF2F4FCA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpa8801:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0047E7B-50CD-492A-B7A2-FD3863ECF499",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpa8802:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89E1CDD6-480A-4027-B74D-CD987FD38DAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpa8803:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13F89782-9105-4437-A33E-BBA59FFF7B86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpa8821:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D72FE2FC-4AC6-4F9A-8868-0977B4713513",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpa8842:-:*:*:*:*:*:*:*",
"matchCriteriaId": "027FD323-DD57-49D6-AD5B-18B84EC5B086",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm4621:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50C9F941-5551-4CB5-B819-5E0905A171E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm4630:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94BF4B4A-F8ED-4E86-A43A-5BA83CFFC3D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm4640:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F141854-187F-4869-B9B3-1FAEE7E0DE7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm4641:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7BF3B9D-B96C-4528-B680-7ED8022D5EEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm4650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB823470-EA4C-499C-856D-4B514CC7510F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm5620:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAC5C6C4-6FFF-47A1-879C-DBE714BC1910",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm5621:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72DA9B6E-B01F-4A91-BF54-74E6C2C900C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm5641:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20720A3D-9199-4110-BC97-83B350F69F3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm5657:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51821A0A-0B45-4B68-9624-6BB6ECB28935",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm5658:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89EC822B-3F9E-46F3-A792-CD4BE73EC0E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm5670:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25DDF73E-92A7-4E53-9550-EBAAC1B3B8F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm5677:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5827067-95F2-4615-897C-92A3749F98AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm5679:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47DFF710-2581-4E83-A60B-DC61FF534453",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm5870:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3F026D09-A91B-4CDF-8A01-119DD10DBC4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm5875:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA8815F8-0703-4CCE-8BD8-0E78E7544321",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm6582:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C51B88E1-BD42-416E-BF9F-FA8AF3C8C312",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm6585:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9C92D88-FF1E-4ADE-8370-F99FCDE00665",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm6621:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE62E62A-3927-4916-BCE4-8189263E06C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm6670:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FED2C326-000C-4FAC-BEAD-EFF945245801",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm8820:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC546B18-D916-4168-89A6-0CB332D83264",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm8830:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9D356E-5CFB-4E72-8F08-F38C0AAD0B4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm8870:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3091C44D-D258-4C87-89E0-EBA8E21FD305",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm8895:-:*:*:*:*:*:*:*",
"matchCriteriaId": "32636F9D-1A2D-4B87-AB95-518AC2787DAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qsm7250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D13CB7F4-B30D-4DB9-AAB3-797A79F888E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qtc800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "462C175D-5C9B-4CC1-8329-B21656DB99CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qtc800s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31B59D37-17C1-452C-89FA-6A2A05AAC444",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qtc801s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62013476-1792-4BCC-B7AB-FB6D1D111C4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qtm525:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1EBF0B4-1305-4E97-BA42-5E98DA3EE290",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:rsw8577:-:*:*:*:*:*:*:*",
"matchCriteriaId": "930596BD-6024-4BAB-9BC3-4391F254DB7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE8AB22C-54EA-4D61-B6F9-7BC45820D29E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sd660:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9CF5EBB-B25A-4A76-B522-951F108263CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06661DAC-5D22-433E-B5EC-486931E265B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sd6905g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9F14F6E-8962-4709-B5E3-4F89496D4AAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sd750g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38A29739-DC41-4DEB-8613-26DECA4B4013",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF1560D8-14F6-4FD8-B83A-2023BB792065",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDE196A0-AB55-4A5B-A1D6-630706310163",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13D505D9-E00B-4934-AD85-E5EA2921FD50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sd8655g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51104EA4-B075-488C-A717-9CE785016C88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sd8885g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EAFE2A68-4EB1-4C36-8807-184940B9DBF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sdr425:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7541209B-94D2-4BC9-9164-C8D3485B7DF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sdr660:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C543239C-018C-42C1-AC4F-5359810395BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sdr735:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B28EC8E-1263-4ECD-8C90-9943468BA9B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sdr735g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FACAF8DE-5D82-4386-BE26-3C84283B97C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sdr8250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6D8E67-38BE-45E1-80A7-9A5776E9BFD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sdr865:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C221A7A-2F73-4060-A147-9712D43D02BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "585B794A-0674-418B-B45B-42EA97C40B9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sdxr25g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "099751A2-A158-4A58-BDA0-D74DF0E8658B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sm4125:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B185412C-177F-48E2-87F9-1269E0FB8E31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sm4350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0DB9382-CF2F-4690-ABCA-145CDA12F4AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D395018-251C-45AA-9EE8-A638CAB0B508",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sm7350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60E77EAC-C832-4AD3-A307-B485F081A7CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:smb1351:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54720F88-446D-47BD-9F0B-DD45C968C50D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:smb1354:-:*:*:*:*:*:*:*",
"matchCriteriaId": "494C65EB-2415-4AF8-9788-028DD29D3025",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:smb1355:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7AABDE55-DCDE-4E7D-8752-704B5EE745C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:smb1390:-:*:*:*:*:*:*:*",
"matchCriteriaId": "961BB1ED-BD12-4EDF-94D3-122F8AA6D064",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:smb1394:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E66C76A2-978C-4496-8CE8-F9485F8BFB53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:smb1395:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C854E653-E387-455B-805B-44DBFB9843B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:smb1396:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E683B05-8631-4CCF-A39A-DB9A532C1926",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:smb1398:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE647A70-A87E-42B9-ACE3-9654A1BBE709",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:smr525:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B616C2E-B3A5-44D2-8AC9-EC7A51094C17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:smr526:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E0E633-BC19-4805-962D-C06E3A193DE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:smr545:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A19C416B-F270-4B5F-949F-CA16D89F6854",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:smr546:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52D4CAD6-452C-4694-8F2B-3B488CE37246",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D1A7188-7D5D-4D46-AEAB-08BA84FFF539",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D9E96B3-F1BB-46F8-B715-7DF90180F1E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33A8FAA1-F824-4561-9CCC-7F0DF12F740F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
"matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5F28E29-520F-469E-B048-62DE2EF07ADD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9523ACC9-9D2F-4A40-9CEF-9A9676176867",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*",
"matchCriteriaId": "362252ED-1DB3-4CF6-86DD-14919826D75E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9BB21B3F-6D07-4B45-8A71-DC5490176296",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9BACB28-F6EA-445A-B74F-0C3881FE59CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E650C510-037F-47DB-A486-EBF871C73278",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64F5D7CA-6F31-4842-AC66-EB975C19C83D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7D8E02BA-3A7E-4B13-A8D7-20FD0FAE3187",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wgr7640:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31DA4BC4-C634-4F62-A49E-5AD8F4FD4672",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wtr2965:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1267A5A-D6C7-405B-AD58-6A80A30E6813",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wtr3925:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27666130-DB04-457F-A968-3919FD5314BC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A possible double free or invalid memory access in audio driver while reading Speaker Protection parameters in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile"
},
{
"lang": "es",
"value": "Una posible doble liberaci\u00f3n o un acceso a la memoria no v\u00e1lido en el controlador de audio mientras se leen los par\u00e1metros de Speaker Protection en los productos Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile"
}
],
"id": "CVE-2020-11217",
"lastModified": "2024-11-21T04:57:17.133",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-01-21T10:15:14.823",
"references": [
{
"source": "product-security@qualcomm.com",
"tags": [
"Broken Link"
],
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin"
},
{
"source": "nvd@nist.gov",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-security-bulletin"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin"
}
],
"sourceIdentifier": "product-security@qualcomm.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-415"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2020-11217
Vulnerability from gsd - Updated: 2023-12-13 01:22Details
A possible double free or invalid memory access in audio driver while reading Speaker Protection parameters in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2020-11217",
"description": "A possible double free or invalid memory access in audio driver while reading Speaker Protection parameters in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile",
"id": "GSD-2020-11217"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-11217"
],
"details": "A possible double free or invalid memory access in audio driver while reading Speaker Protection parameters in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile",
"id": "GSD-2020-11217",
"modified": "2023-12-13T01:22:07.637871Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "product-security@qualcomm.com",
"ID": "CVE-2020-11217",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile",
"version": {
"version_data": [
{
"version_value": "PM3003A, PM4125, PM6125, PM6150A, PM6150L, PM6350, PM660, PM660A, PM660L, PM7150A, PM7150L, PM7250, PM7250B, PM7350C, PM8008, PM8009, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM8350, PM8350B, PM8350BH, PM8350BHS, PM8350C, PMI632, PMK7350, PMK8002, PMK8003, PMK8350, PMR525, PMR735A, PMR735B, PMX55, QAT3514, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QAT5568, QBT2000, QCA6390, QCA6391, QCA6421, QCA6426, QCA6431, QCA6436, QCM2290, QCM4290, QCS2290, QCS4290, QDM2301, QDM2305, QDM2307, QDM2308, QDM2310, QDM3301, QDM3302, QDM4643, QDM4650, QDM5579, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4100, QET4101, QET5100, QET5100M, QET6100, QET6110, QFS2530, QFS2580, QFS2608, QFS2630, QLN4642, QLN4650, QLN5020, QLN5030, QLN5040, QPA2625, QPA4340, QPA4360, QPA5461, QPA5580, QPA5581, QPA6560, QPA8673, QPA8686, QPA8801, QPA8802, QPA8803, QPA8821, QPA8842, QPM4621, QPM4630, QPM4640, QPM4641, QPM4650, QPM5620, QPM5621, QPM5641, QPM5657, QPM5658, QPM5670, QPM5677, QPM5679, QPM5870, QPM5875, QPM6582, QPM6585, QPM6621, QPM6670, QPM8820, QPM8830, QPM8870, QPM8895, QSM7250, QTC800H, QTC800S, QTC801S, QTM525, RSW8577, SD460, SD660, SD662, SD690 5G, SD750G, SD765, SD765G, SD768G, SD865 5G, SD888 5G, SDR425, SDR660, SDR735, SDR735G, SDR8250, SDR865, SDX55M, SDXR2 5G, SM4125, SM4350, SM7250P, SM7350, SMB1351, SMB1354, SMB1355, SMB1390, SMB1394, SMB1395, SMB1396, SMB1398, SMR525, SMR526, SMR545, SMR546, WCD9335, WCD9341, WCD9370, WCD9375, WCD9380, WCD9385, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN6740, WCN6750, WCN6850, WCN6851, WCN6856, WGR7640, WSA8810, WSA8815, WSA8830, WSA8835, WTR2965, WTR3925"
}
]
}
}
]
},
"vendor_name": "Qualcomm, Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A possible double free or invalid memory access in audio driver while reading Speaker Protection parameters in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Double Free Issue in Audio"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin",
"refsource": "CONFIRM",
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm3003a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm4125:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm6125:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm6150a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm6150l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm6350:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm660:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm660a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm660l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm7150a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm7150l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm7250:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm7250b:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm7350c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm8008:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm8009:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm8150a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm8150b:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm8150c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm8150l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm8250:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm8350:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm8350b:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm8350bh:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm8350bhs:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm8350c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pmi632:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pmk7350:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pmk8002:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pmk8003:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pmk8350:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pmr525:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pmr735a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pmr735b:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pmx55:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qat3514:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qat3516:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qat3518:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qat3519:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qat3522:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qat3550:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qat3555:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qat5515:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qat5516:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qat5522:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qat5533:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qat5568:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qbt2000:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qdm2301:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qdm2305:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qdm2307:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qdm2308:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qdm2310:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qdm3301:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qdm3302:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qdm4643:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qdm4650:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qdm5579:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qdm5620:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qdm5621:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qdm5650:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qdm5652:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qdm5670:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qdm5671:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qdm5677:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qdm5679:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qet4100:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qet4101:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qet5100:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qet5100m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qet6100:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qet6110:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qfs2530:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qfs2580:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qfs2608:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qfs2630:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qln4642:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qln4650:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qln5020:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qln5030:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qln5040:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpa2625:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpa4340:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpa4360:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpa5461:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpa5580:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpa5581:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpa6560:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpa8673:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpa8686:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpa8801:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpa8802:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpa8803:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpa8821:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpa8842:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm4621:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm4630:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm4640:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm4641:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm4650:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm5620:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm5621:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm5641:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm5657:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm5658:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm5670:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm5677:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm5679:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm5870:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm5875:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm6582:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm6585:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm6621:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm6670:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm8820:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm8830:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm8870:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm8895:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qsm7250:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qtc800h:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qtc800s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qtc801s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qtm525:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:rsw8577:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sd660:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sd6905g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sd750g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sd8655g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sd8885g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sdr425:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sdr660:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sdr735:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sdr735g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sdr8250:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sdr865:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sdxr25g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sm4125:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sm4350:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sm7350:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:smb1351:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:smb1354:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:smb1355:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:smb1390:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:smb1394:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:smb1395:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:smb1396:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:smb1398:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:smr525:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:smr526:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:smr545:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:smr546:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wgr7640:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wtr2965:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wtr3925:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security.cna@qualcomm.com",
"ID": "CVE-2020-11217"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A possible double free or invalid memory access in audio driver while reading Speaker Protection parameters in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin",
"refsource": "CONFIRM",
"tags": [
"Broken Link"
],
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin"
},
{
"name": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-security-bulletin",
"refsource": "MISC",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-security-bulletin"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2021-01-29T20:28Z",
"publishedDate": "2021-01-21T10:15Z"
}
}
}
GHSA-PMP4-M9V4-RH9X
Vulnerability from github – Published: 2022-05-24 17:40 – Updated: 2022-05-24 17:40
VLAI?
Details
A possible double free or invalid memory access in audio driver while reading Speaker Protection parameters in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
{
"affected": [],
"aliases": [
"CVE-2020-11217"
],
"database_specific": {
"cwe_ids": [
"CWE-415"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2021-01-21T10:15:00Z",
"severity": "HIGH"
},
"details": "A possible double free or invalid memory access in audio driver while reading Speaker Protection parameters in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile",
"id": "GHSA-pmp4-m9v4-rh9x",
"modified": "2022-05-24T17:40:01Z",
"published": "2022-05-24T17:40:01Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11217"
},
{
"type": "WEB",
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin"
},
{
"type": "WEB",
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-security-bulletin"
}
],
"schema_version": "1.4.0",
"severity": []
}
CERTFR-2020-AVI-795
Vulnerability from certfr_avis - Published: 2020-12-08 - Updated: 2020-12-08
De multiples vulnérabilités ont été découvertes dans Google Android. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
References
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Google Android toutes versions sans le correctif du 05/12/2020",
"product": {
"name": "Android",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-0460",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0460"
},
{
"name": "CVE-2020-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0466"
},
{
"name": "CVE-2020-3686",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3686"
},
{
"name": "CVE-2020-11216",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11216"
},
{
"name": "CVE-2020-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0440"
},
{
"name": "CVE-2020-3691",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3691"
},
{
"name": "CVE-2020-11138",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11138"
},
{
"name": "CVE-2020-11145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11145"
},
{
"name": "CVE-2020-11137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11137"
},
{
"name": "CVE-2020-0455",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0455"
},
{
"name": "CVE-2020-0019",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0019"
},
{
"name": "CVE-2020-11119",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11119"
},
{
"name": "CVE-2020-11139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11139"
},
{
"name": "CVE-2020-0470",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0470"
},
{
"name": "CVE-2020-0469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0469"
},
{
"name": "CVE-2020-11215",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11215"
},
{
"name": "CVE-2020-11214",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11214"
},
{
"name": "CVE-2020-11217",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11217"
},
{
"name": "CVE-2020-11143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11143"
},
{
"name": "CVE-2020-0468",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0468"
},
{
"name": "CVE-2020-15802",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15802"
},
{
"name": "CVE-2020-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0464"
},
{
"name": "CVE-2020-11140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11140"
},
{
"name": "CVE-2020-11146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11146"
},
{
"name": "CVE-2020-0456",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0456"
},
{
"name": "CVE-2020-11167",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11167"
},
{
"name": "CVE-2020-11144",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11144"
},
{
"name": "CVE-2020-11213",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11213"
},
{
"name": "CVE-2020-0459",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0459"
},
{
"name": "CVE-2020-11225",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11225"
},
{
"name": "CVE-2020-0444",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0444"
},
{
"name": "CVE-2020-11200",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11200"
},
{
"name": "CVE-2020-0016",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0016"
},
{
"name": "CVE-2020-3685",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3685"
},
{
"name": "CVE-2020-0467",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0467"
},
{
"name": "CVE-2020-0099",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0099"
},
{
"name": "CVE-2020-11136",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11136"
},
{
"name": "CVE-2020-11212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11212"
},
{
"name": "CVE-2020-11185",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11185"
},
{
"name": "CVE-2020-0457",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0457"
},
{
"name": "CVE-2020-0294",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0294"
},
{
"name": "CVE-2020-0458",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0458"
},
{
"name": "CVE-2020-11197",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11197"
},
{
"name": "CVE-2020-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0465"
},
{
"name": "CVE-2020-0463",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0463"
},
{
"name": "CVE-2020-11179",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11179"
}
],
"initial_release_date": "2020-12-08T00:00:00",
"last_revision_date": "2020-12-08T00:00:00",
"links": [],
"reference": "CERTFR-2020-AVI-795",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-12-08T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Android.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Android",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Pixel du 07 d\u00e9cembre 2020",
"url": "https://source.android.com/security/bulletin/pixel"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google 2020-12-01 du 07 d\u00e9cembre 2020",
"url": "https://source.android.com/security/bulletin/2020-12-01"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…