Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-11180 (GCVE-0-2020-11180)
Vulnerability from cvelistv5 – Published: 2021-01-21 09:41 – Updated: 2024-08-04 11:28
VLAI?
EPSS
Summary
Out of bound access in computer vision control due to improper validation of command length before processing it in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
Severity ?
No CVSS data available.
CWE
- Use of Out-of-Range Pointer Offset Issue in ComputerVision
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Qualcomm, Inc. | Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile |
Affected:
AQT1000, PM3003A, PM6150, PM7150A, PM7150L, PM7250, PM7250B, PM8004, PM8008, PM8009, PM8150, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM855, PM855B, PM855L, PM855P, PMC1000H, PMK8002, PMK8003, PMM6155AU, PMM8155AU, PMM8195AU, PMM855AU, PMR525, PMR735B, PMX50, PMX55, QAT3516, QAT3518, QAT3519, QAT3555, QAT5515, QAT5522, QAT5533, QBT1500, QBT2000, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6574, QCA6574A, QCA6574AU, QCA6595AU, QCA6696, QDM2301, QDM2305, QDM3301, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4101, QET5100, QET6110, QFS2530, QFS2580, QLN4642, QLN4650, QLN5020, QLN5030, QLN5040, QPA2625, QPA5580, QPA6560, QPA8673, QPA8686, QPA8801, QPA8802, QPA8803, QPA8821, QPA8842, QPM4650, QPM5620, QPM5621, QPM5657, QPM5658, QPM5670, QPM5677, QPM5679, QPM6582, QPM6585, QPM8820, QPM8830, QPM8895, QSM7250, QSM8250, QTC800H, QTC801S, QTM525, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC8180X+SDX55, SD 8C, SD ...[truncated*]
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T11:28:13.624Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile",
"vendor": "Qualcomm, Inc.",
"versions": [
{
"status": "affected",
"version": "AQT1000, PM3003A, PM6150, PM7150A, PM7150L, PM7250, PM7250B, PM8004, PM8008, PM8009, PM8150, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM855, PM855B, PM855L, PM855P, PMC1000H, PMK8002, PMK8003, PMM6155AU, PMM8155AU, PMM8195AU, PMM855AU, PMR525, PMR735B, PMX50, PMX55, QAT3516, QAT3518, QAT3519, QAT3555, QAT5515, QAT5522, QAT5533, QBT1500, QBT2000, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6574, QCA6574A, QCA6574AU, QCA6595AU, QCA6696, QDM2301, QDM2305, QDM3301, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4101, QET5100, QET6110, QFS2530, QFS2580, QLN4642, QLN4650, QLN5020, QLN5030, QLN5040, QPA2625, QPA5580, QPA6560, QPA8673, QPA8686, QPA8801, QPA8802, QPA8803, QPA8821, QPA8842, QPM4650, QPM5620, QPM5621, QPM5657, QPM5658, QPM5670, QPM5677, QPM5679, QPM6582, QPM6585, QPM8820, QPM8830, QPM8895, QSM7250, QSM8250, QTC800H, QTC801S, QTM525, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC8180X+SDX55, SD 8C, SD ...[truncated*]"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Out of bound access in computer vision control due to improper validation of command length before processing it in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile"
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Use of Out-of-Range Pointer Offset Issue in ComputerVision",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-21T09:41:20.000Z",
"orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f",
"shortName": "qualcomm"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin"
}
],
"x_ConverterErrors": {
"version_name": {
"error": "version_name too long. Use array of versions to record more than one version.",
"message": "Truncated!"
}
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "product-security@qualcomm.com",
"ID": "CVE-2020-11180",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile",
"version": {
"version_data": [
{
"version_value": "AQT1000, PM3003A, PM6150, PM7150A, PM7150L, PM7250, PM7250B, PM8004, PM8008, PM8009, PM8150, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM855, PM855B, PM855L, PM855P, PMC1000H, PMK8002, PMK8003, PMM6155AU, PMM8155AU, PMM8195AU, PMM855AU, PMR525, PMR735B, PMX50, PMX55, QAT3516, QAT3518, QAT3519, QAT3555, QAT5515, QAT5522, QAT5533, QBT1500, QBT2000, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6574, QCA6574A, QCA6574AU, QCA6595AU, QCA6696, QDM2301, QDM2305, QDM3301, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4101, QET5100, QET6110, QFS2530, QFS2580, QLN4642, QLN4650, QLN5020, QLN5030, QLN5040, QPA2625, QPA5580, QPA6560, QPA8673, QPA8686, QPA8801, QPA8802, QPA8803, QPA8821, QPA8842, QPM4650, QPM5620, QPM5621, QPM5657, QPM5658, QPM5670, QPM5677, QPM5679, QPM6582, QPM6585, QPM8820, QPM8830, QPM8895, QSM7250, QSM8250, QTC800H, QTC801S, QTM525, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC8180X+SDX55, SD 8C, SD 8CX, SD730, SD765, SD765G, SD768G, SD855, SD865 5G, SDR051, SDR052, SDR660, SDR735, SDR8150, SDR8250, SDR865, SDX50M, SDX55, SDX55M, SDXR2 5G, SM7250P, SMB1355, SMB1381, SMB1390, SMB1395, SMB2351, SMR525, SMR526, WCD9340, WCD9341, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3910, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN6750, WCN6850, WCN6851, WSA8810, WSA8815, WSA8830, WSA8835"
}
]
}
}
]
},
"vendor_name": "Qualcomm, Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Out of bound access in computer vision control due to improper validation of command length before processing it in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use of Out-of-Range Pointer Offset Issue in ComputerVision"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin",
"refsource": "CONFIRM",
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f",
"assignerShortName": "qualcomm",
"cveId": "CVE-2020-11180",
"datePublished": "2021-01-21T09:41:20.000Z",
"dateReserved": "2020-03-31T00:00:00.000Z",
"dateUpdated": "2024-08-04T11:28:13.624Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
GSD-2020-11180
Vulnerability from gsd - Updated: 2023-12-13 01:22Details
Out of bound access in computer vision control due to improper validation of command length before processing it in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2020-11180",
"description": "Out of bound access in computer vision control due to improper validation of command length before processing it in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile",
"id": "GSD-2020-11180"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-11180"
],
"details": "Out of bound access in computer vision control due to improper validation of command length before processing it in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile",
"id": "GSD-2020-11180",
"modified": "2023-12-13T01:22:05.096167Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "product-security@qualcomm.com",
"ID": "CVE-2020-11180",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile",
"version": {
"version_data": [
{
"version_value": "AQT1000, PM3003A, PM6150, PM7150A, PM7150L, PM7250, PM7250B, PM8004, PM8008, PM8009, PM8150, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM855, PM855B, PM855L, PM855P, PMC1000H, PMK8002, PMK8003, PMM6155AU, PMM8155AU, PMM8195AU, PMM855AU, PMR525, PMR735B, PMX50, PMX55, QAT3516, QAT3518, QAT3519, QAT3555, QAT5515, QAT5522, QAT5533, QBT1500, QBT2000, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6574, QCA6574A, QCA6574AU, QCA6595AU, QCA6696, QDM2301, QDM2305, QDM3301, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4101, QET5100, QET6110, QFS2530, QFS2580, QLN4642, QLN4650, QLN5020, QLN5030, QLN5040, QPA2625, QPA5580, QPA6560, QPA8673, QPA8686, QPA8801, QPA8802, QPA8803, QPA8821, QPA8842, QPM4650, QPM5620, QPM5621, QPM5657, QPM5658, QPM5670, QPM5677, QPM5679, QPM6582, QPM6585, QPM8820, QPM8830, QPM8895, QSM7250, QSM8250, QTC800H, QTC801S, QTM525, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC8180X+SDX55, SD 8C, SD 8CX, SD730, SD765, SD765G, SD768G, SD855, SD865 5G, SDR051, SDR052, SDR660, SDR735, SDR8150, SDR8250, SDR865, SDX50M, SDX55, SDX55M, SDXR2 5G, SM7250P, SMB1355, SMB1381, SMB1390, SMB1395, SMB2351, SMR525, SMR526, WCD9340, WCD9341, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3910, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN6750, WCN6850, WCN6851, WSA8810, WSA8815, WSA8830, WSA8835"
}
]
}
}
]
},
"vendor_name": "Qualcomm, Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Out of bound access in computer vision control due to improper validation of command length before processing it in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use of Out-of-Range Pointer Offset Issue in ComputerVision"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin",
"refsource": "CONFIRM",
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm3003a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm6150:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm7150a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm7150l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm7250:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm7250b:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm8004:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm8008:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm8009:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm8150:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm8150a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm8150b:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm8150c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm8150l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm8250:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm855:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm855b:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm855l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pm855p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pmc1000h:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pmk8002:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pmk8003:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pmm6155au:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pmm8155au:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pmm8195au:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pmm855au:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pmr525:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pmr735b:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pmx50:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:pmx55:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qat3516:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qat3518:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qat3519:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qat3555:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qat5515:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qat5522:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qat5533:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qbt1500:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qbt2000:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qdm2301:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qdm2305:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qdm3301:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qdm5620:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qdm5621:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qdm5650:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qdm5652:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qdm5670:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qdm5671:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qdm5677:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qdm5679:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qet4101:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qet5100:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qet6110:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qfs2530:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qfs2580:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qln4642:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qln4650:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qln5020:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qln5030:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qln5040:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpa2625:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpa5580:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpa6560:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpa8673:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpa8686:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpa8801:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpa8802:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpa8803:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpa8821:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpa8842:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm4650:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm5620:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm5621:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm5657:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm5658:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm5670:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm5677:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm5679:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm6582:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm6585:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm8820:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm8830:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qpm8895:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qsm7250:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qsm8250:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qtc800h:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qtc801s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qtm525:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sc8180x\\+sdx55:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sd8655g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sd8c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sd8cx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sdr051:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sdr052:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sdr660:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sdr735:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sdr8150:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sdr8250:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sdr865:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sdx50m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sdxr25g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:smb1355:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:smb1381:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:smb1390:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:smb1395:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:smb2351:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:smr525:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:smr526:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcd9371:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security.cna@qualcomm.com",
"ID": "CVE-2020-11180"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Out of bound access in computer vision control due to improper validation of command length before processing it in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin",
"refsource": "CONFIRM",
"tags": [
"Broken Link"
],
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin"
},
{
"name": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-security-bulletin",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-security-bulletin"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2021-01-30T00:46Z",
"publishedDate": "2021-01-21T10:15Z"
}
}
}
FKIE_CVE-2020-11180
Vulnerability from fkie_nvd - Published: 2021-01-21 10:15 - Updated: 2024-11-21 04:57
Severity ?
Summary
Out of bound access in computer vision control due to improper validation of command length before processing it in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm3003a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BEF03FD6-E0DF-4216-8639-BCD58F56E646",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm6150:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0D757D8-2A81-4161-ABA8-54D61E71568A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm7150a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B66F085D-874B-43D3-A965-FCAC14657A69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm7150l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9E3064A-C411-4097-8E4D-4984C5769126",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm7250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B20B944-46FA-4D10-8B50-E31D1E08EC4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm7250b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3AD9E23-148B-4AF7-BE79-A1324CC6F546",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm8004:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CAA0E9B-33D8-414B-86CB-DF6D04746144",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm8008:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97A128D0-9E32-4B88-B92B-E15D56CE30E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm8009:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE2D27C4-B364-4991-AE9E-4F3DC486D581",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm8150:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C716BC34-C366-4389-8AD9-8806065A7403",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm8150a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6151FB45-F8F7-4F92-ACB7-57272CCAD255",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm8150b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5AF5EE00-7002-4190-BCCF-8B63ACA70CEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm8150c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "660ADC5A-799B-42C4-B7E1-52539AD994D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm8150l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C5ABEF07-694B-47E8-A3A9-8164EF6E45BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm8250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB6FFB29-7370-43CD-8410-2A17D9A3BD64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm855:-:*:*:*:*:*:*:*",
"matchCriteriaId": "179E3B9E-0EE6-436B-AC5B-49FB3F375BD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm855b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FED8C7A7-884F-412B-BF47-D122810A67E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm855l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A320056A-818F-4BEB-9DB0-14F8F26A309B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pm855p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3AEC500-88F5-432D-9DA3-FBB4438150A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pmc1000h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "068DFD9E-75AA-4556-B16E-0AA699A96A11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pmk8002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E43ED5B2-BE32-4650-9726-970135570455",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pmk8003:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA7350FB-760C-41D1-A72F-A1FD65F7CE60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pmm6155au:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4A07D34-F150-42DE-A5A0-BE41A678AA0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pmm8155au:-:*:*:*:*:*:*:*",
"matchCriteriaId": "732B2221-EA5D-408F-A1C5-0193D452C8DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pmm8195au:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F18ED67-902E-4DFC-8239-B8188DBD7FEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pmm855au:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97F67FB3-5725-4A19-904E-B1FC95D4402E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pmr525:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1AA1D854-AD1B-4732-AEF3-321936B5DF7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pmr735b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1E4545F-B38C-4535-BF0E-6A9FC0579265",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pmx50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F125BECB-FBCE-4B1E-AA23-CE839F91B0B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:pmx55:-:*:*:*:*:*:*:*",
"matchCriteriaId": "01E63676-6E36-4B26-88C6-36CF73B5FBA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qat3516:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D80915F-096A-4B69-B6B8-6C6609B463DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qat3518:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49400DEF-EB72-419F-AD00-37BF7C30F2BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qat3519:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04842F87-AA4D-43BF-8148-FE7BD521C975",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qat3555:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4FDC5240-C134-44E6-8E90-63C09BA01970",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qat5515:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D209F276-3539-4231-9735-B31C22AE8E5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qat5522:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5098C94E-4146-4D68-BCE6-D860B9A62BBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qat5533:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87A58C3D-B9C1-4155-9FF1-C5312D699164",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qbt1500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8B8C5E9-3F03-4A5E-95FC-B9318BA85268",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qbt2000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEA626EC-59F1-43CC-835C-1E4F3FE579BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3BF86E1-3FAC-4A42-8C01-5944C6C30AE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47E674DE-55AB-44E5-8E00-C804FC9D4DC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE9115A0-0D87-49BE-9A9B-091DBF8D9E6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FF5EC23-4884-4C2B-8E77-50B1E8E28A3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A963FDF-6FF4-4F48-834E-2A14D241716D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34661A30-92C3-4F0D-ABD1-8DA8E928DFF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A34D021D-C043-4EFD-9AB3-B2174528CBA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*",
"matchCriteriaId": "66C16E1E-9D4A-4F20-B697-833FDCCA86FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11405993-5903-4716-B452-370281034B42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qdm2301:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2430E3C4-89EA-41F2-9A19-DBCB69A4F91D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qdm2305:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30F2396C-5527-4E03-B005-029F020A095F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qdm3301:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8CA76C6A-0988-436A-B93A-273AB8E0226A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qdm5620:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF4ED992-0B17-433A-82FD-B94DE482DB65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qdm5621:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45EE0BDE-155D-4F1D-B4A5-DFD21C5502FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qdm5650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A850430E-BA5F-4A79-BCC0-346014064A9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qdm5652:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3F1AEEB3-DE39-429B-A373-8BFB51BD21FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qdm5670:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF219397-DA5D-4758-BE04-35B56C3891F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qdm5671:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AF9895A-1A99-49B6-B89A-C6C2170CB9CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qdm5677:-:*:*:*:*:*:*:*",
"matchCriteriaId": "151E59EF-A5F1-4378-8A34-4AAFB074E879",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qdm5679:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D2DFD77-3D15-4156-BADC-F48F73AF7C68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qet4101:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7872ACFC-C2BF-43EC-B061-A100EF25A70D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qet5100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42AF43F3-26C1-4CB0-98D4-F98AA6B4A5FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qet6110:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC427584-98A2-4842-9EE8-72AF8AD2B912",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qfs2530:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98E5B822-FCBC-48F4-AB60-B9AF73A8D58C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qfs2580:-:*:*:*:*:*:*:*",
"matchCriteriaId": "55BEA113-FA98-4BB3-B92C-71FF6C2F6310",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qln4642:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45F730FA-3E02-47A5-BDB3-9E132183DB95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qln4650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F83D75FB-822D-420A-9069-28E55091C05C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qln5020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E8D7085-36BE-4E13-B34B-9D5E9AEC7673",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qln5030:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7AE158C6-5444-4B17-9848-7F9876F8F2DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qln5040:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8EB46FAF-E84E-4007-9B47-EE13E8E31B4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpa2625:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65A30903-7531-42C4-B0CD-2B0D45EA6481",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpa5580:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8C1E390-8B11-4DC7-ACF7-87B7F7C21EE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpa6560:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF7AC75C-65EC-48E8-AECD-77F41EA60D06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpa8673:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E9669EE-515D-40E1-A260-118B9F0D1DD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpa8686:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DC94A215-4CF9-4F95-B25B-3DCDF2F4FCA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpa8801:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0047E7B-50CD-492A-B7A2-FD3863ECF499",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpa8802:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89E1CDD6-480A-4027-B74D-CD987FD38DAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpa8803:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13F89782-9105-4437-A33E-BBA59FFF7B86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpa8821:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D72FE2FC-4AC6-4F9A-8868-0977B4713513",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpa8842:-:*:*:*:*:*:*:*",
"matchCriteriaId": "027FD323-DD57-49D6-AD5B-18B84EC5B086",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm4650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB823470-EA4C-499C-856D-4B514CC7510F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm5620:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAC5C6C4-6FFF-47A1-879C-DBE714BC1910",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm5621:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72DA9B6E-B01F-4A91-BF54-74E6C2C900C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm5657:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51821A0A-0B45-4B68-9624-6BB6ECB28935",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm5658:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89EC822B-3F9E-46F3-A792-CD4BE73EC0E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm5670:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25DDF73E-92A7-4E53-9550-EBAAC1B3B8F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm5677:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5827067-95F2-4615-897C-92A3749F98AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm5679:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47DFF710-2581-4E83-A60B-DC61FF534453",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm6582:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C51B88E1-BD42-416E-BF9F-FA8AF3C8C312",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm6585:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9C92D88-FF1E-4ADE-8370-F99FCDE00665",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm8820:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC546B18-D916-4168-89A6-0CB332D83264",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm8830:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9D356E-5CFB-4E72-8F08-F38C0AAD0B4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qpm8895:-:*:*:*:*:*:*:*",
"matchCriteriaId": "32636F9D-1A2D-4B87-AB95-518AC2787DAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qsm7250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D13CB7F4-B30D-4DB9-AAB3-797A79F888E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qsm8250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8CC9433-6B33-4B9C-8EC3-BBBB43897E5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qtc800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "462C175D-5C9B-4CC1-8329-B21656DB99CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qtc801s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62013476-1792-4BCC-B7AB-FB6D1D111C4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:qtm525:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1EBF0B4-1305-4E97-BA42-5E98DA3EE290",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2DAC85C-CDC9-4784-A69A-147A2CE8A8B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0514D433-162C-4680-8912-721D19BE6201",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3FEACAA9-C061-4713-9A54-37D8BFC0B00B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50EF47E5-2875-412F-815D-44804BB3A739",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sc8180x\\+sdx55:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C819454D-D413-478A-B78D-CFF6994803A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*",
"matchCriteriaId": "48F26F64-98D4-420A-8918-E5E56ABA1D47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF1560D8-14F6-4FD8-B83A-2023BB792065",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDE196A0-AB55-4A5B-A1D6-630706310163",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13D505D9-E00B-4934-AD85-E5EA2921FD50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F562ED3D-CBE3-4DCC-BFBB-DE0AD2425A9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sd8655g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51104EA4-B075-488C-A717-9CE785016C88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sd8c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6D575BE-B591-4E46-A090-0BCA0A6038CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sd8cx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70997DCA-7BEB-4691-B2EE-C9DB38409C07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sdr051:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C78E4FB-9075-417A-A2D0-C5E712CD9A29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sdr052:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6877FE43-90EF-4F90-B23A-DC24E1A1359D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sdr660:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C543239C-018C-42C1-AC4F-5359810395BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sdr735:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B28EC8E-1263-4ECD-8C90-9943468BA9B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sdr8150:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC61A16B-BA73-4F42-B9B9-35BFADECA814",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sdr8250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6D8E67-38BE-45E1-80A7-9A5776E9BFD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sdr865:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C221A7A-2F73-4060-A147-9712D43D02BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sdx50m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "657515D9-D609-4F76-9154-5ACC773A1C70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3FF5A9A-A34A-499C-B6E0-D67B496C5454",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "585B794A-0674-418B-B45B-42EA97C40B9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sdxr25g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "099751A2-A158-4A58-BDA0-D74DF0E8658B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D395018-251C-45AA-9EE8-A638CAB0B508",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:smb1355:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7AABDE55-DCDE-4E7D-8752-704B5EE745C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:smb1381:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D8BD2B3-EC60-41F8-ABF3-0DFCC4DA9F72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:smb1390:-:*:*:*:*:*:*:*",
"matchCriteriaId": "961BB1ED-BD12-4EDF-94D3-122F8AA6D064",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:smb1395:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C854E653-E387-455B-805B-44DBFB9843B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:smb2351:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BCA9AC7-D62A-4C5C-9C67-7FD9CEB5E7BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:smr525:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B616C2E-B3A5-44D2-8AC9-EC7A51094C17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:smr526:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E0E633-BC19-4805-962D-C06E3A193DE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D9E96B3-F1BB-46F8-B715-7DF90180F1E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcd9371:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D3AD370C-2ED0-43CF-83D9-50DC92A01CA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33A8FAA1-F824-4561-9CCC-7F0DF12F740F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5F28E29-520F-469E-B048-62DE2EF07ADD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9523ACC9-9D2F-4A40-9CEF-9A9676176867",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*",
"matchCriteriaId": "362252ED-1DB3-4CF6-86DD-14919826D75E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9BACB28-F6EA-445A-B74F-0C3881FE59CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E650C510-037F-47DB-A486-EBF871C73278",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64F5D7CA-6F31-4842-AC66-EB975C19C83D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out of bound access in computer vision control due to improper validation of command length before processing it in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile"
},
{
"lang": "es",
"value": "Un acceso fuera del l\u00edmite en el control de visi\u00f3n por computadora debido a una comprobaci\u00f3n inapropiada de la longitud del comando antes de procesarlo en los productos Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile"
}
],
"id": "CVE-2020-11180",
"lastModified": "2024-11-21T04:57:07.273",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-01-21T10:15:14.150",
"references": [
{
"source": "product-security@qualcomm.com",
"tags": [
"Broken Link"
],
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin"
},
{
"source": "nvd@nist.gov",
"tags": [
"Vendor Advisory"
],
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-security-bulletin"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin"
}
],
"sourceIdentifier": "product-security@qualcomm.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CERTFR-2021-AVI-071
Vulnerability from certfr_avis - Published: 2021-02-02 - Updated: 2021-02-02
De multiples vulnérabilités ont été découvertes dans Google Android. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
References
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Google Android toutes versions sans le correctif du 01 f\u00e9vrier 2020",
"product": {
"name": "Android",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-18509",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18509"
},
{
"name": "CVE-2021-0331",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0331"
},
{
"name": "CVE-2021-0341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0341"
},
{
"name": "CVE-2020-11163",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11163"
},
{
"name": "CVE-2020-11281",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11281"
},
{
"name": "CVE-2021-0329",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0329"
},
{
"name": "CVE-2020-11272",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11272"
},
{
"name": "CVE-2020-11180",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11180"
},
{
"name": "CVE-2020-11280",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11280"
},
{
"name": "CVE-2020-11282",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11282"
},
{
"name": "CVE-2020-11287",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11287"
},
{
"name": "CVE-2021-0327",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0327"
},
{
"name": "CVE-2020-11283",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11283"
},
{
"name": "CVE-2020-11276",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11276"
},
{
"name": "CVE-2020-11177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11177"
},
{
"name": "CVE-2020-11269",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11269"
},
{
"name": "CVE-2021-0339",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0339"
},
{
"name": "CVE-2021-0333",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0333"
},
{
"name": "CVE-2020-11296",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11296"
},
{
"name": "CVE-2021-0326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0326"
},
{
"name": "CVE-2021-0336",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0336"
},
{
"name": "CVE-2021-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0330"
},
{
"name": "CVE-2020-11270",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11270"
},
{
"name": "CVE-2021-0335",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0335"
},
{
"name": "CVE-2021-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0340"
},
{
"name": "CVE-2021-0314",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0314"
},
{
"name": "CVE-2021-0328",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0328"
},
{
"name": "CVE-2020-11271",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11271"
},
{
"name": "CVE-2020-11170",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11170"
},
{
"name": "CVE-2021-0337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0337"
},
{
"name": "CVE-2020-11277",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11277"
},
{
"name": "CVE-2020-11297",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11297"
},
{
"name": "CVE-2020-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11187"
},
{
"name": "CVE-2020-11278",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11278"
},
{
"name": "CVE-2021-0325",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0325"
},
{
"name": "CVE-2020-11203",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11203"
},
{
"name": "CVE-2021-0302",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0302"
},
{
"name": "CVE-2021-0305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0305"
},
{
"name": "CVE-2020-11286",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11286"
},
{
"name": "CVE-2021-0338",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0338"
},
{
"name": "CVE-2020-11275",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11275"
},
{
"name": "CVE-2021-0332",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0332"
},
{
"name": "CVE-2020-11253",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11253"
},
{
"name": "CVE-2021-0334",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0334"
}
],
"initial_release_date": "2021-02-02T00:00:00",
"last_revision_date": "2021-02-02T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-071",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-02-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Android.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Android",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Android du 01 f\u00e9vrier 2021",
"url": "https://source.android.com/security/bulletin/2021-02-01"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Pixel du 01 f\u00e9vrier 2021",
"url": "https://source.android.com/security/bulletin/pixel/2021-02-01"
}
]
}
GHSA-CG67-RX3C-VX3Q
Vulnerability from github – Published: 2022-05-24 17:40 – Updated: 2022-05-24 17:40
VLAI?
Details
Out of bound access in computer vision control due to improper validation of command length before processing it in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
{
"affected": [],
"aliases": [
"CVE-2020-11180"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2021-01-21T10:15:00Z",
"severity": "HIGH"
},
"details": "Out of bound access in computer vision control due to improper validation of command length before processing it in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile",
"id": "GHSA-cg67-rx3c-vx3q",
"modified": "2022-05-24T17:40:00Z",
"published": "2022-05-24T17:40:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11180"
},
{
"type": "WEB",
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin"
},
{
"type": "WEB",
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-security-bulletin"
}
],
"schema_version": "1.4.0",
"severity": []
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…