ID

VAR-202011-0209


CVE

CVE-2020-11157


TITLE

plural  Qualcomm  Product input verification vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2020-012775

DESCRIPTION

u'Lack of handling unexpected control messages while encryption was in progress can terminate the connection and thus leading to a DoS' in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8053, APQ8076, MDM9640, MDM9650, MSM8905, MSM8917, MSM8937, MSM8940, MSM8953, QCA6174A, QCA9886, QCM2150, QM215, SDM429, SDM439, SDM450, SDM632. plural Qualcomm The product contains an input verification vulnerability.Denial of service (DoS) It may be put into a state. The Qualcomm chip is a chip of Qualcomm (Qualcomm). A way to miniaturize circuits (mainly including semiconductor equipment, but also passive components, etc.) and often manufactured on the surface of semiconductor wafers. Many Qualcomm products have input validation errors. The vulnerability stems from the lack of ability of u to handle unexpected control messages during the encryption process, which leads to DoS

Trust: 2.25

sources: NVD: CVE-2020-11157 // JVNDB: JVNDB-2020-012775 // CNNVD: CNNVD-202010-312 // VULMON: CVE-2020-11157

AFFECTED PRODUCTS

vendor:qualcommmodel:msm8953scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:apq8053scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:msm8917scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qca6174ascope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qm215scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm429scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9640scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm439scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:msm8905scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:msm8940scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:apq8076scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm632scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:msm8937scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qca9886scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qcm2150scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm450scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9650scope:eqversion: -

Trust: 1.0

vendor:クアルコムmodel:msm8905scope: - version: -

Trust: 0.8

vendor:クアルコムmodel:msm8940scope: - version: -

Trust: 0.8

vendor:クアルコムmodel:apq8076scope: - version: -

Trust: 0.8

vendor:クアルコムmodel:mdm9650scope: - version: -

Trust: 0.8

vendor:クアルコムmodel:msm8917scope: - version: -

Trust: 0.8

vendor:クアルコムmodel:qca6174ascope: - version: -

Trust: 0.8

vendor:クアルコムmodel:msm8937scope: - version: -

Trust: 0.8

vendor:クアルコムmodel:mdm9640scope: - version: -

Trust: 0.8

vendor:クアルコムmodel:msm8953scope: - version: -

Trust: 0.8

vendor:クアルコムmodel:apq8053scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-012775 // NVD: CVE-2020-11157

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-11157
value: HIGH

Trust: 1.0

NVD: CVE-2020-11157
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202010-312
value: HIGH

Trust: 0.6

VULMON: CVE-2020-11157
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-11157
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2020-11157
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2020-11157
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2020-11157 // JVNDB: JVNDB-2020-012775 // CNNVD: CNNVD-202010-312 // NVD: CVE-2020-11157

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:Incorrect input confirmation (CWE-20) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2020-012775 // NVD: CVE-2020-11157

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202010-312

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202010-312

PATCH

title:October 2020 Security Bulletinurl:https://www.qualcomm.com/company/product-security/bulletins/october-2020-security-bulletin

Trust: 0.8

title:Google Android Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=129609

Trust: 0.6

sources: JVNDB: JVNDB-2020-012775 // CNNVD: CNNVD-202010-312

EXTERNAL IDS

db:NVDid:CVE-2020-11157

Trust: 2.5

db:JVNDBid:JVNDB-2020-012775

Trust: 0.8

db:AUSCERTid:ESB-2020.3453

Trust: 0.6

db:CNNVDid:CNNVD-202010-312

Trust: 0.6

db:VULMONid:CVE-2020-11157

Trust: 0.1

sources: VULMON: CVE-2020-11157 // JVNDB: JVNDB-2020-012775 // CNNVD: CNNVD-202010-312 // NVD: CVE-2020-11157

REFERENCES

url:https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-11157

Trust: 1.4

url:https://www.auscert.org.au/bulletins/esb-2020.3453/

Trust: 0.6

url:https://vigilance.fr/vulnerability/google-android-multiple-vulnerabilities-of-october-2020-33491

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2020-11157 // JVNDB: JVNDB-2020-012775 // CNNVD: CNNVD-202010-312 // NVD: CVE-2020-11157

SOURCES

db:VULMONid:CVE-2020-11157
db:JVNDBid:JVNDB-2020-012775
db:CNNVDid:CNNVD-202010-312
db:NVDid:CVE-2020-11157

LAST UPDATE DATE

2024-11-23T20:00:59.797000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2020-11157date:2021-07-21T00:00:00
db:JVNDBid:JVNDB-2020-012775date:2021-05-31T07:26:00
db:CNNVDid:CNNVD-202010-312date:2021-07-13T00:00:00
db:NVDid:CVE-2020-11157date:2024-11-21T04:56:57.463

SOURCES RELEASE DATE

db:VULMONid:CVE-2020-11157date:2020-11-02T00:00:00
db:JVNDBid:JVNDB-2020-012775date:2021-05-31T00:00:00
db:CNNVDid:CNNVD-202010-312date:2020-10-06T00:00:00
db:NVDid:CVE-2020-11157date:2020-11-02T07:15:13.797