var-202009-1283
Vulnerability from variot
u'Lack of check to ensure that the TX read index & RX write index that are read from shared memory are less than the FIFO size results into memory corruption and potential information leakage' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, Bitra, IPQ6018, IPQ8074, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA8081, QCM2150, QCN7605, QCS404, QCS405, QCS605, QCS610, QM215, Rennell, SA415M, SA6155P, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130. plural Snapdragon The product contains a buffer error vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202009-1283", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "msm8909", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "apq8053", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "msm8953", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sc8180x", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "msm8917", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sdm429", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "msm8998", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sdx24", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "qcs405", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sda660", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "kamorta", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sm8250", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "mdm9607", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "qcs610", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sdm450", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sxr2130", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "mdm9645", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "mdm9206", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sdm660", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sdm710", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "ipq8074", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "mdm9640", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "mdm9150", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "mdm9655", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sdm845", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "qca8081", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "msm8940", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sxr1130", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "qcs404", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "qcm2150", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sm8150", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sdx55", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sda845", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sdm636", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "apq8096au", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "msm8996au", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "saipan", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sm7150", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "apq8009", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "apq8098", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "qcs605", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sm6150", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "msm8996", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sa415m", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sdm632", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sdm429w", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sdm670", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "mdm9650", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "bitra", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sdm630", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "mdm9205", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sdm850", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sa6155p", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "qm215", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sdm439", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "qcn7605", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "nicobar", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "msm8905", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "msm8920", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sdx20", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "rennell", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sc7180", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "msm8937", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "apq8009", scope: null, trust: 0.8, vendor: "クアルコム", version: null, }, { model: "apq8053", scope: null, trust: 0.8, vendor: "クアルコム", version: null, }, { model: "apq8096au", scope: null, trust: 0.8, vendor: "クアルコム", version: null, }, { model: "apq8098", scope: null, trust: 0.8, vendor: "クアルコム", version: null, }, { model: "bitra", scope: null, trust: 0.8, vendor: "クアルコム", version: null, }, { model: "kamorta", scope: null, trust: 0.8, vendor: "クアルコム", version: null, }, { model: "mdm9150", scope: null, trust: 0.8, vendor: "クアルコム", version: null, }, { model: "mdm9206", scope: null, trust: 0.8, vendor: "クアルコム", version: null, }, { model: "mdm9607", scope: null, trust: 0.8, vendor: "クアルコム", version: null, }, { model: "mdm9640", scope: null, trust: 0.8, vendor: "クアルコム", version: null, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2020-010700", }, { db: "NVD", id: "CVE-2020-3621", }, ], }, cve: "CVE-2020-3621", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", author: "nvd@nist.gov", availabilityImpact: "NONE", baseScore: 4.9, confidentialityImpact: "COMPLETE", exploitabilityScore: 3.9, id: "CVE-2020-3621", impactScore: 6.9, integrityImpact: "NONE", severity: "MEDIUM", trust: 1.8, vectorString: "AV:L/AC:L/Au:N/C:C/I:N/A:N", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "LOCAL", author: "nvd@nist.gov", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", exploitabilityScore: 1.8, id: "CVE-2020-3621", impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, { attackComplexity: "Low", attackVector: "Local", author: "NVD", availabilityImpact: "None", baseScore: 5.5, baseSeverity: "Medium", confidentialityImpact: "High", exploitabilityScore: null, id: "CVE-2020-3621", impactScore: null, integrityImpact: "None", privilegesRequired: "Low", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, ], severity: [ { author: "nvd@nist.gov", id: "CVE-2020-3621", trust: 1, value: "MEDIUM", }, { author: "NVD", id: "CVE-2020-3621", trust: 0.8, value: "Medium", }, { author: "CNNVD", id: "CNNVD-202008-074", trust: 0.6, value: "MEDIUM", }, ], }, ], sources: [ { db: "JVNDB", id: "JVNDB-2020-010700", }, { db: "CNNVD", id: "CNNVD-202008-074", }, { db: "NVD", id: "CVE-2020-3621", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "u'Lack of check to ensure that the TX read index & RX write index that are read from shared memory are less than the FIFO size results into memory corruption and potential information leakage' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, Bitra, IPQ6018, IPQ8074, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA8081, QCM2150, QCN7605, QCS404, QCS405, QCS605, QCS610, QM215, Rennell, SA415M, SA6155P, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130. plural Snapdragon The product contains a buffer error vulnerability.Information may be obtained", sources: [ { db: "NVD", id: "CVE-2020-3621", }, { db: "JVNDB", id: "JVNDB-2020-010700", }, ], trust: 1.62, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2020-3621", trust: 2.4, }, { db: "JVNDB", id: "JVNDB-2020-010700", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-202008-074", trust: 0.6, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2020-010700", }, { db: "CNNVD", id: "CNNVD-202008-074", }, { db: "NVD", id: "CVE-2020-3621", }, ], }, id: "VAR-202009-1283", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VARIoT devices database", id: null, }, ], trust: 0.2491935133333333, }, last_update_date: "2024-11-23T23:07:49.152000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "August 2020 Security Bulletin", trust: 0.8, url: "https://www.qualcomm.com/company/product-security/bulletins/august-2020-security-bulletin", }, { title: "Multiple Qualcomm Product input verification error vulnerability fixes", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=125407", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2020-010700", }, { db: "CNNVD", id: "CNNVD-202008-074", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-787", trust: 1, }, { problemtype: "CWE-20", trust: 1, }, { problemtype: "Buffer error (CWE-119) [NVD Evaluation ]", trust: 0.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2020-010700", }, { db: "NVD", id: "CVE-2020-3621", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.6, url: "https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin", }, { trust: 1.6, url: "https://www.qualcomm.com/company/product-security/bulletins/august-2020-security-bulletin", }, { trust: 1.4, url: "https://nvd.nist.gov/vuln/detail/cve-2020-3621", }, { trust: 0.6, url: "https://vigilance.fr/vulnerability/google-android-pixel-multiple-vulnerabilities-of-september-2020-33285", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2020-010700", }, { db: "CNNVD", id: "CNNVD-202008-074", }, { db: "NVD", id: "CVE-2020-3621", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "JVNDB", id: "JVNDB-2020-010700", }, { db: "CNNVD", id: "CNNVD-202008-074", }, { db: "NVD", id: "CVE-2020-3621", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2021-02-01T00:00:00", db: "JVNDB", id: "JVNDB-2020-010700", }, { date: "2020-08-03T00:00:00", db: "CNNVD", id: "CNNVD-202008-074", }, { date: "2020-09-08T10:15:15.107000", db: "NVD", id: "CVE-2020-3621", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2021-02-01T08:35:00", db: "JVNDB", id: "JVNDB-2020-010700", }, { date: "2020-10-28T00:00:00", db: "CNNVD", id: "CNNVD-202008-074", }, { date: "2024-11-21T05:31:25.493000", db: "NVD", id: "CVE-2020-3621", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "local", sources: [ { db: "CNNVD", id: "CNNVD-202008-074", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "plural Snapdragon Buffer error vulnerability in the product", sources: [ { db: "JVNDB", id: "JVNDB-2020-010700", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "buffer error", sources: [ { db: "CNNVD", id: "CNNVD-202008-074", }, ], trust: 0.6, }, }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.