CVE-2020-11121 Vulnerability Details

  /     /     /  

CVE-2020-11121 Metadata Quick Info

CVE Published: 12/11/2020 | CVE Updated: 04/08/2024 | CVE Year: 2020
Source: qualcomm | Vendor: Qualcomm, Inc. | Product: Snapdragon Auto, Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile
Status : PUBLISHED

CVE-2020-11121 Description

u\'Possible buffer overflow in WIFI hal process due to usage of memcpy without checking length of destination buffer\' in Snapdragon Auto, Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile in QCM4290, QCS4290, QM215, QSM8350, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SC8180X, SC8180XP, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6250, SM6350, SM7125, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR2130, SXR2130P

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID:
CWE Name: Buffer Copy Without Checking Size of Input in WLAN
Source: Qualcomm, Inc.

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID:
CAPEC Description:


Source: NVD (National Vulnerability Database).