7.8
HIGH
CVE-2020-11181
Qualcomm Snapdragon Array Out-of-Bounds Access Vulnerability
Description

Out of bound access issue while handling cvp process control command due to improper validation of buffer pointer received from HLOS in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

INFO

Published Date :

Jan. 21, 2021, 10:15 a.m.

Last Modified :

Nov. 21, 2024, 4:57 a.m.

Remotely Exploitable :

No

Impact Score :

5.9

Exploitability Score :

1.8
Affected Products

The following products are affected by CVE-2020-11181 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Qualcomm qca6390_firmware
2 Qualcomm qca6391_firmware
3 Qualcomm qca6426_firmware
4 Qualcomm qca6436_firmware
5 Qualcomm sd865_5g_firmware
6 Qualcomm sdx55m_firmware
7 Qualcomm sdxr2_5g_firmware
8 Qualcomm wcd9380_firmware
9 Qualcomm wcd9385_firmware
10 Qualcomm wcn6850_firmware
11 Qualcomm wcn6851_firmware
12 Qualcomm wsa8810_firmware
13 Qualcomm wsa8815_firmware
14 Qualcomm wcn6750_firmware
15 Qualcomm qca6421_firmware
16 Qualcomm qca6431_firmware
17 Qualcomm qsm8250_firmware
18 Qualcomm sdx55_firmware
19 Qualcomm pm3003a_firmware
20 Qualcomm pm8009_firmware
21 Qualcomm pm8150a_firmware
22 Qualcomm pm8150b_firmware
23 Qualcomm pm8150c_firmware
24 Qualcomm pm8150l_firmware
25 Qualcomm pm8250_firmware
26 Qualcomm pmk8002_firmware
27 Qualcomm pmr525_firmware
28 Qualcomm pmx55_firmware
29 Qualcomm qbt2000_firmware
30 Qualcomm qfs2530_firmware
31 Qualcomm qfs2580_firmware
32 Qualcomm qtc800h_firmware
33 Qualcomm qtc801s_firmware
34 Qualcomm sdr8250_firmware
35 Qualcomm sdr865_firmware
36 Qualcomm smb1355_firmware
37 Qualcomm smb1390_firmware
38 Qualcomm smr525_firmware
39 Qualcomm smr526_firmware
40 Qualcomm pm3003a
41 Qualcomm pm8009
42 Qualcomm pm8150a
43 Qualcomm pm8150b
44 Qualcomm pm8150c
45 Qualcomm pm8150l
46 Qualcomm pm8250
47 Qualcomm pmk8002
48 Qualcomm pmr525
49 Qualcomm pmx55
50 Qualcomm qbt2000
51 Qualcomm qca6390
52 Qualcomm qca6391
53 Qualcomm qca6421
54 Qualcomm qca6426
55 Qualcomm qca6431
56 Qualcomm qca6436
57 Qualcomm qfs2530
58 Qualcomm qfs2580
59 Qualcomm qsm8250
60 Qualcomm qtc800h
61 Qualcomm qtc801s
62 Qualcomm sd865_5g
63 Qualcomm sdr8250
64 Qualcomm sdr865
65 Qualcomm sdx55
66 Qualcomm sdx55m
67 Qualcomm sdxr2_5g
68 Qualcomm smb1355
69 Qualcomm smb1390
70 Qualcomm smr525
71 Qualcomm smr526
72 Qualcomm wcd9380
73 Qualcomm wcd9385
74 Qualcomm wcn6750
75 Qualcomm wcn6850
76 Qualcomm wcn6851
77 Qualcomm wsa8810
78 Qualcomm wsa8815
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2020-11181.

URL Resource
https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin Broken Link
https://www.qualcomm.com/company/product-security/bulletins/december-2020-security-bulletin Vendor Advisory
https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin Broken Link

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2020-11181 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2020-11181 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CWE Remap by [email protected]

    Jul. 21, 2021

    Action Type Old Value New Value
    Changed CWE CWE-787 CWE-119
  • Initial Analysis by [email protected]

    Jan. 29, 2021

    Action Type Old Value New Value
    Added CVSS V2 NIST (AV:L/AC:L/Au:N/C:C/I:C/A:C)
    Added CVSS V3.1 NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin No Types Assigned https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin Broken Link
    Added Reference https://www.qualcomm.com/company/product-security/bulletins/december-2020-security-bulletin [Vendor Advisory]
    Added CWE NIST CWE-787
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm3003a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm3003a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm8009_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm8009:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm8150a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm8150a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm8150b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm8150b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm8150c_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm8150c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm8150l_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm8150l:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm8250_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm8250:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pmk8002_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pmk8002:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pmr525_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pmr525:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pmx55_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pmx55:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qbt2000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qbt2000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qfs2530_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qfs2530:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qfs2580_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qfs2580:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qsm8250_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qsm8250:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qtc800h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qtc800h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qtc801s_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qtc801s:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdr8250_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdr8250:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdr865_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdr865:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:smb1355_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:smb1355:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:smb1390_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:smb1390:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:smr525_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:smr525:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:smr526_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:smr526:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.04 }} 0.00%

score

0.10264

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability