7.8
HIGH
CVE-2020-11185
Snapdragon WLAN Out-of-Bounds Memory Access Vulnerability
Description

Out of bound issue in WLAN driver while processing vdev responses from firmware due to lack of validation of data received from firmware in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking

INFO

Published Date :

Jan. 21, 2021, 10:15 a.m.

Last Modified :

Nov. 21, 2024, 4:57 a.m.

Remotely Exploitable :

No

Impact Score :

5.9

Exploitability Score :

1.8
Affected Products

The following products are affected by CVE-2020-11185 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Qualcomm pm3003a
2 Qualcomm pm7350c
3 Qualcomm pm8008
4 Qualcomm pm8009
5 Qualcomm pm8350
6 Qualcomm pm8350b
7 Qualcomm pm8350bh
8 Qualcomm pm8350bhs
9 Qualcomm pm8350c
10 Qualcomm pmk7350
11 Qualcomm pmk8002
12 Qualcomm pmk8350
13 Qualcomm pmm6155au
14 Qualcomm pmm8155au
15 Qualcomm pmm8195au
16 Qualcomm pmm855au
17 Qualcomm pmr525
18 Qualcomm pmr735a
19 Qualcomm pmr735b
20 Qualcomm pmx55
21 Qualcomm qat3514
22 Qualcomm qat3516
23 Qualcomm qat3518
24 Qualcomm qat3519
25 Qualcomm qat3555
26 Qualcomm qat5515
27 Qualcomm qat5516
28 Qualcomm qat5522
29 Qualcomm qat5568
30 Qualcomm qca6175a
31 Qualcomm qca6390
32 Qualcomm qca6391
33 Qualcomm qca6564a
34 Qualcomm qca6564au
35 Qualcomm qca6574
36 Qualcomm qca6574a
37 Qualcomm qca6574au
38 Qualcomm qca6584au
39 Qualcomm qca6595
40 Qualcomm qca6595au
41 Qualcomm qca6696
42 Qualcomm qca9984
43 Qualcomm qdm2307
44 Qualcomm qdm2308
45 Qualcomm qdm2310
46 Qualcomm qdm3301
47 Qualcomm qdm3302
48 Qualcomm qdm4643
49 Qualcomm qdm4650
50 Qualcomm qdm5579
51 Qualcomm qdm5620
52 Qualcomm qdm5621
53 Qualcomm qdm5670
54 Qualcomm qdm5671
55 Qualcomm qdm5677
56 Qualcomm qdm5679
57 Qualcomm qet5100
58 Qualcomm qet5100m
59 Qualcomm qet6100
60 Qualcomm qet6110
61 Qualcomm qfs2530
62 Qualcomm qfs2580
63 Qualcomm qfs2608
64 Qualcomm qfs2630
65 Qualcomm qln4642
66 Qualcomm qln4650
67 Qualcomm qln5020
68 Qualcomm qln5030
69 Qualcomm qln5040
70 Qualcomm qpa2625
71 Qualcomm qpa5461
72 Qualcomm qpa5580
73 Qualcomm qpa5581
74 Qualcomm qpa6560
75 Qualcomm qpa8801
76 Qualcomm qpa8802
77 Qualcomm qpa8803
78 Qualcomm qpa8821
79 Qualcomm qpa8842
80 Qualcomm qpm4621
81 Qualcomm qpm4630
82 Qualcomm qpm4640
83 Qualcomm qpm4641
84 Qualcomm qpm4650
85 Qualcomm qpm5621
86 Qualcomm qpm5641
87 Qualcomm qpm5670
88 Qualcomm qpm5677
89 Qualcomm qpm5679
90 Qualcomm qpm5870
91 Qualcomm qpm5875
92 Qualcomm qpm6585
93 Qualcomm qpm6621
94 Qualcomm qpm6670
95 Qualcomm qpm8820
96 Qualcomm qpm8870
97 Qualcomm qtm525
98 Qualcomm sa6145p
99 Qualcomm sa6155p
100 Qualcomm sa8150p
101 Qualcomm sa8155
102 Qualcomm sa8155p
103 Qualcomm sa8195p
104 Qualcomm sdr660g
105 Qualcomm sdr735
106 Qualcomm sdr735g
107 Qualcomm sdr8250
108 Qualcomm sdr865
109 Qualcomm sdx55
110 Qualcomm sdx55m
111 Qualcomm sm7350
112 Qualcomm smb1394
113 Qualcomm smb1395
114 Qualcomm smb1396
115 Qualcomm smb1398
116 Qualcomm smr525
117 Qualcomm smr526
118 Qualcomm smr545
119 Qualcomm smr546
120 Qualcomm wcd9341
121 Qualcomm wcd9380
122 Qualcomm wcd9385
123 Qualcomm wcn3910
124 Qualcomm wcn3991
125 Qualcomm wcn3998
126 Qualcomm wcn6740
127 Qualcomm wcn6750
128 Qualcomm wcn6850
129 Qualcomm wcn6851
130 Qualcomm wcn6856
131 Qualcomm wsa8830
132 Qualcomm wsa8835
133 Qualcomm sd8885g
134 Qualcomm ar9380
135 Qualcomm csr8811
136 Qualcomm ipq4018
137 Qualcomm ipq4019
138 Qualcomm ipq4028
139 Qualcomm ipq4029
140 Qualcomm ipq6000
141 Qualcomm ipq6005
142 Qualcomm ipq6010
143 Qualcomm ipq6018
144 Qualcomm ipq6028
145 Qualcomm ipq8064
146 Qualcomm ipq8065
147 Qualcomm ipq8068
148 Qualcomm ipq8070
149 Qualcomm ipq8070a
150 Qualcomm ipq8071
151 Qualcomm ipq8071a
152 Qualcomm ipq8072
153 Qualcomm ipq8072a
154 Qualcomm ipq8074
155 Qualcomm ipq8074a
156 Qualcomm ipq8076
157 Qualcomm ipq8076a
158 Qualcomm ipq8078
159 Qualcomm ipq8078a
160 Qualcomm ipq8173
161 Qualcomm ipq8174
162 Qualcomm qca4024
163 Qualcomm qca6428
164 Qualcomm qca6438
165 Qualcomm qca7500
166 Qualcomm qca8072
167 Qualcomm qca8075
168 Qualcomm qca8081
169 Qualcomm qca9880
170 Qualcomm qca9886
171 Qualcomm qca9888
172 Qualcomm qca9889
173 Qualcomm qca9898
174 Qualcomm qca9980
175 Qualcomm qca9985
176 Qualcomm qca9990
177 Qualcomm qca9992
178 Qualcomm qca9994
179 Qualcomm qcn5021
180 Qualcomm qcn5022
181 Qualcomm qcn5024
182 Qualcomm qcn5052
183 Qualcomm qcn5054
184 Qualcomm qcn5064
185 Qualcomm qcn5121
186 Qualcomm qcn5122
187 Qualcomm qcn5124
188 Qualcomm qcn5152
189 Qualcomm qcn5154
190 Qualcomm qcn5164
191 Qualcomm qcn5550
192 Qualcomm qcn7605
193 Qualcomm qcn7606
194 Qualcomm qcn9000
195 Qualcomm qcn9074
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2020-11185.

URL Resource
https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin Broken Link
https://www.qualcomm.com/company/product-security/bulletins/december-2020-security-bulletin Patch Vendor Advisory
https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin Broken Link

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2020-11185 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2020-11185 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Initial Analysis by [email protected]

    Jan. 29, 2021

    Action Type Old Value New Value
    Added CVSS V2 NIST (AV:L/AC:L/Au:N/C:C/I:C/A:C)
    Added CVSS V3.1 NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin No Types Assigned https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin Broken Link
    Added Reference https://www.qualcomm.com/company/product-security/bulletins/december-2020-security-bulletin [Patch, Vendor Advisory]
    Added CWE NIST CWE-787
    Added CPE Configuration OR *cpe:2.3:h:qualcomm:ar9380:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:csr8811:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:ipq4018:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:ipq4019:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:ipq4028:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:ipq4029:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:ipq6000:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:ipq6005:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:ipq6010:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:ipq6028:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:ipq8064:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:ipq8065:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:ipq8068:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:ipq8070:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:ipq8070a:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:ipq8071:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:ipq8071a:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:ipq8072:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:ipq8072a:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:ipq8074:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:ipq8074a:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:ipq8076:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:ipq8076a:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:ipq8078:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:ipq8078a:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:ipq8173:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:ipq8174:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:pm3003a:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:pm7350c:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:pm8008:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:pm8009:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:pm8350:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:pm8350b:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:pm8350bh:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:pm8350bhs:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:pm8350c:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:pmk7350:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:pmk8002:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:pmk8350:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:pmm6155au:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:pmm8155au:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:pmm8195au:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:pmm855au:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:pmr525:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:pmr735a:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:pmr735b:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:pmx55:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qat3514:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qat3516:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qat3518:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qat3519:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qat3555:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qat5515:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qat5516:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qat5522:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qat5568:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qca4024:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qca6175a:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qca6428:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qca6438:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qca7500:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qca8072:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qca8075:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qca9880:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qca9886:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qca9888:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qca9889:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qca9898:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qca9980:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qca9984:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qca9985:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qca9990:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qca9992:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qca9994:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qcn5021:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qcn5022:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qcn5024:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qcn5052:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qcn5054:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qcn5064:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qcn5121:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qcn5122:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qcn5124:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qcn5152:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qcn5154:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qcn5164:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qcn5550:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qcn7605:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qcn7606:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qcn9000:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qdm2307:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qdm2308:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qdm2310:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qdm3301:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qdm3302:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qdm4643:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qdm4650:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qdm5579:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qdm5620:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qdm5621:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qdm5670:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qdm5671:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qdm5677:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qdm5679:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qet5100:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qet5100m:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qet6100:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qet6110:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qfs2530:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qfs2580:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qfs2608:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qfs2630:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qln4642:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qln4650:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qln5020:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qln5030:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qln5040:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qpa2625:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qpa5461:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qpa5580:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qpa5581:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qpa6560:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qpa8801:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qpa8802:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qpa8803:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qpa8821:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qpa8842:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qpm4621:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qpm4630:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qpm4640:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qpm4641:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qpm4650:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qpm5621:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qpm5641:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qpm5670:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qpm5677:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qpm5679:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qpm5870:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qpm5875:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qpm6585:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qpm6621:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qpm6670:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qpm8820:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qpm8870:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:qtm525:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:sd8885g:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:sdr660g:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:sdr735:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:sdr735g:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:sdr8250:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:sdr865:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:sm7350:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:smb1394:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:smb1395:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:smb1396:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:smb1398:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:smr525:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:smr526:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:smr545:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:smr546:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:* *cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2020-11185 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2020-11185 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.04 }} 0.00%

score

0.10264

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability