7.8
HIGH
CVE-2020-11207
Qualcomm Snapdragon Buffer Overflow Vulnerability
Description

Buffer overflow in LibFastCV library due to improper size checks with respect to buffer length' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in APQ8052, APQ8056, APQ8076, APQ8096, APQ8096SG, APQ8098, MDM9655, MSM8952, MSM8956, MSM8976, MSM8976SG, MSM8996, MSM8996SG, MSM8998, QCM4290, QCM6125, QCS410, QCS4290, QCS610, QCS6125, QSM8250, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SDA640, SDA660, SDA845, SDA855, SDM640, SDM660, SDM830, SDM845, SDM850, SDX50M, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SXR2130, SXR2130P

INFO

Published Date :

Nov. 12, 2020, 10:15 a.m.

Last Modified :

Nov. 21, 2024, 4:57 a.m.

Remotely Exploitable :

No

Impact Score :

5.9

Exploitability Score :

1.8
Affected Products

The following products are affected by CVE-2020-11207 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Qualcomm sa6145p_firmware
2 Qualcomm sa6150p_firmware
3 Qualcomm sa6155p_firmware
4 Qualcomm sa8150p_firmware
5 Qualcomm sa8155p_firmware
6 Qualcomm sa8195p_firmware
7 Qualcomm sdx55m_firmware
8 Qualcomm qcm4290_firmware
9 Qualcomm qcs4290_firmware
10 Qualcomm qsm8250_firmware
11 Qualcomm sa6155_firmware
12 Qualcomm sa8155_firmware
13 Qualcomm sdx55_firmware
14 Qualcomm sm6250_firmware
15 Qualcomm sm6250p_firmware
16 Qualcomm sm7250p_firmware
17 Qualcomm sdm660_firmware
18 Qualcomm sm6350_firmware
19 Qualcomm sm7125_firmware
20 Qualcomm sm7225_firmware
21 Qualcomm sm8150_firmware
22 Qualcomm sm8250_firmware
23 Qualcomm sxr2130_firmware
24 Qualcomm qcs410_firmware
25 Qualcomm qcs610_firmware
26 Qualcomm sdx50m_firmware
27 Qualcomm qcm6125_firmware
28 Qualcomm qcs6125_firmware
29 Qualcomm apq8052_firmware
30 Qualcomm apq8056_firmware
31 Qualcomm apq8076_firmware
32 Qualcomm msm8952_firmware
33 Qualcomm msm8956_firmware
34 Qualcomm msm8976_firmware
35 Qualcomm msm8976sg_firmware
36 Qualcomm apq8098_firmware
37 Qualcomm msm8998_firmware
38 Qualcomm sc7180_firmware
39 Qualcomm sda660_firmware
40 Qualcomm sda845_firmware
41 Qualcomm sdm640_firmware
42 Qualcomm sdm845_firmware
43 Qualcomm sdm830_firmware
44 Qualcomm sdm850_firmware
45 Qualcomm sm4250_firmware
46 Qualcomm sm6125_firmware
47 Qualcomm sm6150_firmware
48 Qualcomm sm6150p_firmware
49 Qualcomm sm7150_firmware
50 Qualcomm sm7150p_firmware
51 Qualcomm sm7250_firmware
52 Qualcomm sm8150p_firmware
53 Qualcomm sxr2130p_firmware
54 Qualcomm mdm9655_firmware
55 Qualcomm apq8096_firmware
56 Qualcomm msm8996_firmware
57 Qualcomm sm6115_firmware
58 Qualcomm apq8052
59 Qualcomm apq8056
60 Qualcomm apq8076
61 Qualcomm mdm9655
62 Qualcomm msm8952
63 Qualcomm msm8956
64 Qualcomm msm8976
65 Qualcomm msm8976sg
66 Qualcomm qcm4290
67 Qualcomm qcm6125
68 Qualcomm qcs410
69 Qualcomm qcs4290
70 Qualcomm qcs610
71 Qualcomm qcs6125
72 Qualcomm qsm8250
73 Qualcomm sa6145p
74 Qualcomm sa6150p
75 Qualcomm sa6155
76 Qualcomm sa6155p
77 Qualcomm sa8150p
78 Qualcomm sa8155
79 Qualcomm sa8155p
80 Qualcomm sa8195p
81 Qualcomm sdm830
82 Qualcomm sdx50m
83 Qualcomm sdx55
84 Qualcomm sdx55m
85 Qualcomm sm6250
86 Qualcomm sm6250p
87 Qualcomm sm7250p
88 Qualcomm sm4250p_firmware
89 Qualcomm sm6115p_firmware
90 Qualcomm msm8996sg_firmware
91 Qualcomm sda640_firmware
92 Qualcomm sda855_firmware
93 Qualcomm apq8098
94 Qualcomm msm8996
95 Qualcomm msm8998
96 Qualcomm sc7180
97 Qualcomm sda660
98 Qualcomm sda845
99 Qualcomm sdm660
100 Qualcomm sdm845
101 Qualcomm sdm850
102 Qualcomm sm6150
103 Qualcomm sm7150
104 Qualcomm sm8150
105 Qualcomm sm8250
106 Qualcomm sxr2130
107 Qualcomm sm6125
108 Qualcomm sm6350
109 Qualcomm sm7125
110 Qualcomm sm7225
111 Qualcomm sm6115
112 Qualcomm apq8096
113 Qualcomm sm4250
114 Qualcomm sm4250p
115 Qualcomm sm6115p
116 Qualcomm sm7250
117 Qualcomm sm8150p
118 Qualcomm sxr2130p
119 Qualcomm msm8996sg
120 Qualcomm sda640
121 Qualcomm sda855
122 Qualcomm sdm640
123 Qualcomm sm6150p
124 Qualcomm sm7150p
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2020-11207.

URL Resource
https://blog.checkpoint.com/2020/08/06/achilles-small-chip-big-peril/ Third Party Advisory
https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/ Exploit Third Party Advisory
https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin Vendor Advisory
https://blog.checkpoint.com/2020/08/06/achilles-small-chip-big-peril/ Third Party Advisory
https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/ Exploit Third Party Advisory
https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2020-11207 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2020-11207 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://blog.checkpoint.com/2020/08/06/achilles-small-chip-big-peril/
    Added Reference https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/
    Added Reference https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Modified Analysis by [email protected]

    Oct. 19, 2022

    Action Type Old Value New Value
    Changed Reference Type https://blog.checkpoint.com/2020/08/06/achilles-small-chip-big-peril/ No Types Assigned https://blog.checkpoint.com/2020/08/06/achilles-small-chip-big-peril/ Third Party Advisory
    Changed Reference Type https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/ No Types Assigned https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/ Exploit, Third Party Advisory
  • CVE Modified by [email protected]

    May. 10, 2021

    Action Type Old Value New Value
    Changed Description u'Buffer overflow in LibFastCV library due to improper size checks with respect to buffer length' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in APQ8052, APQ8056, APQ8076, APQ8096, APQ8096SG, APQ8098, MDM9655, MSM8952, MSM8956, MSM8976, MSM8976SG, MSM8996, MSM8996SG, MSM8998, QCM4290, QCM6125, QCS410, QCS4290, QCS610, QCS6125, QSM8250, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SDA640, SDA660, SDA845, SDA855, SDM640, SDM660, SDM830, SDM845, SDM850, SDX50M, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SXR2130, SXR2130P Buffer overflow in LibFastCV library due to improper size checks with respect to buffer length' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in APQ8052, APQ8056, APQ8076, APQ8096, APQ8096SG, APQ8098, MDM9655, MSM8952, MSM8956, MSM8976, MSM8976SG, MSM8996, MSM8996SG, MSM8998, QCM4290, QCM6125, QCS410, QCS4290, QCS610, QCS6125, QSM8250, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SDA640, SDA660, SDA845, SDA855, SDM640, SDM660, SDM830, SDM845, SDM850, SDX50M, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SXR2130, SXR2130P
    Added Reference https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/ [No Types Assigned]
    Added Reference https://blog.checkpoint.com/2020/08/06/achilles-small-chip-big-peril/ [No Types Assigned]
  • Initial Analysis by [email protected]

    Nov. 19, 2020

    Action Type Old Value New Value
    Added CVSS V2 NIST (AV:L/AC:L/Au:N/C:C/I:C/A:C)
    Added CVSS V3.1 NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin No Types Assigned https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin Vendor Advisory
    Added CWE NIST CWE-120
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:apq8052_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:apq8052:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:apq8056_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:apq8056:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:apq8076_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:apq8076:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:apq8096_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:apq8096:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:apq8098_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:apq8098:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8952_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8952:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8956_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8956:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8976_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8976:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8976sg_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8976sg:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8996_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8996:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8996sg_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8996sg:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8998_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8998:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qsm8250_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qsm8250:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc7180_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc7180:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sda640_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sda640:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sda855_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sda855:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdm640_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdm640:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdm830_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdm830:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdm850_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdm850:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx50m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx50m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm4250_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm4250:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm4250p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm4250p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm6115_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm6115:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm6115p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm6115p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm6125_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm6125:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm6150p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm6150p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm6350_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm6350:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7125_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7125:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7150p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7150p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7225_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7225:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7250_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7250:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8150p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8150p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sxr2130p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sxr2130p:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2020-11207 is associated with the following CWEs:

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.09 }} -0.00%

score

0.38273

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability