8.4
HIGH
CVE-2020-11284
Qualcomm Snapdragon Memory Disclosure
Description

Locked memory can be unlocked and modified by non secure boot loader through improper system call sequence making the memory region untrusted source of input for secure boot loader in Snapdragon Auto, Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking

INFO

Published Date :

May 7, 2021, 9:15 a.m.

Last Modified :

June 28, 2022, 2:11 p.m.

Remotely Exploitable :

No

Impact Score :

5.9

Exploitability Score :

2.5
Affected Products

The following products are affected by CVE-2020-11284 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Qualcomm aqt1000_firmware
2 Qualcomm qca6390_firmware
3 Qualcomm qca6391_firmware
4 Qualcomm qca6420_firmware
5 Qualcomm qca6426_firmware
6 Qualcomm qca6430_firmware
7 Qualcomm qca6436_firmware
8 Qualcomm qca6574au_firmware
9 Qualcomm sa6155p_firmware
10 Qualcomm sa8195p_firmware
11 Qualcomm sd855_firmware
12 Qualcomm sd870_firmware
13 Qualcomm sdx55m_firmware
14 Qualcomm wcd9341_firmware
15 Qualcomm wcd9380_firmware
16 Qualcomm wcd9385_firmware
17 Qualcomm wcn3980_firmware
18 Qualcomm wcn3988_firmware
19 Qualcomm wcn3998_firmware
20 Qualcomm wsa8810_firmware
21 Qualcomm wsa8815_firmware
22 Qualcomm ar8035_firmware
23 Qualcomm wcn3991_firmware
24 Qualcomm qca6421_firmware
25 Qualcomm qca6431_firmware
26 Qualcomm qca6595_firmware
27 Qualcomm qca9984_firmware
28 Qualcomm qcm2290_firmware
29 Qualcomm qcm4290_firmware
30 Qualcomm qcs2290_firmware
31 Qualcomm qcs4290_firmware
32 Qualcomm sd460_firmware
33 Qualcomm sd662_firmware
34 Qualcomm sdx55_firmware
35 Qualcomm sm4125_firmware
36 Qualcomm wcd9340_firmware
37 Qualcomm wcd9360_firmware
38 Qualcomm wcd9370_firmware
39 Qualcomm wcd9375_firmware
40 Qualcomm wcn3910_firmware
41 Qualcomm wcn3950_firmware
42 Qualcomm wcn3990_firmware
43 Qualcomm sd480_firmware
44 Qualcomm sd675_firmware
45 Qualcomm sdx24_firmware
46 Qualcomm qcs405_firmware
47 Qualcomm wcn3999_firmware
48 Qualcomm sdm830_firmware
49 Qualcomm qet4101_firmware
50 Qualcomm whs9410_firmware
51 Qualcomm pm3003a_firmware
52 Qualcomm pm4125_firmware
53 Qualcomm pm4250_firmware
54 Qualcomm pm6125_firmware
55 Qualcomm pm6150_firmware
56 Qualcomm pm6150a_firmware
57 Qualcomm pm6150l_firmware
58 Qualcomm pm640a_firmware
59 Qualcomm pm640l_firmware
60 Qualcomm pm640p_firmware
61 Qualcomm pm7250b_firmware
62 Qualcomm pm8004_firmware
63 Qualcomm pm8005_firmware
64 Qualcomm pm8008_firmware
65 Qualcomm pm8009_firmware
66 Qualcomm pm8150a_firmware
67 Qualcomm pm8150b_firmware
68 Qualcomm pm8150c_firmware
69 Qualcomm pm8150l_firmware
70 Qualcomm pm8250_firmware
71 Qualcomm pm8350_firmware
72 Qualcomm pm855_firmware
73 Qualcomm pm855b_firmware
74 Qualcomm pm855l_firmware
75 Qualcomm pm855p_firmware
76 Qualcomm pm8998_firmware
77 Qualcomm pmd9655_firmware
78 Qualcomm pmi632_firmware
79 Qualcomm pmi8998_firmware
80 Qualcomm pmk8002_firmware
81 Qualcomm pmm855au_firmware
82 Qualcomm pmr525_firmware
83 Qualcomm pmx24_firmware
84 Qualcomm pmx55_firmware
85 Qualcomm qat3522_firmware
86 Qualcomm qat3550_firmware
87 Qualcomm qbt1500_firmware
88 Qualcomm qbt2000_firmware
89 Qualcomm qet5100_firmware
90 Qualcomm qet6100_firmware
91 Qualcomm qfs2530_firmware
92 Qualcomm qfs2580_firmware
93 Qualcomm qpa4360_firmware
94 Qualcomm qpa5460_firmware
95 Qualcomm qpa6560_firmware
96 Qualcomm qsw8574_firmware
97 Qualcomm qtc410s_firmware
98 Qualcomm qtc800h_firmware
99 Qualcomm qtc800s_firmware
100 Qualcomm qtc801s_firmware
101 Qualcomm qtm525_firmware
102 Qualcomm sdr425_firmware
103 Qualcomm sdr660_firmware
104 Qualcomm sdr660g_firmware
105 Qualcomm sdr735_firmware
106 Qualcomm sdr735g_firmware
107 Qualcomm sdr8150_firmware
108 Qualcomm sdr8250_firmware
109 Qualcomm sdr865_firmware
110 Qualcomm smb1351_firmware
111 Qualcomm smb1354_firmware
112 Qualcomm smb1355_firmware
113 Qualcomm smb1390_firmware
114 Qualcomm smr525_firmware
115 Qualcomm smr526_firmware
116 Qualcomm smr545_firmware
117 Qualcomm smr546_firmware
118 Qualcomm wgr7640_firmware
119 Qualcomm wtr2965_firmware
120 Qualcomm wtr3925_firmware
121 Qualcomm wtr5975_firmware
122 Qualcomm pm6350_firmware
123 Qualcomm pmk8003_firmware
124 Qualcomm qet6105_firmware
125 Qualcomm smb1396_firmware
126 Qualcomm sd8655g_firmware
127 Qualcomm sd8885g_firmware
128 Qualcomm sdxr25g_firmware
129 Qualcomm sd8c_firmware
130 Qualcomm sd8cx_firmware
131 Qualcomm pmm8195au_firmware
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2020-11284.

URL Resource
https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2020-11284 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2020-11284 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CWE Remap by [email protected]

    Jun. 28, 2022

    Action Type Old Value New Value
    Changed CWE CWE-119 CWE-667
  • Initial Analysis by [email protected]

    May. 12, 2021

    Action Type Old Value New Value
    Added CVSS V2 NIST (AV:L/AC:L/Au:N/C:C/I:C/A:C)
    Added CVSS V3.1 NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin No Types Assigned https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin Vendor Advisory
    Added CWE NIST CWE-119
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm3003a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm3003a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm4125_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm4125:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm4250_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm4250:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm6125_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm6125:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm6150_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm6150:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm6150a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm6150a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm6150l_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm6150l:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm6350_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm6350:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm640a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm640a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm640l_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm640l:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm640p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm640p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm7250b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm7250b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm8004_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm8004:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm8005_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm8005:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm8008_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm8008:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm8009_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm8009:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm8150a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm8150a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm8150b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm8150b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm8150c_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm8150c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm8150l_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm8150l:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm8250_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm8250:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm8350_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm8350:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm855_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm855:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm855b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm855b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm855l_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm855l:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm855p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm855p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm8998_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm8998:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pmd9655_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pmd9655:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pmi632_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pmi632:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pmi8998_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pmi8998:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pmk8002_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pmk8002:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pmk8003_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pmk8003:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pmm8195au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pmm8195au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pmm855au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pmm855au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pmr525_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pmr525:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pmx24_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pmx24:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pmx55_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pmx55:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qat3522_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qat3522:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qat3550_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qat3550:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qbt1500_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qbt1500:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qbt2000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qbt2000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9984_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9984:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qet4101_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qet4101:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qet5100_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qet5100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qet6100_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qet6100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qet6105_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qet6105:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qfs2530_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qfs2530:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qfs2580_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qfs2580:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qpa4360_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qpa4360:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qpa5460_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qpa5460:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qpa6560_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qpa6560:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qsw8574_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qsw8574:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qtc410s_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qtc410s:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qtc800h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qtc800h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qtc800s_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qtc800s:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qtc801s_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qtc801s:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qtm525_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qtm525:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd8c_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd8c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd8cx_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd8cx:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd480_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd480:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd8655g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd8655g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd8885g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd8885g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdm830_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdm830:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdr425_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdr425:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdr660_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdr660:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdr660g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdr660g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdr735_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdr735:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdr735g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdr735g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdr8150_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdr8150:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdr8250_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdr8250:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdr865_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdr865:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdxr25g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdxr25g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm4125:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:smb1351_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:smb1351:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:smb1354_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:smb1354:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:smb1355_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:smb1355:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:smb1390_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:smb1390:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:smb1396_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:smb1396:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:smr525_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:smr525:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:smr526_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:smr526:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:smr545_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:smr545:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:smr546_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:smr546:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9360:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3999_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3999:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wgr7640_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wgr7640:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:whs9410_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:whs9410:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wtr2965_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wtr2965:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wtr3925_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wtr3925:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wtr5975_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wtr5975:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2020-11284 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2020-11284 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.04 }} 0.00%

score

0.10264

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability