CVE-2020-11201

Arbitrary access to DSP memory due to improper check in loaded library for data received from CPU side' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in QCM6125, QCS410, QCS603, QCS605, QCS610, QCS6125, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SDA640, SDA845, SDM640, SDM830, SDM845, SDX50M, SDX55, SDX55M, SM6125, SM6150, SM6250, SM6250P, SM7125, SM7150, SM7150P, SM8150, SM8150P
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:qualcomm:qcs603_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qcs603:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:qualcomm:sda640_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sda640:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:qualcomm:sdm640_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm640:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:qualcomm:sdm830_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm830:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*

Configuration 17 (hide)

AND
cpe:2.3:o:qualcomm:sdx50m_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdx50m:-:*:*:*:*:*:*:*

Configuration 18 (hide)

AND
cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*

Configuration 19 (hide)

AND
cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*

Configuration 20 (hide)

AND
cpe:2.3:o:qualcomm:sm6125_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sm6125:-:*:*:*:*:*:*:*

Configuration 21 (hide)

AND
cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*

Configuration 22 (hide)

AND
cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*

Configuration 23 (hide)

AND
cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*

Configuration 24 (hide)

AND
cpe:2.3:o:qualcomm:sm7125_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sm7125:-:*:*:*:*:*:*:*

Configuration 25 (hide)

AND
cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*

Configuration 26 (hide)

AND
cpe:2.3:o:qualcomm:sm7150p_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sm7150p:-:*:*:*:*:*:*:*

Configuration 27 (hide)

AND
cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*

Configuration 28 (hide)

AND
cpe:2.3:o:qualcomm:sm8150p_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sm8150p:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:57

Type Values Removed Values Added
References () https://blog.checkpoint.com/2020/08/06/achilles-small-chip-big-peril/ - Third Party Advisory () https://blog.checkpoint.com/2020/08/06/achilles-small-chip-big-peril/ - Third Party Advisory
References () https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/ - Exploit, Third Party Advisory () https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/ - Exploit, Third Party Advisory
References () https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin - Broken Link, Vendor Advisory () https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin - Broken Link, Vendor Advisory

Information

Published : 2020-11-12 10:15

Updated : 2024-11-21 04:57


NVD link : CVE-2020-11201

Mitre link : CVE-2020-11201

CVE.ORG link : CVE-2020-11201


JSON object : View

Products Affected

qualcomm

  • sdx50m_firmware
  • qcs410_firmware
  • sm7150
  • sdx55m
  • sm6125_firmware
  • sa8155p
  • qcs603_firmware
  • sdm830
  • sm8150_firmware
  • sa6155p_firmware
  • sm8150p_firmware
  • sdx50m
  • sm7125_firmware
  • qcs603
  • qcs6125_firmware
  • sm6250p
  • sa6145p_firmware
  • qcs605
  • qcm6125_firmware
  • qcs610
  • sm6250_firmware
  • sa6155p
  • sm7150_firmware
  • qcs6125
  • sm6250p_firmware
  • sm7150p_firmware
  • sa6145p
  • sm7150p
  • qcm6125
  • sm6150_firmware
  • sm7125
  • sa8155_firmware
  • sa6155
  • qcs410
  • sdm640_firmware
  • sdx55m_firmware
  • sdm640
  • qcs610_firmware
  • sa8155p_firmware
  • sa6155_firmware
  • sa8155
  • sda845
  • sdx55
  • sm8150
  • sm8150p
  • sdx55_firmware
  • sm6250
  • sdm845
  • sda845_firmware
  • sdm845_firmware
  • sda640_firmware
  • sm6150
  • qcs605_firmware
  • sda640
  • sm6125
  • sdm830_firmware
CWE
CWE-20

Improper Input Validation