CVE-2020-11268

Potential UE reset while decoding a crafted Sib1 or SIB1 that schedules unsupported SIBs and can lead to denial of service in Snapdragon Auto, Snapdragon Mobile
Configurations

Configuration 1 (hide)

OR cpe:2.3:h:qualcomm:apq8009:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:apq8016:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:apq8074:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:apq8084:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:apq8094:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:ar6003:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:mdm8215:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:mdm8215m:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:mdm8615m:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:mdm9215:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:mdm9235m:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:mdm9310:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:mdm9609:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:mdm9615:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:mdm9615m:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:mdm9645:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:msm8108:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:msm8208:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:msm8209:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:msm8216:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:msm8274:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:msm8608:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:msm8674:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:msm8916:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:msm8929:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:msm8939:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:msm8974:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:msm8974p:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:msm8994:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:pm8018:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:pm8841:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:pm8909:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:pm8916:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:pm8941:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:pm8994:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:pmd9635:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:pmd9645:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:pmi8994:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qca1990:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qca6174:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qca6584:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qfe1035:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qfe1040:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qfe1045:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qfe1100:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qfe1101:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qfe1520:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qfe1550:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qfe2101:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qfe2310:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qfe2320:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qfe2330:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qfe2340:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qfe2520:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qfe2550:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qfe2720:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qfe3100:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qfe3320:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qfe3335:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qfe3340:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qfe3345:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:smb1360:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:wcd9306:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:wcd9330:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:wcn3660:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:wcn3660a:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:wcn3680:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:wfr1620:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:wgr7640:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:wtr1605:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:wtr1605l:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:wtr1625:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:wtr1625l:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:wtr2605:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:wtr2955:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:wtr3925:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:wtr4605:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:wtr4905:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:57

Type Values Removed Values Added
References () https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin - Vendor Advisory () https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin - Vendor Advisory

Information

Published : 2021-05-07 09:15

Updated : 2024-11-21 04:57


NVD link : CVE-2020-11268

Mitre link : CVE-2020-11268

CVE.ORG link : CVE-2020-11268


JSON object : View

Products Affected

qualcomm

  • qfe3335
  • pm8841
  • wcn3660b
  • mdm9645
  • wfr1620
  • qfe2310
  • apq8074
  • wtr2605
  • mdm9615m
  • pmi8994
  • qfe1040
  • wcd9306
  • qfe2550
  • wtr4605
  • qfe1520
  • msm8974
  • wcn3660a
  • wtr4905
  • mdm9609
  • wtr1605
  • msm8916
  • pm8941
  • qfe3340
  • smb1360
  • qfe3320
  • msm8974p
  • wcn3660
  • qfe2101
  • qfe3100
  • mdm9215
  • pm8916
  • apq8084
  • msm8209
  • wcn3680b
  • mdm8615m
  • wcn3610
  • wcn3680
  • mdm9635m
  • qfe1035
  • msm8216
  • mdm9640
  • msm8994
  • wgr7640
  • wtr3925
  • wcd9330
  • mdm9235m
  • mdm8215
  • qfe1550
  • msm8929
  • qfe2320
  • msm8208
  • qca6174
  • mdm9310
  • pmd9635
  • pmd9645
  • qfe2330
  • qfe1100
  • pm8018
  • sd210
  • msm8108
  • pm8994
  • wtr1625
  • msm8939
  • apq8016
  • qfe2520
  • msm8608
  • qfe1045
  • qca6174a
  • mdm8215m
  • wtr1605l
  • wtr2955
  • mdm9615
  • qfe2340
  • qca1990
  • qfe3345
  • qfe1101
  • apq8094
  • ar6003
  • wtr1625l
  • msm8274
  • msm8674
  • qfe2720
  • qca6584
  • apq8009
  • pm8909
  • wcn3620
CWE
CWE-20

Improper Input Validation