{"id": "CVE-2020-3702", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 6.5, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.5, "attackVector": "ADJACENT_NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 3.6, "exploitabilityScore": 2.8}]}, "published": "2020-09-08T10:15:16.340", "references": [{"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "product-security@qualcomm.com"}, {"url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "product-security@qualcomm.com"}, {"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/11998-security-advisory-58", "tags": ["Third Party Advisory"], "source": "product-security@qualcomm.com"}, {"url": "https://www.debian.org/security/2021/dsa-4978", "tags": ["Third Party Advisory"], "source": "product-security@qualcomm.com"}, {"url": "https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin", "tags": ["Vendor Advisory"], "source": "product-security@qualcomm.com"}, {"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/11998-security-advisory-58", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.debian.org/security/2021/dsa-4978", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-319"}]}], "descriptions": [{"lang": "en", "value": "u'Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8053, IPQ4019, IPQ8064, MSM8909W, MSM8996AU, QCA9531, QCN5502, QCS405, SDX20, SM6150, SM7150"}, {"lang": "es", "value": "Un tr\u00e1fico espec\u00edficamente sincronizado y dise\u00f1ado puede causar errores internos en un dispositivo WLAN que conllevan a un cifrado inapropiado del Wi-Fi de capa 2 con la consiguiente posibilidad de divulgaci\u00f3n de informaci\u00f3n sobre el aire para un conjunto discreto de tr\u00e1fico en los productos Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking versiones APQ8053, IPQ4019, IPQ8064, MSM8909W, MSM8996AU, QCA9531, QCN5502, QCS405, SDX20, SM6150, SM7150"}], "lastModified": "2024-11-21T05:31:36.317", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B052615D-857A-46D4-9098-1CBFA14687C6"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "19B59B60-A298-4A56-A45A-E34B7AAB43D7"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:qualcomm:ipq4019_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "94CB547F-0078-47CD-B511-06DE96882D5A"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:qualcomm:ipq4019:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "AA679375-BB14-4B24-8AD9-B2BFBACE2FDB"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:qualcomm:ipq8064_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A1CC1C1-F2CA-4C43-B9E9-1288C3496C7B"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:qualcomm:ipq8064:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "AC82552A-9E7C-4A13-B7A5-43CEA218675C"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE28A59C-7AA6-4B85-84E8-07852B96108E"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5DEE828B-09A7-4AC1-8134-491A7C87C118"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8CA1E7B0-782B-4757-B118-802943798984"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "95CB08EC-AE12-4A54-AA3C-998F01FC8763"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:qualcomm:qca9531_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E71452E6-551F-4E93-9951-2582C60BDFCE"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:qualcomm:qca9531:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6D69FB0E-FDFF-42B8-ADAD-797B7C91E979"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:qualcomm:qcn5502_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D33E62D2-931E-465C-BC8E-71FB36CF6E36"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:qualcomm:qcn5502:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "254F1AB0-C21A-41A6-9B9B-ED074A4C9EBD"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36F5A18B-8C9E-4A38-B994-E3E2696BB83D"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B703667D-DE09-40AF-BA44-E0E56252A790"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A0CE1B23-6FE3-41C4-B264-C7A9E8BDBEC1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "794BA13C-3C63-4695-AA45-676F85D904BE"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8ABE492A-3755-4969-9DEB-4B85EBB84644"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E3D3787B-6ACC-4591-B041-01307ED66C36"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F63A748F-2236-4486-83F1-DE4BCBE5D56D"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "184F3DFC-27E8-48AC-B46C-C589DBCBF030"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:arista:access_point:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B3CF23B-9C45-4B3F-B077-02CC699A1DC5", "versionEndIncluding": "8.8.3-12"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:arista:av2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "74E5E321-2714-46FF-8F3F-4958EE7B3A5E"}, {"criteria": "cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8EE26D5A-486B-48F3-9C1C-4EE3FD8F0234"}, {"criteria": "cpe:2.3:h:arista:c75-e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2E2ACBF3-F2B2-414E-92AE-20E4E80636B5"}, {"criteria": "cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "41F9E4B2-63FC-4F53-9C12-7478B7B6AD48"}, {"criteria": "cpe:2.3:h:arista:o90e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4CBAB8F1-1F56-4695-8F86-9AA994C4A6C0"}, {"criteria": "cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9F03BB48-C89A-41F6-99DE-12FF95DCD9F2"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252"}, {"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"}], "operator": "OR"}]}], "sourceIdentifier": "product-security@qualcomm.com"}