Vulnerability
CVE-2020-11121
Component: WIFI
Location: OS
u'Possible buffer overflow in WIFI hal process due to usage of memcpy without checking length of destination buffer' in Snapdragon Auto, Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile in QCM4290, QCS4290, QM215, QSM8350, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SC8180X, SC8180XP, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6250, SM6350, SM7125, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR2130, SXR2130P
Impact
Severity (Manufact.)
MEDIUM
Severity (NIST)
7.8
Severity (Android)
N/A
Chipsets
10
Devices
533
Affected Hardware
Name | Also known as | Manufacturer |
---|---|---|
QM215 | Qualcomm 215 | Qualcomm |
SM6115 | Snapdragon 662 | Qualcomm |
SM6125 | Snapdragon 665 | Qualcomm |
SM6350 | Snapdragon 690 | Qualcomm |
SM7125 | Snapdragon 720G | Qualcomm |
SM7225 | Snapdragon 750G | Qualcomm |
SM8150 | Snapdragon 855 | Qualcomm |
SM8350 | Snapdragon 888 | Qualcomm |
SC8180X | Snapdragon 8cx | Qualcomm |
SC8180XP | Snapdragon 8cx Gen 2 5G | Qualcomm |
10 of 10 row(s) shown.
Rows per page
Page 1 of 1
Information reliability
The information on this website is intended to provide information on the big picture of chipset security and measure trends within the industry. Our information is obtained from several vantage points, checked for consistency, and automatically cross-referenced. However, this process may not always yield reliable information. Do not use the information on a particular vulnerability, chipset or device to verify your individual exposure in cases where inaccuracies are inacceptable, for instance to assess risks if you are a Politically Exposed Person.
Timeline
Introduced (est):
Jan 1, 2019
Reported:
Jan 3, 2020
Advisory Published:
Nov 2, 2020
CVE Published:
Nov 12, 2020
Android Patch Level:
None