Vulnerability
CVE-2020-11206
Possible buffer overflow in Fastrpc while handling received parameters due to lack of validation on input parameters' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in APQ8098, MSM8998, QCM4290, QCM6125, QCS410, QCS4290, QCS610, QCS6125, QSM8250, QSM8350, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SDA640, SDA660, SDA845, SDA855, SDM640, SDM660, SDM830, SDM845, SDM850, SDX50M, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR2130, SXR2130P
Impact
Severity (Manufact.)
HIGH
Severity (NIST)
7.8
Severity (Android)
N/A
Chipsets
13
Devices
799
Affected Hardware
Name | Also known as | Manufacturer |
---|---|---|
SDM660 | Snapdragon 660 | Qualcomm |
SM6115 | Snapdragon 662 | Qualcomm |
SM6125 | Snapdragon 665 | Qualcomm |
SM6150 | Snapdragon 675 | Qualcomm |
SM6350 | Snapdragon 690 | Qualcomm |
SM7125 | Snapdragon 720G | Qualcomm |
SM7225 | Snapdragon 750G | Qualcomm |
MSM8998 | Snapdragon 835 Snapdragon 835 Mobile PC Platform | Qualcomm |
SDM845 | Snapdragon 845 | Qualcomm |
SM8150 | Snapdragon 855 | Qualcomm |
13 of 13 row(s) shown.
Rows per page
Page 1 of 2
Information reliability
The information on this website is intended to provide information on the big picture of chipset security and measure trends within the industry. Our information is obtained from several vantage points, checked for consistency, and automatically cross-referenced. However, this process may not always yield reliable information. Do not use the information on a particular vulnerability, chipset or device to verify your individual exposure in cases where inaccuracies are inacceptable, for instance to assess risks if you are a Politically Exposed Person.
Timeline
Introduced (est):
Apr 1, 2017
Reported:
Feb 14, 2020
Advisory Published:
Nov 2, 2020
CVE Published:
Nov 12, 2020
Android Patch Level:
None