Vulnerability
CVE-2020-11269
Component: WIFI
Location: FIRMWARE
Possible memory corruption while processing EAPOL frames due to lack of validation of key length before using it in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
Impact
Severity (Manufact.)
HIGH
Severity (NIST)
8.8
Severity (Android)
N/A
Chipsets
23
Devices
982
Affected Hardware
Name | Also known as | Manufacturer |
---|---|---|
MSM8208 | Snapdragon 208 | Qualcomm |
MSM8916 | Snapdragon 410 | Qualcomm |
MSM8929 | Snapdragon 415 | Qualcomm |
MSM8917 | Snapdragon 425 | Qualcomm |
MSM8920 | Snapdragon 427 | Qualcomm |
MSM8937 | Snapdragon 430 | Qualcomm |
MSM8940 | Snapdragon 435 | Qualcomm |
MSM8939 | Snapdragon 615 | Qualcomm |
MSM8952 | Snapdragon 617 | Qualcomm |
MSM8953 | Snapdragon 625 | Qualcomm |
23 of 23 row(s) shown.
Rows per page
Page 1 of 3
Information reliability
The information on this website is intended to provide information on the big picture of chipset security and measure trends within the industry. Our information is obtained from several vantage points, checked for consistency, and automatically cross-referenced. However, this process may not always yield reliable information. Do not use the information on a particular vulnerability, chipset or device to verify your individual exposure in cases where inaccuracies are inacceptable, for instance to assess risks if you are a Politically Exposed Person.
Timeline
Introduced (est):
Jan 1, 2014
Reported:
Unknown
Advisory Published:
Feb 1, 2021
CVE Published:
Feb 22, 2021
Android Patch Level:
Feb 2021