u'Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8053, IPQ4019, IPQ8064, MSM8909W, MSM8996AU, QCA9531, QCN5502, QCS405, SDX20, SM6150, SM7150
References
| Link | Resource |
|---|---|
| https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html | Mailing List Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html | Mailing List Third Party Advisory |
| https://www.arista.com/en/support/advisories-notices/security-advisories/11998-security-advisory-58 | Third Party Advisory |
| https://www.debian.org/security/2021/dsa-4978 | Third Party Advisory |
| https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin | Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html | Mailing List Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html | Mailing List Third Party Advisory |
| https://www.arista.com/en/support/advisories-notices/security-advisories/11998-security-advisory-58 | Third Party Advisory |
| https://www.debian.org/security/2021/dsa-4978 | Third Party Advisory |
| https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
Configuration 6 (hide)
| AND |
|
Configuration 7 (hide)
| AND |
|
Configuration 8 (hide)
| AND |
|
Configuration 9 (hide)
| AND |
|
Configuration 10 (hide)
| AND |
|
Configuration 11 (hide)
| AND |
|
Configuration 12 (hide)
|
Configuration 13 (hide)
| AND |
|
Configuration 14 (hide)
|
History
21 Nov 2024, 05:31
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html - Mailing List, Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html - Mailing List, Third Party Advisory | |
| References | () https://www.arista.com/en/support/advisories-notices/security-advisories/11998-security-advisory-58 - Third Party Advisory | |
| References | () https://www.debian.org/security/2021/dsa-4978 - Third Party Advisory | |
| References | () https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin - Vendor Advisory |
06 Jan 2022, 14:19
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* | |
| References | (MLIST) https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html - Mailing List, Third Party Advisory | |
| References | (MLIST) https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html - Mailing List, Third Party Advisory |
17 Dec 2021, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
16 Oct 2021, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
12 Oct 2021, 14:30
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:h:arista:av2:-:*:*:*:*:*:*:* cpe:2.3:a:arista:access_point:*:*:*:*:*:*:*:* cpe:2.3:h:arista:o90e:-:*:*:*:*:*:*:* cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:* cpe:2.3:h:arista:c75-e:-:*:*:*:*:*:*:* cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : 3.3
v3 : 6.5 |
| References | (DEBIAN) https://www.debian.org/security/2021/dsa-4978 - Third Party Advisory | |
| References | (CONFIRM) https://www.arista.com/en/support/advisories-notices/security-advisories/11998-security-advisory-58 - Third Party Advisory |
25 Sep 2021, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| CWE | CWE-319 |
Information
Published : 2020-09-08 10:15
Updated : 2024-11-21 05:31
NVD link : CVE-2020-3702
Mitre link : CVE-2020-3702
CVE.ORG link : CVE-2020-3702
JSON object : View
Products Affected
qualcomm
- qcs405
- qcn5502
- sm6150_firmware
- msm8996au_firmware
- sm6150
- qcs405_firmware
- apq8053
- msm8996au
- msm8909w
- qca9531_firmware
- ipq8064_firmware
- sm7150_firmware
- sdx20
- qca9531
- apq8053_firmware
- msm8909w_firmware
- qcn5502_firmware
- ipq8064
- ipq4019
- ipq4019_firmware
- sdx20_firmware
- sm7150
arista
- access_point
- o-90
- o90e
- c-75
- c75-e
- av2
- w-68
debian
- debian_linux
CWE
CWE-319
Cleartext Transmission of Sensitive Information
