u'Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8053, IPQ4019, IPQ8064, MSM8909W, MSM8996AU, QCA9531, QCN5502, QCS405, SDX20, SM6150, SM7150
References
Link | Resource |
---|---|
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html | Mailing List Third Party Advisory |
https://www.arista.com/en/support/advisories-notices/security-advisories/11998-security-advisory-58 | Third Party Advisory |
https://www.debian.org/security/2021/dsa-4978 | Third Party Advisory |
https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin | Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html | Mailing List Third Party Advisory |
https://www.arista.com/en/support/advisories-notices/security-advisories/11998-security-advisory-58 | Third Party Advisory |
https://www.debian.org/security/2021/dsa-4978 | Third Party Advisory |
https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
|
History
21 Nov 2024, 05:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html - Mailing List, Third Party Advisory | |
References | () https://www.arista.com/en/support/advisories-notices/security-advisories/11998-security-advisory-58 - Third Party Advisory | |
References | () https://www.debian.org/security/2021/dsa-4978 - Third Party Advisory | |
References | () https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin - Vendor Advisory |
06 Jan 2022, 14:19
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html - Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html - Mailing List, Third Party Advisory |
17 Dec 2021, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Oct 2021, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 Oct 2021, 14:30
Type | Values Removed | Values Added |
---|---|---|
References | (DEBIAN) https://www.debian.org/security/2021/dsa-4978 - Third Party Advisory | |
References | (CONFIRM) https://www.arista.com/en/support/advisories-notices/security-advisories/11998-security-advisory-58 - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 3.3
v3 : 6.5 |
CPE | cpe:2.3:h:arista:av2:-:*:*:*:*:*:*:* cpe:2.3:a:arista:access_point:*:*:*:*:*:*:*:* cpe:2.3:h:arista:o90e:-:*:*:*:*:*:*:* cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:* cpe:2.3:h:arista:c75-e:-:*:*:*:*:*:*:* cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:* |
25 Sep 2021, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
CWE | CWE-319 |
Information
Published : 2020-09-08 10:15
Updated : 2024-11-21 05:31
NVD link : CVE-2020-3702
Mitre link : CVE-2020-3702
CVE.ORG link : CVE-2020-3702
JSON object : View
Products Affected
qualcomm
- msm8996au
- ipq8064
- qcs405
- msm8996au_firmware
- apq8053_firmware
- qca9531_firmware
- sdx20
- qcn5502_firmware
- msm8909w
- qcs405_firmware
- sm6150
- qca9531
- ipq4019_firmware
- ipq4019
- msm8909w_firmware
- ipq8064_firmware
- sm7150_firmware
- qcn5502
- sm7150
- sdx20_firmware
- sm6150_firmware
- apq8053
arista
- av2
- o90e
- c75-e
- access_point
- w-68
- c-75
- o-90
debian
- debian_linux
CWE
CWE-319
Cleartext Transmission of Sensitive Information