Unknown
CVE-2020-3656
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2020-3656
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Out of bound access can happen in MHI command process due to lack of check of command channel id value received from MHI devices in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, Kamorta, MDM9607, MSM8917, MSM8953, Nicobar, QCM2150, QCS405, QCS605, QM215, Rennell, SA6155P, SA8155P, Saipan, SC8180X, SDM429, SDM429W, SDM439, SDM450, SDM632, SDM710, SDM845, SDX55, SM6150, SM7150, SM8150, SM8250, SXR2130
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- apq8009 firmware -,
- kamorta firmware -,
- mdm9607 firmware -,
- msm8917 firmware -,
- msm8953 firmware -,
- nicobar firmware -,
- qcm2150 firmware -,
- qcs405 firmware -,
- qcs605 firmware -,
- qm215 firmware -,
- rennell firmware -,
- sa6155p firmware -,
- sa8155p firmware -,
- saipan firmware -,
- sc8180x firmware -,
- sdm429 firmware -,
- sdm429w firmware -,
- sdm439 firmware -,
- sdm450 firmware -,
- sdm632 firmware -,
- sdm710 firmware -,
- sdm845 firmware -,
- sdx55 firmware -,
- sm6150 firmware -,
- sm7150 firmware -,
- sm8150 firmware -,
- sm8250 firmware -,
- sxr2130 firmware -
Weaknesses
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: