CVE-2020-3639

u'When a non standard SIP sigcomp message is received from the network, then there may be chances of using more UDVM cycle or memory overflow' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8009, APQ8017, APQ8037, APQ8053, MDM9250, MDM9607, MDM9628, MDM9640, MDM9650, MSM8108, MSM8208, MSM8209, MSM8608, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, QCM4290, QCM6125, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QM215, QSM8350, SA415M, SA6145P, SA6150P, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SC8180X, SC8180X+SDX55, SC8180XP, SDA429W, SDA640, SDA660, SDA670, SDA845, SDA855, SDM1000, SDM429, SDM429W, SDM439, SDM450, SDM455, SDM630, SDM632, SDM636, SDM640, SDM660, SDM670, SDM710, SDM712, SDM845, SDM850, SDX24, SDX50M, SDX55, SDX55M, SM4125, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM7125, SM7150, SM7150P, SM7250, SM7250P, SM8150, SM8150P, SM8350, SM8350P, SXR1120, SXR1130
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
qualcommCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 55%
VendorProductVersion
qualcommapq8009_firmware
-
qualcommapq8017_firmware
-
qualcommapq8037_firmware
-
qualcommapq8053_firmware
-
qualcommmdm9250_firmware
-
qualcommmdm9607_firmware
-
qualcommmdm9628_firmware
-
qualcommmdm9640_firmware
-
qualcommmdm9650_firmware
-
qualcommmsm8108_firmware
-
qualcommmsm8208_firmware
-
qualcommmsm8209_firmware
-
qualcommmsm8608_firmware
-
qualcommmsm8905_firmware
-
qualcommmsm8909_firmware
-
qualcommmsm8917_firmware
-
qualcommmsm8920_firmware
-
qualcommmsm8937_firmware
-
qualcommmsm8940_firmware
-
qualcommmsm8953_firmware
-
qualcommmsm8996au_firmware
-
qualcommqcm4290_firmware
-
qualcommqcm6125_firmware
-
qualcommqcs410_firmware
-
qualcommqcs4290_firmware
-
qualcommqcs603_firmware
-
qualcommqcs605_firmware
-
qualcommqcs610_firmware
-
qualcommqcs6125_firmware
-
qualcommqm215_firmware
-
qualcommqsm8350_firmware
-
qualcommsa415m_firmware
-
qualcommsa6145p_firmware
-
qualcommsa6150p_firmware
-
qualcommsa6155p_firmware
-
qualcommsa8150p_firmware
-
qualcommsa8155_firmware
-
qualcommsa8155p_firmware
-
qualcommsa8195p_firmware
-
qualcommsc7180_firmware
-
qualcommsc8180x_firmware
-
qualcommsc8180x_firmware
-
qualcommsdx55_firmware
-
qualcommsc8180xp_firmware
-
qualcommsda429w_firmware
-
qualcommsda640_firmware
-
qualcommsda660_firmware
-
qualcommsda670_firmware
-
qualcommsda845_firmware
-
qualcommsda855_firmware
-
qualcommsdm1000_firmware
-
qualcommsdm429_firmware
-
qualcommsdm429w_firmware
-
qualcommsdm439_firmware
-
qualcommsdm450_firmware
-
qualcommsdm455_firmware
-
qualcommsdm630_firmware
-
qualcommsdm632_firmware
-
qualcommsdm636_firmware
-
qualcommsdm640_firmware
-
qualcommsdm660_firmware
-
qualcommsdm670_firmware
-
qualcommsdm710_firmware
-
qualcommsdm712_firmware
-
qualcommsdm845_firmware
-
qualcommsdm850_firmware
-
qualcommsdx24_firmware
-
qualcommsdx50m_firmware
-
qualcommsdx55_firmware
-
qualcommsdx55m_firmware
-
qualcommsm4125_firmware
-
qualcommsm4250_firmware
-
qualcommsm4250p_firmware
-
qualcommsm6115_firmware
-
qualcommsm6115p_firmware
-
qualcommsm6125_firmware
-
qualcommsm6150_firmware
-
qualcommsm6150p_firmware
-
qualcommsm6250_firmware
-
qualcommsm6250p_firmware
-
qualcommsm7125_firmware
-
qualcommsm7150_firmware
-
qualcommsm7150p_firmware
-
qualcommsm7250_firmware
-
qualcommsm7250p_firmware
-
qualcommsm8150_firmware
-
qualcommsm8150p_firmware
-
qualcommsm8350_firmware
-
qualcommsm8350p_firmware
-
qualcommsxr1120_firmware
-
qualcommsxr1130_firmware
-
𝑥
= Vulnerable software versions