CVE-2020-3639

EUVD-2020-24910
u'When a non standard SIP sigcomp message is received from the network, then there may be chances of using more UDVM cycle or memory overflow' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8009, APQ8017, APQ8037, APQ8053, MDM9250, MDM9607, MDM9628, MDM9640, MDM9650, MSM8108, MSM8208, MSM8209, MSM8608, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, QCM4290, QCM6125, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QM215, QSM8350, SA415M, SA6145P, SA6150P, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SC8180X, SC8180X+SDX55, SC8180XP, SDA429W, SDA640, SDA660, SDA670, SDA845, SDA855, SDM1000, SDM429, SDM429W, SDM439, SDM450, SDM455, SDM630, SDM632, SDM636, SDM640, SDM660, SDM670, SDM710, SDM712, SDM845, SDM850, SDX24, SDX50M, SDX55, SDX55M, SM4125, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM7125, SM7150, SM7150P, SM7250, SM7250P, SM8150, SM8150P, SM8350, SM8350P, SXR1120, SXR1130
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 55%
Affected Products (NVD)
VendorProductVersion
qualcommapq8009_firmware
-
qualcommapq8017_firmware
-
qualcommapq8037_firmware
-
qualcommapq8053_firmware
-
qualcommmdm9250_firmware
-
qualcommmdm9607_firmware
-
qualcommmdm9628_firmware
-
qualcommmdm9640_firmware
-
qualcommmdm9650_firmware
-
qualcommmsm8108_firmware
-
qualcommmsm8208_firmware
-
qualcommmsm8209_firmware
-
qualcommmsm8608_firmware
-
qualcommmsm8905_firmware
-
qualcommmsm8909_firmware
-
qualcommmsm8917_firmware
-
qualcommmsm8920_firmware
-
qualcommmsm8937_firmware
-
qualcommmsm8940_firmware
-
qualcommmsm8953_firmware
-
qualcommmsm8996au_firmware
-
qualcommqcm4290_firmware
-
qualcommqcm6125_firmware
-
qualcommqcs410_firmware
-
qualcommqcs4290_firmware
-
qualcommqcs603_firmware
-
qualcommqcs605_firmware
-
qualcommqcs610_firmware
-
qualcommqcs6125_firmware
-
qualcommqm215_firmware
-
qualcommqsm8350_firmware
-
qualcommsa415m_firmware
-
qualcommsa6145p_firmware
-
qualcommsa6150p_firmware
-
qualcommsa6155p_firmware
-
qualcommsa8150p_firmware
-
qualcommsa8155_firmware
-
qualcommsa8155p_firmware
-
qualcommsa8195p_firmware
-
qualcommsc7180_firmware
-
qualcommsc8180x_firmware
-
qualcommsc8180x_firmware
-
qualcommsdx55_firmware
-
qualcommsc8180xp_firmware
-
qualcommsda429w_firmware
-
qualcommsda640_firmware
-
qualcommsda660_firmware
-
qualcommsda670_firmware
-
qualcommsda845_firmware
-
qualcommsda855_firmware
-
qualcommsdm1000_firmware
-
qualcommsdm429_firmware
-
qualcommsdm429w_firmware
-
qualcommsdm439_firmware
-
qualcommsdm450_firmware
-
qualcommsdm455_firmware
-
qualcommsdm630_firmware
-
qualcommsdm632_firmware
-
qualcommsdm636_firmware
-
qualcommsdm640_firmware
-
qualcommsdm660_firmware
-
qualcommsdm670_firmware
-
qualcommsdm710_firmware
-
qualcommsdm712_firmware
-
qualcommsdm845_firmware
-
qualcommsdm850_firmware
-
qualcommsdx24_firmware
-
qualcommsdx50m_firmware
-
qualcommsdx55_firmware
-
qualcommsdx55m_firmware
-
qualcommsm4125_firmware
-
qualcommsm4250_firmware
-
qualcommsm4250p_firmware
-
qualcommsm6115_firmware
-
qualcommsm6115p_firmware
-
qualcommsm6125_firmware
-
qualcommsm6150_firmware
-
qualcommsm6150p_firmware
-
qualcommsm6250_firmware
-
qualcommsm6250p_firmware
-
qualcommsm7125_firmware
-
qualcommsm7150_firmware
-
qualcommsm7150p_firmware
-
qualcommsm7250_firmware
-
qualcommsm7250p_firmware
-
qualcommsm8150_firmware
-
qualcommsm8150p_firmware
-
qualcommsm8350_firmware
-
qualcommsm8350p_firmware
-
qualcommsxr1120_firmware
-
qualcommsxr1130_firmware
-
𝑥
= Vulnerable software versions