{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T06:43:15.740","vulnerabilities":[{"cve":{"id":"CVE-2020-11117","sourceIdentifier":"product-security@qualcomm.com","published":"2020-09-08T10:15:14.217","lastModified":"2024-11-21T04:56:50.100","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"u'In the lbd service, an external user can issue a specially crafted debug command to overwrite arbitrary files with arbitrary content resulting in remote code execution.' in Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Wired Infrastructure and Networking in IPQ4019, IPQ6018, IPQ8064, IPQ8074, QCA4531, QCA9531, QCA9980"},{"lang":"es","value":"En el servicio lbd, un usuario externo puede emitir un comando de depuración especialmente diseñado para sobrescribir archivos arbitrarios con contenido arbitrario resultando en una ejecución de código remota. En los productos Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Wired Infrastructure and Networking en versiones IPQ4019, IPQ6018, IPQ8064, IPQ8074, QCA4531, QCA9531, QCA9980"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-77"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qualcomm:ipq4019_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"94CB547F-0078-47CD-B511-06DE96882D5A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:qualcomm:ipq4019:-:*:*:*:*:*:*:*","matchCriteriaId":"AA679375-BB14-4B24-8AD9-B2BFBACE2FDB"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"B04589FF-F299-4EF6-A57B-1AD145372DBB"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*","matchCriteriaId":"FDC1ADAD-DA77-47EF-8DB9-C36961C560C2"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qualcomm:ipq8064_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"7A1CC1C1-F2CA-4C43-B9E9-1288C3496C7B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:qualcomm:ipq8064:-:*:*:*:*:*:*:*","matchCriteriaId":"AC82552A-9E7C-4A13-B7A5-43CEA218675C"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"2914BF98-E69C-4C8D-8B10-759642ADD7B4"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:qualcomm:ipq8074:-:*:*:*:*:*:*:*","matchCriteriaId":"2118C404-402F-463C-8160-3CC3B703DF30"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qualcomm:qca4531_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"7A13DB5D-38AC-4E50-A279-130AF24256E0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:qualcomm:qca4531:-:*:*:*:*:*:*:*","matchCriteriaId":"90A67611-CA55-4039-B4B5-AB87CD6CEA17"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qualcomm:qca9531_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"E71452E6-551F-4E93-9951-2582C60BDFCE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:qualcomm:qca9531:-:*:*:*:*:*:*:*","matchCriteriaId":"6D69FB0E-FDFF-42B8-ADAD-797B7C91E979"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qualcomm:qca9980_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"DCBC53AC-E040-40E0-B09B-4117E641C9D4"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:qualcomm:qca9980:-:*:*:*:*:*:*:*","matchCriteriaId":"7AE49086-E95B-4852-8A09-16A83DD63EC9"}]}]}],"references":[{"url":"https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin","source":"product-security@qualcomm.com","tags":["Broken Link"]},{"url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1065","source":"product-security@qualcomm.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1065","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}