First published: Mon Nov 02 2020(Updated: )
u'Bluetooth devices does not properly restrict the L2CAP payload length allowing users in radio range to cause a buffer overflow via a crafted Link Layer packet(Equivalent to CVE-2019-17060,CVE-2019-17061 and CVE-2019-17517 in Sweyntooth paper)' in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music in AR9344
Credit: product-security@qualcomm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Qualcomm AR9344 | ||
Qualcomm AR9344 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-11114 is classified as a high-severity vulnerability due to the potential for buffer overflow exploitation.
To fix CVE-2020-11114, update your Qualcomm AR9344 firmware to the latest version provided by Qualcomm.
The vulnerability affects devices utilizing Qualcomm AR9344 firmware that do not properly restrict L2CAP payload length.
CVE-2020-11114 is a buffer overflow vulnerability related to Bluetooth communication protocols.
Yes, CVE-2020-11114 can be exploited by users within radio range of the vulnerable device.