Categories
NVD NVD Nist GOV

NVD – CVE-2020-11147

Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm3003a_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm3003a:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm456_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm456:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm6125_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm6125:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm6150_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm6150:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm6150a_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm6150a:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm6150l_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm6150l:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm6250_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm6250:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm6350_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm6350:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm660_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm660:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm660a_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm660a:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm660l_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm660l:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm7150a_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm7150a:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm7150l_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm7150l:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm7250_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm7250:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm7250b_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm7250b:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm7350c_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm7350c:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm8004_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm8004:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm8008_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm8008:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm8009_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm8009:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm8150a_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm8150a:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm8150b_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm8150b:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm8150c_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm8150c:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm8150l_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm8150l:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm8250_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm8250:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm8350_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm8350:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm8350b_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm8350b:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm8350bh_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm8350bh:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm8350bhs_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm8350bhs:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm8350c_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm8350c:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm855_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm855:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm855b_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm855b:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm855l_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm855l:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pm855p_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pm855p:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pmi632_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pmi632:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pmk7350_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pmk7350:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pmk8002_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pmk8002:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pmk8003_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pmk8003:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pmk8350_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pmk8350:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pmr525_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pmr525:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pmr735a_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pmr735a:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pmr735b_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pmr735b:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pmx50_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pmx50:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:pmx55_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:pmx55:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qat3514_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qat3514:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qat3516_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qat3516:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qat3518_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qat3518:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qat3519_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qat3519:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qat3522_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qat3522:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qat3550_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qat3550:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qat3555_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qat3555:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qat5515_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qat5515:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qat5516_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qat5516:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qat5522_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qat5522:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qat5533_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qat5533:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qat5568_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qat5568:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qbt1500_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qbt1500:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qbt2000_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qbt2000:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qdm2307_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qdm2307:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qdm2308_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qdm2308:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qdm2310_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qdm2310:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qdm3301_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qdm3301:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qdm3302_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qdm3302:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qdm4643_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qdm4643:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qdm4650_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qdm4650:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qdm5579_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qdm5579:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qdm5620_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qdm5620:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qdm5621_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qdm5621:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qdm5650_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qdm5650:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qdm5652_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qdm5652:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qdm5670_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qdm5670:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qdm5671_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qdm5671:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qdm5677_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qdm5677:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qdm5679_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qdm5679:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qet4100_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qet4100:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qet4101_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qet4101:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qet5100_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qet5100:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qet5100m_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qet5100m:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qet6100_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qet6100:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qet6110_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qet6110:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qfs2530_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qfs2530:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qfs2580_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qfs2580:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qfs2608_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qfs2608:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qfs2630_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qfs2630:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qln4642_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qln4642:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qln4650_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qln4650:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qln5020_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qln5020:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qln5030_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qln5030:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qln5040_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qln5040:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpa2625_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpa2625:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpa4340_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpa4340:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpa4360_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpa4360:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpa5461_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpa5461:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpa5580_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpa5580:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpa5581_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpa5581:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpa6560_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpa6560:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpa8673_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpa8673:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpa8686_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpa8686:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpa8801_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpa8801:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpa8802_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpa8802:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpa8803_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpa8803:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpa8821_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpa8821:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpa8842_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpa8842:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpm4621_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpm4621:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpm4630_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpm4630:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpm4640_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpm4640:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpm4641_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpm4641:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpm4650_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpm4650:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpm5620_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpm5620:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpm5621_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpm5621:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpm5641_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpm5641:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpm5657_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpm5657:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpm5658_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpm5658:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpm5670_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpm5670:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpm5677_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpm5677:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpm5679_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpm5679:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpm5870_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpm5870:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpm5875_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpm5875:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpm6585_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpm6585:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpm6621_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpm6621:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpm6670_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpm6670:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpm8820_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpm8820:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpm8870_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpm8870:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qpm8895_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qpm8895:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qsm7250_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qsm7250:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qtc800h_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qtc800h:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qtc800s_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qtc800s:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qtc801s_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qtc801s:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:qtm525_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:qtm525:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:rsw8577_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:rsw8577:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sd660:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sd670:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sd690_5g_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sd690_5g:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sd710_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sd710:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sd720g_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sd720g:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sd750g_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sd750g:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sd765_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sd765g_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sd768g_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sdr051_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sdr051:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sdr052_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sdr052:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sdr425_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sdr425:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sdr660_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sdr660:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sdr675_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sdr675:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sdr735_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sdr735:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sdr735g_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sdr735g:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sdr8150_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sdr8150:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sdr865_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sdr865:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sdx50m_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sdx50m:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:sm7350_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:sm7350:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:smb1351_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:smb1351:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:smb1354_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:smb1354:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:smb1355_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:smb1355:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:smb1381_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:smb1381:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:smb1390_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:smb1390:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:smb1394_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:smb1394:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:smb1395_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:smb1395:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:smb1396_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:smb1396:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:smb1398_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:smb1398:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:smr525_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:smr525:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:smr526_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:smr526:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:smr545_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:smr545:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:smr546_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:smr546:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:wgr7640_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:wgr7640:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:wtr2965_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:wtr2965:-:*:*:*:*:*:*:*
Added CPE Configuration
AND
     OR
          *cpe:2.3:o:qualcomm:wtr3925_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:qualcomm:wtr3925:-:*:*:*:*:*:*:*
Added CVSS V2
NIST (AV:L/AC:L/Au:N/C:P/I:P/A:P)
Added CVSS V3.1
NIST AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Added CWE
NIST CWE-416
Changed Reference Type
https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin No Types Assigned
https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin Vendor Advisory
Categories
NVD NVD Nist GOV

NVD – CVE-2020-11163

CVE-2020-11163 Detail

Undergoing Analysis


This vulnerability is currently undergoing analysis and not all information is available. Please check back soon to view the completed vulnerability summary.

Description

Possible buffer overflow while updating ikev2 parameters due to lack of check of input validation for certain parameters received from the ePDG server in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

Severity

CVSS 3.x Severity and Metrics:

CVSS 2.0 Severity and Metrics:

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Weakness Enumeration

CWE-ID CWE Name Source

Change History

0 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2020-11163
NVD Published Date:
02/22/2021
NVD Last Modified:
02/22/2021
Source:
Qualcomm, Inc.

Categories
NVD NVD Nist GOV

NVD – CVE-2020-11170

CVE-2020-11170 Detail

Undergoing Analysis


This vulnerability is currently undergoing analysis and not all information is available. Please check back soon to view the completed vulnerability summary.

Description

Out of bound memory access while playing music playbacks with crafted vorbis content due to improper checks in header extraction in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Severity

CVSS 3.x Severity and Metrics:

CVSS 2.0 Severity and Metrics:

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Weakness Enumeration

CWE-ID CWE Name Source

Change History

0 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2020-11170
NVD Published Date:
02/22/2021
NVD Last Modified:
02/22/2021
Source:
Qualcomm, Inc.

Categories
NVD NVD Nist GOV

NVD – CVE-2020-11177

CVE-2020-11177 Detail

Undergoing Analysis


This vulnerability is currently undergoing analysis and not all information is available. Please check back soon to view the completed vulnerability summary.

Description

User can overwrite Security Code NV item without knowing current SPC due to improper validation of SPC code setting and device lock in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Severity

CVSS 3.x Severity and Metrics:

CVSS 2.0 Severity and Metrics:

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Weakness Enumeration

CWE-ID CWE Name Source

Change History

0 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2020-11177
NVD Published Date:
02/22/2021
NVD Last Modified:
02/22/2021
Source:
Qualcomm, Inc.

Categories
NVD NVD Nist GOV

NVD – CVE-2020-11187

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Categories
NVD NVD Nist GOV

NVD – CVE-2020-11194

CVE-2020-11194 Detail

Undergoing Analysis


This vulnerability is currently undergoing analysis and not all information is available. Please check back soon to view the completed vulnerability summary.

Description

Possible out of bound access in TA while processing a command from NS side due to improper length check of response buffer in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking

Severity

CVSS 3.x Severity and Metrics:

CVSS 2.0 Severity and Metrics:

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Weakness Enumeration

CWE-ID CWE Name Source

Change History

0 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2020-11194
NVD Published Date:
02/22/2021
NVD Last Modified:
02/22/2021
Source:
Qualcomm, Inc.

Categories
NVD NVD Nist GOV

NVD – CVE-2020-11195

CVE-2020-11195 Detail

Undergoing Analysis


This vulnerability is currently undergoing analysis and not all information is available. Please check back soon to view the completed vulnerability summary.

Description

Out of bound write and read in TA while processing command from NS side due to improper length check on command and response buffers in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music

Severity

CVSS 3.x Severity and Metrics:

CVSS 2.0 Severity and Metrics:

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Weakness Enumeration

CWE-ID CWE Name Source

Change History

0 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2020-11195
NVD Published Date:
02/22/2021
NVD Last Modified:
02/22/2021
Source:
Qualcomm, Inc.

Categories
NVD NVD Nist GOV

NVD – CVE-2020-11198

CVE-2020-11198 Detail

Undergoing Analysis


This vulnerability is currently undergoing analysis and not all information is available. Please check back soon to view the completed vulnerability summary.

Description

Key material used for TZ diag buffer encryption and other data related to log buffer is not wiped securely due to improper usage of memset in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

Severity

CVSS 3.x Severity and Metrics:

CVSS 2.0 Severity and Metrics:

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Weakness Enumeration

CWE-ID CWE Name Source

Change History

0 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2020-11198
NVD Published Date:
02/22/2021
NVD Last Modified:
02/22/2021
Source:
Qualcomm, Inc.

Categories
NVD NVD Nist GOV

NVD – CVE-2020-11203

CVE-2020-11203 Detail

Undergoing Analysis


This vulnerability is currently undergoing analysis and not all information is available. Please check back soon to view the completed vulnerability summary.

Description

Stack overflow may occur if GSM/WCDMA broadcast config size received from user is larger than variable length array in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables

Severity

CVSS 3.x Severity and Metrics:

CVSS 2.0 Severity and Metrics:

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Weakness Enumeration

CWE-ID CWE Name Source

Change History

0 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2020-11203
NVD Published Date:
02/22/2021
NVD Last Modified:
02/22/2021
Source:
Qualcomm, Inc.

Categories
NVD NVD Nist GOV

NVD – CVE-2020-11204

CVE-2020-11204 Detail

Undergoing Analysis


This vulnerability is currently undergoing analysis and not all information is available. Please check back soon to view the completed vulnerability summary.

Description

Possible memory corruption and information leakage in sub-system due to lack of check for validity and boundary compliance for parameters that are read from shared MSG RAM in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Severity

CVSS 3.x Severity and Metrics:

CVSS 2.0 Severity and Metrics:

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Weakness Enumeration

CWE-ID CWE Name Source

Change History

0 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2020-11204
NVD Published Date:
02/22/2021
NVD Last Modified:
02/22/2021
Source:
Qualcomm, Inc.