#VU112422 Integer overflow in Qualcomm products - CVE-2020-11196
Published: July 7, 2025
Vulnerability identifier: #VU112422
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2020-11196
CWE-ID: CWE-190
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
APQ8009
APQ8017
APQ8053
APQ8096AU
APQ8098
MDM9206
MDM9650
MSM8905
MSM8909W
MSM8917
MSM8920
MSM8937
MSM8940
MSM8953
MSM8996
MSM8996AU
MSM8998
QCS405
QCS605
QM215
SA6155P
SDA660
SDA845
SDM429
SDM429W
SDM439
SDM450
SDM630
SDM632
SDM636
SDM660
SDM670
SDM710
SDM845
SDX20
SDX55
SM6150
SM7150
SM8150
SM8250
SXR1130
SXR2130
APQ8009W
APQ8037
APQ8064AU
APQ8096
APQ8096SG
MSM8909
MSM8996SG
QCM4290
QCM6125
QCS410
QCS4290
QCS603
QCS610
QCS6125
SA6145P
SA6150P
SA6155
SA8150P
SA8155
SA8155P
SA8195P
SDA429W
SDA640
SDA670
SDM455
SDM640
SDM830
SDW2500
SDX20M
SDX50M
SDX55M
SM4125
SM4250
SM4250P
SM6115
SM6115P
SM6125
SM6150P
SM6250
SM6250P
SM6350
SM7125
SM7150P
SM7225
SM7250
SM7250P
SM8150P
SXR1120
SXR2130P
WCD9330
APQ8009
APQ8017
APQ8053
APQ8096AU
APQ8098
MDM9206
MDM9650
MSM8905
MSM8909W
MSM8917
MSM8920
MSM8937
MSM8940
MSM8953
MSM8996
MSM8996AU
MSM8998
QCS405
QCS605
QM215
SA6155P
SDA660
SDA845
SDM429
SDM429W
SDM439
SDM450
SDM630
SDM632
SDM636
SDM660
SDM670
SDM710
SDM845
SDX20
SDX55
SM6150
SM7150
SM8150
SM8250
SXR1130
SXR2130
APQ8009W
APQ8037
APQ8064AU
APQ8096
APQ8096SG
MSM8909
MSM8996SG
QCM4290
QCM6125
QCS410
QCS4290
QCS603
QCS610
QCS6125
SA6145P
SA6150P
SA6155
SA8150P
SA8155
SA8155P
SA8195P
SDA429W
SDA640
SDA670
SDM455
SDM640
SDM830
SDW2500
SDX20M
SDX50M
SDX55M
SM4125
SM4250
SM4250P
SM6115
SM6115P
SM6125
SM6150P
SM6250
SM6250P
SM6350
SM7125
SM7150P
SM7225
SM7250
SM7250P
SM8150P
SXR1120
SXR2130P
WCD9330
Software vendor:
Qualcomm
Qualcomm
Description
The vulnerability allows a remote attacker to read and manipulate data.
The vulnerability exists due to improper input validation in Video. A remote attacker can read and manipulate data.
Remediation
Install security update from vendor's website.