{"id":"CVE-2020-3702","details":"u'Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8053, IPQ4019, IPQ8064, MSM8909W, MSM8996AU, QCA9531, QCN5502, QCS405, SDX20, SM6150, SM7150","modified":"2026-03-13T00:42:18.559599Z","published":"2020-09-08T10:15:16.340Z","related":["MGASA-2021-0409","MGASA-2021-0419","SUSE-SU-2021:3337-1","SUSE-SU-2021:3338-1","SUSE-SU-2021:3339-1","SUSE-SU-2021:3386-1","SUSE-SU-2021:3387-1","SUSE-SU-2021:3388-1","SUSE-SU-2021:3389-1","SUSE-SU-2021:3415-1","SUSE-SU-2021:3447-1","SUSE-SU-2021:3876-1","SUSE-SU-2021:3929-1","SUSE-SU-2021:3935-1","SUSE-SU-2021:3969-1","SUSE-SU-2021:3972-1","SUSE-SU-2022:0234-1","SUSE-SU-2022:0237-1","SUSE-SU-2022:0241-1","SUSE-SU-2022:0243-1","SUSE-SU-2022:0246-1","SUSE-SU-2022:0254-1","SUSE-SU-2022:0255-1","SUSE-SU-2022:0257-1","SUSE-SU-2022:0263-1","SUSE-SU-2022:0267-1","SUSE-SU-2022:0291-1","SUSE-SU-2022:0292-1","SUSE-SU-2022:0293-1","SUSE-SU-2022:0295-1","SUSE-SU-2022:0296-1","SUSE-SU-2022:0298-1","SUSE-SU-2022:0325-1","SUSE-SU-2022:0327-1","SUSE-SU-2022:0328-1","openSUSE-SU-2021:1357-1","openSUSE-SU-2021:1365-1","openSUSE-SU-2021:3338-1","openSUSE-SU-2021:3387-1","openSUSE-SU-2021:3447-1","openSUSE-SU-2021:3876-1"],"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"},{"type":"ADVISORY","url":"https://www.arista.com/en/support/advisories-notices/security-advisories/11998-security-advisory-58"},{"type":"ADVISORY","url":"https://www.debian.org/security/2021/dsa-4978"},{"type":"ADVISORY","url":"https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.8.3-12"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-3702.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}