Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "09E6085C-A61E-4A89-BF80-EDD9A7DF1E47", "vulnerable": true}, {"criteria": "cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "FC30B2A2-9674-4052-B402-20348E50F9E8", "vulnerable": true}, {"criteria": "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D835D592-2423-44C6-804A-3AD010112E7C", "vulnerable": true}, {"criteria": "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "568E2561-A068-46A2-B331-BBA91FC96F0C", "vulnerable": true}, {"criteria": "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "B578E383-0D77-4AC7-9C81-3F0B8C18E033", "vulnerable": true}, {"criteria": "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2", "vulnerable": true}, {"criteria": "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "8DFAAD08-36DA-4C95-8200-C29FE5B6B854", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:broadcom:bcm43162:-:*:*:*:*:*:*:*", "matchCriteriaId": "381BFA78-84FA-498F-A7CE-055184521A9A", "vulnerable": false}, {"criteria": "cpe:2.3:h:broadcom:bcm43224:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4AA3359-3E0A-4B72-BA7A-1E8B295B3CFD", "vulnerable": false}, {"criteria": "cpe:2.3:h:broadcom:bcm4323:-:*:*:*:*:*:*:*", "matchCriteriaId": "22A283DE-EBDB-4A10-8B76-19C3DCF6CD9E", "vulnerable": false}, {"criteria": "cpe:2.3:h:broadcom:bcm43684:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2E0882A-3CC9-4C21-8DED-5FF687220B58", "vulnerable": false}, {"criteria": "cpe:2.3:h:broadcom:bcm43694:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F48D044-1600-4BA0-A25A-90CAEE00E12B", "vulnerable": false}, {"criteria": "cpe:2.3:h:broadcom:bcm47622:-:*:*:*:*:*:*:*", "matchCriteriaId": "35539FE5-46C1-47AA-9AE4-DDA18C7AF8A1", "vulnerable": false}, {"criteria": "cpe:2.3:h:broadcom:bcm6710:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F91F624-8E30-48ED-AA6F-950B0450BA57", "vulnerable": false}, {"criteria": "cpe:2.3:h:broadcom:bcm6750:-:*:*:*:*:*:*:*", "matchCriteriaId": "00EDD2E8-91F0-4069-90EC-73DE59146CE4", "vulnerable": false}, {"criteria": "cpe:2.3:h:broadcom:bcm6752:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DAD9CE9-5694-45B1-9971-C9BF6A1FA096", "vulnerable": false}, {"criteria": "cpe:2.3:h:broadcom:bcm6755:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A0B7F0F-8F9E-47F8-8E8E-938BAEBAB4C6", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "An issue was discovered on Samsung mobile devices with N(7.x), O(8.x), and P(9.0) (Broadcom Wi-Fi chipsets) software. A denial-of-service attack can leverage a shared interface between Broadcom Bluetooth and Broadcom Wi-Fi. The Samsung ID is SVE-2019-15350 (November 2019)."}, {"lang": "es", "value": "Se detect\u00f3 un problema en dispositivos m\u00f3viles Samsung con versiones de software N(7.x), O(8.x) y P(9.0) (chipsets Broadcom Wi-Fi). Un ataque de denegaci\u00f3n de servicio puede aprovechar una interfaz compartida entre Broadcom Bluetooth y Broadcom Wi-Fi. El ID de Samsung es SVE-2019-15350 (Noviembre de 2019)."}], "id": "CVE-2019-20546", "lastModified": "2024-11-21T04:38:43.230", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-03-24T19:15:17.930", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://security.samsungmobile.com/securityUpdate.smsb"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://security.samsungmobile.com/securityUpdate.smsb"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-noinfo"}], "source": "nvd@nist.gov", "type": "Primary"}]}