Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2021-35111

Summary
Assigner-qualcomm
Assigner Org ID-2cfc7d3e-20d3-47ac-8db7-1b7285aff15f
Published At-14 Jun, 2022 | 09:40
Updated At-04 Aug, 2024 | 00:33
Rejected At-
Credits

Improper validation of tag id while RRC sending tag id to MAC can lead to TOCTOU race condition in Snapdragon Connectivity, Snapdragon Mobile

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:qualcomm
Assigner Org ID:2cfc7d3e-20d3-47ac-8db7-1b7285aff15f
Published At:14 Jun, 2022 | 09:40
Updated At:04 Aug, 2024 | 00:33
Rejected At:
▼CVE Numbering Authority (CNA)

Improper validation of tag id while RRC sending tag id to MAC can lead to TOCTOU race condition in Snapdragon Connectivity, Snapdragon Mobile

Affected Products
Vendor
Qualcomm Technologies, Inc.Qualcomm, Inc.
Product
Snapdragon Connectivity, Snapdragon Mobile
Versions
Affected
  • AR8035, QCA6390, QCA6391, QCA8081, QCA8337, SD 8 Gen1 5G, SD765, SD765G, SD768G, SD778G, SD865 5G, SD870, SD888 5G, SDX55, SDX55M, SDX65, SM7250P, SM7450, SM8475, SM8475P, WCD9341, WCD9370, WCD9375, WCD9380, WCD9385, WCN3991, WCN3998, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WCN7851, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835
Problem Types
TypeCWE IDDescription
textN/ATime-of-check Time-of-use (TOCTOU) Race Condition in Modem
Type: text
CWE ID: N/A
Description: Time-of-check Time-of-use (TOCTOU) Race Condition in Modem
Metrics
VersionBase scoreBase severityVector
3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.qualcomm.com/company/product-security/bulletins/june-2022-bulletin
x_refsource_CONFIRM
Hyperlink: https://www.qualcomm.com/company/product-security/bulletins/june-2022-bulletin
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.qualcomm.com/company/product-security/bulletins/june-2022-bulletin
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.qualcomm.com/company/product-security/bulletins/june-2022-bulletin
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:product-security@qualcomm.com
Published At:14 Jun, 2022 | 10:15
Updated At:19 Apr, 2023 | 17:10

Improper validation of tag id while RRC sending tag id to MAC can lead to TOCTOU race condition in Snapdragon Connectivity, Snapdragon Mobile

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.9MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Secondary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Primary2.07.1HIGH
AV:N/AC:M/Au:N/C:N/I:N/A:C
Type: Primary
Version: 3.1
Base score: 5.9
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Secondary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 2.0
Base score: 7.1
Base severity: HIGH
Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:C
CPE Matches

Qualcomm Technologies, Inc.
qualcomm
>>ar8035_firmware>>-
cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>ar8035>>-
cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6390_firmware>>-
cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6390>>-
cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6391_firmware>>-
cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6391>>-
cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca8081_firmware>>-
cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca8081>>-
cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca8337_firmware>>-
cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca8337>>-
cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sd_8_gen1_5g_firmware>>-
cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sm8475>>-
cpe:2.3:h:qualcomm:sm8475:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sd765_firmware>>-
cpe:2.3:o:qualcomm:sd765_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sd765>>-
cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sd765g_firmware>>-
cpe:2.3:o:qualcomm:sd765g_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sd765g>>-
cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sd768g_firmware>>-
cpe:2.3:o:qualcomm:sd768g_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sd768g>>-
cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sd778g_firmware>>-
cpe:2.3:o:qualcomm:sd778g_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sd778g>>-
cpe:2.3:h:qualcomm:sd778g:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sd865_5g_firmware>>-
cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sd865_5g>>-
cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sd870_firmware>>-
cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sd870>>-
cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sd888_5g_firmware>>-
cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sd888_5g>>-
cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sdx55_firmware>>-
cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sdx55>>-
cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sdx55m_firmware>>-
cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sdx55m>>-
cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sdx65_firmware>>-
cpe:2.3:o:qualcomm:sdx65_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sdx65>>-
cpe:2.3:h:qualcomm:sdx65:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sm7250p_firmware>>-
cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sm7250p>>-
cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sm7450_firmware>>-
cpe:2.3:o:qualcomm:sm7450_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sm7450>>-
cpe:2.3:h:qualcomm:sm7450:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sm8475_firmware>>-
cpe:2.3:o:qualcomm:sm8475_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sm8475>>-
cpe:2.3:h:qualcomm:sm8475:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sm8475p_firmware>>-
cpe:2.3:o:qualcomm:sm8475p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sm8475p>>-
cpe:2.3:h:qualcomm:sm8475p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcd9341_firmware>>-
cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcd9341>>-
cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcd9370_firmware>>-
cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcd9370>>-
cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcd9375_firmware>>-
cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcd9375>>-
cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcd9380_firmware>>-
cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcd9380>>-
cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcd9385_firmware>>-
cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcd9385>>-
cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-20Primarynvd@nist.gov
CWE-367Primarynvd@nist.gov
CWE ID: CWE-20
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-367
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.qualcomm.com/company/product-security/bulletins/june-2022-bulletinproduct-security@qualcomm.com
Vendor Advisory
Hyperlink: https://www.qualcomm.com/company/product-security/bulletins/june-2022-bulletin
Source: product-security@qualcomm.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

1285Records found

CVE-2022-33270
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.08% / 24.66%
||
7 Day CHG~0.00%
Published-04 Apr, 2023 | 04:46
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check time-of-use race condition in Modem

Transient DOS due to time-of-check time-of-use race condition in Modem while processing RRC Reconfiguration message.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sm6375wsa8830sm7325-ae_firmwareqca8337_firmwarewcd9380_firmwareqca8337wcn785x-5sm8350-ac_firmwarewsa8835snapdragon_auto_5g_modem-rfwcd9380qca6595au_firmwaresnapdragon_x70_modem-rf_systemsm8350wcd9370wcn685x-5_firmwaresm7325pwcn685x-1sm7325sm8450wcn6750sm4375wcn3998wcd9385_firmwareqcn6024_firmwaresm6375_firmwarewsa8815sm7325p_firmwaresdx57m_firmwaresm7325-afsm7325-aeqcn9024qca6595auwcn3998_firmwareqca8081_firmwaresm7325-af_firmwarewcd9375_firmwarewcn785x-5_firmwareqca6391sm4350-acsd778gsnapdragon_auto_5g_modem-rf_firmwaresnapdragon_x65_5g_modem-rf_system_firmwaresnapdragon_x70_modem-rf_system_firmwaresnapdragon_x65_5g_modem-rf_systemqcs6490qcm6490_firmwareqca6698aqsm8350_firmwarewcn685x-5wcn3988_firmwarewcn785x-1_firmwaresd778g_firmwareqcn9024_firmwarewsa8810_firmwaresdx57msm4375_firmwaresm8450_firmwarewsa8810qca8081qca6698aq_firmwaresm8350-acwcn685x-1_firmwarewcd9385qca6696_firmwareqcs6490_firmwareqca6696qca6391_firmwarear8035sm4350_firmwarewcd9375sm4350wcd9370_firmwaresm4350-ac_firmwarewsa8830_firmwareqcn6024qcm6490wcn3988wsa8815_firmwarewsa8835_firmwarewcn6750_firmwarear8035_firmwarewcn785x-1sm7325_firmwareSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-11200
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.34% / 55.72%
||
7 Day CHG~0.00%
Published-21 Jan, 2021 | 09:41
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer over-read while parsing RPS due to lack of check of input validation on values received from user side. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qfe3100qfs2580qfe2550qcs610pmi8996qdm2307qfs2530qpa8802qln1030qpa8688pm6125qat3519pm8150asc8180x\+sdx55qtc800hqdm5670qcs2290sa6155qca6335pm7150lqpa8821qln1020wtr3905qdm5671pmc1000hqat3518sd632sd8cwcn3998wcn3950sm4125sd720gqpa5460wcn3660bqfe4320qcc112qca4020pm845qdm5652sd6905gqpm8870qpm5679qbt2000pm855pqca6420wcd9360pm6150asdr735gpm8150bqsm7250pm8996qcs6125qfe2101qca6430qat3522qfe4455fcpmr735awcd9340sd765gqfe3440fcsdr660qca6436wcn6851sa6155pqpa6560sdr865pmc7180smb1358wcd9341pmi8952qca6431qln5020wcd9371smb1350sd750gwtr3950sa8150pqpm5657pm6350qdm5621qfe3340qtc800ssd660qdm5650sd712wcn3988wtr3925qfe2080fcsdr052smb1390pm6150lsd450qet4100mdm9640qpm6585qtc410swcn3991smb1355qln4650qpa8801wgr7640sd636qet5100qca6564ausdxr25gpm6150qca6574pm7250bqpa8842pmm8996auwcd9380qln4640qcs410smb1381sdr735pm7250wtr4905smb1395pm660lqpa8803ar8151smr526wtr5975wcn3980pmk8003qdm2301qsw8573qcs605wsa8815wcn6850qbt1000sd7cqca6320wcn3910sd835pm8009qpa8675sd730sdx55mpm670apm8008msm8953qsw8574pmi8998qfe2520pme605pm855lqcs603rsw8577sd8655gqpm5621qpm6582sd670pm670pm8150lqdm5677pm8005qsm8250sa6145pqdm2302pmm6155ausdxr1apq8096auwtr2965pm8150sdx55apq8053sa8155psd675qet4101pmi8994qat3516pm670lwcn3660qpm5658qca9379pm855bsmb2351qln1031qcm2290wsa8830qfe4465fcpm660sdr051qln5030pm4125qbt1500qpa5581pmi632pm456mdm9650qpa5373pmk8001qcs4290qet6100pmm855ausdr660gsd455qpa8686smb1396pm7150awcd9370qca6564sdr425qca6426whs9410qat5516wtr2955qdm5620qln1021aqsd662smb1380pm3003asa8155qat5533wcn3615qca6595auqtc800tsmb1354qdm2305qca6310qpm8820qpm2630qfe2081fcpm855pm8250sdm630sd821pmx55sdr675qca6421sm6250qdm3301sa8195ppm8953qat5515qca6694qpm5677qat3514wcd9326wcd9335qet4200aqwcd9385qpm5620pmm8155auqca6390wcd9375aqt1000apq8064auqpa8673qdm2310pmm8195auqln4642qca6694ausd820pm8998qca6564aqet6110qln5040qpm8895sdr845qpm5670wcn3990pm8019qca6595qpm8830qat5522wsa8835msm8996aupm8150cpmr735bsm6250prgr7640auqpa4360qln1035bdpm855aqpa4361qca6574aqca6174asmr525wcn6750pmr525qpm4650qtm525wtr6955sd855sd8cxsd665qca6175asd765pm640pqat3555sd460qca6391smb1351qfe2082fcpm660aqpa4340qcm4290sdx50mpm640asdr8150qln1036aqqtc801spmd9655qca6574ausd710qsw6310qcm6125wsa8810qdm2308qat3550pmx50qdm5679wcn3680bsdr8250sd768gqca6696sm4350pm8004pm640lpmk8002qpa2625sa6150psd845sm7250psdm830sd850pm6250qpa5580Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-20
Improper Input Validation
CVE-2023-33103
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.14% / 35.29%
||
7 Day CHG~0.00%
Published-04 Mar, 2024 | 10:48
Updated-10 Jan, 2025 | 17:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in Multi-Mode Call Processor

Transient DOS while processing CAG info IE received from NW.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sg8275psg8275p_firmwarewcd9385_firmwaresnapdragon_8_gen_2_mobilefastconnect_7800qcm4490wcd9370_firmwaresnapdragon_x75_5g_modem-rf_firmwarewcd9390_firmwaresnapdragon_x65_5g_modem-rf_firmwareqcn6024qcs8550wcd9385snapdragon_8_gen_2_mobile_firmwarewcd9380snapdragon_x75_5g_modem-rfwcd9370wcd9390sm8550pwsa8815wcd9395_firmwareqca6698aq_firmwarewsa8845wsa8810fastconnect_6900_firmwareqcs4490_firmwarewcn3950qcm8550_firmwareqcn6024_firmwarewsa8845_firmwarefastconnect_6900qfw7124snapdragon_4_gen_2_mobile_firmwarewsa8832_firmwareqcn9024_firmwarewsa8830_firmwareqcc710snapdragon_x70_modem-rf_firmwarewcn3988qcc710_firmwareqca8337_firmwarewsa8835snapdragon_8_gen_3_mobilewcd9340_firmwaresnapdragon_8_gen_3_mobile_firmwarewsa8810_firmwarewsa8832qca6174a_firmwareqep8111_firmwarewcd9380_firmwareqcn9024qca8337wcd9395qca6698aqwsa8830wcn3950_firmwarewsa8845hqca6174awcn3988_firmwarewsa8840qcs8550_firmwarefastconnect_6700snapdragon_auto_5g_modem-rf_gen_2_firmwareqca8081_firmwaresnapdragon_x35_5g_modem-rf_firmwareqcs4490qca8081qca6584auar8035_firmwareqcn6224_firmwaresnapdragon_x65_5g_modem-rfwcd9340qcm4490_firmwaresnapdragon_8\+_gen_2_mobileqcn6274qca6584au_firmwareqcn6224wsa8815_firmwarewsa8845h_firmwaresnapdragon_4_gen_2_mobilesnapdragon_auto_5g_modem-rf_gen_2fastconnect_7800_firmwareqcm8550qfw7124_firmwareqep8111qfw7114wsa8835_firmwaresnapdragon_x35_5g_modem-rfwsa8840_firmwareqfw7114_firmwareqcn6274_firmwarear8035snapdragon_8\+_gen_2_mobile_firmwarefastconnect_6700_firmwaresnapdragon_x70_modem-rfsm8550p_firmwareSnapdragon
CWE ID-CWE-20
Improper Input Validation
CVE-2023-33104
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.14% / 35.29%
||
7 Day CHG~0.00%
Published-04 Mar, 2024 | 10:48
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper input Validation in Multi-Mode Call Processor

Transient DOS while processing PDU Release command with a parameter PDU ID out of range.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6431qcm8550_firmwarewsa8845_firmwaresd865_5gwsa8832snapdragon_480_5g_mobilesnapdragon_750g_5g_mobile_firmwaresdx57m_firmwaresxr2130_firmwarewcd9370qca8081_firmwaresnapdragon_860_mobile_firmwaresnapdragon_x35_5g_modem-rfar8035_firmwareqca6696snapdragon_778g\+_5g_mobilesnapdragon_x70_modem-rf_firmwarewcd9340_firmwarewcd9341_firmwarewcd9395_firmwareqcn6024sd888_firmwareqcc710_firmwareqca6426snapdragon_8\+_gen_1_mobilewcn6740_firmwarefastconnect_6700snapdragon_780g_5g_mobilesnapdragon_750g_5g_mobilesnapdragon_782g_mobile_firmwarewsa8815_firmwarewsa8832_firmwareqca8337_firmwareqca8337qca6426_firmwarewcd9395sg8275p_firmwareqcm6490_firmwaresnapdragon_690_5g_mobile_firmwaresm7250p_firmwarewcd9341qcm4490_firmwarewcd9390snapdragon_888\+_5g_mobile_firmwarewcn3950wsa8810_firmwarewsa8845h_firmwaresnapdragon_870_5g_mobile_firmwaresnapdragon_778g_5g_mobile_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_690_5g_mobilefastconnect_6800_firmwaresnapdragon_778g\+_5g_mobile_firmwaresnapdragon_870_5g_mobileqcn6024_firmwaresm7250pqca6584auqcn6274_firmwaresd888qcc710snapdragon_xr2_5g_firmwarewcn6740snapdragon_768g_5g_mobilesnapdragon_780g_5g_mobile_firmwaresnapdragon_8_gen_3_mobile_firmwarefastconnect_6800qfw7114_firmware315_5g_iot_modem_firmwarefastconnect_7800_firmwarefastconnect_6900snapdragon_865_5g_mobile_firmwareqep8111qfw7114wcd9385_firmware315_5g_iot_modemqca6421fastconnect_6900_firmwarewcd9380wcd9360snapdragon_xr2_5gsnapdragon_x65_5g_modem-rfqcs4490wsa8845qca6421_firmwaresnapdragon_auto_5g_modem-rf_firmwarewsa8810snapdragon_888_5g_mobile_firmwarevideo_collaboration_vc3_platformqca6595ausnapdragon_888_5g_mobilesnapdragon_4_gen_1_mobile_firmwaresm7315_firmwarewsa8840sd855qcs8550_firmwaresnapdragon_782g_mobilesnapdragon_x35_5g_modem-rf_firmwareqca6431_firmwaresm7315snapdragon_8_gen_2_mobile_firmwaresnapdragon_x55_5g_modem-rfqfw7124_firmwareqca6698aq_firmwareqca6436_firmwaresnapdragon_4_gen_2_mobile_firmwaresnapdragon_888\+_5g_mobilewcd9385snapdragon_8_gen_1_mobilesnapdragon_695_5g_mobile_firmwareqcs4490_firmwaresnapdragon_x55_5g_modem-rf_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewcd9390_firmwaresnapdragon_8_gen_2_mobilesnapdragon_865\+_5g_mobileqep8111_firmwaresg8275psnapdragon_855\+_mobilewcd9370_firmwaresdx55_firmwaresnapdragon_765_5g_mobilesnapdragon_860_mobilesnapdragon_auto_5g_modem-rfqca6574asnapdragon_8\+_gen_2_mobilesxr2130qcm4490qca6174asnapdragon_x65_5g_modem-rf_firmwarewcd9340snapdragon_480\+_5g_mobile_firmwaresnapdragon_auto_5g_modem-rf_gen_2qca6174a_firmwareqcm6490sm7325psm8550p_firmwareqcm8550wcn3988qcs6490_firmwaresnapdragon_765_5g_mobile_firmwareqcn9024qca6584au_firmwaresd855_firmwareqcn6274qca6436qfw7124snapdragon_x70_modem-rfwsa8835qca6595au_firmwareqca6391_firmwarewsa8840_firmwaresnapdragon_855_mobile_firmwareqca6696_firmwareqcn9024_firmwaresdx57mwsa8845hwcd9380_firmwareqca8081wsa8815snapdragon_765g_5g_mobile_firmwarewsa8830sm8550psnapdragon_x75_5g_modem-rfsnapdragon_768g_5g_mobile_firmwarear8035qca6574a_firmwaresdx55snapdragon_4_gen_1_mobilesnapdragon_4_gen_2_mobilesnapdragon_865_5g_mobilesnapdragon_855\+_mobile_firmwarewcd9375_firmwareqca6391qcn6224snapdragon_865\+_5g_mobile_firmwareqca6698aqwcn3950_firmwareqcs8550snapdragon_480\+_5g_mobilefastconnect_6200fastconnect_7800sm7325p_firmwaresd865_5g_firmwarewcd9360_firmwaresnapdragon_480_5g_mobile_firmwaresnapdragon_8\+_gen_2_mobile_firmwarewcd9375snapdragon_765g_5g_mobilewcn3988_firmwarefastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwaresnapdragon_8\+_gen_1_mobile_firmwaresnapdragon_x75_5g_modem-rf_firmwarewsa8835_firmwareqcs6490snapdragon_695_5g_mobilesnapdragon_8_gen_3_mobilesnapdragon_855_mobilesnapdragon_778g_5g_mobilefastconnect_6200_firmwarewsa8830_firmwareqcn6224_firmwaresnapdragon_8_gen_1_mobile_firmwareSnapdragonqca6574a_firmwaresnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_xr2_5g_platform_firmwarewsa8832_firmwareqcs4490_firmwareqep8111_firmwareqca6431_firmwaresnapdragon_x35_5g_modem-rf_system_firmwaresdx57m_firmwareqca6696_firmwaresd888_firmwareqcn9024_firmwarewsa8835_firmwaresd855_firmwaresnapdragon_780g_5g_mobile_platform_firmwaresnapdragon_8_gen_3_mobile_platform_firmwareqca8337_firmwaresm7325p_firmwarewcn3988_firmwarefastconnect_6700_firmwareqca6595au_firmwaresnapdragon_855_mobile_platform_firmwarewcd9390_firmwareqcm6490_firmwaresm8550p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqcs6490_firmwarefastconnect_6200_firmwarewcd9395_firmwareqcn6224_firmwaresnapdragon_888_5g_mobile_platform_firmwarewcd9375_firmwareqca6174a_firmwaresm7250p_firmwareqfw7124_firmwareqca6391_firmwaresm7315_firmwareqca6698aq_firmwaresnapdragon_x70_modem-rf_system_firmwareqca8081_firmwarefastconnect_6900_firmwarewcd9385_firmwarewcd9370_firmwarewsa8840_firmwaresxr2130_firmwarewcd9380_firmwareqca6584au_firmwaresnapdragon_8_gen_1_mobile_platform_firmwarewsa8810_firmwarefastconnect_7800_firmwarewcd9341_firmwarewsa8845h_firmwareqfw7114_firmwaresnapdragon_865_5g_mobile_platform_firmwareqcm8550_firmwarewsa8830_firmwarewcd9360_firmwaresg8275p_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareqcn6024_firmwareqca6436_firmwareqcn6274_firmwareqcm4490_firmwarequalcomm_video_collaboration_vc3_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwarewcn3950_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaresnapdragon_778g_5g_mobile_platform_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewsa8815_firmwaresnapdragon_8_gen_2_mobile_platform_firmwaresnapdragon_690_5g_mobile_platform_firmwarewcd9340_firmwarear8035_firmwaresnapdragon_695_5g_mobile_platform_firmware315_5g_iot_modem_firmwarefastconnect_6800_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewsa8845_firmwaresd865_5g_firmwaresnapdragon_750g_5g_mobile_platform_firmwareqca6426_firmwareqcc710_firmwaresdx55_firmwaresnapdragon_auto_5g_modem-rf_firmwareqca6421_firmwarewcn6740_firmwareqcs8550_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2023-33100
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.12% / 32.38%
||
7 Day CHG~0.00%
Published-01 Apr, 2024 | 15:05
Updated-13 Jan, 2025 | 21:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper input validation in Multi-Mode Call Processor

Transient DOS while processing DL NAS Transport message when message ID is not defined in the 3GPP specification.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qfw7124_firmwarefastconnect_6700_firmwareqcn6274wsa8840_firmwarewsa8832qcc710qcs4490snapdragon_x35_5g_modem-rffastconnect_7800_firmwaresnapdragon_8_gen_3_mobile_firmwarewcd9370qfw7124qcm4490snapdragon_4_gen_2_mobilesnapdragon_auto_5g_modem-rf_gen_2qfw7114wsa8810_firmwareqcn6024sg8275p_firmwarewsa8845_firmwaresnapdragon_8\+_gen_2_mobilesnapdragon_8_gen_1_mobileqcn6224qcc710_firmwaresnapdragon_4_gen_2_mobile_firmwareqcm4490_firmwareqcm8550snapdragon_auto_5g_modem-rf_gen_2_firmwarewcd9390ar8035wcd9340wsa8835wcn3950fastconnect_7800qcn6274_firmwarewcd9395_firmwarewsa8845h_firmwarewsa8830snapdragon_x70_modem-rfqfw7114_firmwareqca8337qca6584au_firmwareqcs8550_firmwarefastconnect_6900snapdragon_x35_5g_modem-rf_firmwarewsa8845snapdragon_8_gen_2_mobile_firmwareqca6584auwsa8835_firmwareqep8111_firmwarefastconnect_6700qcn6224_firmwaresnapdragon_x75_5g_modem-rfqca6174awcd9390_firmwarewsa8815_firmwaresnapdragon_x65_5g_modem-rf_firmwaresnapdragon_8_gen_2_mobilewcn3988qcn6024_firmwaresnapdragon_8\+_gen_2_mobile_firmwarewsa8845hwsa8815sm8550p_firmwarewcd9385_firmwarefastconnect_6900_firmwarewcd9380wsa8832_firmwarewcn3950_firmwarewcd9385wcd9395sm8550pwcd9340_firmwaresnapdragon_x75_5g_modem-rf_firmwareqca8081_firmwareqep8111wsa8830_firmwaresnapdragon_8\+_gen_1_mobile_firmwareqcn9024_firmwareqca6698aqqcs4490_firmwaresnapdragon_x70_modem-rf_firmwareqcs8550wcd9380_firmwaresnapdragon_8_gen_1_mobile_firmwaresnapdragon_x65_5g_modem-rfqca6698aq_firmwareqca6174a_firmwareqca8081wsa8840sg8275pwcn3988_firmwareqcm8550_firmwareqcn9024wcd9370_firmwaresnapdragon_8\+_gen_1_mobilear8035_firmwaresnapdragon_8_gen_3_mobileqca8337_firmwarewsa8810Snapdragonqca6174a_firmwareqca8337_firmwareqcm4490_firmwareqcm8550_firmwareqca6584au_firmwareqcn6274_firmwareqcs4490_firmwareqep8111_firmwareqfw7114_firmwaresg8275p_firmwarefastconnect_6900_firmwareqcn6024_firmwareqcs8550_firmwaresm8550p_firmwarear8035_firmwareqcc710_firmwareqcn6224_firmwarefastconnect_6700_firmwareqcn9024_firmwarefastconnect_7800_firmwareqca8081_firmwareqfw7124_firmwaresnapdragon_8_gen_1_mobile_platform_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaresnapdragon_8_gen_2_mobile_platform_firmwareqca6698aq_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2023-33042
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.19% / 40.69%
||
7 Day CHG~0.00%
Published-05 Dec, 2023 | 03:04
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in Modem

Transient DOS in Modem after RRC Setup message is received.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6431sd865_5gsdx57m_firmwaresm6350sxr2130_firmwarewcd9370qca8081_firmwarear8035_firmwareqca6696sm7250-absm8475wcd9341_firmwaresm8250-ab_firmwareqcn6024sd888_firmwareqca6390qca6426wcn6740_firmwaresm7325-af_firmwarewsa8815_firmwaresm7325-ae_firmwaresm8250-abqca8337_firmwareqca8337sm7325qca6426_firmwareqcm6490_firmwarewcn785x-5sm7250p_firmwaresm8350-ac_firmwarewcd9341wcn785x-5_firmwarewsa8810_firmwaresnapdragon_xr2_5g_platformsnapdragon_x65_5g_modem-rf_system_firmwaresnapdragon_7c\+_gen_3_computesm4350_firmwaresm7350-ab_firmwarewcn3991sm8150-acsm6375_firmwareqcn6024_firmwaresm7250psd888sm6375wcn685x-5wcn6740sm7250-aa_firmware315_5g_iot_modem_firmwaresm8250-acsm8450_firmwaresm8250_firmwarewcd9385_firmware315_5g_iot_modemqca6421sm7225snapdragon_x55_5g_modem-rf_systemwcd9380wcd9360snapdragon_xr2_5g_platform_firmwareqca6421_firmwaresm7350-absnapdragon_auto_5g_modem-rf_firmwarewsa8810sm4350-acsm8350-acvideo_collaboration_vc3_platformqca6595ausm7315_firmwaresm7325_firmwarewcn3991_firmwaresd855qcs8550_firmwareqca6390_firmwareqca6431_firmwaresm7225_firmwaresm7315qca6698aq_firmwareqca6436_firmwarewcd9385snapdragon_7c\+_gen_3_compute_firmwaresm8250-ac_firmwarewcn6750wcn6750_firmwarewcd9370_firmwaresnapdragon_x70_modem-rf_system_firmwaresdx55_firmwaresnapdragon_auto_5g_modem-rfsnapdragon_x55_5g_modem-rf_system_firmwaresm7250-ab_firmwareqca6574asm7325-aesxr2130sm4350sm7325pqcm6490wcn3998sm8150-ac_firmwarewcn3998_firmwarewcn3988qcs6490_firmwaresm8450snapdragon_x65_5g_modem-rf_systemqcn9024sd855_firmwareqca6436sm7325-afwsa8835qca6595au_firmwareqca6391_firmwaresm8250qca6696_firmwareqcn9024_firmwaresdx57mwcd9380_firmwaresm7250-aaqca8081wsa8815sm4375wsa8830sm4375_firmwarewcn785x-1_firmwarear8035qca6574a_firmwaresdx55sm6350_firmwarewcd9375_firmwareqca6391snapdragon_x70_modem-rf_systemwcn785x-1sm8475_firmwareqca6698aqqcs8550sm7250-acwcn685x-1sm7325p_firmwaresd865_5g_firmwarewcd9360_firmwarewcd9375wcn685x-5_firmwarewcn3988_firmwarevideo_collaboration_vc3_platform_firmwaresm4350-ac_firmwarewsa8835_firmwareqcs6490sm7250-ac_firmwarewsa8830_firmwarewcn685x-1_firmwareSnapdragon
CWE ID-CWE-20
Improper Input Validation
CVE-2023-33099
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.12% / 32.38%
||
7 Day CHG~0.00%
Published-01 Apr, 2024 | 15:05
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in Multi-Mode Call Processor

Transient DOS while processing SMS container of non-standard size received in DL NAS transport in NR.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6431qcm8550_firmwarewsa8845_firmwaresd865_5gwsa8832snapdragon_480_5g_mobilesnapdragon_750g_5g_mobile_firmwaresdx57m_firmwaresxr2130_firmwarewcd9370qca8081_firmwaresnapdragon_860_mobile_firmwaresnapdragon_x35_5g_modem-rfar8035_firmwareqca6696snapdragon_778g\+_5g_mobilesnapdragon_x70_modem-rf_firmwarewcd9340_firmwarewcd9341_firmwarewcd9395_firmwareqcn6024sd888_firmwareqcc710_firmwareqca6426snapdragon_8\+_gen_1_mobilewcn6740_firmwarefastconnect_6700snapdragon_780g_5g_mobilesnapdragon_750g_5g_mobilesnapdragon_782g_mobile_firmwarewsa8815_firmwarewsa8832_firmwareqca8337_firmwareqca8337qca6426_firmwarewcd9395sg8275p_firmwareqcm6490_firmwaresnapdragon_690_5g_mobile_firmwaresm7250p_firmwarewcd9341qcm4490_firmwarewcd9390snapdragon_888\+_5g_mobile_firmwarewcn3950wsa8810_firmwarewsa8845h_firmwaresnapdragon_870_5g_mobile_firmwaresnapdragon_778g_5g_mobile_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_690_5g_mobilefastconnect_6800_firmwareqcs5430snapdragon_778g\+_5g_mobile_firmwaresnapdragon_870_5g_mobileqcn6024_firmwareqcm5430sm7250pqcm5430_firmwareqca6584auqcn6274_firmwaresd888qcc710snapdragon_xr2_5g_firmwarewcn6740snapdragon_768g_5g_mobilesnapdragon_780g_5g_mobile_firmwaresnapdragon_8_gen_3_mobile_firmwarefastconnect_6800qfw7114_firmware315_5g_iot_modem_firmwarefastconnect_7800_firmwarefastconnect_6900snapdragon_865_5g_mobile_firmwareqep8111qfw7114wcd9385_firmware315_5g_iot_modemqca6421fastconnect_6900_firmwarewcd9380wcd9360snapdragon_xr2_5gsnapdragon_x65_5g_modem-rfqcs4490wsa8845qca6421_firmwaresnapdragon_auto_5g_modem-rf_firmwarewsa8810snapdragon_888_5g_mobile_firmwarevideo_collaboration_vc3_platformqca6595ausnapdragon_888_5g_mobilesnapdragon_4_gen_1_mobile_firmwaresm7315_firmwarewsa8840sd855qcs8550_firmwaresnapdragon_782g_mobilesnapdragon_x35_5g_modem-rf_firmwareqca6431_firmwaresm7315snapdragon_8_gen_2_mobile_firmwaresnapdragon_x55_5g_modem-rfqfw7124_firmwareqca6698aq_firmwareqca6436_firmwaresnapdragon_4_gen_2_mobile_firmwaresnapdragon_888\+_5g_mobilewcd9385snapdragon_8_gen_1_mobilesnapdragon_695_5g_mobile_firmwareqcs4490_firmwaresnapdragon_x55_5g_modem-rf_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewcd9390_firmwaresnapdragon_8_gen_2_mobilesnapdragon_865\+_5g_mobileqep8111_firmwaresg8275psnapdragon_855\+_mobilewcd9370_firmwaresdx55_firmwaresnapdragon_765_5g_mobilesnapdragon_860_mobilesnapdragon_auto_5g_modem-rfqca6574asnapdragon_8\+_gen_2_mobilesxr2130qcm4490qca6174asnapdragon_x65_5g_modem-rf_firmwarewcd9340snapdragon_480\+_5g_mobile_firmwaresnapdragon_auto_5g_modem-rf_gen_2qca6174a_firmwareqcm6490sm7325psm8550p_firmwareqcm8550wcn3988qcs6490_firmwaresnapdragon_765_5g_mobile_firmwareqcn9024qca6584au_firmwaresd855_firmwareqcn6274qca6436qfw7124snapdragon_x70_modem-rfwsa8835qca6595au_firmwareqca6391_firmwarewsa8840_firmwaresnapdragon_855_mobile_firmwareqca6696_firmwareqcn9024_firmwaresdx57mwsa8845hwcd9380_firmwareqca8081wsa8815snapdragon_765g_5g_mobile_firmwarewsa8830sm8550psnapdragon_x75_5g_modem-rfsnapdragon_768g_5g_mobile_firmwarear8035qca6574a_firmwaresdx55snapdragon_4_gen_1_mobilesnapdragon_4_gen_2_mobilesnapdragon_865_5g_mobilesnapdragon_855\+_mobile_firmwarewcd9375_firmwareqca6391qcn6224snapdragon_865\+_5g_mobile_firmwareqcs5430_firmwareqca6698aqwcn3950_firmwareqcs8550snapdragon_480\+_5g_mobilefastconnect_6200fastconnect_7800sm7325p_firmwaresd865_5g_firmwarewcd9360_firmwaresnapdragon_480_5g_mobile_firmwaresnapdragon_8\+_gen_2_mobile_firmwarewcd9375snapdragon_765g_5g_mobilewcn3988_firmwarefastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwaresnapdragon_8\+_gen_1_mobile_firmwaresnapdragon_x75_5g_modem-rf_firmwarewsa8835_firmwareqcs6490snapdragon_695_5g_mobilesnapdragon_8_gen_3_mobilesnapdragon_855_mobilesnapdragon_778g_5g_mobilefastconnect_6200_firmwarewsa8830_firmwareqcn6224_firmwaresnapdragon_8_gen_1_mobile_firmwareSnapdragonqca8337_firmwareqcm4490_firmwareqcm8550_firmwaresnapdragon_690_5g_mobile_platform_firmwareqcn6274_firmwareqcs4490_firmwaresnapdragon_778g_5g_mobile_platform_firmware315_5g_iot_modem_firmwareqcm6490_firmwaresg8275p_firmwareqca6431_firmwarefastconnect_6900_firmwareqcs8550_firmwareqcn6224_firmwarefastconnect_6700_firmwareqcn9024_firmwarefastconnect_7800_firmwareqca6595au_firmwaresnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_8_gen_1_mobile_platform_firmwaresnapdragon_4_gen_2_mobile_platform_firmwareqca6698aq_firmwareqcm5430_firmwareqca6174a_firmwaresnapdragon_8_gen_2_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwareqca6584au_firmwareqep8111_firmwareqca6696_firmwareqcs6490_firmwareqfw7114_firmwareqcs5430_firmwarequalcomm_video_collaboration_vc3_platform_firmwareqca6391_firmwareqcn6024_firmwaresm8550p_firmwaresd888_firmwareqcc710_firmwaresm7325p_firmwaresdx57m_firmwaresd855_firmwaresd865_5g_firmwareqca6426_firmwaresm7315_firmwareqca6574a_firmwarefastconnect_6200_firmwaresnapdragon_695_5g_mobile_platform_firmwaresdx55_firmwaresnapdragon_780g_5g_mobile_platform_firmwareqca8081_firmwarefastconnect_6800_firmwareqfw7124_firmwaresm7250p_firmwareqca6436_firmwarear8035_firmwaresnapdragon_750g_5g_mobile_platform_firmwareqca6421_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2023-33057
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.10% / 27.65%
||
7 Day CHG~0.00%
Published-06 Feb, 2024 | 05:47
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in Multi-Mode Call Processor

Transient DOS in Multi-Mode Call Processor while processing UE policy container.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6431qcm8550_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewsa8845_firmwaresd865_5gwsa8832sdx57m_firmwaresxr2130_firmwarewcd9370qca8081_firmwarear8035_firmwareqca6696wcd9340_firmwaresnapdragon_888_5g_mobile_platformwcd9341_firmwarewcd9395_firmwareqcn6024sd888_firmwareqcc710_firmwareqca6426wcn6740_firmwarefastconnect_6700snapdragon_768g_5g_mobile_platform_firmwarewsa8815_firmwaresnapdragon_x35_5g_modem-rf_system_firmwarewsa8832_firmwareqca8337_firmwareqca8337qca6426_firmwarewcd9395sg8275p_firmwareqcm6490_firmwaresm7250p_firmwarewcd9341qcm4490_firmwaresnapdragon_855_mobile_platformwcd9390wcn3950wsa8810_firmwaresnapdragon_xr2_5g_platformwsa8845h_firmwaresnapdragon_x65_5g_modem-rf_system_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_765g_5g_mobile_platform_firmwaresnapdragon_780g_5g_mobile_platformfastconnect_6800_firmwareqcn6024_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaresm7250psnapdragon_695_5g_mobile_platformsnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_778g\+_5g_mobile_platformsnapdragon_780g_5g_mobile_platform_firmwareqca6584auqcn6274_firmwaresd888qcc710snapdragon_4_gen_2_mobile_platformsnapdragon_765_5g_mobile_platform_firmwarewcn6740snapdragon_480\+_5g_mobile_platform_firmwaresnapdragon_695_5g_mobile_platform_firmwarefastconnect_6800qfw7114_firmware315_5g_iot_modem_firmwarefastconnect_7800_firmwarefastconnect_6900snapdragon_765g_5g_mobile_platformqep8111qfw7114snapdragon_782g_mobile_platform_firmwarewcd9385_firmware315_5g_iot_modemqca6421fastconnect_6900_firmwaresnapdragon_x55_5g_modem-rf_systemwcd9380snapdragon_888_5g_mobile_platform_firmwaresnapdragon_xr2_5g_platform_firmwaresnapdragon_4_gen_1_mobile_platformwcd9360qcs4490snapdragon_8_gen_1_mobile_platform_firmwaresnapdragon_778g_5g_mobile_platformsnapdragon_8\+_gen_2_mobile_platform_firmwarewsa8845qca6421_firmwaresnapdragon_auto_5g_modem-rf_firmwaresnapdragon_x35_5g_modem-rf_systemsnapdragon_768g_5g_mobile_platformwsa8810snapdragon_865\+_5g_mobile_platformsnapdragon_8\+_gen_2_mobile_platformvideo_collaboration_vc3_platformqca6595ausm7315_firmwaresnapdragon_865_5g_mobile_platform_firmwarewsa8840sd855qcs8550_firmwareqca6431_firmwaresm7315snapdragon_870_5g_mobile_platform_firmwareqfw7124_firmwareqca6698aq_firmwareqca6436_firmwarewcd9385snapdragon_8\+_gen_1_mobile_platformqcs4490_firmwaresnapdragon_8_gen_2_mobile_platformsnapdragon_7c\+_gen_3_compute_firmwaresnapdragon_855\+\/860_mobile_platform_firmwarewcd9390_firmwaresnapdragon_778g\+_5g_mobile_platform_firmwaresnapdragon_8_gen_3_mobile_platformsnapdragon_865\+_5g_mobile_platform_firmwaresnapdragon_690_5g_mobile_platformqep8111_firmwaresg8275pwcd9370_firmwaresnapdragon_x70_modem-rf_system_firmwaresdx55_firmwaresnapdragon_auto_5g_modem-rfsnapdragon_750g_5g_mobile_platform_firmwaresnapdragon_x55_5g_modem-rf_system_firmwareqca6574asxr2130qcm4490qca6174awcd9340snapdragon_auto_5g_modem-rf_gen_2qca6174a_firmwareqcm6490sm7325psnapdragon_855_mobile_platform_firmwaresm8550p_firmwareqcm8550wcn3988qcs6490_firmwaresnapdragon_x65_5g_modem-rf_systemqcn9024qca6584au_firmwaresd855_firmwareqcn6274qca6436qfw7124snapdragon_480_5g_mobile_platform_firmwaresnapdragon_x75_5g_modem-rf_systemqca6595au_firmwareqca6391_firmwarewsa8835wsa8840_firmwaresnapdragon_870_5g_mobile_platformsnapdragon_782g_mobile_platformqca6696_firmwareqcn9024_firmwaresdx57msnapdragon_865_5g_mobile_platformwcd9380_firmwarewsa8845hqca8081wsa8815wsa8830sm8550psnapdragon_8\+_gen_1_mobile_platform_firmwaresnapdragon_765_5g_mobile_platformar8035qca6574a_firmwaresdx55snapdragon_750g_5g_mobile_platformsnapdragon_480\+_5g_mobile_platformwcd9375_firmwareqca6391snapdragon_x70_modem-rf_systemqcn6224snapdragon_778g_5g_mobile_platform_firmwareqca6698aqwcn3950_firmwaresnapdragon_480_5g_mobile_platformsnapdragon_8_gen_2_mobile_platform_firmwaresnapdragon_8_gen_1_mobile_platformqcs8550fastconnect_6200fastconnect_7800sm7325p_firmwaresd865_5g_firmwarewcd9360_firmwaresnapdragon_888\+_5g_mobile_platformwcd9375snapdragon_855\+\/860_mobile_platformwcn3988_firmwarefastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwaresnapdragon_888\+_5g_mobile_platform_firmwarewsa8835_firmwaresnapdragon_x75_5g_modem-rf_system_firmwareqcs6490snapdragon_690_5g_mobile_platform_firmwarefastconnect_6200_firmwarewsa8830_firmwareqcn6224_firmwareSnapdragon
CWE ID-CWE-20
Improper Input Validation
CVE-2020-11119
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.26% / 49.08%
||
7 Day CHG~0.00%
Published-21 Jan, 2021 | 09:41
Updated-04 Aug, 2024 | 11:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer over-read can happen when the buffer length received from response handlers is more than the size of the payload in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qfe3100qfe2080fc_firmwareqca9377_firmwareqfs2580qpm5679_firmwaremdm9640_firmwaresm6250p_firmwareipq4028_firmwarepmd9607_firmwareqca1023qca8337qfe4455fc_firmwarear9380ipq8173_firmwareqfs2608_firmwareqfs2530qpm8870_firmwareqln1030qpa8688pm6125qcn5124qat5522_firmwarewcn3950_firmwarepm8150aqdm5670qca6595au_firmwareqpm5541_firmwareqpa5581_firmwaresa6155pm7150lqpa8821mdm8215pm8998_firmwaresd_455_firmwareapq8076wtr5975_firmwareqcs6125_firmwarepm456_firmwareqpa5580_firmwarewcn3998wcd9371_firmwarewcn3950qcn6024_firmwaresd720gsm4125mdm9206_firmwareqsw8573_firmwarewtr1605wcn3660bqsw8574_firmwaresd460_firmwaresmb2351_firmwarepm8953_firmwareqpa4360_firmwareqca8081_firmwarewcn3998_firmwarepm855pqca6420apq8053_firmwarewtr4605_firmwarepm6150aqpm6670_firmwareipq8070_firmwareqca9367_firmwareipq8078a_firmwarepm660_firmwarepm8150bipq8072_firmwareqca0000sa8155_firmwareqfe2101qca6430qat3522qfe4455fcpmr735awcd9340sdm830_firmwaresd765gsdr660qfs2630_firmwaresdr865mdm9250_firmwareqdm5620_firmwareqca9888_firmwaresmb1358smr545qca6696_firmwareqln5020wcd9371smb1350qcn5154_firmwaremdm8215_firmwarepmm855au_firmwaresd_8cxwtr3950sa8150ppm6350qdm5621qtc800sqat3514_firmwareqca9992_firmwaresd660sd865_5g_firmwaresd712pm640p_firmwaresd660_firmwareqcn5121qcn5022_firmwareqcn7606_firmwareqat5516_firmwarepm6150lwcn6750_firmwarepm855l_firmwareqca6428_firmwareqtc410sipq4018_firmwarewcn3991qca9980_firmwareqpa8801ipq8078pm8150l_firmwareipq8173qat5533_firmwaresdx55m_firmwareqpa8673_firmwarepm6150smb1354_firmwaremsm8976_firmwareqca6574sd670_firmwareqfs2630qpa8842csr8811_firmwarepmm8996ausdr052_firmwarewcd9380qln4640qcs410qpm5579_firmwaresmb1380_firmwarepmk8350_firmwareqcn5024pm855p_firmwaresd690_5g_firmwaresmb1381qfe3100_firmwarepm7250qca9379_firmwarewtr4905qpa8803sdx24_firmwareqcn9012_firmwarepmd9645qdm2301ipq6018_firmwarewcd9340_firmwarewsa8815wcn6850qfe2101_firmwarepmp8074_firmwareqca6584_firmwareqdm2301_firmwareqdm5621_firmwareqpm6375sd_8c_firmwaremdm9215_firmwareipq6028ipq8064sd835pmp8074wcn3980_firmwaresd730qfe3320_firmwarepm660l_firmwarepm6250_firmwarepm8008pm8350b_firmwareqtm525_firmwarepme605_firmwareqcn5064_firmwarepme605ipq8078_firmwareqpm5621_firmwareqca6234qcn5054qln1021aq_firmwareqcs603rsw8577qpa6560_firmwareqca9994qpa8802_firmwareqln4640_firmwareqca9980qpm5621qcn9024_firmwareipq8174_firmwarepm8009_firmwareqpm6582qfs2580_firmwaresd670wcn6855qcn7605_firmwarepm8150lpmi8998_firmwareqcs610_firmwaresa6145ppm660a_firmwareqca9886_firmwarear8031qca1023_firmwareqpm5577wtr2965sdm630_firmwaresd820_firmwareqca6391_firmwarepmx20_firmwarepm8150qca4024wcd9370_firmwareqat3516_firmwaresdx55apq8053qcn5021_firmwarecsra6640qat3555_firmwarepmi8994qpa8803_firmwareqca9379pm855bqca6234_firmwareqln1031qcn7606smb2351qpm5870pm8909qfe1040wsa8830pm660qet6110_firmwareqpm6325pm6125_firmwareqbt1500qpa5581qfe1040_firmwarecsrb31024mdm9628_firmwareqfe2340_firmwaremdm9650sd_636pmx24_firmwareqbt1500_firmwareqpm5870_firmwarepmk8001qca9992qet6100pmm855aumdm9250qca6420_firmwareapq8009_firmwaresd690_5gsmb1396pm7150amdm9310_firmwaresd675_firmwareipq8072pm8350qca6564qpa4361_firmwarepm8350c_firmwareqpa5461_firmwareqca6426wcn3990_firmwareqca9984_firmwareqca9377qpm5641wcd9385_firmwareqdm5650_firmwareqpa4340_firmwaresdxr2_5g_firmwarewcd9326_firmwarewcn3615_firmwarewhs9410rgr7640au_firmwarewtr2955pm7250_firmwaresdr845_firmwareqdm5620qln1021aqipq8074asmb1380pmk8002_firmwareqsw6310_firmwaresa8155qca6584qdm4650_firmwareqcn5122_firmwarepmm6155au_firmwareqat5533qln1031_firmwareqcn6023_firmwaresdx55_firmwarewcn3615sm7250p_firmwarewcn3610_firmwareqsm7250_firmwareqpm6670pm7150l_firmwareqca6584auqpm4641qat5515_firmwareipq8174pm855qpm8830_firmwarepm8250qcn5052qca9367qfe2082fc_firmwaresdm630mdm9607_firmwaremdm9655_firmwareqdm4643qfs2530_firmwarewcn3988_firmwarepmx55qpm4641_firmwareqcn9074pm8150c_firmwareqca6421qdm3301qpa8842_firmwareqat3519_firmwaresa8195psdr735_firmwarepm8953qat5515qca6694qpm5677qat3514wcd9326wcd9335pm6350_firmwareqcn6023pm8004_firmwaresdr8150_firmwareqtc800h_firmwareqpm5620qpm4630qca6390qca9898_firmwaresd750g_firmwareaqt1000msm8976wcd9375sm6250_firmwarepmm8195auqln4642msm8994qpm5677_firmwareipq5010_firmwareipq8074a_firmwaresd888_5g_firmwaresdx20_firmwarepm8998smr525_firmwarewsa8815_firmwareqpm8820_firmwarewtr3925_firmwareapq8017qln1020_firmwareqpm6621_firmwarepm670a_firmwareqcm6125_firmwarepmx55_firmwarewtr2955_firmwareqbt1000_firmwaresd865_5gpm8019qca6595pm8150_firmwaresmb1398_firmwareqpm8830pmm8996au_firmwareqat5522pm8150cpmr735bsd665_firmwareqca9369_firmwareqpa4360pmk8003_firmwareqcn5154qca8075_firmwareqpa4361ipq6005_firmwaremdm9206qpm4640_firmwareqpm5577_firmwarewcn6855_firmwareqdm5679_firmwarepm8350csmr525qca9888qca6310_firmwareipq8070a_firmwarepm6150l_firmwarepmr525mdm9615pm8150a_firmwareqca6574_firmwareqca9886wtr3950_firmwareqln1036aq_firmwaresd665pm6150a_firmwarepm6150_firmwareqca6175asd765pmx20pmd9607qca6574a_firmwareqpm4630_firmwareqat3555sd850_firmwareapq8009qpa5461mdm9310qfe2082fcwtr2965_firmwarepm670_firmwarecsrb31024_firmwareqfs2608qcn9070_firmwareqln1036aqqtc801sipq6028_firmwareipq8072a_firmwaremdm9626_firmwareqpm5641_firmwareqca9889_firmwareqfe3320mdm9607qcn5122sd710pm8008_firmwareqln1035bd_firmwaresdx20m_firmwareqpm6621pmr735a_firmwarepmx50pm8018qcn5022qca6564_firmwaresdr8250sd768gqln1030_firmwaresmb1350_firmwarepm8004pm640lpmk8002qca8075apq8096au_firmwareqcn6024qcn9022sd845mdm9615_firmwaresdm830ipq6000_firmwaresmb1357qcs410_firmwareqca6175a_firmwareqpa5580pm8018_firmwareqpm5579qfe2550sa6150p_firmwareqcs610qcn5550pmi8996qpm5620_firmwareqdm2307qca6431_firmwareqpa8802wcd9360_firmwareqpm6585_firmwareqat3519qbt2000_firmwareqca4024_firmwarepm855a_firmwareipq8078aqtc800hsa8150p_firmwaresdr8250_firmwareqca6335qcn5064csra6620_firmwareqcs605_firmwareqln1020sd_675_firmwaresmr546_firmwareqdm5671csra6640_firmwarepmc1000hqpm4650_firmwarewtr3905qat3518sdr425_firmwaresmr526_firmwareipq8076amdm9628pm640a_firmwareqpa5460wgr7640_firmwareqdm2305_firmwareqpm5670_firmwaresd710_firmwareqca4020qca6428qdm5652qca6574au_firmwareqcn5164_firmwareipq8071qpm8870wcd9375_firmwareqpm5679qbt2000sa6155_firmwarewcd9360sdx20mqca6438_firmwarepmx50_firmwareqpa8675_firmwarewhs9410_firmwaresdr735gqpa5460_firmwarewcn3999qdm3301_firmwarepm8996qsm7250ipq4029_firmwareqcs6125ipq6010sd662_firmwaresmb1360qcs405qfe3440fcqdm2308_firmwarersw8577_firmwareqca4020_firmwareqca6436wcn6851sa6155pqcs603_firmwareqpa6560sdr675_firmwarewcd9341pmi8952qdm4643_firmwaremdm9655pm8937_firmwareqca6431qet4100_firmwaresd750gwcn3910_firmwareqpm5657wtr1605_firmwareqpm5875_firmwarewsa8830_firmwaresd855_firmwareqdm5650wcn3988qca6438wtr3925qfe2080fcsdr052sa8195p_firmwaresmb1390qca9898ipq4028qet4100wcn3610mdm9640qpa8686_firmwareipq5018_firmwareqpm6585qca8337_firmwarewcd9380_firmwaresmb1355ipq8072aqln4650qtc800t_firmwaremsm8996au_firmwaresdr735g_firmwarewcd9330wgr7640qat5568csr6030ipq8076a_firmwareqdm5671_firmwareqca6564auqet5100qpa8801_firmwareqtm527_firmwarewcn6856_firmwarepm8005_firmwareqcn5164qet4101_firmwarepm7250bqln4642_firmwarepmk8001_firmwaresmb1355_firmwarepm7250b_firmwarepmd9655_firmwaresmb1351_firmwareqcn5054_firmwarepm8996_firmwareqet4200aq_firmwaresdx50m_firmwaresdr735smb1395smb358spm660lsmb358s_firmwarear8151smr526qca8072_firmwarewtr5975qca6430_firmwarepmk8003qcn5052_firmwareqtc801s_firmwareqat3522_firmwarewcd9335_firmwarewcn3980qca6335_firmwareqsw8573qcs605qbt1000sd7cqca6320wcn3910mdm9650_firmwareqca6426_firmwarepm8350_firmwarewcn3660b_firmwareqca9984qcn9024pm8009qpa8675qcn5550_firmwaresdr051_firmwaresdx55mwcd9330_firmwareipq8064_firmwarepm670aqca6421_firmwarewtr3905_firmwareqat3518_firmwareqsw8574pmi8998sd821_firmwarear8031_firmwarepm855lwcn6851_firmwareqdm5670_firmwareipq8070pm7150a_firmwarepm8150b_firmwaresd_636_firmwarepmc1000h_firmwareqca6564a_firmwareqdm2310_firmwaresmr545_firmwarepmd9645_firmwareqcn5121_firmwarepm670sd210_firmwareqdm5677pm8005ipq6018pm855_firmwareqdm2302pmm6155ausdxr1pm855b_firmwareapq8096auqca6595_firmwareqcs405_firmwareqpm6582_firmwareqpm6375_firmwarepm640l_firmwarepmi8996_firmwareqln4650_firmwareqpm5875qet5100msa8155psd675wtr4605qet4101pm8952qat3516pm670lqpm5658ar8035_firmwareqpm5658_firmwareqcn5024_firmwarewcn3991_firmwareqdm5652_firmwarepmm8155au_firmwareqfe4465fcqcn9070sdr051qln5030pm4125pmi632qpa2625_firmwarepm456sd7c_firmwareqfe2081fc_firmwarepm8350bh_firmwarecsra6620pmr735b_firmwareqet5100_firmwareqpm4621smb1360_firmwareqcn9072qet6100_firmwarepm670l_firmwaresdr660gqfe2340sd765g_firmwareqpa8686smb1358_firmwareipq8069_firmwareqca6390_firmwareipq6000sd730_firmwarewcd9370qcn5152_firmwareqca0000_firmwaresdr425pmr525_firmwareqca6584au_firmwareapq8076_firmwareqcn9000_firmwareipq5018qca9369ar8151_firmwarepmi632_firmwaresd_8cx_firmwareqcn7605qpm5541qat5516sd662qpa8821_firmwareqcn5124_firmwaresdr660g_firmwarepm8350bhpm3003aqca6320_firmwarewcn3680b_firmwareqca6595auwcn3999_firmwareqca6436_firmwareqtc800tsmb1354ipq5010qca6564au_firmwareqdm2305sa6155p_firmwareqca6310qpm8820pm8937qpm2630qfe2081fcqln5020_firmwaresa515m_firmwareqca9990sdxr2_5gsmb1398sd821msm8994_firmwaresa6145p_firmwaresdr675sm6250sd712_firmwareapq8017_firmwarewsa8810_firmwaresmb231sd765_firmwareqdm5677_firmwareqca8081qet4200aqipq8071aqca6174a_firmwareipq8071a_firmwarewcd9385qpm6325_firmwareqdm2302_firmwareqat3550_firmwarepmm8155auqln5040_firmwarepm4125_firmwarear8035csr8811pm8019_firmwareqpa8673qca6694_firmwareqdm2310qfe2550_firmwareqcn9100_firmwareqln5030_firmwarepm8952_firmwaresd210sd820smb1396_firmwarewcn6850_firmwarewsa8835_firmwarecsr6030_firmwareqca6564apmx24smr546qet6110pmi8952_firmwareqca8072qln5040qpm8895sdr845qpm5670wcn3990qcn9000sd_675qtm527qfe3440fc_firmwarear9380_firmwarepmk8350sdx24qcn9012pmi8994_firmwarepm8350bqdm2307_firmwarewsa8835msm8996auqpm5657_firmwaresd888_5gsm6250prgr7640auqln1035bdpm855asdr660_firmwarepm8909_firmwareipq4018qca6574apm8916_firmwareqca9889qca6174asmb1390_firmwareipq8074qca9994_firmwareqpm4640wcn6750pm8956_firmwareqet5100m_firmwareipq8076_firmwareqpm4650qtm525sa515mwtr6955sd855sm4125_firmwareipq8076wtr6955_firmwarepm640pqcn5021ipq8069qcn5152sd768g_firmwaresdr865_firmwareqfe4465fc_firmwarepm8250_firmwaresd460qca6391sdxr1_firmwaresmb1351smb1357_firmwareipq6005aqt1000_firmwareqcn9100qpm8895_firmwaremdm9626pm660aqpa4340sdx50mpm640asdr8150sdx20pm8916smb1395_firmwareqdm4650mdm9215sd_455pmd9655ipq8074_firmwareqca6574ausa8155p_firmwareqsw6310wcd9341_firmwareqcm6125wsa8810qtc410s_firmwareqpm2630_firmwaresmb231_firmwareqat5568_firmwareqdm2308qat3550wtr4905_firmwarewcn6856qdm5679sd_8cwcn3680bsd835_firmwareipq6010_firmwarepm3003a_firmwareqca6696qtc800s_firmwaresmb1381_firmwaresd845_firmwareqpa2625sa6150pqcn9022_firmwareqpa8688_firmwareqca9990_firmwareipq8070apmm8195au_firmwareqcn9072_firmwaresm7250psd720g_firmwareipq8071_firmwareqcn9074_firmwareqpm4621_firmwareipq4029pm8956sd850pm6250Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-20
Improper Input Validation
CVE-2020-11268
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.26% / 49.08%
||
7 Day CHG~0.00%
Published-07 May, 2021 | 09:10
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Potential UE reset while decoding a crafted Sib1 or SIB1 that schedules unsupported SIBs and can lead to denial of service in Snapdragon Auto, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qfe3100pm8909qfe1040qfe2550wcd9330wgr7640qfe1550qfe1045pm8994mdm9645qfe1035qfe2340msm8974mdm8215qfe2330qca6174awtr4905mdm9609qfe2320msm8108qca6174mdm9635mpmd9645mdm9615wtr2605wtr1605msm8929wtr2955msm8939wcn3660bqfe3335mdm9640apq8094wcn3680mdm8215mqca6584msm8209qca1990apq8009pm8941msm8974pmdm9310pm8841wcd9306msm8208wtr1625lqfe2520msm8274qfe1520apq8074pm8916apq8084pmd9635mdm9215qfe2101mdm9615msmb1360wtr1625qfe3320msm8216qfe1100wcn3660awtr1605lqfe3345pm8018msm8674wcn3680bmdm8615mqfe1101wfr1620apq8016qfe3340qfe2720wtr4605msm8994sd210qfe2310wtr3925pmi8994wcn3620msm8916wcn3660ar6003mdm9235mwcn3610msm8608Snapdragon Auto, Snapdragon Mobile
CWE ID-CWE-20
Improper Input Validation
CVE-2019-14010
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.24% / 47.69%
||
7 Day CHG~0.00%
Published-21 Jan, 2020 | 06:30
Updated-05 Aug, 2024 | 00:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The device may enter into error state when some tool or application gets failure at 1st buffer map all and performs 2nd buffer map which happens to be at same physical address in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in MDM9607, Nicobar, Rennell, SA6155P, SDM660, SDX55, SM6150, SM7150, SM8150, SM8250, SXR2130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa6155p_firmwaresm8150_firmwaresxr2130_firmwarerennellrennell_firmwaresdm660sm8250_firmwaremdm9607_firmwaresdx55sm7150_firmwaresm6150_firmwaresm8250sm6150mdm9607sm8150sdx55_firmwaresm7150nicobar_firmwaresa6155psxr2130sdm660_firmwarenicobarSnapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music
CWE ID-CWE-20
Improper Input Validation
CVE-2022-40502
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.09% / 26.77%
||
7 Day CHG~0.00%
Published-09 Feb, 2023 | 06:58
Updated-03 Aug, 2024 | 12:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper input validation in WLAN Host

Transient DOS due to improper input validation in WLAN Host.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcn5024_firmwarewsa8830qcn9070sxr2230p_firmwareqcs610ipq8173_firmwareqcn5124qca4024_firmwareqcn9072wcn3950_firmwareipq8078aipq5028_firmwareqca6595au_firmwareipq6000wcd9370ssg2115pqcn5152_firmwareqca6584au_firmwareqcn9000_firmwareipq5018qca6554a_firmwarewcd9385_firmwareqam8295pwcn3950ipq8076aqcn6024_firmwaresd_8_gen1_5g_firmwareipq8074aqcn5124_firmwareqam8295p_firmwareqcn6100_firmwareqcn6102_firmwarewcn7850qca6574au_firmwareqcn5122_firmwareqcn5164_firmwareqca6595auqca8081_firmwareqcn6023_firmwarewcd9375_firmwareqcn9002ipq5010qca6564au_firmwareqca6584ausa6155p_firmwaresd680_firmwareipq8078a_firmwareqcn9274ipq8174qcn9001wcn7851ipq5028qca6698aqqcn5052ipq6010qcn6112_firmwarewcn3988_firmwareqcn9074sa8195pqcn6132wsa8810_firmwaresd680sa6155psg4150pqca8081wcn7851_firmwareqca6698aq_firmwareipq8071aqcn6023ipq8071a_firmwarewcd9385qca9888_firmwareqcn6122wcd9341qca6696_firmwareipq9008_firmwareqcn5154_firmwarecsr8811wcd9375qcn9100_firmwarewsa8830_firmwareipq5010_firmwareipq8074a_firmwarewcn3988wsa8815_firmwarewcn7850_firmwarewsa8835_firmwaresa8195p_firmwaresm8475qcn5022_firmwaresa8295p_firmwaresa4150psg4150p_firmwareqca8072ipq5018_firmwarewcd9380_firmwaressg2125pqcn9000ipq8072aqca6554aipq8076a_firmwareqca6595ipq8078qca6564auqcn9001_firmwareipq8173wcn6856_firmwareipq9008qcn5164qcn6122_firmwareqca6574sxr1230p_firmwarewsa8835csr8811_firmwarewcd9380qcn5054_firmwareqcs410qcn5154qca8075_firmwaressg2125p_firmwareqca6574aqcn5024wcn6855_firmwareqca9889qcn6132_firmwareqcn9003_firmwaresxr1230pqca9888qca8072_firmwarewcn3980qcn5052_firmwareqcn9274_firmwareqcn9003ipq8070a_firmwareipq6018_firmwareipq8076_firmwareqca6574_firmwarewsa8815qcn6112sxr2230pipq8076qca6574a_firmwareqcn5152ipq6028qcn9024ipq9574_firmwarewcn3980_firmwaresa8295pwcn6740_firmwareqcn6102qcn9100ipq8078_firmwarewsa8832_firmwareqcn5054qcn9070_firmwareipq6028_firmwareipq8072a_firmwareqca6574auqca9889_firmwaresa8155p_firmwareipq9574qcn5122qcn9024_firmwareipq8174_firmwarewcd9341_firmwarewsa8810wsa8832wcn6855qcs610_firmwarewcn6856ipq6018qcn5022ipq6010_firmwareqca6595_firmwarewcn6740qca6696sa4150p_firmwareqca4024wcd9370_firmwareqca8075qcn9022_firmwaresa8155pqcn6024qcn9022ipq8070aqcn9002_firmwareqcn6100qcn9072_firmwareipq6000_firmwaressg2115p_firmwareqcn9074_firmwareqcs410_firmwareSnapdragonqcn5024_firmwareipq5018_firmwarewcd9380_firmwaresxr2230p_firmwareipq8076a_firmwareipq8173_firmwareqcn9001_firmwarewcn6856_firmwareqca4024_firmwareqcn6122_firmwaresxr1230p_firmwarewcn3950_firmwarecsr8811_firmwareipq5028_firmwareqca6595au_firmwareqcn5054_firmwareqca8075_firmwaressg2125p_firmwarewcn6855_firmwareqcn5152_firmwareqcn6132_firmwareqcn9003_firmwareqca6584au_firmwareqca8072_firmwareqcn9000_firmwareqcn5052_firmwareqcn9274_firmwareipq8070a_firmwareqca6554a_firmwarewcd9385_firmwareqcn6024_firmwareipq8076_firmwareipq6018_firmwareqca6574_firmwaresd_8_gen1_5g_firmwareqcn5124_firmwareqam8295p_firmwareqcn6100_firmwareqcn6102_firmwareqca6574a_firmwareqca6574au_firmwareqcn5122_firmwareqcn5164_firmwarewcd9375_firmwareqca8081_firmwareqcn6023_firmwareipq9574_firmwarewcn3980_firmwarewcn6740_firmwareqca6564au_firmwaresd680_firmwaresa6155p_firmwareipq8078a_firmwareipq8078_firmwarewsa8832_firmwareqcn9070_firmwareipq6028_firmwareipq8072a_firmwareqcn6112_firmwarewcn3988_firmwareqca9889_firmwaresa8155p_firmwareqcn9024_firmwareipq8174_firmwarewsa8810_firmwarewcd9341_firmwareqcs610_firmwarewcn7851_firmwareqca6698aq_firmwareipq8071a_firmwareqca9888_firmwareipq6010_firmwareqca6696_firmwareqca6595_firmwareipq9008_firmwareqcn5154_firmwaresa4150p_firmwarewcd9370_firmwareqcn9100_firmwareqcn9022_firmwarewsa8830_firmwareqcn9002_firmwareipq5010_firmwareipq8074a_firmwarewsa8815_firmwarewsa8835_firmwarewcn7850_firmwareqcn9072_firmwareipq6000_firmwaresa8195p_firmwaressg2115p_firmwareqcn9074_firmwareqcs410_firmwareqcn5022_firmwaresa8295p_firmwaresg4150p_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2021-30310
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.28% / 51.02%
||
7 Day CHG~0.00%
Published-20 Oct, 2021 | 06:31
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible buffer overflow due to Improper validation of received CF-ACK and CF-Poll data frames in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarewcn3991_firmwarewsa8830sm7250mdm9640_firmwaresa6150p_firmwaresa8145p_firmwareqcs2290_firmwaresm7250_firmwarecsrb31024mdm9628_firmwarewcd9360_firmwaremdm9650wcn3950_firmwaremdm9250sa8150p_firmwareqcs2290qca6595au_firmwaresd765g_firmwaresa6155apq8009_firmwaresd690_5gwcd9370qca6564qca6584au_firmwarewcn3990_firmwareqca9369qca9377qca4531wcn3998wcd9385_firmwarewcn3950wcd9326_firmwaremdm9628wcn3615_firmwaremdm9206_firmwarewcn3660bqca4020sa8155qca6320_firmwareqca6574au_firmwaresdx55_firmwarewcn3680b_firmwareqca6595ausa6155_firmwarewcd9375_firmwarewcn3615wcn3998_firmwarewcn3610_firmwarewcd9360apq8053_firmwaresdx20mqca6564au_firmwareqca6584ausa6155p_firmwareqca6310qca9367_firmwaresa515m_firmwareqca9367sa8155_firmwaresd821mdm9607_firmwaremdm9655_firmwarewcn3988_firmwaresa6145p_firmwarewcd9340sa8195papq8017_firmwarewsa8810_firmwaresd765gsd765_firmwareqca4020_firmwarewcd9326wcd9335sa6155pqca6174a_firmwaremdm9250_firmwarewcd9385wcd9341mdm9655qca6696_firmwaresd750gwcn3910_firmwarewcd9375sd750g_firmwaresa8150pwsa8830_firmwaresd210sd820sdx20_firmwarewcn3988wsa8815_firmwarewsa8835_firmwaresa8195p_firmwareapq8017qca6564awcn3610mdm9640qcm2290_firmwarewcn3991wcd9380_firmwareqca4531_firmwarewcn3990wcd9330msm8996au_firmwareqca6595qca6564ausdx24wsa8835qca6574msm8996auwcd9380qca9369_firmwareqca6574asd690_5g_firmwaremdm9206qca9379_firmwareqca6174asdx24_firmwareqca6310_firmwarewcd9335_firmwaresa515mqca6574_firmwareqca9886wcd9340_firmwarewsa8815wcn3910qca6320mdm9650_firmwareqca6175asd765wcn3660b_firmwareqca6574a_firmwaresd768g_firmwareapq8009wcd9330_firmwaresd821_firmwaremdm9626csrb31024_firmwaresdx20sd480_firmwaremdm9626_firmwareqca6574ausa8155p_firmwaremdm9607qca6564a_firmwarewcd9341_firmwaresdx20m_firmwaresd480wsa8810sd210_firmwaresa6145pwcn3680bqca9886_firmwareqca6564_firmwaresd768gapq8096auqca6595_firmwaresa8145pqca6696sd820_firmwaresd845_firmwarewcd9370_firmwaresa6150psdx55apq8053apq8096au_firmwaresa8155psd845qca9379qca6175a_firmwareqcm2290Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music
CWE ID-CWE-20
Improper Input Validation
CVE-2025-21477
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.12% / 31.42%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 07:25
Updated-20 Aug, 2025 | 19:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in Modem

Transient DOS while processing CCCH data when NW sends data with invalid length.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_778g_5g_mobile_platform_firmwaresm8635p_firmwaresm7325p_firmwarewsa8810_firmwareqcm5430_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwaresdx57mfastconnect_6700wcd9395wsa8845h_firmwareqca6696sdx55_firmwaresnapdragon_auto_5g_modem-rfsm8550pqcc710qca6391snapdragon_865_5g_mobile_platform_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)wsa8835_firmwaresnapdragon_x55_5g_modem-rf_system_firmwareqca6698aq_firmwaresnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)snapdragon_8_gen_2_mobile_platform_firmwareqcm6490_firmwareqcn6024snapdragon_auto_5g_modem-rf_firmwaresnapdragon_8_gen_3_mobile_platformsnapdragon_x62_5g_modem-rf_system_firmwarewsa8840_firmwaresnapdragon_x72_5g_modem-rf_system_firmwareqcs6490qca6574a_firmwaresnapdragon_695_5g_mobile_platformqcc710_firmwareqfw7124sg8275psnapdragon_865_5g_mobile_platformsg8275p_firmwarewcd9370snapdragon_690_5g_mobile_platform_firmwaresnapdragon_780g_5g_mobile_platform_firmwareqca8337sm8550p_firmwaresnapdragon_8\+_gen_2_mobile_platformqcm5430snapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)_firmwarewcd9380snapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmwarefastconnect_6800_firmwarewsa8815_firmwarefastconnect_6900_firmwaresnapdragon_8_gen_1_mobile_platform_firmwarewsa8845_firmwareqca6391_firmwarewcd9375snapdragon_780g_5g_mobile_platformsnapdragon_782g_mobile_platform_\(sm7325-af\)qcs5430_firmwaresm7675_firmwaresnapdragon_480_5g_mobile_platformqcn6274_firmwaresm7675psnapdragon_870_5g_mobile_platform_\(sm8250-ac\)_firmwaresnapdragon_x65_5g_modem-rf_systemsnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)_firmwaresnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmwaresdx57m_firmwarewcn3988315_5g_iot_modem_firmwaresnapdragon_8_gen_1_mobile_platformsnapdragon_x65_5g_modem-rf_system_firmwaresnapdragon_x75_5g_modem-rf_systemqca6584au_firmwareqcm6490snapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)wcd9360sdx55sm7675sm7675p_firmwareqca6584ausm8635_firmwaresnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)snapdragon_8\+_gen_1_mobile_platform_firmwarear8035snapdragon_765_5g_mobile_platform_\(sm7250-aa\)_firmwarewcd9380_firmwarefastconnect_6200_firmwaresnapdragon_8\+_gen_1_mobile_platformwcd9395_firmwarefastconnect_6200qca6574awcn6740_firmwarewsa8830_firmwarewcd9375_firmwaresnapdragon_4_gen_1_mobile_platformar8035_firmwareqcs8550wsa8832_firmwareqcs8550_firmwareqcs5430wsa8835315_5g_iot_modemwsa8840wsa8845fastconnect_7800snapdragon_8_gen_3_mobile_platform_firmwareqca8081_firmwareqca8337_firmwarewsa8830sm7325pwsa8832fastconnect_6800wcn3988_firmwaresm7250psnapdragon_8_gen_2_mobile_platformqcn6224snapdragon_768g_5g_mobile_platform_\(sm7250-ac\)_firmwarewcd9385snapdragon_auto_5g_modem-rf_gen_2qca6595au_firmwareqca6696_firmwaresnapdragon_480_5g_mobile_platform_firmwaresnapdragon_x70_modem-rf_systemsnapdragon_x72_5g_modem-rf_systemwcd9385_firmwarevideo_collaboration_vc3_platform_firmwaresnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)sm7250p_firmwarewcn6740snapdragon_x70_modem-rf_system_firmwarewcd9370_firmwarewsa8815sm8635snapdragon_888_5g_mobile_platformwcn6755fastconnect_6700_firmwareqca6595ausnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)_firmwarewsa8845hwcd9390_firmwarewcd9341wsa8810snapdragon_888_5g_mobile_platform_firmwaresnapdragon_870_5g_mobile_platform_\(sm8250-ac\)snapdragon_x75_5g_modem-rf_system_firmwareqcn6274qfw7114snapdragon_695_5g_mobile_platform_firmwaresnapdragon_690_5g_mobile_platformsnapdragon_7c\+_gen_3_compute_firmwareqfw7114_firmwarewcd9340wcd9390wcd9360_firmwarevideo_collaboration_vc3_platformsnapdragon_auto_5g_modem-rf_gen_2_firmwarefastconnect_7800_firmwaresnapdragon_4_gen_1_mobile_platform_firmwareqca8081wcd9340_firmwareqcn6024_firmwarefastconnect_6900qcn9024_firmwaresnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)snapdragon_x62_5g_modem-rf_systemsnapdragon_782g_mobile_platform_\(sm7325-af\)_firmwareqcn9024wcd9341_firmwaresnapdragon_765_5g_mobile_platform_\(sm7250-aa\)sm8635pqca6698aqqcs6490_firmwaresnapdragon_x55_5g_modem-rf_systemqfw7124_firmwaresnapdragon_778g_5g_mobile_platformwcn6755_firmwareqcn6224_firmwaresnapdragon_7c\+_gen_3_computeSnapdragon
CWE ID-CWE-20
Improper Input Validation
CVE-2024-21453
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.12% / 32.38%
||
7 Day CHG~0.00%
Published-01 Apr, 2024 | 15:06
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in Automotive Telematics

Transient DOS while decoding message of size that exceeds the available system memory.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9370_firmwarevideo_collaboration_vc1_platformqcs410_firmwarec-v2x_9150_firmwaresnapdragon_auto_4g_modem_firmwaresnapdragon_auto_5g_modem-rfwcn3950_firmwaresnapdragon_auto_4g_modemqcs610_firmwarewcd9370qcs410wsa8815video_collaboration_vc1_platform_firmwarec-v2x_9150wcd9341wcd9341_firmwarewcn3950wsa8810_firmwarevideo_collaboration_vc3_platform_firmwaresnapdragon_auto_5g_modem-rf_firmwarewsa8810wcn3980_firmwarewcn3980video_collaboration_vc3_platformwsa8815_firmwareqcs610Snapdragonc-v2x_9150wcd9341qcs610snapdragon_auto_4g_modemvideo_collaboration_vc3wcn3980snapdragon_auto_5g_modem-rfwsa8810video_collaboration_vc1wcn3950qcs410wcd9370wsa8815
CWE ID-CWE-20
Improper Input Validation
CVE-2024-21452
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.3||HIGH
EPSS-0.07% / 22.54%
||
7 Day CHG~0.00%
Published-01 Apr, 2024 | 15:06
Updated-13 Jan, 2025 | 21:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in Automotive Telematics

Transient DOS while decoding an ASN.1 OER message containing a SEQUENCE of unknown extensions.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_auto_4g_modem_firmwarec-v2x_9150_firmwaresnapdragon_auto_4g_modemqca6584au_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqca6698aq_firmwareqca6698aqsnapdragon_auto_5g_modem-rf_gen_2snapdragon_auto_5g_modem-rfqca6584auc-v2x_9150snapdragon_auto_5g_modem-rf_firmwareSnapdragonsnapdragon_auto_5g_modem-rf_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqca6584au_firmwarec-v2x_9150_firmwaresnapdragon_auto_4g_modem_firmwareqca6698aq_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2022-34146
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.15% / 36.67%
||
7 Day CHG~0.00%
Published-09 Feb, 2023 | 06:58
Updated-03 Aug, 2024 | 08:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper input validation in WLAN Host

Transient DOS due to improper input validation in WLAN Host while parsing frame during defragmentation.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcn5024_firmwarewsa8830qcn9070sxr2230p_firmwareqcs610ipq8173_firmwareqcn5124qca4024_firmwareqcn9072wcn3950_firmwareipq8078aipq5028_firmwareqca6595au_firmwareipq6000wcd9370ssg2115pqcn5152_firmwareqca6584au_firmwareqcn9000_firmwareipq5018qca6554a_firmwarewcd9385_firmwareqam8295pwcn3950ipq8076aqcn6024_firmwaresd_8_gen1_5g_firmwareipq8074aqcn5124_firmwareqam8295p_firmwareqcn6100_firmwareqcn6102_firmwarewcn7850qca6574au_firmwareqcn5122_firmwareqcn5164_firmwareqca6595auqca8081_firmwareqcn6023_firmwarewcd9375_firmwareqcn9002ipq5010qca6564au_firmwareqca6584ausa6155p_firmwaresd680_firmwareipq8078a_firmwareqcn9274ipq8174qcn9001wcn7851ipq5028qca6698aqqcn5052ipq6010qcn6112_firmwarewcn3988_firmwareqcn9074sa8195pqcn6132wsa8810_firmwaresd680sa6155psg4150pqca8081wcn7851_firmwareqca6698aq_firmwareipq8071aqcn6023ipq8071a_firmwarewcd9385qca9888_firmwareqcn6122wcd9341qca6696_firmwareipq9008_firmwareqcn5154_firmwarecsr8811wcd9375qcn9100_firmwarewsa8830_firmwareipq5010_firmwareipq8074a_firmwarewcn3988wsa8815_firmwarewcn7850_firmwarewsa8835_firmwaresa8195p_firmwaresm8475qcn5022_firmwaresa8295p_firmwaresa4150psg4150p_firmwareqcm4325qca8072ipq5018_firmwarewcd9380_firmwaressg2125pqcn9000ipq8072aqca6554aipq8076a_firmwareqca6595ipq8078qca6564auqcn9001_firmwareipq8173wcn6856_firmwareipq9008qcn5164qcn6122_firmwareqca6574sxr1230p_firmwarewsa8835csr8811_firmwarewcd9380qcn5054_firmwareqcs410qcn5154qca8075_firmwaressg2125p_firmwareqca6574aqcn5024wcn6855_firmwareqca9889qcn6132_firmwareqcn9003_firmwaresxr1230pqca9888qca8072_firmwarewcn3980qcn5052_firmwareqcn9274_firmwareqcn9003ipq8070a_firmwareipq6018_firmwareipq8076_firmwareqcm4325_firmwareqca6574_firmwarewsa8815qcn6112sxr2230pipq8076qca6574a_firmwareqcn5152ipq6028qcn9024ipq9574_firmwarewcn3980_firmwaresa8295pwcn6740_firmwareqcn6102qcn9100ipq8078_firmwarewsa8832_firmwareqcn5054qcn9070_firmwareipq6028_firmwareipq8072a_firmwareqca6574auqca9889_firmwaresa8155p_firmwareipq9574qcn5122qcn9024_firmwareipq8174_firmwarewcd9341_firmwarewsa8810wsa8832wcn6855qcs610_firmwarewcn6856ipq6018qcn5022ipq6010_firmwareqca6595_firmwarewcn6740qca6696sa4150p_firmwareqca4024wcd9370_firmwareqca8075qcn9022_firmwaresa8155pqcn6024qcn9022ipq8070aqcn9002_firmwareqcn6100qcn9072_firmwareipq6000_firmwaressg2115p_firmwareqcn9074_firmwareqcs410_firmwareSnapdragonqcn5024_firmwareipq5018_firmwarewcd9380_firmwaresxr2230p_firmwareipq8076a_firmwareipq8173_firmwareqcn9001_firmwarewcn6856_firmwareqca4024_firmwareqcn6122_firmwaresxr1230p_firmwarewcn3950_firmwarecsr8811_firmwareipq5028_firmwareqca6595au_firmwareqcn5054_firmwareqca8075_firmwaressg2125p_firmwarewcn6855_firmwareqcn5152_firmwareqcn6132_firmwareqcn9003_firmwareqca6584au_firmwareqca8072_firmwareqcn9000_firmwareqcn5052_firmwareqcn9274_firmwareipq8070a_firmwareqca6554a_firmwarewcd9385_firmwareqcn6024_firmwareipq8076_firmwareipq6018_firmwareqcm4325_firmwareqca6574_firmwaresd_8_gen1_5g_firmwareqcn5124_firmwareqam8295p_firmwareqcn6100_firmwareqcn6102_firmwareqca6574a_firmwareqca6574au_firmwareqcn5122_firmwareqcn5164_firmwarewcd9375_firmwareqca8081_firmwareqcn6023_firmwareipq9574_firmwarewcn3980_firmwarewcn6740_firmwareqca6564au_firmwaresd680_firmwaresa6155p_firmwareipq8078a_firmwareipq8078_firmwarewsa8832_firmwareqcn9070_firmwareipq6028_firmwareipq8072a_firmwareqcn6112_firmwarewcn3988_firmwareqca9889_firmwaresa8155p_firmwareqcn9024_firmwareipq8174_firmwarewsa8810_firmwarewcd9341_firmwareqcs610_firmwarewcn7851_firmwareqca6698aq_firmwareipq8071a_firmwareqca9888_firmwareipq6010_firmwareqca6696_firmwareqca6595_firmwareipq9008_firmwareqcn5154_firmwaresa4150p_firmwarewcd9370_firmwareqcn9100_firmwareqcn9022_firmwarewsa8830_firmwareqcn9002_firmwareipq5010_firmwareipq8074a_firmwarewsa8815_firmwarewsa8835_firmwarewcn7850_firmwareqcn9072_firmwareipq6000_firmwaresa8195p_firmwaressg2115p_firmwareqcn9074_firmwareqcs410_firmwareqcn5022_firmwaresa8295p_firmwaresg4150p_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2021-1914
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.26% / 49.08%
||
7 Day CHG~0.00%
Published-08 Sep, 2021 | 11:25
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Loop with unreachable exit condition may occur due to improper handling of unsupported input in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresm7250mdm9640_firmwaresm6250p_firmwareqcs610qca6431_firmwarewcd9360_firmwarewcn3950_firmwareqca6595au_firmwareqca6335msm8917sd_455_firmwareqcs605_firmwaresd_675_firmwareqcs6125_firmwaresd632msm8108sa415mwcn3998wcd9371_firmwaremsm8108_firmwarewcn3950sd720gmdm9628mdm9206_firmwareqsw8573_firmwarewcn3660bsd450_firmwareqca6574au_firmwarewcd9375_firmwarewcn3998_firmwaresdx12_firmwaremsm8909wapq8009w_firmwareqca6420apq8053_firmwarewcd9360qca9367_firmwarewhs9410_firmwaremdm8207qcs6125sa8155_firmwareqca4004_firmwareqca6430wcd9306_firmwarewcd9340sd765gqualcomm215_firmwareqca6436wcn6851qcs603_firmwaremsm8937msm8209_firmwaremdm9250_firmwarewcn3660_firmwareqca6431qca6696_firmwarewcd9371sd870_firmwaresd750gwcn3910_firmwaresd_8cxmdm9207_firmwareqca4004wsa8830_firmwaresd855_firmwaresd865_5g_firmwaresd712wcn3988msm8208_firmwarewcn6750_firmwaresd450wcn3610msm8608mdm9640wcn3991sda429w_firmwarewcd9380_firmwaresdm429wwcd9330msm8996au_firmwarecsr6030qca6564ausdx55m_firmwarewcn6856_firmwaremsm8940_firmwaremsm8976_firmwareqca6574sd632_firmwaresd670_firmwarewcd9380qualcomm215qcs410sd690_5g_firmwaresdx50m_firmwareqca9379_firmwaresdx24_firmwareqca6430_firmwaresd439_firmwareqca6335_firmwareqsw8573qcs605wcd9340_firmwarewsa8815wcn6850wcn3910qca6320qca6584_firmwaremsm8937_firmwaremdm9650_firmwaresd_8c_firmwareqca6426_firmwarewcn3660b_firmwarewcn3680sd835sd730wcd9330_firmwaresdx55mqca6421_firmwaremsm8953sd821_firmwaresd678_firmwarewcn3680_firmwarewcn6851_firmwareqcs603sd670sd_636_firmwareqca6564a_firmwareapq8009wqca6694au_firmwaremsm8976sg_firmwareqcm4290_firmwaresd480sd870wcn6855sd210_firmwareqcs610_firmwaresdxr1apq8096aumdm8207_firmwaresdm630_firmwaremdm9205_firmwareqca6391_firmwaresd820_firmwarewcd9370_firmwaresdx55apq8053sa8155psd675sd439wcn3660qca9379wcn3991_firmwaremdm9150_firmwarewsa8830sd678sm7250_firmwarecsrb31024mdm9628_firmwaremdm9650sd_636qcs4290mdm9250sd765g_firmwareqca6420_firmwareqca6390_firmwareapq8009_firmwaresd690_5gsd730_firmwarewcd9370sd675_firmwareqca6426qca6584au_firmwareqca9377sdw2500_firmwaresd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewhs9410wcn3615_firmwareapq8037sa8155qca6320_firmwareqca6584wcn3680b_firmwaresdx55_firmwarewcn3615qca6595auwcn3610_firmwareqca6436_firmwaremdm9207wcd9306qca6584ausd778gqca6564au_firmwaremsm8208qca6310sa515m_firmwaresd429sdxr2_5gqca9367sdm630mdm9607_firmwaresd821msm8976sgsa415m_firmwarewcn3988_firmwaresd205sd429_firmwareqca6421sd778g_firmwaresm6250sd712_firmwareapq8017_firmwarewsa8810_firmwareqca6694sd765_firmwareqca6174a_firmwareqcs4290_firmwarewcd9385qca6390wcd9375sd750g_firmwareaqt1000msm8976qca6694_firmwaresm6250_firmwaremsm8953_firmwareqca6694ausda429wmsm8917_firmwaresd210wcn3620_firmwaresdx20_firmwarewsa8815_firmwaresd888_5g_firmwaresd820wcn6850_firmwarewsa8835_firmwarewcn3620apq8017qcx315csr6030_firmwareqca6564aqcm6125_firmwaresd_675sd865_5gsdx24msm8909w_firmwareqcx315_firmwarewsa8835msm8996ausdm429w_firmwaresd665_firmwaresd888_5gsm6250psc8180xqca6574amdm9206wcn6855_firmwareqca6174aqca6310_firmwarewcn6750mdm9205sa515mqca6574_firmwaresd855sd665sd765qca6574a_firmwaresd768g_firmwaremsm8209sd850_firmwareapq8009qca6391sdxr1_firmwareaqt1000_firmwaremsm8920qcm4290csrb31024_firmwaresdx50msdx20sd480_firmwaremsm8920_firmwaresd_455sc8180x_firmwareqca6574ausa8155p_firmwaremdm9607sd205_firmwareqcm6125wsa8810mdm9150wcn6856sd_8cwcn3680bsd835_firmwaresd768gqca6696sd845_firmwaremsm8608_firmwaresdw2500msm8940apq8096au_firmwaresd845apq8037_firmwaresd720g_firmwaresdx12qcs410_firmwaresd850Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CVE-2022-33286
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.12% / 32.22%
||
7 Day CHG~0.00%
Published-06 Jan, 2023 | 05:02
Updated-09 Apr, 2025 | 14:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer over-read in WLAN

Transient DOS due to buffer over-read in WLAN while processing 802.11 management frames.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaremdm9640_firmwaresm6250p_firmwareipq4028_firmwareqca1023qca8337ar9380ipq8173_firmwareqcn5124mdm9645wcn3950_firmwareqca6595au_firmwaresa6155mdm8215sd_455_firmwareapq8076qcs6125_firmwaresa415msm4375wcn3998wcd9371_firmwarewcn3950qcn6024_firmwaresd720gsm4125mdm9206_firmwarewcn3660bqsm8350_firmwareqsm8350sd460_firmwaresm7315_firmwarewcn7850qca8081_firmwarewcn3998_firmwareqca6420qcn9002qca9986ipq8070_firmwareqca9367_firmwareipq8065ipq8078a_firmwaresd_8cx_gen2ipq8072_firmwareqca0000sa8155_firmwareipq8068qca6430wcd9340sd765gsd680wcn7851_firmwaremdm9250_firmwareqca9888_firmwareqcn6122qca6696_firmwarewcd9371sd870_firmwareqca1062qcn5154_firmwaremdm8215_firmwaresd_8cxsa8150pqca9992_firmwaresd660sd865_5g_firmwaresd712sd660_firmwaresm8475qcn5022_firmwareqcn7606_firmwarewcn6750_firmwareqca6428_firmwareqca9985_firmwarewcn3991ipq4018_firmwareqca9980_firmwareipq8078qca8084qcn9001_firmwareipq8173sdx55m_firmwaremsm8976_firmwareqca6574sd670_firmwarecsr8811_firmwarewcd9380qcs410qcn5024sd690_5g_firmwareqca9379_firmwaresdx24_firmwareqca9985qcn9012_firmwareqcn9274_firmwareipq6018_firmwarewcd9340_firmwarewsa8815wcn6850pmp8074_firmwareqcn6112qca6584_firmwaremdm9215_firmwaresd695ipq6028ipq8064sd835pmp8074ipq9574_firmwarewcn3980_firmwaresd730qcc5100_firmwaresa8295pqca2062_firmwarewcn6740_firmwaresd678_firmwareapq8064au_firmwareipq8078_firmwareqcn5054qcs603qca9994qca9980sd670qcn9024_firmwareipq8174_firmwareqcm4290_firmwarewcn6855qcn7605_firmwaresw5100p_firmwareqcs610_firmwaresa6145pqca9886_firmwarear8031qca1023_firmwaresdm630_firmwaresd820_firmwareqca6391_firmwaresa4150p_firmwareqca4024wcd9370_firmwaresdx55qcn5021_firmwarecsra6640qca9379sa4155psxr2150pqcn7606qsm8250_firmwarewsa8830qca1062_firmwarecsrb31024mdm9628_firmwaremdm9650sd_636qca8082qca9992qcs4290mdm9250qca6420_firmwareapq8009_firmwareqca2064_firmwaresd690_5gmdm9310_firmwaresd675_firmwareipq8072qca6564qca6426wcn3990_firmwareqrb5165n_firmwareqca9984_firmwareqca9377wcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwarewcn3615_firmwareipq8074aqcn6102_firmwareqcn9011_firmwaresa8155qca6584qcn5122_firmwaresdx55_firmwarewcn3615qcn6023_firmwaresm7250p_firmwarewcn3610_firmwareqrb5165nqca6584ausd778gipq8174wcn7851qcn5052qca9367sdm630mdm9607_firmwareqcn6112_firmwaresa415m_firmwarewcn3988_firmwareqcn9074qca6421qca8085sd778g_firmwaresa8195pqca6694sm4375_firmwarewcd9326wcd9335qcn6023qcs4290_firmwareqca8085_firmwareqcs6490_firmwareqca6390qca9898_firmwaresd750g_firmwareaqt1000msm8976wcd9375sm6250_firmwareipq5010_firmwareipq8074a_firmwaresd888_5g_firmwaresdx20_firmwarewsa8815_firmwareapq8017qcx315qcm6125_firmwaresd780gsd865_5gqca6595qcc5100ipq8065_firmwareqcx315_firmwaresd665_firmwareqcn5154qca8075_firmwaresc8180xmdm9206wcn6855_firmwareqcn6132_firmwareqcn9003_firmwareqca9888qca6310_firmwareipq8070a_firmwaremdm9615qca6574_firmwareqca9886sm7325p_firmwaresd665qca6175asd765qca6574a_firmwareqrb5165msd850_firmwaresm7315apq8009mdm9310qcn6102csrb31024_firmwareqcm6490_firmwareqcn9070_firmwaresd480_firmwareipq6028_firmwareipq8072a_firmwaresc8180x_firmwareqca9889_firmwaresd710mdm9607qcn5122mdm9645_firmwaresdx20m_firmwareqcn5022qca6564_firmwaresd768gqca1064_firmwarewcn6740qca8075apq8096au_firmwareqcn6024qcn9022sd845mdm9615_firmwareqcn9002_firmwareipq6000_firmwaresdx12qcs410_firmwareqca6175a_firmwaresd_8cx_gen3_firmwareqca2066sa6150p_firmwareqcs610qca6431_firmwarewcd9360_firmwaresdx65qca4024_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqcs2290qca6335qca2062csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareqca6554a_firmwareqam8295psd_8cx_gen2_firmwareipq8076amdm9628qca8386_firmwaresd_8_gen1_5g_firmwareqca8084_firmwaresd710_firmwareqca4020qca6428qca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwaresa6155_firmwaresdx12_firmwarewcd9360sdx20mqca6438_firmwaresd680_firmwarewcn3999qrb5165_firmwareipq5028qrb5165m_firmwareipq4029_firmwareqcs6125sa4155p_firmwareipq6010sd662_firmwareqcs405qcn6132sw5100qca4020_firmwareqca6436wcn6851sa6155pqcs603_firmwarewcd9341ipq8068_firmwareqca2066_firmwareqca6431sd750gipq9008_firmwarewcn3910_firmwaresxr2150p_firmwarewsa8830_firmwaresd855_firmwarewcn3988qca6438wcn7850_firmwaresa8195p_firmwareqca9898sa8295p_firmwareipq4028wcn3610mdm9640ipq5018_firmwareqca8337_firmwarewcd9380_firmwareipq8072asw5100pmsm8996au_firmwarewcd9330ipq8076a_firmwareqca6564auwcn6856_firmwareipq9008qcn5164qcn5054_firmwaresdx50m_firmwareqca8072_firmwareqca6174qca6430_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980qca6335_firmwareqcs605sd7cwcn3910qca6320mdm9650_firmwareqca9986_firmwareqca6426_firmwarewcn3660b_firmwareqca9984qcn9024wcd9330_firmwaresdx55mipq8064_firmwareqca6421_firmwaresd821_firmwarear8031_firmwareqrb5165wcn6851_firmwareipq8070sd_636_firmwareqca6564a_firmwaresd480sd870qsm8250ipq6018sd695_firmwaresdxr1apq8096auqca6595_firmwareqcs405_firmwaresa8145pqca2064sd780g_firmwaresd888_firmwaresa8155psd675ar8035_firmwareqcm2290qcn5024_firmwarewcn3991_firmwaresd678qcn9070sa8145p_firmwareqcs2290_firmwaresd7c_firmwarecsra6620qcn9072qca8386sd765g_firmwareipq8069_firmwareqca6390_firmwareipq6000qca6174_firmwaresd730_firmwarewcd9370qcn5152_firmwareqca0000_firmwareqca6584au_firmwareapq8076_firmwareqcn9000_firmwareipq5018sd_8cx_firmwareqcn7605qca2065sd662qcn5124_firmwareqam8295p_firmwareqca1064qcn6100_firmwareqca8082_firmwareqca6320_firmwarewcn3680b_firmwareqca6595auwcn3999_firmwareqca6436_firmwareipq5010qca6564au_firmwaresa6155p_firmwareqca6310qcn9274qcn9001qca9990qcs6490sa515m_firmwaresdxr2_5gsd821sa6145p_firmwaresm6250sd712_firmwareapq8017_firmwarewsa8810_firmwaresd765_firmwareqca8081ipq8071aqca6174a_firmwareipq8071a_firmwarewcd9385qca2065_firmwaresd_8cx_gen3ar8035csr8811apq8064auqca6694_firmwareqcn9100_firmwaresd820qcm6490wcn6850_firmwarewsa8835_firmwareqca6564asa4150pqca8072qcm2290_firmwarewcn3990qcn9000sd_675qca6554aar9380_firmwaresdx24qcn9012sd888qcn6122_firmwarewsa8835msm8996ausd888_5gsm6250pipq4018qca6574aqca9889qca6174asm7325pipq8074qca9994_firmwarewcn6750qcn9003ipq8076_firmwaresa515msd855sm4125_firmwareipq8076qcn5021ipq8069qcn5152sd768g_firmwaresd460qca6391sdxr1_firmwareaqt1000_firmwareqcn9100sdx65_firmwareqcm4290sdx50msdx20mdm9215qcn9011sd_455ipq8074_firmwareqca6574ausa8155p_firmwareipq9574wcd9341_firmwareqcm6125wsa8810wcn6856wcn3680bsd835_firmwareipq6010_firmwareqca6696sd845_firmwaresa6150pqcn9022_firmwareqca9990_firmwareipq8070aqcn6100qcn9072_firmwaresm7250psd720g_firmwareipq8071_firmwareqcn9074_firmwaresw5100_firmwareipq4029sd850Snapdragon
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-1971
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.37% / 57.98%
||
7 Day CHG~0.00%
Published-09 Sep, 2021 | 07:36
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible assertion due to lack of physical layer state validation in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcn5024_firmwareqca2066wsa8830qcn9070sa6150p_firmwaresa8145p_firmwareqcn5550qca1062_firmwareqca8337ipq8173_firmwareqca6431_firmwarecsrb31024wcd9360_firmwareqcn5124qca4024_firmwareqcn9072ipq8078asa8150p_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwaresa6155qca2064_firmwareqca2062ipq6000qcn5064ipq8072qcn5152_firmwareqca6426qca6584au_firmwareqcn9000_firmwareqca9984_firmwareipq5018sa415mwcn3998sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwareipq8076aqcn6024_firmwarewcn6745qsm8350_firmwareipq8074aqca2065qcn5124_firmwareqsm8350qca1064qca6428sa8155qca6574au_firmwareqcn5122_firmwareipq8071qcn5164_firmwareqca6595auqca8081_firmwareqcn6023_firmwaresa6155_firmwaresdx55_firmwarewcn3998_firmwareqca6420qca6436_firmwarewcd9360qca6438_firmwareipq5010qca6564au_firmwareqca6584auipq8070_firmwaresa6155p_firmwareipq8078a_firmwareipq8174sa515m_firmwaresdxr2_5gipq8072_firmwareqcn5052sa8155_firmwareipq6010sa415m_firmwaresc8280xp_firmwareqca6430qcn9074sa6145p_firmwareqca6421wcd9340sa8195pwsa8810_firmwareqca6694qca6436wcn6851sa6155pqca8081ipq8071aqcn6023ipq8071a_firmwarewcd9385qca9888_firmwarewcd9341qca2066_firmwareqca6431qca6696_firmwareqca2065_firmwaresd870_firmwareqca1062qcn5154_firmwarear8035csr8811qca6390aqt1000qca6694_firmwaresa8150psd_8cxqcn9100_firmwarewsa8830_firmwaresd865_5g_firmwareipq5010_firmwareipq8074a_firmwareqca6438sd888_5g_firmwarewcn6850_firmwarewsa8815_firmwarewsa8835_firmwaresa8195p_firmwareqcn5121qcx315qcn5022_firmwareqca6564awcn6750_firmwareqca6428_firmwareipq5018_firmwareqca8072qca8337_firmwarewcd9380_firmwareqcn9000ipq8072aipq8076a_firmwaresd865_5gqca6595ipq8078qca6564ausdx55m_firmwareipq8173wcn6856_firmwareqcn9012qcn5164wsa8835qca6574qcx315_firmwarecsr8811_firmwarewcd9380sd888_5gqcn5054_firmwareqcn5154qca8075_firmwareqca6574aqcn5024ipq6005_firmwarewcn6855_firmwareqca9889ipq8074qca8072_firmwareqca9888qca6430_firmwareqcn5052_firmwareqcn9012_firmwarewcn6750ipq8070a_firmwareipq6018_firmwareipq8076_firmwaresa515mqca6574_firmwarewcd9340_firmwarewsa8815wcn6850ipq8076qca6175asd_8c_firmwareqca6426_firmwareqca6574a_firmwareqca9984ipq6028qcn5021qcn5152qcn9024wcn6745_firmwareqcn5550_firmwareqca6391sdx55mqca6421_firmwareipq6005aqt1000_firmwareqca2062_firmwareqcn9100qcn5064_firmwarecsrb31024_firmwareipq8078_firmwareqcn5054qcn9070_firmwarewcn6851_firmwareipq8070ipq6028_firmwareipq8072a_firmwareipq8074_firmwareqca6574auqca9889_firmwaresa8155p_firmwareqcn5122qca6564a_firmwareipq8174_firmwareqcn9024_firmwarewcd9341_firmwarewsa8810sd870qcn5121_firmwarewcn6855wcn6856sd_8cipq6018qcn5022sa6145pipq6010_firmwareqca6595_firmwareqca1064_firmwaresa8145pqca6696qca6391_firmwareqca2064qca4024sa6150psdx55qca8075qcn5021_firmwareqcn9022_firmwareqcn6024qcn9022sa8155psc8280xpipq8070aqcn9072_firmwareipq6000_firmwareipq8071_firmwareqcn9074_firmwareqca6175a_firmwarear8035_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-617
Reachable Assertion
CVE-2021-1955
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.30% / 53.23%
||
7 Day CHG~0.00%
Published-13 Jul, 2021 | 05:31
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Denial of service in SAP case due to improper handling of connections when association is rejected in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaremdm9640_firmwaresa6150p_firmwareqca8337qca6431_firmwarewcd9360_firmwarewcn3950_firmwaresa8150p_firmwareqcs2290qca6595au_firmwaresa6155qca6335msm8917mdm8215sd_455_firmwarecsra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareqcs6125_firmwaremdm8615m_firmwaresd632sa415mwcn3998wcd9371_firmwarewcn3950sm4125sd720gmdm9628mdm9206_firmwareqsw8573_firmwarewcn3660bsd450_firmwaresd710_firmwaresd460_firmwareqca4020mdm9230_firmwaresm7315_firmwaremdm8215mqca6574au_firmwaremdm9630wcd9375_firmwarewcn3998_firmwaresa6155_firmwaremsm8909wapq8009w_firmwareqca6420apq8053_firmwarewcd9360sdx20mqca9367_firmwarewcn3999qcs6125sa8155_firmwaresd662_firmwaremdm9615mqca6430qcs405wcd9340sdm830_firmwaresd765gqualcomm215_firmwareqca4020_firmwareqca6436wcn6851sa6155pqcs603_firmwaremdm9250_firmwarewcn3660_firmwarewcd9341qca6431qca6696_firmwarewcd9371sd870_firmwaresd750gmdm8215_firmwarewcn3910_firmwaresd_8cxsa8150pwsa8830_firmwaremdm9330_firmwaresd855_firmwaresd660sd865_5g_firmwarewcn3988sd660_firmwaresa8195p_firmwarewcn6750_firmwaresd450wcn3610mdm9640wcn3991qca8337_firmwaresda429w_firmwarewcd9380_firmwaresdm429wwcd9330msm8996au_firmwarecsr6030qca6564ausdx55m_firmwarewcn6856_firmwareqet4101_firmwaresd670_firmwareqca6574sd632_firmwarewcd9380qualcomm215mdm9230sd690_5g_firmwaresdx50m_firmwareqca9379_firmwaresdx24_firmwareqca6174qca6430_firmwarewcd9335_firmwaresd439_firmwarewcn3980qca6335_firmwareqsw8573qcs605wcd9340_firmwarewsa8815wcn6850wcn3910qca6584_firmwaremdm9650_firmwaresd_8c_firmwaremdm9215_firmwareqca6426_firmwarewcn3660b_firmwarewcn3680sd835wcn3980_firmwaresd730wcd9330_firmwaresdx55mqca6421_firmwarewcn6740_firmwarear6003_firmwaremsm8953sd678_firmwareapq8064au_firmwarear8031_firmwarewcn3680_firmwarewcn6851_firmwareqcs603sd670sd_636_firmwareqca6564a_firmwareapq8009wqcm4290_firmwaresd480sd870wcn6855sd210_firmwaresa6145psdxr1ar8031apq8096auqca6595_firmwareqcs405_firmwaresa8145psdm630_firmwareqca6391_firmwarewcd9370_firmwaresd780g_firmwaresdx55sd888_firmwareapq8053sa8155pcsra6640sd675sd439qet4101wcn3660qca9379ar8035_firmwareqcm2290wcn3991_firmwaremdm9150_firmwarewsa8830sd678sa8145p_firmwareqcs2290_firmwarecsrb31024mdm9628_firmwaremdm9650sd_636csra6620qcs4290mdm9250sd765g_firmwareqca6420_firmwareqca6390_firmwareapq8009_firmwaresd690_5gqca6174_firmwaresd730_firmwaremdm9310_firmwarewcd9370sd675_firmwareqca6564qca6426qca6584au_firmwarewcn3990_firmwareqca9377sdw2500_firmwaresd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwaremdm9615m_firmwarewcn3615_firmwaresd662sa8155qca6584wcn3680b_firmwaresdx55_firmwarewcn3615qca6595auwcn3999_firmwaresm7250p_firmwarewcn3610_firmwareqca6436_firmwareqca6564au_firmwareqca6584ausd778gsa6155p_firmwareqca6310sa515m_firmwaresd429sdxr2_5gqca9367sdm630mdm9607_firmwaresa415m_firmwarewcn3988_firmwaresd205sd429_firmwareqca6421sd778g_firmwaresa6145p_firmwaresm6250sa8195papq8017_firmwarewsa8810_firmwaresd765_firmwarewcd9326wcd9335qca6174a_firmwareqcs4290_firmwarewcd9385mdm8615mqca6390wcd9375sd750g_firmwareaqt1000ar8035apq8064ausm6250_firmwaremsm8953_firmwaresda429wmsm8917_firmwaresd210wcn3620_firmwaresdx20_firmwarewsa8815_firmwaresd888_5g_firmwarewcn6850_firmwarewsa8835_firmwarewcn3620apq8017ar6003csr6030_firmwareqca6564amdm9630_firmwareqcm6125_firmwareqcm2290_firmwarewcn3990sd_675sd780gsd865_5gqca6595sdx24sd888msm8909w_firmwarewsa8835msm8996ausdm429w_firmwaresd665_firmwaresd888_5gqca6574amdm9206wcn6855_firmwareqca6174asm7325pqca6310_firmwarewcn6750mdm9615sa515mqca6574_firmwaresd855sm4125_firmwaresm7325p_firmwaresd665qca6175asd765qca6574a_firmwaresd768g_firmwaresm7315apq8009sd460qca6391sdxr1_firmwaremdm9310aqt1000_firmwaremdm9626qcm4290csrb31024_firmwaresdx50msdx20sd480_firmwaremdm9215sd_455mdm9626_firmwareqca6574ausd710mdm8215m_firmwaremdm9607sa8155p_firmwaresd205_firmwarewcd9341_firmwaresdx20m_firmwareqcm6125wsa8810mdm9150wcn6856sd_8cwcn3680bsd835_firmwareqca6564_firmwaresd768gwcn6740qca6696sd845_firmwaresdw2500sa6150papq8096au_firmwaresd845mdm9615_firmwaresm7250psdm830sd720g_firmwaremdm9330qca6175a_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-617
Reachable Assertion
CVE-2021-1974
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.36% / 57.48%
||
7 Day CHG~0.00%
Published-09 Sep, 2021 | 07:36
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible buffer over read due to lack of alignment between map or unmap length of IPA SMMU and WLAN SMMU in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055sm7250sa6150p_firmwareqcs610ipq4028_firmwareqcn5550qca8337ar9380ipq8173_firmwareqca9561_firmwareqcn5124qca4024_firmwarewcn3950_firmwareipq8078asa8150p_firmwareqcs2290qca6595au_firmwaresa6155qcn5064qcs605_firmwaresd_675_firmwareqcs6125_firmwaresa415mwcn3998wcn3950qcn6024_firmwaresd720gsm4125ipq8076awcn3660bsd710_firmwaresd460_firmwareqca6428qca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwareqca8081_firmwarewcn3998_firmwaresa6155_firmwareqca6420qca6438_firmwareipq8070_firmwareipq8065ipq8078a_firmwareqrb5165_firmwareqca7500ipq8072_firmwareipq4029_firmwareqcs6125sa8155_firmwareipq6010sd662_firmwareipq8068qca6430wcd9340sd765gfsm10056_firmwareqca6436wcn6851sa6155pqca9888_firmwarewcd9341ipq8068_firmwareqca6696_firmwaresd870_firmwaresd750gqcn5154_firmwarewcn3910_firmwaresd_8cxsa8150pwsa8830_firmwareqca9992_firmwaresd660sd865_5g_firmwaresd855_firmwarewcn3988qca6438sd660_firmwaresa8195p_firmwareqcn5022_firmwarewcn6750_firmwareqca9898ipq4028wcn3610qca6428_firmwareipq5018_firmwareqca9985_firmwarewcn3991ipq4018_firmwareqca8337_firmwaresda429w_firmwarewcd9380_firmwareipq8072aqca7500_firmwareqca9980_firmwaresdm429wipq8076a_firmwareipq8078qca6564ausdx55m_firmwareipq8173wcn6856_firmwareqcn5164qca9558sd670_firmwareqca6574csr8811_firmwarewcd9380qcn5054_firmwareqcs410qcn5024sd690_5g_firmwareipq4019_firmwaresdx50m_firmwareqca8072_firmwareqca9985qcn9012_firmwareqca6430_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980ipq6018_firmwareqcs605wcd9340_firmwarewsa8815wcn6850pmp8074_firmwarewcn3910sd_8c_firmwareqca6426_firmwarewcn3660b_firmwareqca9984ipq6028ipq8064sd835pmp8074qcn9024wcn3980_firmwaresd730qcn5550_firmwaresdx55mipq8064_firmwarewcn6740_firmwareqcn5064_firmwaresd678_firmwareipq8078_firmwareqcn5054qrb5165wcn6851_firmwareipq8070qca9896qca9994qca9887_firmwareqca9980sd670qcn9024_firmwareipq8174_firmwaresd_636_firmwareqca6564a_firmwareqca9880qcm4290_firmwaresd480sd870sd210_firmwareqcs610_firmwareqsm8250sa6145pipq6018qca9886_firmwareqca6595_firmwaresa8145psdm630_firmwareqca6391_firmwareqca4024wcd9370_firmwaresd780g_firmwaresdx55qcn5021_firmwaresa8155psd675qca9531_firmwarear8035_firmwareqcm2290qsm8250_firmwareqcn5024_firmwarewcn3991_firmwarewsa8830sd678qca9561qcn9070sa8145p_firmwareqcs2290_firmwarefsm10056sm7250_firmwarecsrb31024qca9563_firmwaresd_636fsm10055_firmwareqcn9072qca9880_firmwareqca9992qcs4290sd765g_firmwareqca6420_firmwareqca6390_firmwaresd690_5gipq6000sd730_firmwarewcd9370sd675_firmwareipq8072qcn5152_firmwareqca6564qca6426qca6584au_firmwarewcn3990_firmwareqcn9000_firmwareqca9984_firmwareipq5018sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwareqca9563ipq8074asd662qcn5124_firmwaresa8155qcn5122_firmwaresdx55_firmwareqca6595auqcn6023_firmwarewcn3610_firmwareqca6436_firmwareipq5010qca6564au_firmwareqca6584ausd778gsa6155p_firmwareipq8174sd429sa515m_firmwareqca9990sdxr2_5gqcn5052sdm630sa415m_firmwarewcn3988_firmwareqcn9074sd205sd429_firmwaresa6145p_firmwaresd778g_firmwaresm6250sa8195pwsa8810_firmwaresd765_firmwarewcd9326wcd9335qca8081qcn6023ipq8071aipq8071a_firmwareqcs4290_firmwarewcd9385qca6390qca9898_firmwaresd750g_firmwareaqt1000wcd9375ar8035sm6250_firmwarecsr8811ipq4019qcn9100_firmwaresda429wsd210wcn3620_firmwareipq5010_firmwareipq8074a_firmwaresd888_5g_firmwarewsa8815_firmwarewcn6850_firmwarewsa8835_firmwarewcn3620qca6564aqcm6125_firmwareqca9882qca8072qcm2290_firmwarewcn3990qcn9000sd_675sd780gsd865_5gqca6595ar9380_firmwareqcn9012qca9558_firmwareqca9896_firmwarewsa8835ipq8065_firmwaresdm429w_firmwaresd665_firmwaresd888_5gqcn5154qca8075_firmwareipq4018qca6574aqca9889qca9888ipq8074sm7325qca9994_firmwarewcn6750ipq8070a_firmwareipq8076_firmwaresa515mqca6574_firmwareqca9886sd855sm4125_firmwaresd665ipq8076qca6175asd765qca9887qca6574a_firmwareqcn5021qcn5152sd768g_firmwaresd460qca6391aqt1000_firmwareqcn9100qcm4290csrb31024_firmwaresdx50mqca9882_firmwareqcn9070_firmwaresd480_firmwareipq6028_firmwareipq8072a_firmwareqca9531ipq8074_firmwareqca6574auqca9889_firmwaresd710sa8155p_firmwareqcn5122sd205_firmwarewcd9341_firmwareqcm6125wsa8810wcn6856sd_8cqcn5022sd835_firmwareqca6564_firmwaresd768gipq6010_firmwarewcn6740qca6696sa6150pqca8075qcn9022_firmwareqcn6024qcn9022qca9990_firmwareipq8070aqcn9072_firmwareipq6000_firmwaresd720g_firmwareipq8071_firmwareqcn9074_firmwareqcs410_firmwareipq4029qca6175a_firmwaresm7325_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-1887
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.26% / 49.08%
||
7 Day CHG~0.00%
Published-13 Jul, 2021 | 05:30
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An assertion can be reached in the WLAN subsystem while using the Wi-Fi Fine Timing Measurement protocol in Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcn5024_firmwareqca6428_firmwareqca9882ipq4018_firmwareqca9561ipq4028_firmwareqca7500_firmwareqca9980_firmwareqca7520qca7550_firmwarear9380ar9380_firmwareqca9563_firmwareqca9561_firmwareqca9558qca9558_firmwareqca9896_firmwareipq8065_firmwareqca9880_firmwareqca9992csr8811_firmwareqca7520_firmwareipq8069_firmwareqcn5054_firmwareqca6335ipq4019_firmwareipq4018qcn5024qca9889ipq8074qca6310_firmwareqca9888qca9984_firmwareqca9994_firmwareqca6335_firmwareqca9563ar7420qcn5502_firmwareqca6320qca9887qca6428qca6320_firmwareqca9984ipq8064ipq8069ipq8064_firmwareqca6438_firmwareqca6310ipq8065qca9990qca7500qca9882_firmwareipq4029_firmwareqcn5054qcn5501qca9896qcn5502qca9994qca9531qca9887_firmwareipq8074_firmwareqca9889_firmwareqca9980qca9880qca7550qca9888_firmwareqca9898_firmwarecsr8811ipq4019qcn5501_firmwarear7420_firmwareqca9992_firmwareqca9990_firmwareqca6438qca9531_firmwareqca9898ipq4029ipq4028Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-617
Reachable Assertion
CVE-2022-34144
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.16% / 37.50%
||
7 Day CHG~0.00%
Published-02 May, 2023 | 05:08
Updated-03 Aug, 2024 | 08:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reachable assertion in Modem

Transient DOS due to reachable assertion in Modem during OSI decode scheduling.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wsa8830sm7325-ae_firmware315_5g_iot_modem_firmwareqca8337wcn785x-5wcd9360_firmwaresm7250-ac_firmwarewcn3950_firmwaresm4450_firmwareqca6595au_firmwareqca6390_firmwaresnapdragon_x70_modem-rf_systemsm8350wcd9370wcn685x-1sm7350-ab_firmwaresm8450sm4375wcn3998sm8250-abwcd9385_firmwarewcn3950qcn6024_firmwaresm6375_firmwaresm7325-afsm7315_firmwaresm7325-aesnapdragon_x55_5g_modem-rf_systemqca6574au_firmwaresdx55_firmwareqca6595auwcn3998_firmwareqca8081_firmwaresm7325-af_firmwaresm7250p_firmwarewcd9375_firmwarewcd9360sm4350-acsnapdragon_x65_5g_modem-rf_system_firmwaresnapdragon_x70_modem-rf_system_firmwareqcs6490qca6698aqsm8250_firmwaresm7250-ab_firmwaresm8250-acwcn3988_firmware315_5g_iot_modemsm7250-aawsa8810_firmwaresm4375_firmwaresm8450_firmwareqca8081qca6698aq_firmwareqcm4490wcn685x-1_firmwarewcd9385wcd9341qca6696_firmwareqcs6490_firmwareqca6390ar8035sm4350_firmwarewcd9375sm8250-ac_firmwarewsa8830_firmwaresnapdragon_7c\+_gen_3_compute_firmwareqcm6490wcn3988wsa8815_firmwarewsa8835_firmwaresm7350-absm8475wcn6750_firmwarewcn785x-1sm6375qca8337_firmwarewcd9380_firmwaresnapdragon_auto_5g__modem-rfsm8350-ac_firmwaresd888wsa8835snapdragon_7c\+_gen_3_computewcd9380qca6574awcn685x-5_firmwaresm7325psm7325wcn6750sm7250-abwsa8815sm7325p_firmwaresdx57m_firmwaresm4450qca6574a_firmwareqcn9024wcn785x-5_firmwaresm7315sm8250-ab_firmwareqca6391snapdragon_x55_5g_modem-rf_system_firmwaresm6350sm8475_firmwarewcn6740_firmwareqcm4490_firmwareqcs4490_firmwaresnapdragon_x65_5g_modem-rf_systemqcm6490_firmwarewsa8832_firmwaresm8350_firmwarewcn685x-5sm6350_firmwarewcn785x-1_firmwareqca6574auqcn9024_firmwaresdx57mwcd9341_firmwarewsa8810sm7250-aa_firmwarewsa8832snapdragon_auto_5g__modem-rf_firmwaresm7250-acsm8350-acqcs4490wcn6740qca6696qca6391_firmwaresm4350wcd9370_firmwaresm4350-ac_firmwaresdx55sd888_firmwaresm8250qcn6024sm7250par8035_firmwaresm7325_firmwareSnapdragon
CWE ID-CWE-617
Reachable Assertion
CVE-2021-1964
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.39% / 59.51%
||
7 Day CHG~0.00%
Published-13 Jul, 2021 | 05:31
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible buffer over read due to improper validation of IE size while parsing beacon from peer device in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa6150p_firmwareipq4028_firmwareqcn5550qca8337ar9380ipq8173_firmwareqca9561_firmwareqcn5124qca4024_firmwarewcn3950_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqcs2290qca6595au_firmwaresa6155qcn5064sd_675_firmwaresa415mwcn3998wcn3950qcn6024_firmwaresd720gsm4125ipq8076asd710_firmwaresd460_firmwaresm7315_firmwareqca6428qca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwareqca8081_firmwarewcn3998_firmwaresa6155_firmwareqca6420apq8053_firmwareqca6438_firmwareipq8070_firmwareipq8065ipq8078a_firmwareipq5028qca7500ipq8072_firmwareipq4029_firmwaresa8155_firmwareipq6010sd662_firmwareipq8068qca6430wcd9340sd765gqca6436wcn6851sa6155pqca9888_firmwareqcn6122wcd9341ipq8068_firmwareqca6696_firmwaresd870_firmwaresd750gqcn5154_firmwarewcn3910_firmwaresd_8cxsa8150pwsa8830_firmwareqca9992_firmwaresd660sd865_5g_firmwaresd855_firmwarewcn3988qca6438sd660_firmwaresa8195p_firmwareqcn5121qcn5022_firmwarewcn6750_firmwareqca9898ipq4028qca6428_firmwareipq5018_firmwareqca9985_firmwarewcn3991ipq4018_firmwareqca8337_firmwarewcd9380_firmwareipq8072aqca7500_firmwareqca9980_firmwareipq8076a_firmwareipq8078qca6564ausdx55m_firmwareipq8173wcn6856_firmwareqcn5164qca9558sd670_firmwareqca6574csr8811_firmwarewcd9380qcn5054_firmwareqcn5024sd690_5g_firmwareipq4019_firmwaresdx50m_firmwareqca8072_firmwareqca9985qcn9012_firmwareqca6430_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980ipq6018_firmwarewcd9340_firmwarewsa8815wcn6850pmp8074_firmwarewcn3910sd_8c_firmwareqca6426_firmwareqca9984ipq6028ipq8064sd835pmp8074qcn9024wcn3980_firmwaresd730qcn5550_firmwaresdx55mipq8064_firmwarewcn6740_firmwaremsm8953qcn5064_firmwaresd678_firmwareipq8078_firmwareqcn5054wcn6851_firmwareipq8070qca9896qcn5502qca9994qca9887_firmwareqca9980sd670qcn9024_firmwareipq8174_firmwaresd_636_firmwareqca6564a_firmwareqca9880qcm4290_firmwaresd480sd870qcn5121_firmwaresa6145pipq6018qca9886_firmwareqca6595_firmwaresa8145psdm630_firmwareqca6391_firmwareqca4024wcd9370_firmwaresd780g_firmwaresdx55sd888_firmwareapq8053qcn5021_firmwaresa8155psd675qca9531_firmwarear8035_firmwareqcm2290qcn5024_firmwarewcn3991_firmwareqcn5500wsa8830sd678qca9561qcn9070sa8145p_firmwareqcs2290_firmwarecsrb31024qca9563_firmwaresd_636qcn9072qca9880_firmwareqca9992qcs4290sd765g_firmwareqca6420_firmwareqca6390_firmwaresd690_5gipq6000sd730_firmwarewcd9370sd675_firmwareipq8072qcn5152_firmwareqca6564qca6426qca6584au_firmwarewcn3990_firmwareqcn9000_firmwareqca9984_firmwareipq5018sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwarewcn3615_firmwareqca9563ipq8074asd662qcn5124_firmwareqca9982sa8155wcn3680b_firmwareqcn5122_firmwaresdx55_firmwarewcn3615qcn6023_firmwareqca6595ausm7250p_firmwareqca6436_firmwareipq5010qca6564au_firmwareqca6584ausd778gsa6155p_firmwareipq8174sa515m_firmwareqca9990sdxr2_5gqcn5052sdm630sa415m_firmwarewcn3988_firmwareqcn9074sa6145p_firmwaresm6250sd778g_firmwaresa8195pwsa8810_firmwareqca6694sd765_firmwarewcd9326wcd9335qca8081qca9982_firmwareqcn6023ipq8071aipq8071a_firmwareqcs4290_firmwarewcd9385qca6390qca9898_firmwaresd750g_firmwareaqt1000wcd9375ar8035sm6250_firmwarecsr8811ipq4019qca6694_firmwaremsm8953_firmwareqcn9100_firmwareipq5010_firmwareipq8074a_firmwaresd888_5g_firmwarewsa8815_firmwarewcn6850_firmwarewsa8835_firmwareqca6564aqca9882qca8072qcm2290_firmwarewcn3990qcn9000sd_675sd780gsd865_5gqca6595ar9380_firmwareqcn9012sd888qca9558_firmwareqca9896_firmwareqcn6122_firmwareipq8065_firmwarewsa8835sd665_firmwaresd888_5gqcn5154qca8075_firmwareipq4018qca6574aipq6005_firmwareqca9889sm7325pqca9888ipq8074qca9994_firmwarewcn6750ipq8070a_firmwareipq8076_firmwaresa515mqca6574_firmwareqca9886qcn5502_firmwaresd855sm4125_firmwaresm7325p_firmwaresd665ipq8076qca6175asd765qca9887qca6574a_firmwareqcn5021qcn5152sd768g_firmwaresm7315sd460qca6391ipq6005aqt1000_firmwareqcn9100qcm4290csrb31024_firmwaresdx50mqca9882_firmwareqcn9070_firmwaresd480_firmwareipq6028_firmwareipq8072a_firmwareqca9531ipq8074_firmwareqca6574auqca9889_firmwaresd710sa8155p_firmwareqcn5122wcd9341_firmwarewsa8810qcn5500_firmwarewcn6856sd_8cqcn5022wcn3680bsd835_firmwareqca6564_firmwaresd768gipq6010_firmwarewcn6740qca6696sd845_firmwaresa6150pqca8075qcn9022_firmwareqcn6024qcn9022sd845qca9990_firmwareipq8070aqcn9072_firmwaresm7250pipq6000_firmwaresd720g_firmwareipq8071_firmwareqcn9074_firmwareipq4029qca6175a_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-33306
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.12% / 32.22%
||
7 Day CHG~0.00%
Published-09 Feb, 2023 | 06:58
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer over-read in WLAN

Transient DOS due to buffer over-read in WLAN while processing an incoming management frame with incorrectly filled IEs.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd_8cx_gen3_firmwareqca2066qca8337ar9380ipq8173_firmwaresdx65qcn5124qca4024_firmwareipq8078aipq5028_firmwareqca6595au_firmwareqca2062qca6554a_firmwareqam8295pipq8076aqca8386_firmwareqcn6024_firmwaresd_8_gen1_5g_firmwareqca8084_firmwareqsm8350_firmwareqsm8350wcn7850qca6574au_firmwareqcn5164_firmwarewcd9375_firmwareqca8081_firmwareqcn9002qca9986ipq8065ipq8078a_firmwareqca6678aq_firmwareipq5028qca6698aqipq6010ipq8068qcn6132qca6436wcn6851wcn7851_firmwareqca6698aq_firmwareqca9888_firmwareqcn6122ipq8068_firmwareqca2066_firmwarewcd9341qca6696_firmwaresd870_firmwareipq9008_firmwareqcn5154_firmwarewsa8830_firmwareqca9992_firmwaresd660sd865_5g_firmwaresd660_firmwarewcn7850_firmwaresm8475qcn5022_firmwaresa8295p_firmwarewcn6750_firmwareipq5018_firmwareqca9985_firmwareqca8337_firmwarewcd9380_firmwaressg2125pipq8072aqca9980_firmwareipq8076a_firmwareipq8078qca6564auqca8084ipq8173qcn9001_firmwaresdx55m_firmwareipq9008wcn6856_firmwareqcn5164qca6574csr8811_firmwarewcd9380qcn5054_firmwareqcn5024sxr1230pqca8072_firmwareqca9985wcd9335_firmwareqcn5052_firmwareqcn9274_firmwarewcn3980ipq6018_firmwarewsa8815wcn6850qcn6112qca9986_firmwareqca6426_firmwareqca9984ipq6028ipq8064qcn9024ipq9574_firmwarewcn3980_firmwaresdx55mipq8064_firmwaresa8295pqca2062_firmwarewcn6740_firmwareqca6678aqipq8078_firmwareqcn5054wcn6851_firmwareqca9994qca9980qcn9024_firmwareipq8174_firmwaresd870wsa8832wcn6855ipq6018qca9886_firmwareqca6595_firmwareqca6391_firmwareqca2064qca4024sd780g_firmwarewcd9370_firmwaresd888_firmwaressg2115p_firmwarear8035_firmwareqcn5024_firmwarewsa8830qcn9070sxr2230p_firmwareqca8082qcn9072qca8386qca9992qca6390_firmwareqca2064_firmwareipq6000wcd9370ssg2115pqcn5152_firmwareqca6426qca6584au_firmwarewcn3990_firmwareqcn9000_firmwareqca9984_firmwareipq5018wcd9385_firmwaresdxr2_5g_firmwareipq8074aqca2065qcn5124_firmwareqam8295p_firmwareqcn6100_firmwareqcn6102_firmwareqca8082_firmwareqcn5122_firmwareqca6595auqcn6023_firmwareqca6436_firmwareipq5010qca6564au_firmwareqca6584auqcn9274ipq8174qca9990qcn9001qcs6490sdxr2_5gqcn5052wcn7851qcn6112_firmwareqcn9074qca8085wsa8810_firmwarewcd9335qca8081ipq8071aqcn6023ipq8071a_firmwarewcd9385qca8085_firmwareqca2065_firmwareqcs6490_firmwaresd_8cx_gen3ar8035csr8811qca6390wcd9375qcn9100_firmwareipq5010_firmwareipq8074a_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewsa8815_firmwarewsa8835_firmwareqca8072wcn3990qcn9000sd780gqca6554asd865_5gqca6595ar9380_firmwaresd888qcn6122_firmwareipq8065_firmwaresxr1230p_firmwarewsa8835sd888_5gqcn5154qca8075_firmwaressg2125p_firmwareqca6574awcn6855_firmwareqca9889qcn6132_firmwareqcn9003_firmwareqca9888qca9994_firmwarewcn6750qcn9003ipq8070a_firmwareipq8076_firmwareqca6574_firmwareqca9886sxr2230pipq8076qca6574a_firmwareqcn5152qca6391qcn6102qcn9100sdx65_firmwareqcm6490_firmwarewsa8832_firmwareqcn9070_firmwareipq6028_firmwareipq8072a_firmwareqca6574auqca9889_firmwareipq9574qcn5122wcd9341_firmwarewsa8810wcn6856qcn5022ipq6010_firmwarewcn6740qca6696qca8075qcn9022_firmwareqcn6024qcn9022qca9990_firmwareipq8070aqcn9002_firmwareqcn6100qcn9072_firmwareipq6000_firmwareqcn9074_firmwareSnapdragon
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-1937
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.26% / 49.08%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 06:20
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Reachable assertion is possible while processing peer association WLAN message from host and nonstandard incoming packet in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca2066sa6150p_firmwaresm6250p_firmwareqcs610ipq4028_firmwareqcn5550qca8337ar9380ipq8173_firmwareqca6431_firmwarewcd9360_firmwareqcn5124qca4024_firmwarewcn3950_firmwaresc8180x\+sdx55ipq8078asa8150p_firmwareqca6595au_firmwaresa6155qca6335qca2062qcn5064sd_455_firmwarecsra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareqcs6125_firmwaresa415mwcn3998wcd9371_firmwarewcn3950qcn6024_firmwaresd720gsm4125ipq8076aqsm8350_firmwaresd710_firmwareqsm8350sd460_firmwareqca6428qca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwareqca8081_firmwarewcn3998_firmwaresa6155_firmwareqca6420wcd9360qca6438_firmwareipq8070_firmwarewhs9410_firmwareipq8078a_firmwarewcn3999ipq8072_firmwareipq4029_firmwareqcs6125sa8155_firmwareipq6010sd662_firmwareqcs405qca6430wcd9340sdm830_firmwaresd765gqca6436wcn6851sa6155pqca9888_firmwarewcd9341qca2066_firmwareqca6431qca6696_firmwarewcd9371sd870_firmwaresd750gqca1062qcn5154_firmwarewcn3910_firmwaresd_8cxsa8150pwsa8830_firmwareqca9992_firmwaresd660sd865_5g_firmwaresd855_firmwarewcn3988qca6438sd660_firmwaresa8195p_firmwareqcn5121qcn5022_firmwarewcn6750_firmwareqca9898ipq4028qca6428_firmwareipq5018_firmwarewcn3991ipq4018_firmwareqca8337_firmwarewcd9380_firmwareipq8072aqca9980_firmwareipq8076a_firmwareipq8078qca6564ausdx55m_firmwareipq8173wcn6856_firmwareqcn5164sd670_firmwareqca6574csr8811_firmwarewcd9380qcn5054_firmwareqcs410qcn5024sd690_5g_firmwaresdx50m_firmwareqca8072_firmwareqcn9012_firmwareqca6430_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980qca6335_firmwareipq6018_firmwareqcs605wcd9340_firmwarewsa8815wcn6850pmp8074_firmwarewcn3910sd_8c_firmwareqca6426_firmwareqca9984ipq6028ipq8064qcn9024pmp8074wcn3980_firmwarewcn6745_firmwaresd730qcn5550_firmwaresdx55mipq8064_firmwareqca6421_firmwareqca2062_firmwareqcn5064_firmwaresd678_firmwarear8031_firmwareipq8078_firmwareqcn5054wcn6851_firmwareipq8070qca9994qca9980sd670qcn9024_firmwareipq8174_firmwaresd_636_firmwareqca6564a_firmwaresd480sd870wcn6855qcn5121_firmwareqcs610_firmwaresa6145pipq6018sdxr1ar8031qca6595_firmwareqcs405_firmwaresa8145psdm630_firmwareqca6391_firmwareqca4024wcd9370_firmwareqca2064sdx55qcn5021_firmwaresa8155pcsra6640sd675ar8035_firmwareqcn5024_firmwarewcn3991_firmwarewsa8830sd678qcn9070sa8145p_firmwareqca1062_firmwarecsrb31024sd_636csra6620qcn9072qca9992sd765g_firmwareqca6420_firmwareipq8069_firmwareqca6390_firmwareqca2064_firmwaresd690_5gipq6000sd730_firmwarewcd9370sd675_firmwareipq8072qcn5152_firmwareqca6426qca6584au_firmwarewcn3990_firmwareqcn9000_firmwareqca9984_firmwareipq5018sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewhs9410wcd9326_firmwarewcn6745ipq8074aqca2065sd662qcn5124_firmwareqca1064sa8155qcn5122_firmwaresdx55_firmwareqca6595auqcn6023_firmwarewcn3999_firmwaresm7250p_firmwareqca6436_firmwareipq5010qca6564au_firmwareqca6584ausd778gsa6155p_firmwareqca6310ipq8174sa515m_firmwareqca9990sdxr2_5gqcn5052sdm630sa415m_firmwarewcn3988_firmwareqcn9074sa6145p_firmwareqca6421sd778g_firmwaresm6250sa8195pwsa8810_firmwaresd765_firmwarewcd9326wcd9335qca8081qcn6023ipq8071aipq8071a_firmwarewcd9385qca2065_firmwareqca6390qca9898_firmwaresd750g_firmwareaqt1000wcd9375ar8035sc8180x\+sdx55_firmwaresm6250_firmwarecsr8811qcn9100_firmwareipq5010_firmwareipq8074a_firmwaresd888_5g_firmwarewsa8815_firmwarewcn6850_firmwarewsa8835_firmwareqca6564aqcm6125_firmwareqca8072wcn3990qcn9000sd_675sd865_5gqca6595ar9380_firmwareqcn9012wsa8835sd665_firmwaresd888_5gsm6250pqcn5154qca8075_firmwareipq4018qca6574aipq6005_firmwarewcn6855_firmwareqca9889sm7325pqca9888qca6310_firmwareipq8074qca9994_firmwarewcn6750ipq8070a_firmwareipq8076_firmwaresa515mqca6574_firmwaresd855sm4125_firmwaresm7325p_firmwaresd665ipq8076qca6175asd765qca6574a_firmwareqcn5021ipq8069qcn5152sd768g_firmwaresd460qca6391sdxr1_firmwareipq6005aqt1000_firmwareqcn9100csrb31024_firmwaresdx50mqcn9070_firmwaresd480_firmwareipq6028_firmwareipq8072a_firmwaresd_455ipq8074_firmwareqca6574auqca9889_firmwaresd710sa8155p_firmwareqcn5122wcd9341_firmwareqcm6125wsa8810wcn6856sd_8cqcn5022sd768gipq6010_firmwareqca1064_firmwareqca6696sd845_firmwaresa6150pqca8075qcn9022_firmwareqcn6024qcn9022sd845qca9990_firmwareipq8070aqcn9072_firmwaresm7250psdm830ipq6000_firmwaresd720g_firmwareipq8071_firmwareqcn9074_firmwareqcs410_firmwareipq4029qca6175a_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-617
Reachable Assertion
CVE-2022-33251
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.14% / 35.56%
||
7 Day CHG~0.00%
Published-06 Jun, 2023 | 07:38
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reachable assertion in Modem

Transient DOS due to reachable assertion in Modem because of invalid network configuration.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewsa8830sm7325-ae_firmware315_5g_iot_modem_firmwareqca8337wcn785x-5qca6431_firmwarewcd9360_firmwaresm7250-ac_firmwareqca6595au_firmwareqca6390_firmwaresnapdragon_x70_modem-rf_systemsm8350wcd9370qca6426wcn685x-1sm7350-ab_firmwaresm8450sm4375wcn3998sm8250-abwcd9385_firmwareqcn6024_firmwaresm6375_firmwaresm7325-afsm7325-aesnapdragon_x55_5g_modem-rf_systemqca6574au_firmwaresdx55_firmwareqca6595auwcn3998_firmwareqca8081_firmwaresm7325-af_firmwaresm7250p_firmwarewcd9375_firmwarewcd9360qca6436_firmwaresm4350-acsnapdragon_auto_5g_modem-rf_firmwaresnapdragon_x65_5g_modem-rf_system_firmwaresnapdragon_x70_modem-rf_system_firmwareqcs6490qca6698aqqcs8550_firmwaresm8250_firmwaresm7250-ab_firmwaresm8250-acwcn3988_firmware315_5g_iot_modemqca6421sm7250-aawsa8810_firmwaresm4375_firmwaresm8450_firmwareqca6436qca8081qca6698aq_firmwarewcn685x-1_firmwarewcd9385sm8150_firmwaresxr2130_firmwarewcd9341qca6431qca6696_firmwareqcs6490_firmwareqca6390ar8035sm4350_firmwarewcd9375sm8250-ac_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwaresm7225_firmwaresnapdragon_7c\+_gen_3_compute_firmwareqcm6490sm8150wcn3988wsa8815_firmwarewsa8835_firmwaresm7350-absm8475wcn6750_firmwarewcn785x-1sm6375wcn3991qca8337_firmwarewcd9380_firmwaresd865_5gsm8350-ac_firmwaresm8150-acwsa8835snapdragon_7c\+_gen_3_computesnapdragon_auto_5g_modem-rfwcd9380sxr2130qca6574awcn685x-5_firmwaresm7325psm7325wcn6750sm7225sm7250-absd855wsa8815sm7325p_firmwaresdx57m_firmwaresnapdragon_xr2_5g_platform_firmwareqca6426_firmwareqca6574a_firmwareqcn9024wcn785x-5_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresm8250-ab_firmwareqca6391qca6421_firmwaresm6350sm8475_firmwarewcn6740_firmwaresnapdragon_xr2_5g_platformsnapdragon_x65_5g_modem-rf_systemqcm6490_firmwaresm8350_firmwarewcn685x-5sm6350_firmwarewcn785x-1_firmwareqca6574auqcn9024_firmwaresdx57mwcd9341_firmwarewsa8810sm7250-aa_firmwaresm7250-acsm8150-ac_firmwaresm8350-acwcn6740qca6696qca6391_firmwareqcs8550sm4350wcd9370_firmwaresm4350-ac_firmwaresdx55sm8250qcn6024sm7250par8035_firmwaresm7325_firmwareSnapdragon
CWE ID-CWE-617
Reachable Assertion
CVE-2022-33250
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.12% / 32.17%
||
7 Day CHG~0.00%
Published-07 Mar, 2023 | 04:43
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reachable assertion in Modem

Transient DOS due to reachable assertion in modem when network repeatedly sent invalid message container for NR to LTE handover.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewsa8830qca8337qca6431_firmwaresnapdragon_4_gen_1_firmwarewcd9360_firmwaresdx65sd765g_firmwareqca6595au_firmwareqca6390_firmwaresd690_5gwcd9370qca6426wcn3998wcd9385_firmwaresdxr2_5g_firmwareqcn6024_firmwaresd_8_gen1_5g_firmwaresm7315_firmwarewcn7850qca6574au_firmwaresdx55_firmwareqca6595auqca8081_firmwarewcd9375_firmwarewcn3998_firmwaresm7250p_firmwarewcd9360qca6436_firmwaresd778gsa515m_firmwareqcs6490wcn7851sdxr2_5gwcn3988_firmwareqca6421sd778g_firmwarewsa8810_firmwaresd765gsd765_firmwareqca6436wcn6851qca8081wcn7851_firmwarewcd9385wcd9341qca6431qca6696_firmwareqcs6490_firmwaresd750gsd870_firmwaresdx70m_firmwareqca6390ar8035sd750g_firmwarewcd9375wsa8830_firmwaresd855_firmwaresd865_5g_firmwaresnapdragon_4_gen_1qcm6490sd888_5g_firmwarewcn3988wcn6850_firmwarewcn7850_firmwarewsa8815_firmwarewsa8835_firmwareqcx315sm8475wcn6750_firmwarewcn3991qca8337_firmwarewcd9380_firmwaresd780gsd865_5gsdx55m_firmwarewcn6856_firmwaresd888wsa8835qcx315_firmwarewcd9380sd888_5gqca6574asd690_5g_firmwarewcn6855_firmwaresm7325pwcn6750sa515msd855wsa8815sm7325p_firmwarewcn6850sdx57m_firmwaresd765qca6426_firmwareqca6574a_firmwaresd695sd768g_firmwareqcn9024sm7315qca6391sdx55mqca6421_firmwarewcn6740_firmwaresdx65_firmwareqcm6490_firmwaresd480_firmwarewcn6851_firmwareqca6574auqcn9024_firmwaresdx57mwcd9341_firmwaresd480sd870wsa8810wcn6855wcn6856sd695_firmwaresd768gwcn6740qca6696qca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55sd888_firmwareqcn6024sdx70msm7250par8035_firmwareSnapdragonwcn3991_firmwareqca8337_firmwarewcd9380_firmwareqca6431_firmwaresdx55m_firmwarewcn6856_firmwaresnapdragon_4_gen_1_firmwarewcd9360_firmwareqcx315_firmwaresd765g_firmwareqca6595au_firmwareqca6390_firmwaresd690_5g_firmwarewcn6855_firmwarewcd9385_firmwaresdxr2_5g_firmwareqcn6024_firmwaresd_8_gen1_5g_firmwaresm7325p_firmwaresdx57m_firmwareqca6426_firmwaresm7315_firmwareqca6574a_firmwareqca6574au_firmwaresd768g_firmwaresdx55_firmwarewcd9375_firmwareqca8081_firmwarewcn3998_firmwaresm7250p_firmwareqca6436_firmwareqca6421_firmwarewcn6740_firmwaresdx65_firmwaresa515m_firmwareqcm6490_firmwaresd480_firmwarewcn6851_firmwarewcn3988_firmwaresd778g_firmwareqcn9024_firmwarewsa8810_firmwarewcd9341_firmwaresd765_firmwarewcn7851_firmwaresd695_firmwareqca6696_firmwareqcs6490_firmwaresd870_firmwaresdx70m_firmwareqca6391_firmwaresd750g_firmwaresd780g_firmwarewcd9370_firmwaresd888_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewsa8815_firmwaresd888_5g_firmwarewsa8835_firmwarewcn6850_firmwarewcn7850_firmwarewcn6750_firmwarear8035_firmware
CWE ID-CWE-617
Reachable Assertion
CVE-2022-33272
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.12% / 32.17%
||
7 Day CHG~0.00%
Published-07 Mar, 2023 | 04:43
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reachable assertion in Modem

Transient DOS in modem due to reachable assertion.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewcn3991wsa8830qca8337_firmwarewcd9380_firmwaresd780gqca8337sd865_5gsdx55m_firmwarewcn6856_firmwaresnapdragon_4_gen_1_firmwaresdx65wsa8835qcx315_firmwarewcd9380sd765g_firmwaresd888_5gqca6390_firmwarewcd9370wcn6855_firmwaresm7325pwcn6750wcn3998wcd9385_firmwareqcn6024_firmwaresd_8_gen1_5g_firmwarewsa8815sm7325p_firmwarewcn6850sdx57m_firmwaresd765wcn7850sd695sd768g_firmwaresdx55_firmwareqcn9024wcd9375_firmwareqca8081_firmwarewcn3998_firmwaresm7250p_firmwareqca6391sdx55mwcn6740_firmwaresd778gsdx65_firmwarewcn7851qcs6490qcm6490_firmwaresd480_firmwarewcn6851_firmwarewcn3988_firmwaresd778g_firmwareqcn9024_firmwarewsa8810_firmwaresd765gsdx57mwcd9341_firmwaresd480sd765_firmwaresd870wsa8810wcn6851wcn6855qca8081wcn7851_firmwarewcn6856wcd9385wcd9341sd695_firmwaresd768gqcs6490_firmwaresd870_firmwarewcn6740sdx70m_firmwareqca6391_firmwareqca6390ar8035wcd9375sd780g_firmwarewcd9370_firmwaresdx55wsa8830_firmwareqcn6024sdx70msd865_5g_firmwaresnapdragon_4_gen_1qcm6490sd888_5g_firmwarewcn3988wcn6850_firmwarewcn7850_firmwarewsa8815_firmwarewsa8835_firmwaresm7250pqcx315sm8475wcn6750_firmwarear8035_firmwareSnapdragon
CWE ID-CWE-617
Reachable Assertion
CVE-2022-33285
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.16% / 37.20%
||
7 Day CHG~0.00%
Published-06 Jan, 2023 | 05:02
Updated-09 Apr, 2025 | 15:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer over-read in WLAN

Transient DOS due to buffer over-read in WLAN while parsing WLAN CSA action frames.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaremdm9640_firmwaresm6250p_firmwareipq4028_firmwareqca8337ar9380ipq8173_firmwareqcn5124mdm9645wcn3950_firmwareqca6595au_firmwaresa6155mdm8215sd_455_firmwareapq8076qcs6125_firmwaresa415msm4375wcn3998wcd9371_firmwarewcn3950qcn6024_firmwaresd720gsm4125mdm9206_firmwarewcn3660bqsm8350_firmwareqsm8350sd460_firmwaresm7315_firmwarewcn7850qca8081_firmwarewcn3998_firmwareqca6420qcn9002qca9986ipq8070_firmwareqca9367_firmwareipq8065ipq8078a_firmwaresd_8cx_gen2ipq8072_firmwaresa8155_firmwareipq8068qca6430wcd9340sd765gsd680wcn7851_firmwaremdm9250_firmwareqca9888_firmwareqcn6122qca6696_firmwarewcd9371sd870_firmwareqca1062qcn5154_firmwaremdm8215_firmwaresd_8cxsa8150pqca9992_firmwaresd660sd865_5g_firmwaresd712sd660_firmwaresm8475qcn5022_firmwareqcn7606_firmwarewcn6750_firmwareqca6428_firmwareqca9985_firmwarewcn3991ipq4018_firmwareqca4531_firmwareqca9980_firmwareipq8078qca8084qcn9001_firmwareipq8173sdx55m_firmwaremsm8976_firmwareqca6574sd670_firmwarecsr8811_firmwarewcd9380qcs410qcn5024sd690_5g_firmwareqca9379_firmwaresdx24_firmwareqca9985qcn9012_firmwareqcn9274_firmwareipq6018_firmwarewcd9340_firmwarewsa8815wcn6850pmp8074_firmwareqcn6112qca6584_firmwaremdm9215_firmwaresd695ipq6028ipq8064sd835pmp8074ipq9574_firmwarewcn3980_firmwaresd730qcc5100_firmwaresa8295pqca2062_firmwarewcn6740_firmwaresd678_firmwareapq8064au_firmwareipq8078_firmwareqcn5054qcs603qca9994qca9980sd670qcn9024_firmwareipq8174_firmwareqcm4290_firmwarewcn6855qcn7605_firmwaresw5100p_firmwareqcs610_firmwaresa6145pqca9886_firmwarear8031sdm630_firmwaresd820_firmwareqca6391_firmwaresa4150p_firmwareqca4024wcd9370_firmwaresdx55qcn5021_firmwarecsra6640qca9379sxr2150pqcn7606qsm8250_firmwarewsa8830qca1062_firmwarecsrb31024mdm9628_firmwaremdm9650sd_636qca8082qca9992qcs4290mdm9250qca6420_firmwareapq8009_firmwareqca2064_firmwaresd690_5gmdm9310_firmwaresd675_firmwareipq8072qca6564qca6426wcn3990_firmwareqrb5165n_firmwareqca9984_firmwareqca9377qca4531wcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwarewcn3615_firmwareipq8074aqcn6102_firmwareqcn9011_firmwaresa8155qca6584qcn5122_firmwaresdx55_firmwarewcn3615qcn6023_firmwaresm7250p_firmwarewcn3610_firmwareqrb5165nqca6584ausd778gipq8174wcn7851qcn5052qca9367sdm630mdm9607_firmwareqcn6112_firmwaresa415m_firmwarewcn3988_firmwareqcn9074qca6421qca8085sd778g_firmwaresa8195psm4375_firmwarewcd9326wcd9335qcn6023qcs4290_firmwareqca8085_firmwareqcs6490_firmwareqca6390qca9898_firmwaresd750g_firmwareaqt1000msm8976wcd9375sm6250_firmwareipq5010_firmwareipq8074a_firmwaresd888_5g_firmwaresdx20_firmwarewsa8815_firmwareapq8017qcx315qcm6125_firmwaresd780gsd865_5gqca6595qcc5100ipq8065_firmwareqcx315_firmwaresd665_firmwareqcn5154qca8075_firmwaresc8180xmdm9206wcn6855_firmwareqcn6132_firmwareqcn9003_firmwareqca9888qca6310_firmwareipq8070a_firmwaremdm9615qca6574_firmwareqca9886sm7325p_firmwaresd665qca6175asd765qca6574a_firmwareqrb5165msd850_firmwaresm7315apq8009mdm9310qcn6102csrb31024_firmwareqcm6490_firmwareqcn9070_firmwaresd480_firmwareipq6028_firmwareipq8072a_firmwaresc8180x_firmwareqca9889_firmwaresd710mdm9607qcn5122mdm9645_firmwaresdx20m_firmwareqcn5022qca6564_firmwaresd768gqca1064_firmwarewcn6740qca8075apq8096au_firmwareqcn6024qcn9022sd845mdm9615_firmwareqcn9002_firmwareipq6000_firmwaresdx12qcs410_firmwareqca6175a_firmwaresd_8cx_gen3_firmwareqca2066sa6150p_firmwareqcs610qca6431_firmwarewcd9360_firmwaresdx65qca4024_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqcs2290qca6335qca2062csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareqca6554a_firmwareqam8295psd_8cx_gen2_firmwareipq8076amdm9628qca8386_firmwaresd_8_gen1_5g_firmwareqca8084_firmwaresd710_firmwareqca4020qca6428qca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwaresa6155_firmwaresdx12_firmwarewcd9360sdx20mqca6438_firmwaresd680_firmwarewcn3999qrb5165_firmwareipq5028qrb5165m_firmwareipq4029_firmwareqcs6125ipq6010sd662_firmwareqcs405qcn6132sw5100qca4020_firmwareqca6436wcn6851sa6155pqcs603_firmwarewcd9341ipq8068_firmwareqca2066_firmwareqca6431sd750gipq9008_firmwarewcn3910_firmwaresxr2150p_firmwarewsa8830_firmwaresd855_firmwarewcn3988qca6438wcn7850_firmwaresa8195p_firmwareqca9898sa8295p_firmwareipq4028wcn3610mdm9640ipq5018_firmwareqca8337_firmwarewcd9380_firmwareipq8072asw5100pmsm8996au_firmwarewcd9330ipq8076a_firmwareqca6564auwcn6856_firmwareipq9008qcn5164qcn5054_firmwaresdx50m_firmwareqca8072_firmwareqca6174qca6430_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980qca6335_firmwareqcs605sd7cwcn3910qca6320mdm9650_firmwareqca9986_firmwareqca6426_firmwarewcn3660b_firmwareqca9984qcn9024wcd9330_firmwaresdx55mipq8064_firmwareqca6421_firmwaresd821_firmwarear8031_firmwareqrb5165wcn6851_firmwareipq8070sd_636_firmwareqca6564a_firmwaresd480sd870qsm8250ipq6018sd695_firmwaresdxr1apq8096auqca6595_firmwareqcs405_firmwaresa8145pqca2064sd780g_firmwaresd888_firmwaresa8155psd675ar8035_firmwareqcm2290qcn5024_firmwarewcn3991_firmwaresd678qcn9070sa8145p_firmwareqcs2290_firmwaresd7c_firmwarecsra6620qcn9072qca8386sd765g_firmwareipq8069_firmwareqca6390_firmwareipq6000qca6174_firmwaresd730_firmwarewcd9370qcn5152_firmwareqca6584au_firmwareapq8076_firmwareqcn9000_firmwareipq5018sd_8cx_firmwareqcn7605qca2065sd662qcn5124_firmwareqam8295p_firmwareqca1064qcn6100_firmwareqca8082_firmwareqca6320_firmwarewcn3680b_firmwareqca6595auwcn3999_firmwareqca6436_firmwareipq5010qca6564au_firmwaresa6155p_firmwareqca6310qcn9274qcn9001qca9990qcs6490sa515m_firmwaresdxr2_5gsd821sa6145p_firmwaresm6250sd712_firmwareapq8017_firmwarewsa8810_firmwaresd765_firmwareqca8081ipq8071aqca6174a_firmwareipq8071a_firmwarewcd9385qca2065_firmwaresd_8cx_gen3ar8035csr8811apq8064auqcn9100_firmwaresd820qcm6490wcn6850_firmwarewsa8835_firmwareqca6564asa4150pqca8072qcm2290_firmwarewcn3990qcn9000sd_675qca6554aar9380_firmwaresdx24qcn9012sd888qcn6122_firmwarewsa8835msm8996ausd888_5gsm6250pipq4018qca6574aqca9889qca6174asm7325pipq8074qca9994_firmwarewcn6750qcn9003ipq8076_firmwaresa515msd855sm4125_firmwareipq8076qcn5021ipq8069qcn5152sd768g_firmwaresd460qca6391sdxr1_firmwareaqt1000_firmwareqcn9100sdx65_firmwareqcm4290sdx50msdx20mdm9215qcn9011sd_455ipq8074_firmwareqca6574ausa8155p_firmwareipq9574wcd9341_firmwareqcm6125wsa8810wcn6856wcn3680bsd835_firmwareipq6010_firmwareqca6696sd845_firmwaresa6150pqcn9022_firmwareqca9990_firmwareipq8070aqcn6100qcn9072_firmwaresm7250psd720g_firmwareipq8071_firmwareqcn9074_firmwaresw5100_firmwareipq4029sd850Snapdragon
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-33239
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.23% / 46.08%
||
7 Day CHG~0.00%
Published-15 Nov, 2022 | 00:00
Updated-22 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Transient DOS due to loop with unreachable exit condition in WLAN firmware while parsing IPV6 extension header. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380_firmwaremdm9310qcn9072_firmwaremsm8996auwcn3615_firmwareqca6595au_firmwaresd730qca1062qcn9000apq8009qcn7606_firmwareipq6028qca6696qca6421mdm9607qcn9070wcn7850qcn5122qsm8250_firmwareqca6564auwcn3660bqca6426_firmwareqca4531_firmwaresd720gipq8078asa6150psd460msm8996au_firmwareqca9889_firmwareqcn5124wsa8830wsa8815qcn9003ipq9008qca6430sd855ipq9008_firmwareqcs6490_firmwaresd_8cx_gen3_firmwarewcd9340sdx55_firmwaresd_8cx_firmwaresxr2150p_firmwaresdxr2_5g_firmwaresd_8cx_gen2_firmwareqca8386_firmwaresc8180x\+sdx55_firmwareqcn5022_firmwaresa4155p_firmwareqca8386mdm9650qca8072sd765g_firmwareqca6574aqca8084_firmwaresd865_5g_firmwareapq8017_firmwareqcm6125_firmwarewcn6750sa8295p_firmwaresm7325pqcn5024mdm8215sd695_firmwareqcc5100sd_675qcs405qcn5024_firmwareqca6595qca6431_firmwarecsra6640sd480_firmwaremdm9215_firmwareqca6430_firmwareqca8081sm7315_firmwaresm7325p_firmwareqca6584ausd870ipq6018qca9367ipq5018_firmwareqca6390_firmwareqcn9024_firmwaresc8180x\+sdx55qcn9011_firmwaresa6155_firmwarewcn6855qca6584_firmwareqcx315_firmwareipq8070aipq8072awcn3910ipq8070a_firmwaresd870_firmwareqcm6490_firmwaresm6250ipq8078_firmwareqca6431qca6595auwcd9370sd888_firmwareqcs4290_firmwarewcn3980qcn5152qca2066sm4125_firmwaresm7315qcn9022sd765_firmwaresd720g_firmwaresd765gqca9888_firmwaresdx55mqam8295pwcn6850_firmwareqcn9002_firmwareqcn9274sm6250pwsa8810_firmwarewsa8815_firmwarewcn3991_firmwaresa8150pwcn6740ipq8078qca6436ipq8076aipq8071aqca4024qcn7605_firmwaresa8155pwsa8810qca6694_firmwareqca2062_firmwareqca2066_firmwaresw5100p_firmwareaqt1000_firmwareqcn9012wsa8835_firmwareipq8076wcd9335_firmwaresm7250p_firmwareqcn5154_firmwareapq8009_firmwareqca6391qcn9024qcn5052_firmwarecsra6620wcn3998_firmwaremdm9310_firmwarewcn6851sd778g_firmwarewcd9370_firmwaresd675qca6420_firmwareipq8074aqcn6023_firmwareqcx315qcc5100_firmwareqca6554a_firmwareqca8082_firmwareqcm6125ipq8174qca4020_firmwareqcn6122sdx12sd660csrb31024_firmwaresa4150p_firmwareipq8070qcs610qca6391_firmwarewcd9326_firmwareqcn9012_firmwaresm7250psa8155p_firmwarecsra6620_firmwarewcn3610sa6145pwcn3910_firmwareqrb5165_firmwareapq8017qca8085_firmwarewcd9375sd750g_firmwareqca6696_firmwareipq8076_firmwareqca2064sxr2150psd865_5gmdm9215qca2062qca9377sm6250p_firmwareqcn9003_firmwarewcn3990_firmwarewcn3950_firmwarewcn3988sd778gwcd9371_firmwarewcn3615qca8085ipq8071a_firmwaresd750gsd768g_firmwaremdm9615_firmwarewcn7851qcn9002mdm9640_firmwareqca6436_firmwaresa8195p_firmwareqca4020qca9367_firmwareipq8074a_firmwareqcn5021_firmwarewcd9341_firmwareipq6000_firmwareqcn6102wcd9340_firmwareqca6175a_firmwareqca8082sd_675_firmwareqca6174a_firmwareqca6564a_firmwareqcn5021sd855_firmwaresd662_firmwareqcn5054_firmwareqca9889sdx50mwcd9371mdm9650_firmwareqcs405_firmwareqcn6024_firmwareqcs6490ipq5018sdx55sd460_firmwaremdm9628wcn3610_firmwaresa6155qcm4290_firmwareqca1064wcn3660b_firmwaresm4375sd820sd665_firmwaresdx20m_firmwarewcd9360_firmwareqrb5165m_firmwaresa6145p_firmwareqsm8350_firmwareipq5028_firmwaresd768gwcn6740_firmwarewcn6856sm4125qca6390sdx50m_firmwareqca6175asa6155pipq5010_firmwaresa8150p_firmwaresd480wcd9330wcn7851_firmwaresa8145p_firmwaresw5100mdm8215_firmwareqca4024_firmwarewcn6850csr8811sa8145psa415mwcn3950ipq6018_firmwareqca6584au_firmwareqcn9100_firmwareqcn5122_firmwareqcn7605qcm6490qcn6024qca6174awcd9335wcn3999ipq8078a_firmwaresd7c_firmwareqca6595_firmwareqrb5165nipq6010qca6421_firmwareqrb5165qca6574au_firmwaresd662qrb5165n_firmwaremdm9250_firmwareqca2065_firmwareqam8295p_firmwareqca6564_firmwaresa8295pqcs610_firmwareqcn9074qca6174qcm2290_firmwareqcn5054qcn9274_firmwarewcd9380ar8031qcm4290qcn6102_firmwareqcn5052sd660_firmwaresd730_firmwaremdm9628_firmwareqca2064_firmwaresd695sd_8cx_gen3qca6174_firmwarewcd9375_firmwaresd888sa6150p_firmwarear8035_firmwareipq8070_firmwarewcn6856_firmwareqcn6132_firmwareaqt1000qcn5152_firmwareqcn6100_firmwaresdx12_firmwarear8035qcn6112wcn6855_firmwareqca8072_firmwareqsm8250qca6420wcd9360sd780g_firmwareqca4531sdx65_firmwareqcm2290mdm9250qcn9011qcn5124_firmwaresa515msa515m_firmwareqcn5164_firmwaremdm9607_firmwarewcn3990ipq6028_firmwareqcn6023sd690_5gmdm9645_firmwareqca8081_firmwareqca1062_firmwarewsa8835wcn3998ar8031_firmwarecsr8811_firmwareqca8337_firmwareqcn5164qca8075_firmwareqcs2290qrb5165mqcn6122_firmwaresd820_firmwareqca1064_firmwaresd7cipq8072a_firmwaresd678wcd9385qca6574auwcn7850_firmwareqcn6112_firmwaresdx65wcd9385_firmwaremdm9640apq8096auwcn6750_firmwareqcs410_firmwareqcn9000_firmwareipq8173_firmwaresd680qcn9001_firmwaresd888_5gqcn9070_firmwarepmp8074qca8075pmp8074_firmwaresd678_firmwareqca9379wcn3999_firmwareqcs6125sm4375_firmwareipq6010_firmwareqsm8350qca6574wcn3991sd_8cxcsra6640_firmwareqca6574_firmwaresa415m_firmwareipq8076a_firmwareqca6564asdx20msa8195psd675_firmwareqca6574a_firmwareqca9888qca6694sd665sa8155_firmwarewsa8830_firmwaresd888_5g_firmwareipq8174_firmwareqca8337sd_8_gen1_5g_firmwaresm6250_firmwareqcn6100sdxr2_5gqcn6132wcd9341wcn3980_firmwareqcs2290_firmwarewcn6851_firmwarewcd9326sd680_firmwareqca8084qca9379_firmwaresa6155p_firmwareqcn9074_firmwaresa4150pqcn5154qca2065qca9377_firmwaremdm9645apq8096au_firmwaresw5100_firmwareipq8173qcn9001qca6584qcn9072sd780gqca6564au_firmwarecsrb31024qca6426sdx55m_firmwaresd690_5g_firmwareqcs6125_firmwareqcn9100qcn5022sm8475sa8155ipq6000sd765qca6564wcd9330_firmwareipq5010wcn3988_firmwareqcn9022_firmwareqcs4290qca6554aipq5028sa4155pqcn7606sw5100pmdm9615sd_8cx_gen2qcs410Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CVE-2022-33236
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.20% / 42.03%
||
7 Day CHG~0.00%
Published-15 Nov, 2022 | 00:00
Updated-22 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Transient DOS due to buffer over-read in WLAN firmware while parsing cipher suite info attributes. in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380_firmwareqcn9072_firmwareqcn9000qca8082qcn5054_firmwareqca9889qcn6024_firmwareipq5018ipq6028qcn9070wcn7850qcn5122qca6426_firmwareipq8078aqca9889_firmwareipq5028_firmwareqcn5124wsa8830wcn6740_firmwarewcn6856wsa8815qcn9003qca6390ipq9008ipq5010_firmwarewcn7851_firmwareipq9008_firmwareqca4024_firmwarewcn6850csr8811ipq6018_firmwareqcn9100_firmwareqca8386_firmwareqcn5122_firmwareqcn5022_firmwareqcn6024ipq8078a_firmwareqca8386qca8072qca8084_firmwareipq6010sd865_5g_firmwareqcn5024qcn9074qcn9274_firmwareqcn5054wcd9380qcn6102_firmwareqcn5024_firmwareqcn5052qca8081ar8035_firmwarewcn6856_firmwareqcn6132_firmwaresd870ipq6018qcn5152_firmwareipq5018_firmwareqcn6100_firmwareqca6390_firmwarear8035qcn6112qcn9024_firmwarewcn6855_firmwareqca8072_firmwarewcn6855ipq8072aipq8070asdx65_firmwareipq8070a_firmwaresd870_firmwareqcn5124_firmwareipq8078_firmwareqcn5164_firmwareqcn5152ipq6028_firmwareqcn6023qca8081_firmwareqcn9022wsa8835qca9888_firmwarewcn6850_firmwarecsr8811_firmwareqcn9002_firmwareqcn9274wsa8810_firmwareqca8337_firmwarewsa8815_firmwareqcn5164qca8075_firmwareqcn6122_firmwarewcn6740ipq8072a_firmwareipq8078ipq8076aqca6436wcn7850_firmwareqcn6112_firmwaresdx65ipq8071aqca4024wsa8810qcn9000_firmwareipq8173_firmwareqcn9001_firmwareqcn9070_firmwareqca8075wsa8835_firmwareipq8076qcn5154_firmwareipq6010_firmwareqca6391qcn9024qcn5052_firmwarewcn6851ipq8076a_firmwareqca9888ipq8074aqcn6023_firmwarewsa8830_firmwareqca8082_firmwareipq8174_firmwareqca8337sd_8_gen1_5g_firmwareqcn6100ipq8174qcn6122qcn6132wcn6851_firmwareqca8084qca6391_firmwareqcn9074_firmwareqcn5154qca8085_firmwareipq8173qcn9001qcn9072ipq8076_firmwaresd865_5gqca6426qcn9003_firmwareqcn9100qcn5022sm8475ipq8071a_firmwareqca8085ipq6000ipq5010wcn7851qcn9002qcn9022_firmwareipq5028qca6436_firmwareipq8074a_firmwareipq6000_firmwareqcn6102Snapdragon Compute, Snapdragon Connectivity, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-33253
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.11% / 30.31%
||
7 Day CHG~0.00%
Published-06 Jan, 2023 | 05:02
Updated-09 Apr, 2025 | 19:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer over-read in WLAN

Transient DOS due to buffer over-read in WLAN while parsing corrupted NAN frames.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd_8cx_gen3_firmwareqca2066sa6150p_firmwareqca8337ar9380ipq8173_firmwareqca6431_firmwarewcd9360_firmwaresdx65qcn5124qca4024_firmwaresc8180x\+sdx55ipq8078aipq5028_firmwaresa8150p_firmwareqca6595au_firmwaresa6155qca2062sa415mwcn3998qca6554a_firmwareqam8295psd_8cx_gen2_firmwareqcn6024_firmwareipq8076aqca8386_firmwaresd_8_gen1_5g_firmwareqca8084_firmwareqsm8350_firmwareqsm8350sm7315_firmwarewcn7850qca6574au_firmwareqcn5164_firmwarewcd9375_firmwareqca8081_firmwarewcn3998_firmwaresa6155_firmwareqca6420wcd9360qcn9002qca9986ipq8070_firmwareipq8065ipq8078a_firmwaresd_8cx_gen2qrb5165_firmwareipq5028qrb5165m_firmwaresa8155_firmwareipq6010ipq8068qca6430wcd9340qcn6132qca6436wcn6851sa6155pwcn7851_firmwareqca9888_firmwareqcn6122wcd9341ipq8068_firmwareqca2066_firmwareqca6696_firmwareqca6431sd870_firmwareqca1062ipq9008_firmwareqcn5154_firmwaresxr2150p_firmwaresa8150pwsa8830_firmwareqca9992_firmwaresd865_5g_firmwarewcn7850_firmwaresa8195p_firmwaresm8475qcn5022_firmwarewcn6750_firmwaresa8295p_firmwareipq5018_firmwareqca9985_firmwareqca8337_firmwarewcd9380_firmwareipq8072aqca9980_firmwareipq8076a_firmwareipq8078qca8084qcn9001_firmwareipq8173sdx55m_firmwareqca6564auwcn6856_firmwareipq9008qcn5164qca6574csr8811_firmwarewcd9380qcn5054_firmwareqcn5024qca8072_firmwareqca9985qcn9012_firmwareqca6430_firmwareqcn9274_firmwareqcn5052_firmwarewcn3980ipq6018_firmwarewcd9340_firmwarewsa8815wcn6850pmp8074_firmwareqcn6112qca9986_firmwareqca6426_firmwareqca9984ipq6028ipq8064qcn9024pmp8074ipq9574_firmwarewcn3980_firmwaresdx55mipq8064_firmwaresa8295pqca6421_firmwareqca2062_firmwarewcn6740_firmwareipq8078_firmwareqcn5054qrb5165wcn6851_firmwareipq8070qca9994qca9980qcn9024_firmwareipq8174_firmwaresd870wcn6855qsm8250sa6145pipq6018qca9886_firmwareqca6595_firmwaresa8145pqca6391_firmwaresa4150p_firmwareqca4024wcd9370_firmwareqca2064sd780g_firmwaresdx55sd888_firmwareqcn5021_firmwaresa8155psxr2150par8035_firmwareqsm8250_firmwareqcn5024_firmwarewsa8830qcn9070sa8145p_firmwareqca1062_firmwarecsrb31024qca8082qcn9072qca8386qca9992qca6420_firmwareqca6390_firmwareqca2064_firmwareipq6000wcd9370qcn5152_firmwareqca6426qca6584au_firmwareqrb5165n_firmwareqcn9000_firmwareqca9984_firmwareipq5018wcd9385_firmwaresdxr2_5g_firmwareipq8074aqca2065qcn5124_firmwareqam8295p_firmwareqcn6102_firmwareqcn9011_firmwareqca1064sa8155qcn6100_firmwareqca8082_firmwareqcn5122_firmwaresdx55_firmwareqca6595auqcn6023_firmwareqca6436_firmwareqrb5165nipq5010qca6564au_firmwareqca6584ausd778gsa6155p_firmwareqcn9274ipq8174wcn7851qcn9001qca9990qcs6490qcn5052sa515m_firmwaresdxr2_5gqcn6112_firmwaresa415m_firmwareqcn9074sa6145p_firmwareqca6421qca8085sd778g_firmwaresa8195pwsa8810_firmwareqca8081qcn6023ipq8071aipq8071a_firmwarewcd9385qca8085_firmwareqcs6490_firmwareqca2065_firmwaresd_8cx_gen3qca6390wcd9375ar8035aqt1000csr8811sc8180x\+sdx55_firmwareqcn9100_firmwareipq5010_firmwareipq8074a_firmwaresd888_5g_firmwarewsa8815_firmwareqcm6490wcn6850_firmwarewsa8835_firmwareqcx315sa4150pqca8072qcn9000sd780gqca6554asd865_5gqca6595ar9380_firmwareqcn9012sd888qcn6122_firmwareipq8065_firmwareqcx315_firmwarewsa8835sd888_5gqcn5154qca8075_firmwareqca6574awcn6855_firmwareqca9889sm7325pqcn6132_firmwareqcn9003_firmwareqca9888qca9994_firmwarewcn6750qcn9003ipq8070a_firmwareipq8076_firmwaresa515mqca6574_firmwareqca9886sm7325p_firmwareipq8076qca6574a_firmwareqcn5021qcn5152qrb5165msm7315qca6391aqt1000_firmwareqcn6102qcn9100sdx65_firmwarecsrb31024_firmwareqcm6490_firmwareqcn9070_firmwareipq6028_firmwareipq8072a_firmwareqcn9011qca6574auqca9889_firmwaresa8155p_firmwareqcn5122ipq9574wcd9341_firmwarewsa8810wcn6856qcn5022ipq6010_firmwareqca1064_firmwarewcn6740qca6696sa6150pqca8075qcn9022_firmwareqcn6024qcn9022qca9990_firmwareipq8070aqcn9002_firmwareqcn6100qcn9072_firmwareipq6000_firmwareqcn9074_firmwareSnapdragon
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-33309
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.13% / 33.80%
||
7 Day CHG~0.00%
Published-07 Mar, 2023 | 04:43
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buiffer over-read in WLAN Firmware.

Transient DOS due to buffer over-read in WLAN Firmware while parsing secure FTMR frame with size lesser than 39 Bytes.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcn5024_firmwarewsa8830qcn9070sxr2230p_firmwareipq8173_firmwaresdx65qcn5124qca4024_firmwareqca8082qcn9072qca8386ipq8078aipq5028_firmwareipq6000ssg2115pqcn5152_firmwareqcn9000_firmwareipq5018wcd9385_firmwareipq8076aqca8386_firmwareqcn6024_firmwaresd_8_gen1_5g_firmwareqca8084_firmwareipq8074aqcn5124_firmwareqca8082_firmwarewcn7850qcn5164_firmwareqcn5122_firmwareqca8081_firmwareqcn6023_firmwareipq5010ipq8078a_firmwareqcn9274ipq8174wcn7851ipq5028qcn5052ipq6010qcn9074qca8085sdx65mqcn6132qca8081wcn7851_firmwareipq8071aqcn6023sdx65m_firmwareipq8071a_firmwarewcd9385qca8085_firmwareqca9888_firmwareqcn6122ipq9008_firmwareqcn5154_firmwarecsr8811qcn9100_firmwarewsa8830_firmwareipq5010_firmwareipq8074a_firmwarewsa8835_firmwarewcn7850_firmwaresm8475qcn5022_firmwareipq5018_firmwarewcd9380_firmwaressg2125pqcn9000ipq8072aipq8076a_firmwareipq8078qca8084ipq8173wcn6856_firmwareipq9008qcn5164qcn6122_firmwarewsa8835sxr1230p_firmwarecsr8811_firmwarewcd9380qcn5154qca8075_firmwaressg2125p_firmwareqcn5024wcn6855_firmwareqca9889qcn6132_firmwaresxr1230pqca9888qcn5052_firmwareqcn9274_firmwareipq8070a_firmwareipq6018_firmwareipq8076_firmwaresxr2230pipq8076qcn5152ipq6028qcn9024ipq9574_firmwareqcn9100sdx65_firmwareipq8078_firmwarewsa8832_firmwareqcn9070_firmwareipq6028_firmwareipq8072a_firmwareqca9889_firmwareipq9574qcn5122qcn9024_firmwareipq8174_firmwarewsa8832wcn6855wcn6856ipq6018qcn5022ipq6010_firmwareqca4024qca8075qcn9022_firmwareqcn6024qcn9022ipq8070aqcn9072_firmwareipq6000_firmwaressg2115p_firmwareqcn9074_firmwareSnapdragon
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-33237
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.15% / 36.74%
||
7 Day CHG~0.00%
Published-15 Nov, 2022 | 00:00
Updated-22 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Transient DOS due to buffer over-read in WLAN firmware while processing PPE threshold. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380_firmwareqcn9072_firmwareqca6595au_firmwareqca1062qca6310sd730qcn9000qcn7606_firmwareipq8074ipq6028qca6696qca6421mdm9607qcn9070wcn7850qcn5122qsm8250_firmwareqca6564auqca6426_firmwaresd720gipq8078asa6150psd460sd710_firmwareqca9889_firmwareqcn5124wsa8830ipq8072wsa8815qcn9003ipq9008qca6430sd855ipq9008_firmwareqcs6490_firmwaresd_8cx_gen3_firmwarewcd9340qca0000_firmwaresdx55_firmwaresd_8cx_firmwaresxr2150p_firmwaresdxr2_5g_firmwaresd_8cx_gen2_firmwareqca8386_firmwaresc8180x\+sdx55_firmwareqcn5022_firmwaresa4155p_firmwaresd712qca8386qca8072sd765g_firmwareqca6574aqca8084_firmwaresd865_5g_firmwareqcm6125_firmwarewcn6750sa8295p_firmwaresm7325pqcn5024sd695_firmwareqcc5100qca9994qca6335sd_675qcs405qcn5024_firmwareqca6595qca6431_firmwarecsra6640sd480_firmwareqca6430_firmwareqca8081sm7315_firmwaresm7325p_firmwareqca6584ausd870ipq6018qca9367ipq5018_firmwareqca6390_firmwareqcn9024_firmwaresc8180x\+sdx55ipq4028_firmwareqcn9011_firmwaresa6155_firmwarewcn6855qcx315_firmwareipq8072aipq8070awcn3910ipq8070a_firmwaresd870_firmwareqcm6490_firmwaresm6250ipq8078_firmwareqca6431qca6595auwcd9370sd888_firmwareqcs4290_firmwarewcn3980qcn5152qca2066sm4125_firmwareqca9992sm7315qcn9022sd765_firmwaresd720g_firmwaresd765gsd670qca9888_firmwaresdx55mqam8295pwcn6850_firmwareqcn9002_firmwareqcn9274sm6250pwsa8810_firmwarewsa8815_firmwarewcn3991_firmwaresa8150psd850_firmwarewcn6740ipq8078qca6436ipq8076aipq8069ipq8071aqca4024qcn7605_firmwaresa8155psdxr1wsa8810qca6694_firmwareqca2062_firmwareqca2066_firmwaresw5100p_firmwareaqt1000_firmwareqcn9012wsa8835_firmwareipq8076wcd9335_firmwaresm7250p_firmwareqcn5154_firmwareqca6391ar9380_firmwareqcn9024qcn5052_firmwarecsra6620wcn3998_firmwarewcn6851sd778g_firmwarewcd9370_firmwaresd675qca6420_firmwareipq8074aqcn6023_firmwareqcx315qcc5100_firmwareqca6554a_firmwareqca8082_firmwareipq4028qcm6125ipq8174ipq8071ipq8064_firmwareqcn6122sd660csrb31024_firmwaresa4150p_firmwareipq8070qcs610qca6391_firmwarewcd9326_firmwareqcn9012_firmwaresm7250psa8155p_firmwarecsra6620_firmwaresa6145pwcn3910_firmwareqrb5165_firmwareqca8085_firmwarewcd9375sd750g_firmwareqca6696_firmwareipq8076_firmwareqca2064sxr2150psd865_5gqca2062ipq8071_firmwareqca9377sm6250p_firmwareqca9980_firmwareqcn9003_firmwarewcn3990_firmwarewcn3950_firmwarewcn3988sd778gwcd9371_firmwareipq8071a_firmwareqca8085sd750gqca9980sd768g_firmwareqcs605sd712_firmwarewcn7851qcn9002qca6310_firmwaresd710qca6436_firmwaresa8195p_firmwareqcn5021_firmwareqca9367_firmwareipq8074a_firmwarewcd9341_firmwareipq6000_firmwareqcn6102ipq4018wcd9340_firmwaresd850qca8082sd_675_firmwareqca6174a_firmwareqcn5021sd855_firmwaresd662_firmwareqcn5054_firmwareqca9889sdx50mwcd9371qcs405_firmwareqcn6024_firmwareqcs6490ipq5018sdx55sd460_firmwaremdm9628sa6155qca9990qcm4290_firmwareqca1064sm4375sd665_firmwaresdx20m_firmwarewcd9360_firmwareqrb5165m_firmwaresa6145p_firmwareqsm8350_firmwareipq5028_firmwaresd768gwcn6740_firmwarewcn6856sm4125qca6390sdx50m_firmwareipq5010_firmwaresa6155pipq8074_firmwaresa8150p_firmwaresd480wcd9330wcn7851_firmwaresa8145p_firmwaresw5100qca4024_firmwarewcn6850csr8811sa8145psa415mwcn3950qcs603_firmwareipq6018_firmwareqca6584au_firmwareqcn9100_firmwareqcn5122_firmwareqcn7605qcm6490qcn6024qca6174awcd9335wcn3999ipq8078a_firmwaresd7c_firmwaresd670_firmwareqca6595_firmwareqrb5165nipq6010qca6421_firmwareqca6438_firmwareqrb5165qca6574au_firmwaresd662qrb5165n_firmwareqca2065_firmwareipq4029_firmwareqam8295p_firmwaresa8295pqcs610_firmwareqcn9074qcm2290_firmwareqcn9274_firmwareqcn5054wcd9380ar8031qca6438qcm4290qcn6102_firmwareqcn5052sd660_firmwaresd730_firmwaremdm9628_firmwareqca2064_firmwaresd695ipq8064sd_8cx_gen3ipq8069_firmwarewcd9375_firmwaresa6150p_firmwaresd888ar8035_firmwareipq8070_firmwareqca0000wcn6856_firmwareqcn6132_firmwareaqt1000qcn5152_firmwareqcs603qcn6100_firmwarear8035qcn6112wcn6855_firmwareqca8072_firmwareqsm8250qca6420wcd9360sd780g_firmwareqca9898_firmwaresdx65_firmwareqcm2290qcn9011qcn5124_firmwaresa515msd845_firmwareqca6428_firmwaremdm9206sa515m_firmwaresdxr1_firmwareqcn5164_firmwareqca9994_firmwaremdm9607_firmwarewcn3990ipq6028_firmwareqcn6023sd690_5gqca8081_firmwareqca9984qca1062_firmwarewsa8835wcn3998ar8031_firmwarecsr8811_firmwareqca8337_firmwareqca9898qca8075_firmwareqcn5164qcs2290qrb5165mmdm9206_firmwareqcn6122_firmwareqca9990_firmwareqca1064_firmwaresd7cipq8072a_firmwaresd678wcd9385qca6574auwcn7850_firmwareqcn6112_firmwaresdx65wcd9385_firmwareipq4029wcn6750_firmwareqcs410_firmwareqcn9000_firmwareipq8173_firmwaresd680qcn9001_firmwaresd888_5gqcn9070_firmwarepmp8074qca8075pmp8074_firmwaresd678_firmwarewcn3999_firmwareqcs6125sm4375_firmwareipq6010_firmwareqca9984_firmwareqca6574qsm8350wcn3991sd_8cxcsra6640_firmwareqca6574_firmwaresa415m_firmwareipq8076a_firmwarear9380sdx20msa8195psd675_firmwareqca6574a_firmwareqca9888qca6694sd665sa8155_firmwarewsa8830_firmwaresd888_5g_firmwareipq8174_firmwareqca8337sd_8_gen1_5g_firmwaresm6250_firmwareqcn6100sdxr2_5gqcn6132wcd9341wcn3980_firmwareqcs2290_firmwarewcn6851_firmwareipq4018_firmwarewcd9326sd680_firmwareqca8084sa6155p_firmwareqcn9074_firmwareqca9992_firmwaresa4150pqcn5154qca2065qca9377_firmwaresw5100_firmwareipq8173qcn9001qcn9072sd780gqca6564au_firmwarecsrb31024qca6426qca6335_firmwaresdx55m_firmwareqcs6125_firmwareqcn9100sd690_5g_firmwareqcn5022sm8475ipq8072_firmwaresa8155ipq6000sd765qcs605_firmwarewcd9330_firmwareipq5010wcn3988_firmwareqcn9022_firmwareqcs4290qca6554aipq5028sa4155pqcn7606sw5100psd_8cx_gen2sd845qcs410qca6428Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-33290
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.12% / 32.46%
||
7 Day CHG~0.00%
Published-06 Jan, 2023 | 05:02
Updated-09 Apr, 2025 | 14:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Null pointer dereference in Bluetooth HOST

Transient DOS in Bluetooth HOST due to null pointer dereference when a mismatched argument is passed.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaremdm9150_firmwaremdm9640_firmwaremsm8996au_firmwareqca6595qca6564aucsrb31024mdm9628_firmwarewcd9360_firmwaremdm9650csra6620qca6574msm8996aumdm9250qca6595au_firmwarecsra6620_firmwareqca6574amdm9206csra6640_firmwareqca6174aqca6584au_firmwareqca6564asd626qca9377sa415mwcn3998wcd9335_firmwarewcn3980qam8295pwcd9326_firmwaremdm9628sa515mmdm9206_firmwareqca6574_firmwarewcn3660bwsa8815qca6584_firmwareqam8295p_firmwaremdm9650_firmwareqca6175awcn3660b_firmwareqca6574a_firmwareqca6584qca6574au_firmwaresdx55_firmwarewcn3680b_firmwareqca6595auwcn3998_firmwarewcn3980_firmwarewcd9360sdx20msa8295pqca6564au_firmwareqca6584auqca9367_firmwaresa515m_firmwarear8031_firmwarecsrb31024_firmwareqca9367sdx20mdm9607_firmwaresa415m_firmwareqcs405qca6574auqcn9074mdm9607qca6564a_firmwareapq8017_firmwaresd626_firmwaresdx20m_firmwarewcd9326wcd9335mdm9150wcn3680bqca6174a_firmwaremdm9250_firmwareapq8096auqca6696_firmwarear8031qca6595_firmwareqcs405_firmwareqca6696sdx55apq8096au_firmwarecsra6640sdx20_firmwarewsa8815_firmwareapq8017qcn9074_firmwaresa8295p_firmwareqca6175a_firmwaremdm9640Snapdragon
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2022-33238
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.14% / 35.56%
||
7 Day CHG~0.00%
Published-13 Dec, 2022 | 00:00
Updated-22 Apr, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Transient DOS due to loop with unreachable exit condition in WLAN while processing an incoming FTM frames. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380_firmwareqcn9072_firmwaremsm8996auwcn3615_firmwaresd730apq8009ipq6028qca6696qca6421qcn9070wcn7850qcn5122qsm8250_firmwareqca6564ausdx24wcn3660bsd720gipq8078asd460msm8996au_firmwaresdx24_firmwareqcn5124qca6430ipq9008_firmwareqcs6490_firmwaresd_8cx_gen3_firmwaresd_8cx_firmwaresdxr2_5g_firmwaresd_8cx_gen2_firmwaresd712qca8386qca6574asd865_5g_firmwareapq8017_firmwaresd835_firmwaresa8295p_firmwaresm7325pqcn5024mdm8215qcc5100qcs405qca6595qca6431_firmwaresd480_firmwareapq8064au_firmwaresm7315_firmwareqca9367qca6390_firmwaresc8180x\+sdx55qca6584_firmwareipq8070asd870_firmwareqcm6490_firmwareipq8078_firmwareipq4019qca6595ausd821_firmwareqcs4290_firmwarewcn3980qca2066sm4125_firmwaresm7315qcn9022sd765_firmwareipq8065_firmwareqca9888_firmwaresdx55mqam8295pwcn6850_firmwaresm6250pwcn3991_firmwaresa8150pwcn6740ipq8078qca6436apq8064auipq8069ipq8071aqca4024qca2062_firmwareqca2066_firmwaresw5100p_firmwareqcn9012wsa8835_firmwareapq8009_firmwareqca6391qcn9024qcn5052_firmwarecsra6620wcn3998_firmwaresd778g_firmwaresd675ipq8074aqcx315qcc5100_firmwareqca6554a_firmwareqca9886_firmwareqca7500_firmwareipq8071qcn6122sdx12sd660csrb31024_firmwaresa4150p_firmwaresdx20ipq8070qcs610qcn9012_firmwaresm7250psa8155p_firmwarecsra6620_firmwarewcn3610sdx20_firmwarewcn3910_firmwareqrb5165_firmwaresd750g_firmwareqca6696_firmwareqca2064sxr2150psd865_5gipq8071_firmwareqca9377qcn9003_firmwarewcn3990_firmwarewcn3950_firmwarewcn3988wcn3615qca8085sd750gsd768g_firmwareqcs605mdm9615_firmwaremdm9640_firmwareqca4020qca9367_firmwareipq8074a_firmwareqcn5021_firmwareqcn6102ipq4018wcd9340_firmwaresd850qca6175a_firmwaresd_675_firmwaresd855_firmwaresd662_firmwareqcn5054_firmwareqca9889sdx50mwcd9371qca1023mdm9628wcn3610_firmwaresa6155qcm4290_firmwarewcn3660b_firmwaresm4375sdx20m_firmwarewcd9360_firmwareqrb5165m_firmwareqsm8350_firmwaresd768gwcn6740_firmwarewcn6856sdx50m_firmwareqca6175asa6155pipq8074_firmwaresa8150p_firmwaresd480wcd9330wcn7851_firmwaremdm8215_firmwareqca4024_firmwaresa8145pwcn3950ipq6018_firmwareqcn5122_firmwareqcn7605ipq8078a_firmwarewcn3680b_firmwareipq6010qca6421_firmwareqca6438_firmwareqca6574au_firmwaresd662qrb5165n_firmwareqca2065_firmwareipq4029_firmwareqam8295p_firmwareqca6564_firmwareqcs610_firmwareqcn5054ar8031qca6438qcm4290qcn6102_firmwareqcn5052sd660_firmwaresd730_firmwareqca6174_firmwaresd888qcn5550qca0000wcn6856_firmwareqcn6132_firmwareaqt1000qcn5152_firmwareqcs603qca9985ar8035qca8072_firmwareqsm8250qca6420wcd9360qca4531qca9898_firmwareqcm2290mdm9250qcn9011sa515msd845_firmwareqca6428_firmwaresa515m_firmwareqcn5550_firmwareqca9994_firmwareqcn5064apq8076ipq6028_firmwareqcn6023mdm9645_firmwareqca8081_firmwareqca9984ipq8068qca9898qca8075_firmwareqcn5164qcs2290qrb5165mipq8068_firmwareqca1064_firmwaresd7csd678qca6574auwcd9385_firmwareipq9574_firmwareapq8096auqcs410_firmwareqcn9000_firmwareipq8173_firmwaresd680qcn9001_firmwareqca9379sm4375_firmwareipq6010_firmwaresd_8cxqca9987sa8195pqca6574a_firmwareqca9888sa8155_firmwarewsa8830_firmwareipq8174_firmwaresd_8_gen1_5g_firmwareqcn6100wcd9341sd680_firmwareqca9992_firmwareqca2065apq8096au_firmwareqcn9001qca6584sd780gqca6335_firmwaresdx55m_firmwareqcs6125_firmwareqcn9100ipq8072_firmwaresa8155ipq6000sd765qca6564wcd9330_firmwareqcn9022_firmwareqcs4290ipq5028sa4155pqca9369qcn7606sd845qcs410qca6428mdm9310qca6595au_firmwareqca1062qca6310qcn9000qcn7606_firmwareipq8074mdm9607qca6426_firmwareqca4531_firmwaresa6150psd710_firmwareqca9889_firmwarewsa8830ipq8072wsa8815qcn9003ipq9008wcn3680bsd855wcd9340qca0000_firmwaresdx55_firmwaresxr2150p_firmwareqca8386_firmwaresc8180x\+sdx55_firmwareqcn5022_firmwaresa4155p_firmwaremdm9650qca8072sd765g_firmwareqca8084_firmwareqcm6125_firmwarewcn6750ipq4019_firmwaresd695_firmwareqca9994qca6335sd_675qcn5024_firmwarecsra6640mdm9215_firmwareqca6430_firmwareqca8081sm7325p_firmwareqca6584ausd870ipq6018ipq5018_firmwareipq9574qcn9024_firmwareipq4028_firmwareqcn9011_firmwaresa6155_firmwarewcn6855qcx315_firmwareipq8072awcn3910ipq8070a_firmwareqca9880_firmwaresm6250qca6431wcd9370sd888_firmwareqcn5152qca9992sd720g_firmwaresd765gqca9985_firmwaresd670qcn9002_firmwareqcn9274wsa8810_firmwarewsa8815_firmwaresd850_firmwareipq8076aqcn7605_firmwaresa8155psdxr1wsa8810aqt1000_firmwareipq8076wcd9335_firmwaresm7250p_firmwareqcn5154_firmwarear9380_firmwaremdm9310_firmwarewcn6851wcd9370_firmwareqca6420_firmwareqcn6023_firmwareqca8082_firmwareipq4028qcm6125ipq8174ipq8064_firmwareqca4020_firmwareqca6391_firmwarewcd9326_firmwaresa6145papq8017qca8085_firmwarewcd9375msm8976_firmwareipq8076_firmwaremdm9215qca2062qca9980_firmwaresm6250p_firmwaresd778gwcd9371_firmwareipq8071a_firmwaremsm8976qca9980sd712_firmwarewcn7851qcn9002qca6310_firmwaresd710qca6436_firmwaresa8195p_firmwareqcn5064_firmwarewcd9341_firmwareqca9886sd821ipq6000_firmwareqca8082qca6174a_firmwareqca6564a_firmwareqcn5021mdm9650_firmwareqcs405_firmwareqcn6024_firmwareqcs6490ipq5018sdx55sd460_firmwareqca9990qca1064sd820sd665_firmwareqca7500sa6145p_firmwareipq5028_firmwaresm4125qca6390ipq5010_firmwaresa8145p_firmwaresw5100wcn6850csr8811sa415mqcs603_firmwareqca6584au_firmwareqca6320_firmwareqcn9100_firmwareqcm6490qcn6024qca6174awcd9335wcn3999sd7c_firmwaresd670_firmwaresd835qca6595_firmwareqrb5165nqrb5165mdm9250_firmwaresa8295pqcn9074qca6174qcm2290_firmwareqcn9274_firmwarewcd9380mdm9628_firmwareqca2064_firmwaresd695ipq8064qca9369_firmwaresd_8cx_gen3ipq8069_firmwarewcd9375_firmwaresa6150p_firmwarear8035_firmwareipq8070_firmwareqca9880qcn6100_firmwaresdx12_firmwareqcn6112wcn6855_firmwaresd780g_firmwareqca1023_firmwaresdx65_firmwareqcn5124_firmwaremdm9206sdxr1_firmwareqcn5164_firmwaremdm9607_firmwarewcn3990apq8076_firmwaresd690_5gqca1062_firmwarewsa8835wcn3998ar8031_firmwarecsr8811_firmwareqca8337_firmwaremdm9206_firmwareqcn6122_firmwaresd820_firmwareqca9990_firmwareipq8072a_firmwarewcd9385wcn7850_firmwareqcn6112_firmwaresdx65ipq4029mdm9640wcn6750_firmwareipq8065sd888_5gqcn9070_firmwarepmp8074qca8075pmp8074_firmwaresd678_firmwarewcn3999_firmwareqcs6125qca9984_firmwareqca6574qsm8350wcn3991csra6640_firmwareqca6574_firmwaresa415m_firmwareipq8076a_firmwarear9380qca6564asdx20msd675_firmwaresd665qca9987_firmwaresd888_5g_firmwareqca6320qca8337sm6250_firmwaresdxr2_5gqcn6132wcn3980_firmwareqcs2290_firmwarewcn6851_firmwareipq4018_firmwarewcd9326qca8084qca9379_firmwaresa6155p_firmwareqcn9074_firmwaresa4150pqcn5154qca9377_firmwaremdm9645sw5100_firmwareipq8173qcn9072qca6564au_firmwarecsrb31024qca6426sd690_5g_firmwareqcn5022sm8475qcs605_firmwareipq5010wcn3988_firmwareqca6554asw5100pmdm9615sd_8cx_gen2Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CVE-2022-33299
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.12% / 32.46%
||
7 Day CHG~0.00%
Published-06 Jan, 2023 | 05:02
Updated-09 Apr, 2025 | 14:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Null pointer dereference in Bluetooth HOST

Transient DOS due to null pointer dereference in Bluetooth HOST while receiving an attribute protocol PDU with zero length data.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaremdm9150_firmwaremdm9640_firmwaremsm8996au_firmwareqca6595qca6564aucsrb31024mdm9628_firmwarewcd9360_firmwaremdm9650csra6620qca6574msm8996aumdm9250qca6595au_firmwarecsra6620_firmwareqca6574amdm9206csra6640_firmwareqca6174aqca6584au_firmwaresd626qca9377sa415mwcn3998wcd9335_firmwarewcn3980wcd9326_firmwaremdm9628sa515mmdm9206_firmwareqca6574_firmwarewcn3660bwsa8815qca6584_firmwaremdm9650_firmwareqca6175awcn3660b_firmwareqca6574a_firmwareqca6584qca6574au_firmwaresdx55_firmwarewcn3680b_firmwareqca6595auwcn3998_firmwarewcn3980_firmwarewcd9360sdx20mqca6564au_firmwareqca6584auqca9367_firmwaresa515m_firmwarear8031_firmwarecsrb31024_firmwareqca9367sdx20mdm9607_firmwaresa415m_firmwareqcs405qca6574auqcn9074mdm9607qca6564a_firmwareapq8017_firmwaresd626_firmwaresdx20m_firmwarewcd9326wcd9335mdm9150wcn3680bqca6174a_firmwaremdm9250_firmwareapq8096auqca6696_firmwarear8031qca6595_firmwareqcs405_firmwareqca6696sdx55apq8096au_firmwarecsra6640sdx20_firmwarewsa8815_firmwareapq8017qcn9074_firmwareqca6564aqca6175a_firmwaremdm9640Snapdragon
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2022-33244
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.12% / 32.17%
||
7 Day CHG~0.00%
Published-07 Mar, 2023 | 04:43
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reachable assertion in Modem

Transient DOS due to reachable assertion in modem during MIB reception and SIB timeout

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewcn3991wsa8830qca8337_firmwarewcd9380_firmwaresd780gqca8337wcn6856_firmwaresnapdragon_4_gen_1_firmwaresdx65wsa8835wcd9380sd888_5gwcd9370wcn6855_firmwaresm7325pwcn6750wcn3998wcd9385_firmwareqcn6024_firmwaresa515msd_8_gen1_5g_firmwarewsa8815sm7325p_firmwarewcn6850sdx57m_firmwarewcn7850sd695qcn9024wcd9375_firmwareqca8081_firmwarewcn3998_firmwareqca6391wcn6740_firmwaresd778gsdx65_firmwaresa515m_firmwareqcs6490wcn7851qcm6490_firmwaresd480_firmwarewcn6851_firmwarewcn3988_firmwaresd778g_firmwareqcn9024_firmwarewsa8810_firmwaresdx57msd480wsa8810wcn6855wcn6851qca8081wcn7851_firmwarewcn6856wcd9385sd695_firmwareqcs6490_firmwarewcn6740sdx70m_firmwareqca6391_firmwarear8035wcd9375sd780g_firmwarewcd9370_firmwarewsa8830_firmwareqcn6024sdx70msnapdragon_4_gen_1qcm6490sd888_5g_firmwarewsa8835_firmwarewcn3988wcn6850_firmwarewcn7850_firmwarewsa8815_firmwaresm8475wcn6750_firmwarear8035_firmwareSnapdragonwcn6740_firmwarewcn3991_firmwareqca8337_firmwarewcd9380_firmwaresdx65_firmwaresa515m_firmwareqcm6490_firmwaresd480_firmwarewcn6851_firmwarewcn6856_firmwaresnapdragon_4_gen_1_firmwarewcn3988_firmwaresd778g_firmwareqcn9024_firmwarewsa8810_firmwarewcn7851_firmwarewcn6855_firmwaresd695_firmwareqcs6490_firmwaresdx70m_firmwareqca6391_firmwarewcd9385_firmwareqcn6024_firmwaresd780g_firmwarewcd9370_firmwaresd_8_gen1_5g_firmwaresm7325p_firmwarewsa8830_firmwaresdx57m_firmwarewsa8815_firmwaresd888_5g_firmwarewcn6850_firmwarewcn7850_firmwarewsa8835_firmwarewcd9375_firmwareqca8081_firmwarewcn3998_firmwarewcn6750_firmwarear8035_firmware
CWE ID-CWE-617
Reachable Assertion
CVE-2022-33294
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.11% / 29.28%
||
7 Day CHG~0.00%
Published-04 Apr, 2023 | 04:46
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
NULL pointer dereference in Modem

Transient DOS in Modem due to NULL pointer dereference while receiving response of lwm2m registration/update/bootstrap request message.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-mdm9206wcd9306snapdragon_wear_1300mdm8207snapdragon_wear_1200wcd9330mdm9207snapdragon_x5_lte_modem_firmwaremdm8207_firmwaresnapdragon_wear_1100mdm9205_firmwaremdm9205qca4004_firmwaremdm9206_firmwaremdm9207_firmwareqca4004qts110wcd9306_firmwaresnapdragon_wear_1100_firmwaresnapdragon_wear_1300_firmwarewcd9330_firmwaresnapdragon_wear_1200_firmwaresnapdragon_x5_lte_modemqts110_firmwareSnapdragon
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2022-33223
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.11% / 29.28%
||
7 Day CHG~0.00%
Published-04 Apr, 2023 | 04:46
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Null pointer dereference in Modem

Transient DOS in Modem due to null pointer dereference while processing the incoming packet with http chunked encoding.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-mdm9206wcd9306snapdragon_wear_1300mdm8207snapdragon_wear_1200wcd9330mdm9207snapdragon_x5_lte_modem_firmwaremdm8207_firmwaresnapdragon_wear_1100mdm9205_firmwaremdm9205qca4004_firmwaremdm9206_firmwaremdm9207_firmwareqca4004qts110wcd9306_firmwaresnapdragon_wear_1100_firmwaresnapdragon_wear_1300_firmwarewcd9330_firmwaresnapdragon_wear_1200_firmwaresnapdragon_x5_lte_modemqts110_firmwareSnapdragon
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2022-33254
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.12% / 32.17%
||
7 Day CHG~0.00%
Published-07 Mar, 2023 | 04:43
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reachable assertion in Modem

Transient DOS due to reachable assertion in Modem while processing SIB1 Message.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewsa8830qca8337qca6431_firmwaresnapdragon_4_gen_1_firmwaresdx65sd765g_firmwareqca6595au_firmwareqca6390_firmwaresd690_5gwcd9370qca6426wcn3998wcd9385_firmwaresdxr2_5g_firmwareqcn6024_firmwaresd_8_gen1_5g_firmwarewcn7850qca6574au_firmwaresdx55_firmwareqca6595auqca8081_firmwarewcd9375_firmwarewcn3998_firmwaresm7250p_firmwareqca6436_firmwaresd778gsa515m_firmwareqcs6490wcn7851sdxr2_5gwcn3988_firmwareqca6421sd778g_firmwarewsa8810_firmwaresd765gsd765_firmwareqca6436wcn6851qca8081wcn7851_firmwarewcd9385wcd9341qca6431qca6696_firmwareqcs6490_firmwaresd750gsd870_firmwaresdx70m_firmwareqca6390ar8035sd750g_firmwareaqt1000wcd9375wsa8830_firmwaresd855_firmwaresd865_5g_firmwaresnapdragon_4_gen_1qcm6490sd888_5g_firmwarewcn3988wcn6850_firmwarewcn7850_firmwarewsa8815_firmwarewsa8835_firmwareqcx315sm8475wcn6750_firmwarewcn3991qca8337_firmwarewcd9380_firmwaresd780gsd865_5gsdx55m_firmwarewcn6856_firmwarewsa8835qcx315_firmwarewcd9380sd888_5gqca6574asd690_5g_firmwaresdx50m_firmwarewcn6855_firmwaresm7325pwcn6750sa515msd855wsa8815sm7325p_firmwarewcn6850sdx57m_firmwaresd765qca6426_firmwareqca6574a_firmwaresd695sd768g_firmwareqcn9024qca6391sdx55mqca6421_firmwareaqt1000_firmwarewcn6740_firmwaresdx65_firmwareqcm6490_firmwaresdx50msd480_firmwarewcn6851_firmwareqca6574auqcn9024_firmwaresdx57mwcd9341_firmwaresd480sd870wsa8810wcn6855wcn6856sd695_firmwaresd768gwcn6740qca6696qca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55qcn6024sdx70msm7250par8035_firmwareSnapdragonwcn3991_firmwareqca8337_firmwarewcd9380_firmwareqca6431_firmwaresdx55m_firmwarewcn6856_firmwaresnapdragon_4_gen_1_firmwareqcx315_firmwaresd765g_firmwareqca6595au_firmwareqca6390_firmwaresd690_5g_firmwaresdx50m_firmwarewcn6855_firmwarewcd9385_firmwaresdxr2_5g_firmwareqcn6024_firmwaresd_8_gen1_5g_firmwaresm7325p_firmwaresdx57m_firmwareqca6426_firmwareqca6574a_firmwareqca6574au_firmwaresd768g_firmwaresdx55_firmwarewcd9375_firmwareqca8081_firmwarewcn3998_firmwaresm7250p_firmwareqca6436_firmwareqca6421_firmwareaqt1000_firmwarewcn6740_firmwaresdx65_firmwaresa515m_firmwareqcm6490_firmwaresd480_firmwarewcn6851_firmwarewcn3988_firmwaresd778g_firmwareqcn9024_firmwarewsa8810_firmwarewcd9341_firmwaresd765_firmwarewcn7851_firmwaresd695_firmwareqca6696_firmwareqcs6490_firmwaresd870_firmwaresdx70m_firmwareqca6391_firmwaresd750g_firmwaresd780g_firmwarewcd9370_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewsa8815_firmwaresd888_5g_firmwarewsa8835_firmwarewcn6850_firmwarewcn7850_firmwarewcn6750_firmwarear8035_firmware
CWE ID-CWE-617
Reachable Assertion
CVE-2022-25670
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.15% / 36.79%
||
7 Day CHG~0.00%
Published-16 Sep, 2022 | 05:25
Updated-03 Aug, 2024 | 04:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Denial of service in WLAN HOST due to buffer over read while unpacking frames in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarewcn3991_firmwarewsa8830sd678mdm9640_firmwaresm6250p_firmwarewcn3998_firmwareqcs2290_firmwareqca8337mdm9628_firmwaremdm9650sdx65csra6620qcs4290wcn3950_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqcs2290qca6390_firmwareapq8009_firmwaresa6155msm8917sd690_5gsd730_firmwarewcd9370csra6620_firmwareqcs605_firmwaresd_675_firmwaresd675_firmwarecsra6640_firmwareqca6426sd632wcn3990_firmwareqrb5165n_firmwareqca9377wcn3998sdw2500_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcn3950sm4125mdm9628sd720gwcd9326_firmwarewcn3615_firmwaresd_8_gen1_5g_firmwarewcn3660bsd450_firmwaresd662sd460_firmwareqca4020sa8155qca6584qca6574au_firmwaresdx55_firmwarewcn3680b_firmwareqca6595auqca8081_firmwaresa6155_firmwaresdx12_firmwaremsm8909wsm7250p_firmwareapq8009w_firmwareqca6420qca6436_firmwareapq8053_firmwareqrb5165nwcn3610_firmwaresm7450_firmwareqca6564au_firmwaresa6155p_firmwareqca9367_firmwarepm8937wcn3999wcn7851sd429qrb5165_firmwareqrb5165m_firmwaresdxr2_5gqca9367sa8155_firmwaresd662_firmwaremdm9607_firmwareqcs405qca6430wcn3988_firmwaresa6145p_firmwaresd429_firmwaresm6250sa8195papq8017_firmwarewsa8810_firmwarequalcomm215_firmwaresd765gsd765_firmwareqca4020_firmwareqca6436wcd9326sa6155pwcd9335wcn6851qca8081wcn7851_firmwaremsm8937qca6174a_firmwareqcs4290_firmwarewcd9385wcd9341wcn3660_firmwarepm8937_firmwareqca6696_firmwaresd750gsd870_firmwarear8035qca6390sd750g_firmwareaqt1000wcd9375wcn3910_firmwaresm6250_firmwaremsm8953_firmwarewsa8830_firmwaremsm8917_firmwaresd855_firmwaresd865_5g_firmwarewcn3620_firmwaresdx20_firmwarewcn3988sd888_5g_firmwarewcn6850_firmwarewcn3620wsa8815_firmwarewsa8835_firmwaresa8195p_firmwaresm7450apq8017sm8475qca6564awcn6750_firmwaresd450wcn3610mdm9640qcm2290_firmwarewcn3991qca8337_firmwarewcd9380_firmwarewcn3990sd_675sd865_5gwcn3615qca6564ausdx55m_firmwarewcn6856_firmwarewcd9375_firmwaremsm8909w_firmwareqca6574sd632_firmwarewsa8835wcd9380sd888_5gsm6250pwcn3999_firmwarequalcomm215qca6574asd690_5g_firmwarewcn6855_firmwareqca9379_firmwareqca6174aqca6430_firmwarewcd9335_firmwarewcn3980sd439_firmwarewcn6750qca6574_firmwareqcs605sd855sm4125_firmwarewcn6850wsa8815wcn3910qca6584_firmwaremsm8937_firmwaremdm9650_firmwareqca6175asd765qca6426_firmwarewcn3660b_firmwarewcn3680qca6574a_firmwaresd768g_firmwareqrb5165mwcn3980_firmwareapq8009qca6391sd460sd730sdx55msm8475_firmwareaqt1000_firmwaremsm8953sdx65_firmwaremdm9626sd678_firmwarear8031_firmwareqcm4290wcn3680_firmwarewsa8832_firmwaresdx20qrb5165wcn6851_firmwaremdm9626_firmwareqca6574ausa8155p_firmwaremdm9607qca6564a_firmwareapq8009wwcd9341_firmwareqcm4290_firmwaresd870wsa8810wcn6855wsa8832wcn6856sa6145pwcn3680bsd768gapq8096auar8031qcs405_firmwareqca6696qca6391_firmwarewcd9370_firmwaresdw2500sdx55apq8053apq8096au_firmwarecsra6640sa8155psd675sd439sm7250psd720g_firmwaresdx12wcn3660sm8475p_firmwareqca9379qca6175a_firmwarear8035_firmwareqcm2290sm8475pSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-25702
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.19% / 41.11%
||
7 Day CHG~0.00%
Published-13 Dec, 2022 | 00:00
Updated-22 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Denial of service in modem due to reachable assertion while processing reconfiguration message in Snapdragon Auto, Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380_firmwarewcd9340_firmwarewcn3615_firmwaresd429_firmwareapq8037_firmwareapq8009sd855_firmwaresdx50mqcn6024_firmwaresdx55qca6421wcn3610_firmwarewcn7850qca6426_firmwaremsm8937wcn3660bwcn3660b_firmwaresm4375sd205_firmwarewsa8830sd768gwcn6740_firmwarewcn6856wsa8815qca6390sda429w_firmwaresdx50m_firmwarewcn3680bsd480wcn7851_firmwarewcn3620_firmwaresd855wcd9340wcn6850sdx55_firmwaremsm8608sdxr2_5g_firmwareapq8037qcn6024sd765g_firmwarewcn3680b_firmwaremsm8108_firmwaresd865_5g_firmwareqca6421_firmwareapq8017_firmwaresdm429w_firmwarewcn6750msm8917_firmwaresd695_firmwarewcd9380msm8108qca6431_firmwaremsm8208sd695sd480_firmwareqca8081wcd9375_firmwarear8035_firmwaresd888sm7315_firmwarewcn6856_firmwaresd870aqt1000qca6390_firmwarear8035qcn9024_firmwarewcn6855_firmwarewcn6855sd780g_firmwareqcx315_firmwaresdx65_firmwaresd870_firmwaresa515mqca6431sa515m_firmwarewcd9370sd888_firmwarewcn3980sd429sd439_firmwaresd690_5gsm7315qca8081_firmwaresd765_firmwaresd765gwsa8835sdx55mmsm8208_firmwaremsm8917wcn3998wcn6850_firmwarewsa8810_firmwareqca8337_firmwarewsa8815_firmwarewcn3991_firmwarewcn6740msm8608_firmwarewcd9385qca6436wcn7850_firmwaresdx65wcd9385_firmwarewcn6750_firmwarewsa8810sd210aqt1000_firmwarewsa8835_firmwaresm4375_firmwaresm7250p_firmwareapq8009_firmwareqca6391qcn9024wcn3991wcn3998_firmwarewcn6851wcd9370_firmwaresd439sda429wqcx315sd210_firmwarewsa8830_firmwareqca8337sd_8_gen1_5g_firmwarefsm10055_firmwaresdxr2_5gfsm10055wcd9341wcn3980_firmwarewcn6851_firmwaresdm429wwcd9326qca6391_firmwaresd205wcd9326_firmwaresm7250pmsm8937_firmwarewcn3610msm8209apq8017wcd9375sd750g_firmwaresd865_5gsd780gqca6426sdx55m_firmwaresd690_5g_firmwaresm8475wcn3988wcn3615sd750gwcn3620sd765sd768g_firmwarewcn3988_firmwarewcn7851msm8209_firmwareqca6436_firmwarewcd9341_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
CWE ID-CWE-617
Reachable Assertion
CVE-2022-25735
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.14% / 35.46%
||
7 Day CHG~0.00%
Published-09 Feb, 2023 | 06:58
Updated-03 Aug, 2024 | 04:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Null Pointer Dereference in MODEM

Denial of service in modem due to missing null check while processing TCP or UDP packets from server

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380_firmwarewsa8830ssg2125psxr2230p_firmwarewcd9330wcn6856_firmwarecsra6620qca4024_firmwarewsa8835sxr1230p_firmwarewcd9380csra6620_firmwaressg2125p_firmwaressg2115pmdm9206csra6640_firmwarewcn6855_firmwaresxr1230pwcd9335_firmwarewcn3980wcn3998wcd9385_firmwaremdm9205mdm9206_firmwarewsa8815sxr2230pqca4020wcn7850wcn3999_firmwarewcn3998_firmwarewcn3980_firmwarewcd9330_firmwaremdm9207wcd9306mdm8207wcn3999wcn7851ar8031_firmwarewsa8832_firmwareqca4004_firmwaremdm9607_firmwareqcs405qts110mdm9607wcd9306_firmwarewsa8810_firmwarewsa8810wsa8832qca4020_firmwarewcn6855wcd9335wcn7851_firmwarewcn6856wcd9385ar8031qcs405_firmwaremdm8207_firmwaremdm9205_firmwareqca4024mdm9207_firmwareqca4004csra6640wsa8830_firmwarewsa8815_firmwarewsa8835_firmwarewcn7850_firmwaressg2115p_firmwareqts110_firmwareSnapdragonwcd9380_firmwaresxr2230p_firmwarear8031_firmwarewsa8832_firmwarewcn6856_firmwareqca4004_firmwaremdm9607_firmwareqca4024_firmwarewcd9306_firmwaresxr1230p_firmwarewsa8810_firmwareqca4020_firmwaressg2125p_firmwarecsra6620_firmwarewcn7851_firmwarewcn6855_firmwarecsra6640_firmwareqcs405_firmwarewcd9335_firmwaremdm8207_firmwaremdm9205_firmwarewcd9385_firmwaremdm9206_firmwaremdm9207_firmwarewsa8830_firmwarewsa8815_firmwarewsa8835_firmwarewcn7850_firmwaressg2115p_firmwarewcn3999_firmwarewcn3998_firmwarewcn3980_firmwarewcd9330_firmwareqts110_firmware
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2022-25710
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.20% / 42.74%
||
7 Day CHG~0.00%
Published-15 Nov, 2022 | 00:00
Updated-22 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Denial of service due to null pointer dereference when GATT is disconnected in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3615_firmwaremsm8996auqca6595au_firmwareqca6175a_firmwareapq8009qca6174a_firmwareqca6564a_firmwaremdm9150_firmwareqam8295pwcn3998ar8031_firmwaremdm9650_firmwareqcs405_firmwaresdx55wsa8810_firmwarewsa8815_firmwaresa8150pmdm9206_firmwaremdm9607qca6696mdm9628wcn3610_firmwaresa6155qca6564auwcn3660bqca6574auwcn3660b_firmwaremdm9640sa6150papq8096ausdx20m_firmwaresa8155pmsm8996au_firmwarewcd9360_firmwarewsa8810sa6145p_firmwaresd626wsa8815sd626_firmwarewcn3680bqca6175asa6155pwcd9335_firmwaresa8150p_firmwareqca9379sa8145p_firmwarewcn3999_firmwareapq8009_firmwareqca6574csra6620wcn3998_firmwarecsra6640_firmwaresa8145psa415msdx55_firmwareqca6574_firmwaresa415m_firmwareqca6564aqca6584au_firmwaresdx20msa8195pqca6574a_firmwareqca6174awcd9335wcn3999sa8155_firmwaremdm9650wcn3680b_firmwareqca6574aqca6595_firmwareqca4020_firmwareapq8017_firmwarewcn3980_firmwareqca6574au_firmwarecsrb31024_firmwaremdm9250_firmwaresa4150p_firmwaresdx20qam8295p_firmwaresa8295pwcd9326sa8295p_firmwareqca9379_firmwaresa6155p_firmwaresa4150pwcd9326_firmwareqca9367_firmwaresa8155p_firmwarecsra6620_firmwarear8031sa6145psdx20_firmwareqca9377_firmwareqcs405wcn3610qca6595csra6640mdm9628_firmwareapq8017apq8096au_firmwareqca6584qca6696_firmwaresa6150p_firmwareqca6584auqca6564au_firmwarecsrb31024qca9377mdm9150qca9367wcn3615sa8155wcd9360sa6155_firmwareqca6584_firmwaremdm9250sa515mmdm9206mdm9640_firmwaresa515m_firmwaresa8195p_firmwareqca6595auqca4020mdm9607_firmwarewcn3980Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2022-25734
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.14% / 35.56%
||
7 Day CHG~0.00%
Published-09 Feb, 2023 | 06:58
Updated-24 Mar, 2025 | 18:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Loop with Unreachable Exit Condition in MODEM

Denial of service in modem due to missing null check while processing IP packets with padding

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380_firmwarewsa8830ssg2125psxr2230p_firmwarewcd9330wcn6856_firmwarecsra6620qca4024_firmwarewsa8835sxr1230p_firmwarewcd9380csra6620_firmwaressg2125p_firmwaressg2115pmdm9206csra6640_firmwarewcn6855_firmwaresxr1230pwcd9335_firmwarewcn3980wcn3998wcd9385_firmwaremdm9205mdm9206_firmwarewsa8815sxr2230pqca4020wcn7850wcn3999_firmwarewcn3998_firmwarewcn3980_firmwarewcd9330_firmwaremdm9207wcd9306mdm8207wcn3999wcn7851ar8031_firmwarewsa8832_firmwareqca4004_firmwaremdm9607_firmwareqcs405qts110mdm9607wcd9306_firmwarewsa8810_firmwarewsa8810wsa8832qca4020_firmwarewcn6855wcd9335qca4010wcn7851_firmwarewcn6856wcd9385ar8031qcs405_firmwaremdm8207_firmwaremdm9205_firmwareqca4024mdm9207_firmwareqca4004csra6640wsa8830_firmwarewsa8815_firmwarewsa8835_firmwarewcn7850_firmwaressg2115p_firmwareqca4010_firmwareqts110_firmwareSnapdragon
CWE ID-CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CVE-2022-25673
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.19% / 41.11%
||
7 Day CHG~0.00%
Published-13 Dec, 2022 | 00:00
Updated-22 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Denial of service in MODEM due to reachable assertion while processing configuration from network in Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-ar8035_firmwarewcd9380_firmwarewcn6856_firmwarewsa8830wcn6856sm8475qca8081_firmwarewsa8835_firmwarewsa8835wcn7851_firmwarear8035qcn9024_firmwarewcn6855_firmwareqcn9024qcn6024_firmwareqca8337_firmwarewcn6855wcn7851sdx65_firmwarewcd9380wcn7850qcn6024wcn7850_firmwarewsa8830_firmwaresdx65qca8337sd_8_gen1_5g_firmwareqca8081Snapdragon Mobile
CWE ID-CWE-617
Reachable Assertion
CVE-2022-25749
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.28% / 50.67%
||
7 Day CHG~0.00%
Published-19 Oct, 2022 | 00:00
Updated-22 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Transient Denial-of-Service in WLAN due to buffer over-read while parsing MDNS frames. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380_firmwareqcn9072_firmwaremsm8996auwcn3615_firmwaresd730apq8009ipq6028qca6696qca6421qcn9070wcn7850qcn5122qsm8250_firmwareqca6564ausdx24wcn3660bsd720gipq8078asd460msm8996au_firmwaresdx24_firmwareqcn5124qca6430ipq9008_firmwareqcs6490_firmwaresd_8cx_gen3_firmwaresd_8cx_firmwaresdxr2_5g_firmwaresd_8cx_gen2_firmwaresd712qca8386qca6574asd865_5g_firmwareapq8017_firmwaresd835_firmwaresa8295p_firmwaresm7325pqcn5024mdm8215qcc5100qcs405qca6595qca6431_firmwaresd480_firmwareapq8064au_firmwaresm7315_firmwareqca9367qca6390_firmwaresc8180x\+sdx55qca6584_firmwareipq8070asd870_firmwareqcm6490_firmwareipq8078_firmwareqca6595auqcs4290_firmwarewcn3980qca2066sm4125_firmwaresm7315qcn9022sd765_firmwareqca9888_firmwaresdx55mqam8295pwcn6850_firmwaresm6250pwcn3991_firmwaresa8150pwcn6740ipq8078qca6436apq8064auipq8069ipq8071aqca4024qca6694_firmwareqca2062_firmwareqca2066_firmwaresw5100p_firmwareqcn9012wsa8835_firmwareapq8009_firmwareqca6391qcn9024qcn5052_firmwarecsra6620wcn3998_firmwaresd778g_firmwaresd675ipq8074aqcx315qcc5100_firmwareqca6554a_firmwareipq8071qcn6122sdx12sd660csrb31024_firmwaresa4150p_firmwaresdx20ipq8070qcs610qcn9012_firmwaresm7250psa8155p_firmwarecsra6620_firmwarewcn3610sdx20_firmwarewcn3910_firmwareqrb5165_firmwaresd750g_firmwareqca6696_firmwareqca2064sxr2150psd865_5gipq8071_firmwareqca9377qcn9003_firmwarewcn3990_firmwarewcn3950_firmwarewcn3988wcn3615qca8085sd750gsd768g_firmwareqcs605mdm9615_firmwaremdm9640_firmwareqca4020qca9367_firmwareipq8074a_firmwareqcn5021_firmwareqcn6102ipq4018wcd9340_firmwaresd850qca6175a_firmwaresd_675_firmwaresd855_firmwaresd662_firmwareqcn5054_firmwareqca9889sdx50mwcd9371qca1023sd_455_firmwaremdm9628wcn3610_firmwaresa6155qcm4290_firmwarewcn3660b_firmwaresm4375sdx20m_firmwarewcd9360_firmwareqrb5165m_firmwareqsm8350_firmwaresd768gwcn6740_firmwarewcn6856sdx50m_firmwareqca6175asa6155pipq8074_firmwaresa8150p_firmwaresd480wcd9330wcn7851_firmwaremdm8215_firmwareqca4024_firmwaresa8145pwcn3950ipq6018_firmwareqcn5122_firmwareqcn7605ipq8078a_firmwarewcn3680b_firmwareipq6010qca6421_firmwareqca6438_firmwareqca6574au_firmwaresd662qrb5165n_firmwareqca2065_firmwareipq4029_firmwareqam8295p_firmwareqca6564_firmwareqcs610_firmwareqcn5054ar8031qca6438qcm4290qcn6102_firmwareqcn5052sd660_firmwaresd730_firmwareqca6174_firmwaresd888qca0000wcn6856_firmwareqcn6132_firmwareaqt1000qcn5152_firmwareqcs603ar8035qca8072_firmwareqsm8250qca6420wcd9360qca4531qca9898_firmwareqcm2290mdm9250qcn9011sa515msd845_firmwareqca6428_firmwaresa515m_firmwareqca9994_firmwareapq8076ipq6028_firmwareqcn6023mdm9645_firmwareqca8081_firmwareqca9984qca9898qca8075_firmwareqcn5164qcs2290qrb5165mqca1064_firmwaresd7csd678qca6574auwcd9385_firmwareapq8096auqcs410_firmwareqcn9000_firmwareipq8173_firmwaresd680qcn9001_firmwareqca9379sm4375_firmwareipq6010_firmwaresd_8cxsa8195pqca6574a_firmwareqca9888qca6694sa8155_firmwarewsa8830_firmwareipq8174_firmwaresd_8_gen1_5g_firmwareqcn6100wcd9341sd680_firmwareqca9992_firmwareqca2065apq8096au_firmwareqcn9001qca6584sd780gqca6335_firmwaresdx55m_firmwareqcs6125_firmwareqcn9100ipq8072_firmwaresa8155ipq6000sd765qca6564wcd9330_firmwareqcn9022_firmwareqcs4290ipq5028sa4155pqca9369qcn7606sd845qcs410qca6428mdm9310qca6595au_firmwareqca1062qca6310qcn9000qcn7606_firmwareipq8074mdm9607qca6426_firmwareqca4531_firmwaresa6150psd710_firmwareqca9889_firmwarewsa8830ipq8072wsa8815qcn9003ipq9008wcn3680bsd855wcd9340qca0000_firmwaresdx55_firmwaresxr2150p_firmwareqca8386_firmwaresc8180x\+sdx55_firmwareqcn5022_firmwaresa4155p_firmwaremdm9650qca8072sd765g_firmwareqca8084_firmwareqcm6125_firmwarewcn6750sd_636_firmwaresd695_firmwareqca9994qca6335sd_675qcn5024_firmwarecsra6640mdm9215_firmwareqca6430_firmwareqca8081sm7325p_firmwareqca6584ausd870ipq6018ipq5018_firmwareqcn9024_firmwareipq4028_firmwareqcn9011_firmwaresa6155_firmwarewcn6855qcx315_firmwareipq8072awcn3910ipq8070a_firmwaresm6250sdm630_firmwareqca6431wcd9370sd888_firmwareqcn5152qca9992sd720g_firmwaresd765gsd670qcn9002_firmwareqcn9274sd_455wsa8810_firmwarewsa8815_firmwaresd850_firmwareipq8076aqcn7605_firmwaresa8155psdxr1wsa8810sdm630aqt1000_firmwareipq8076wcd9335_firmwaresm7250p_firmwareqcn5154_firmwarear9380_firmwaremdm9310_firmwarewcn6851wcd9370_firmwareqca6420_firmwareqcn6023_firmwareqca8082_firmwareipq4028qcm6125ipq8174ipq8064_firmwareqca4020_firmwareqca6391_firmwarewcd9326_firmwaresa6145papq8017qca8085_firmwarewcd9375msm8976_firmwareipq8076_firmwaremdm9215qca2062qca9980_firmwaresm6250p_firmwaresd778gwcd9371_firmwareipq8071a_firmwaremsm8976qca9980sd712_firmwarewcn7851qcn9002qca6310_firmwaresd710qca6436_firmwaresa8195p_firmwaresd_636wcd9341_firmwareipq6000_firmwareqca8082qca6174a_firmwareqca6564a_firmwareqcn5021mdm9650_firmwareqcs405_firmwareqcn6024_firmwareqcs6490ipq5018sdx55sd460_firmwareqca9990qca1064sd820sd665_firmwaresa6145p_firmwareipq5028_firmwaresm4125qca6390ipq5010_firmwaresa8145p_firmwaresw5100wcn6850csr8811sa415mqcs603_firmwareqca6584au_firmwareqca6320_firmwareqcn9100_firmwareqcm6490qcn6024qca6174awcd9335wcn3999sd7c_firmwaresd670_firmwaresd835qca6595_firmwareqrb5165nqrb5165mdm9250_firmwaresa8295pqcn9074qca6174qcm2290_firmwareqcn9274_firmwarewcd9380mdm9628_firmwareqca2064_firmwaresd695ipq8064qca9369_firmwaresd_8cx_gen3ipq8069_firmwarewcd9375_firmwaresa6150p_firmwarear8035_firmwareipq8070_firmwareqcn6100_firmwaresdx12_firmwareqcn6112wcn6855_firmwaresd780g_firmwareqca1023_firmwaresdx65_firmwareqcn5124_firmwaremdm9206sdxr1_firmwareqcn5164_firmwaremdm9607_firmwarewcn3990apq8076_firmwaresd690_5gqca1062_firmwarewsa8835wcn3998ar8031_firmwarecsr8811_firmwareqca8337_firmwaremdm9206_firmwareqcn6122_firmwaresd820_firmwareqca9990_firmwareipq8072a_firmwarewcd9385wcn7850_firmwareqcn6112_firmwaresdx65ipq4029mdm9640wcn6750_firmwaresd888_5gqcn9070_firmwarepmp8074qca8075pmp8074_firmwaresd678_firmwarewcn3999_firmwareqcs6125qca9984_firmwareqca6574qsm8350wcn3991csra6640_firmwareqca6574_firmwaresa415m_firmwareipq8076a_firmwarear9380qca6564asdx20msd675_firmwaresd665sd888_5g_firmwareqca6320qca8337sm6250_firmwaresdxr2_5gqcn6132wcn3980_firmwareqcs2290_firmwarewcn6851_firmwareipq4018_firmwarewcd9326qca8084qca9379_firmwaresa6155p_firmwareqcn9074_firmwaresa4150pqcn5154qca9377_firmwaremdm9645sw5100_firmwareipq8173qcn9072qca6564au_firmwarecsrb31024qca6426sd690_5g_firmwareqcn5022sm8475qcs605_firmwareipq5010wcn3988_firmwareqca6554asw5100pmdm9615sd_8cx_gen2Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-125
Out-of-bounds Read
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 25
  • 26
  • Next
Details not found