Transient DOS due to improper input validation in WLAN Host while parsing frame during defragmentation.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
Transient DOS due to improper input validation in WLAN Host while parsing frame during defragmentation.
Version | Base score | Base severity | Vector |
---|---|---|---|
3.1 | 7.5 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin | N/A |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin | x_transferred |
Transient DOS due to improper input validation in WLAN Host while parsing frame during defragmentation.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 3.1 | 7.5 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Secondary | 3.1 | 7.5 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Hyperlink | Source | Resource |
---|---|---|
https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin | product-security@qualcomm.com | Vendor Advisory |