Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-21667

Summary
Assigner-qualcomm
Assigner Org ID-2cfc7d3e-20d3-47ac-8db7-1b7285aff15f
Published At-05 Sep, 2023 | 06:24
Updated At-02 Aug, 2024 | 09:44
Rejected At-
Credits

Buffer Over-read in Bluetooth HOST

Transient DOS in Bluetooth HOST while passing descriptor to validate the blacklisted BT keyboard.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:qualcomm
Assigner Org ID:2cfc7d3e-20d3-47ac-8db7-1b7285aff15f
Published At:05 Sep, 2023 | 06:24
Updated At:02 Aug, 2024 | 09:44
Rejected At:
â–¼CVE Numbering Authority (CNA)
Buffer Over-read in Bluetooth HOST

Transient DOS in Bluetooth HOST while passing descriptor to validate the blacklisted BT keyboard.

Affected Products
Vendor
Qualcomm Technologies, Inc.Qualcomm, Inc.
Product
Snapdragon
Platforms
  • Snapdragon Auto
  • Snapdragon Compute
  • Snapdragon Consumer IOT
  • Snapdragon Industrial IOT
  • Snapdragon Mobile
  • Snapdragon Wearables
Default Status
unaffected
Versions
Affected
  • QCA6390
  • QCA6391
  • QCA6426
  • QCA6436
  • QCA6574AU
  • QCA6595AU
  • QCA6696
  • QCC5100
  • QCN9074
  • QCS410
  • QCS610
  • SA6145P
  • SA6150P
  • SA6155P
  • SA8145P
  • SA8150P
  • SA8155P
  • SA8195P
  • SD 8 Gen1 5G
  • SD865 5G
  • SD870
  • SDX55M
  • SDXR2 5G
  • SW5100
  • SW5100P
  • WCD9341
  • WCD9370
  • WCD9380
  • WCN3660B
  • WCN3680B
  • WCN3950
  • WCN3980
  • WCN3988
  • WCN6850
  • WCN6851
  • WCN6855
  • WCN6856
  • WCN7850
  • WCN7851
  • WSA8810
  • WSA8815
  • WSA8830
  • WSA8835
Problem Types
TypeCWE IDDescription
CWECWE-126CWE-126 Buffer Over-read
Type: CWE
CWE ID: CWE-126
Description: CWE-126 Buffer Over-read
Metrics
VersionBase scoreBase severityVector
3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin
N/A
Hyperlink: https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin
Resource: N/A
â–¼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin
x_transferred
Hyperlink: https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin
Resource:
x_transferred
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:product-security@qualcomm.com
Published At:05 Sep, 2023 | 07:15
Updated At:12 Apr, 2024 | 17:16

Transient DOS in Bluetooth HOST while passing descriptor to validate the blacklisted BT keyboard.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.5MEDIUM
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Secondary3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Secondary
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Qualcomm Technologies, Inc.
qualcomm
>>qca6390_firmware>>-
cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6390>>-
cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6391_firmware>>-
cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6391>>-
cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6426_firmware>>-
cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6426>>-
cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6436_firmware>>-
cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6436>>-
cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6574au_firmware>>-
cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6574au>>-
cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6595au_firmware>>-
cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6595au>>-
cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6696_firmware>>-
cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6696>>-
cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qcc5100_firmware>>-
cpe:2.3:o:qualcomm:qcc5100_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qcc5100>>-
cpe:2.3:h:qualcomm:qcc5100:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qcn9074_firmware>>-
cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qcn9074>>-
cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qcs410_firmware>>-
cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qcs410>>-
cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qcs610_firmware>>-
cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qcs610>>-
cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sa6145p_firmware>>-
cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sa6145p>>-
cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sa6150p_firmware>>-
cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sa6150p>>-
cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sa6155p_firmware>>-
cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sa6155p>>-
cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sa8145p_firmware>>-
cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sa8145p>>-
cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sa8150p_firmware>>-
cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sa8150p>>-
cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sa8155p_firmware>>-
cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sa8155p>>-
cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sa8195p_firmware>>-
cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sa8195p>>-
cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sd_8_gen1_5g_firmware>>-
cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sd_8_gen1_5g>>-
cpe:2.3:h:qualcomm:sd_8_gen1_5g:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sd865_5g_firmware>>-
cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sd865_5g>>-
cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sd870_firmware>>-
cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sd870>>-
cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sdx55m_firmware>>-
cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sdx55m>>-
cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sdxr2_5g_firmware>>-
cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sdxr2_5g>>-
cpe:2.3:h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sw5100_firmware>>-
cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sw5100>>-
cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sw5100p_firmware>>-
cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sw5100p>>-
cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-125Primarynvd@nist.gov
CWE-126Secondaryproduct-security@qualcomm.com
CWE ID: CWE-125
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-126
Type: Secondary
Source: product-security@qualcomm.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletinproduct-security@qualcomm.com
Patch
Vendor Advisory
Hyperlink: https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin
Source: product-security@qualcomm.com
Resource:
Patch
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

512Records found

CVE-2025-47401
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 11.84%
||
7 Day CHG+0.01%
Published-04 May, 2026 | 16:43
Updated-06 May, 2026 | 18:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in WLAN HAL

Transient DOS when processing target power rate tables during channel configuration.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca2062_firmwareqrb5165mflight_rb5_5gqxm8083qca8101_firmwaresnapdragon_8_gen_2_mobilesa7775pqxm1083wsa8845h_firmwareqcn9012_firmwareqca2064_firmwarewcd9378wsa8832_firmwareipq9570_firmwarefastconnect_6700wcd9395_firmwaresa510m_firmwarewsa8850sm8845psm8650q_firmwaresnapdragon_8_elite_gen_5_firmwaresnapdragon_x75_5g_modem-rfg3x_gen_2sa7775p_firmwarex2000094_firmwarenetraniqam8255plemans_au_lgitx1e80100_firmwareqxm1083_firmwareqam8295p_firmwaresm7435_firmwareiqx5121snapdragon_x65_5g_modem-rf_firmwarewcn7861_firmwarewsa8840_firmwareqca8695au_firmwareipq5332_firmwarenetworking_pro_810qamsrv1mqamsrv1hqcn5154sm8475p_firmwarefwa_gen_3_ultra_firmwareqca2066qca6595au_firmwareqmp1000snapdragon_auto_5g_modem-rfqca8085wsa8850wqca6584auqcn9024_firmwareqcn5224robotics_rb5_firmwaresnapdragon_8_gen1_5glemansau_firmwareqpa1083bdqxm1094_firmwaresxr2250pqcn6412qca6174a_firmwareqca6574a_firmwaresnapdragon_888_5g_mobileqca8101milos_iot_firmwaremilosxg101039_firmwarelemans_au_lgit_firmwaresm6850qxm1095wcn6650wcn7760_firmwaresnapdragon_8_elite_firmwareqmp1000_firmwarewcn6650_firmwarenetworking_pro_1200qcs8550sm8635_firmwarecq8725ssa8770p_firmwarewcn3950_firmwarewsa8810_firmwarewsa8832sm8475pqcs4490_firmwaresnapdragon_6_gen_3_mobileqca2062srv1hsar1165p_firmwarefwa_gen_3_ultrawcn7881_firmwaresnapdragon_8_elitefastconnect_6700_firmwaresar2130psnapdragon_x72_5g_modem-rf_firmwareqcn9000qcn6024qrb5165n_firmwarevideo_collaboration_vc3qfw7124qcc710snapdragon_7_gen_1_mobile_firmwarewcd9378c_firmwarex2000077snapdragon_8\+_gen_2_mobileipq5302sm8845p_firmwarewsa8855c_firmwareqcn5124g3x_gen_2_firmwarepalawan25_firmwareqca6174asm7550_firmwareqam8255p_firmwaresnapdragon_4_gen_2_mobile_firmwaresm7425_firmwareqcn9012qln1083bdsa8620pqca6797aq_firmwarewcn7881qca8384_firmwarefastconnect_6200_firmwareqca6574_firmwareqam8397p_firmwarewcd9370_firmwarewsa8830_firmwareimmersive_home_326_firmwareqca6554a_firmwaresm8735psrv1m_firmwareqca6696_firmwareqca6698aqqcm5430networking_pro_610_firmwaresxr2330p_firmwareqcn9160qxm1096_firmwareqxm8083_firmwareqca6564ausc8380xp_firmwaresm7425snapdragon_6_gen_4_mobilewcd9340_firmwareqcn5224_firmwareqxm1095_firmwarevideo_collaboration_vc3_firmwareqca2066_firmwareqcs8550_firmwarear8035molokaiipq5302_firmwareipq9554_firmwaresnapdragon_x62_5g_modem-rfqfw7114_firmwarefastconnect_6900qcf8001_firmwareimmersive_home_3210_firmwaresa7255pxg101039qca8081_firmwarex2000086_firmwareqca6391_firmwaresnapdragon_4_gen_2_mobileqcn9011_firmwarex2000086qca6574qamsrv1m_firmwareqca6574asa6155psa9000p_firmwaresnapdragon_7\+_gen_2_mobile_firmwaresxr2230p_firmwaresm6650psm7635p_firmwaresa510mfastconnect_7800sa8295p_firmwareqcs4490sm6850_firmwarewsa8850_firmwarecq7790sm7525pandeiroqca6391qca6584au_firmwaresnapdragon_6_gen_3_mobile_firmwareqca2064qca6688aq_firmwaresa8155p_firmwaresm6450p_firmwarewsa8835ipq5312wcd9340snapdragon_6_gen_4_mobile_firmwaresm7675snapdragon_8\+_gen_1_mobile_firmwaresxr2330pcq8750m_firmwareqcm4490sm7525_firmwaresm8425_firmwareqcn6224_firmwareqamsrv1h_firmwaresa8620p_firmwareqca8385_firmwarewcd9371x2000090qca8102_firmwareqcn9011qca8081snapdragon_x32_5g_modem-rf_firmwareqcf8001palawan25qxm1093_firmwareqca6595fastconnect_7800_firmwaresnapdragon_8_elite_gen_5qcf8000fastconnect_6200sa8770psm7435pqcn6274sm6650p_firmwareqcs6690qmb415qxm1086_firmwareqca8111_firmwarewcd9371_firmwareg2_gen_1_firmwareqca6777aqsnapdragon_x35_5g_modem-rf_firmwareqxm1086snapdragon_auto_5g_modem-rf_gen_2snapdragon_888\+_5g_mobilexg101002g2_gen_1wcn6450_firmwaremonaco_iotsnapdragon_x62_5g_modem-rf_firmwarex2000092_firmwareipq9554qca8112snapdragon_7_gen_1_mobilefastconnect_6900_firmwareqxm1093qep8111_firmwarewsa8810qca8386wcd9375qmp2001sxr2350p_firmwarewcd9370snapdragon_7\+_gen_2_mobilear8035_firmwareflight_rb5_5g_firmwareqrb5165nsa8255pqca8337sar2130p_firmwaresnapdragon_8\+_gen_2_mobile_firmwareqfw7124_firmwareqmb715qcm6490snapdragon_6_gen_1_mobileqcn6024_firmwarenetrani_firmwarewcn3988ipq9574_firmwaresnapdragon_8cx_gen_3_compute_firmwarenetworking_pro_610orne_firmwareqca6777aq_firmwaresm8650qsm8750p_firmwaresm8735p_firmwarexrv7209_firmwareqcn6432snapdragon_ar1_gen_1_firmwareqcf8000_firmwareqxm1096srv1h_firmwarex1e80100qca8386_firmwarenetworking_pro_1210_firmwareqca8080_firmwarexg101002_firmwarex2000090_firmwarerobotics_rb5wsa8815marinasxr2350pqcn6432_firmwaresdx61snapdragon_ar1_gen_1qpa1083bd_firmwarelemansausnapdragon_ar1\+_gen_1_firmwaresa8295pornenetworking_pro_1610xg101032_firmwaresm8425qcn6274_firmwaresm6475qsnapdragon_x32_5g_modem-rfqcm4490_firmwareqca6678aqsnapdragon_7s_gen_3_mobilesnapdragon_7_gen_4_mobilesa8195p_firmwareqca8084qpa1086bdqca6698aq_firmwareqcn6422_firmwareqca0000_firmwaresxr2250p_firmwaresnapdragon_8\+_gen_1_mobilemonaco_iot_firmwareqca8385qcn5154_firmwarewcn7760wsa8850w_firmwareiqx7181_firmwarewcd9395qca6797aqipq5312_firmwaresm7550p_firmwarecologneipq9570qca6595_firmwaremilos_iotx2000092sm7550wcn7860qca8384sar1165pcologne_firmwareqca8085_firmwaresm6475p_firmwareqca2065networking_pro_1610_firmwareipq9574qmp2001_firmwarewsa8830sa8195pqcn9274sdx61_firmwareqca8082wcd9380wsa8845_firmwarewcd9375_firmwaresm6475q_firmwaresnapdragon_8_gen_2_mobile_firmwaresnapdragon_ar1\+_gen_1marina_firmwarewcn3950qam8397pqln1086bd_firmwareiqx7181qln1083bd_firmwaresm8635p_firmwareqcm5430_firmwarewsa8845hsm8550p_firmwaresm7635pqca8075srv1mwcn7861qca8337_firmwareipq5300_firmwareqpa1086bd_firmwareqcn9274_firmwaresm8635snapdragon_888_5g_mobile_firmwaresnapdragon_888\+_5g_mobile_firmwarenetworking_pro_1200_firmwarenetworking_pro_1210qca6595auqca6787aqwcn7880snapdragon_x75_5g_modem-rf_firmwaresnapdragon_8_gen_1_mobile_firmwaresnapdragon_8cx_gen_3_computeimmersive_home_326qcc710_firmwarewsa8855cqca6678aq_firmwarewcn6450snapdragon_8_gen1_5g_firmwaresa9000psnapdragon_6_gen_1_mobile_firmwarex2000094qca0000qca8080xg101032qca6688aqipq9008_firmwaresm6450psa8155pqca6787aq_firmwareqcn9024milos_firmwarenetworking_pro_810_firmwarewcd9385_firmwaresa6155p_firmwarewcd9390sm8750psnapdragon_8_gen_3_mobileqln1086bdsm7675p_firmwareqca6564au_firmwareqcn6224sm7675_firmwareqca8111snapdragon_7_gen_4_mobile_firmwareqca8102xrv9209wcn6755qmb715_firmwarecq8725s_firmwareqca6574ausm7550pqcn9000_firmwarewcn7880_firmwaresnapdragon_8_gen_3_mobile_firmwarecq7790_firmwareimmersive_home_3210wcd9378_firmwareqcn6402qcs6690_firmwaresnapdragon_x35_5g_modem-rfsm7675piqx5121_firmwaresm7435snapdragon_auto_5g_modem-rf_firmwareqcn6412_firmwarexrv9209_firmwarewcn3988_firmwareqca6554asm6475pqca8112_firmwarewcd9378cwcn7860_firmwareqcm6490_firmwareqep8111ipq5300qmb415_firmwareqcn5124_firmwaresm7435p_firmwaresnapdragon_x65_5g_modem-rfsa8255p_firmwareqrb5165m_firmwarewcd9390_firmwareqca6696sm8635psnapdragon_x72_5g_modem-rfqca8082_firmwaresnapdragon_7s_gen_3_mobile_firmwareqca8695auxrv7209qcn6402_firmwarewsa8815_firmwareqca2065_firmwareqca8084_firmwareqam8295pwcn6755_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_8_gen_1_mobileipq5332wsa8835_firmwareqcn9160_firmwaresc8380xpwcd9380_firmwarepandeiro_firmwareqxm1094ipq9008qca6574au_firmwaresa7255p_firmwaresm8550pcq8750mqcn6422x2000077_firmwaresxr2230pmolokai_firmwareqfw7114qca8075_firmwarewcd9385wsa8845wsa8840Snapdragon
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-126
Buffer Over-read
CVE-2022-33286
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.36% / 58.17%
||
7 Day CHG~0.00%
Published-06 Jan, 2023 | 05:02
Updated-09 Apr, 2025 | 14:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer over-read in WLAN

Transient DOS due to buffer over-read in WLAN while processing 802.11 management frames.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaremdm9640_firmwaresm6250p_firmwareipq4028_firmwareqca1023qca8337ar9380ipq8173_firmwareqcn5124mdm9645wcn3950_firmwareqca6595au_firmwaresa6155mdm8215sd_455_firmwareapq8076qcs6125_firmwaresa415msm4375wcn3998wcd9371_firmwarewcn3950qcn6024_firmwaresd720gsm4125mdm9206_firmwarewcn3660bqsm8350_firmwareqsm8350sd460_firmwaresm7315_firmwarewcn7850qca8081_firmwarewcn3998_firmwareqca6420qcn9002qca9986ipq8070_firmwareqca9367_firmwareipq8065ipq8078a_firmwaresd_8cx_gen2ipq8072_firmwareqca0000sa8155_firmwareipq8068qca6430wcd9340sd765gsd680wcn7851_firmwaremdm9250_firmwareqca9888_firmwareqcn6122qca6696_firmwarewcd9371sd870_firmwareqca1062qcn5154_firmwaremdm8215_firmwaresd_8cxsa8150pqca9992_firmwaresd660sd865_5g_firmwaresd712sd660_firmwaresm8475qcn5022_firmwareqcn7606_firmwarewcn6750_firmwareqca6428_firmwareqca9985_firmwarewcn3991ipq4018_firmwareqca9980_firmwareipq8078qca8084qcn9001_firmwareipq8173sdx55m_firmwaremsm8976_firmwareqca6574sd670_firmwarecsr8811_firmwarewcd9380qcs410qcn5024sd690_5g_firmwareqca9379_firmwaresdx24_firmwareqca9985qcn9012_firmwareqcn9274_firmwareipq6018_firmwarewcd9340_firmwarewsa8815wcn6850pmp8074_firmwareqcn6112qca6584_firmwaremdm9215_firmwaresd695ipq6028ipq8064sd835pmp8074ipq9574_firmwarewcn3980_firmwaresd730qcc5100_firmwaresa8295pqca2062_firmwarewcn6740_firmwaresd678_firmwareapq8064au_firmwareipq8078_firmwareqcn5054qcs603qca9994qca9980sd670qcn9024_firmwareipq8174_firmwareqcm4290_firmwarewcn6855qcn7605_firmwaresw5100p_firmwareqcs610_firmwaresa6145pqca9886_firmwarear8031qca1023_firmwaresdm630_firmwaresd820_firmwareqca6391_firmwaresa4150p_firmwareqca4024wcd9370_firmwaresdx55qcn5021_firmwarecsra6640qca9379sa4155psxr2150pqcn7606qsm8250_firmwarewsa8830qca1062_firmwarecsrb31024mdm9628_firmwaremdm9650sd_636qca8082qca9992qcs4290mdm9250qca6420_firmwareapq8009_firmwareqca2064_firmwaresd690_5gmdm9310_firmwaresd675_firmwareipq8072qca6564qca6426wcn3990_firmwareqrb5165n_firmwareqca9984_firmwareqca9377wcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwarewcn3615_firmwareipq8074aqcn6102_firmwareqcn9011_firmwaresa8155qca6584qcn5122_firmwaresdx55_firmwarewcn3615qcn6023_firmwaresm7250p_firmwarewcn3610_firmwareqrb5165nqca6584ausd778gipq8174wcn7851qcn5052qca9367sdm630mdm9607_firmwareqcn6112_firmwaresa415m_firmwarewcn3988_firmwareqcn9074qca6421qca8085sd778g_firmwaresa8195pqca6694sm4375_firmwarewcd9326wcd9335qcn6023qcs4290_firmwareqca8085_firmwareqcs6490_firmwareqca6390qca9898_firmwaresd750g_firmwareaqt1000msm8976wcd9375sm6250_firmwareipq5010_firmwareipq8074a_firmwaresd888_5g_firmwaresdx20_firmwarewsa8815_firmwareapq8017qcx315qcm6125_firmwaresd780gsd865_5gqca6595qcc5100ipq8065_firmwareqcx315_firmwaresd665_firmwareqcn5154qca8075_firmwaresc8180xmdm9206wcn6855_firmwareqcn6132_firmwareqcn9003_firmwareqca9888qca6310_firmwareipq8070a_firmwaremdm9615qca6574_firmwareqca9886sm7325p_firmwaresd665qca6175asd765qca6574a_firmwareqrb5165msd850_firmwaresm7315apq8009mdm9310qcn6102csrb31024_firmwareqcm6490_firmwareqcn9070_firmwaresd480_firmwareipq6028_firmwareipq8072a_firmwaresc8180x_firmwareqca9889_firmwaresd710mdm9607qcn5122mdm9645_firmwaresdx20m_firmwareqcn5022qca6564_firmwaresd768gqca1064_firmwarewcn6740qca8075apq8096au_firmwareqcn6024qcn9022sd845mdm9615_firmwareqcn9002_firmwareipq6000_firmwaresdx12qcs410_firmwareqca6175a_firmwaresd_8cx_gen3_firmwareqca2066sa6150p_firmwareqcs610qca6431_firmwarewcd9360_firmwaresdx65qca4024_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqcs2290qca6335qca2062csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareqca6554a_firmwareqam8295psd_8cx_gen2_firmwareipq8076amdm9628qca8386_firmwaresd_8_gen1_5g_firmwareqca8084_firmwaresd710_firmwareqca4020qca6428qca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwaresa6155_firmwaresdx12_firmwarewcd9360sdx20mqca6438_firmwaresd680_firmwarewcn3999qrb5165_firmwareipq5028qrb5165m_firmwareipq4029_firmwareqcs6125sa4155p_firmwareipq6010sd662_firmwareqcs405qcn6132sw5100qca4020_firmwareqca6436wcn6851sa6155pqcs603_firmwarewcd9341ipq8068_firmwareqca2066_firmwareqca6431sd750gipq9008_firmwarewcn3910_firmwaresxr2150p_firmwarewsa8830_firmwaresd855_firmwarewcn3988qca6438wcn7850_firmwaresa8195p_firmwareqca9898sa8295p_firmwareipq4028wcn3610mdm9640ipq5018_firmwareqca8337_firmwarewcd9380_firmwareipq8072asw5100pmsm8996au_firmwarewcd9330ipq8076a_firmwareqca6564auwcn6856_firmwareipq9008qcn5164qcn5054_firmwaresdx50m_firmwareqca8072_firmwareqca6174qca6430_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980qca6335_firmwareqcs605sd7cwcn3910qca6320mdm9650_firmwareqca9986_firmwareqca6426_firmwarewcn3660b_firmwareqca9984qcn9024wcd9330_firmwaresdx55mipq8064_firmwareqca6421_firmwaresd821_firmwarear8031_firmwareqrb5165wcn6851_firmwareipq8070sd_636_firmwareqca6564a_firmwaresd480sd870qsm8250ipq6018sd695_firmwaresdxr1apq8096auqca6595_firmwareqcs405_firmwaresa8145pqca2064sd780g_firmwaresd888_firmwaresa8155psd675ar8035_firmwareqcm2290qcn5024_firmwarewcn3991_firmwaresd678qcn9070sa8145p_firmwareqcs2290_firmwaresd7c_firmwarecsra6620qcn9072qca8386sd765g_firmwareipq8069_firmwareqca6390_firmwareipq6000qca6174_firmwaresd730_firmwarewcd9370qcn5152_firmwareqca0000_firmwareqca6584au_firmwareapq8076_firmwareqcn9000_firmwareipq5018sd_8cx_firmwareqcn7605qca2065sd662qcn5124_firmwareqam8295p_firmwareqca1064qcn6100_firmwareqca8082_firmwareqca6320_firmwarewcn3680b_firmwareqca6595auwcn3999_firmwareqca6436_firmwareipq5010qca6564au_firmwaresa6155p_firmwareqca6310qcn9274qcn9001qca9990qcs6490sa515m_firmwaresdxr2_5gsd821sa6145p_firmwaresm6250sd712_firmwareapq8017_firmwarewsa8810_firmwaresd765_firmwareqca8081ipq8071aqca6174a_firmwareipq8071a_firmwarewcd9385qca2065_firmwaresd_8cx_gen3ar8035csr8811apq8064auqca6694_firmwareqcn9100_firmwaresd820qcm6490wcn6850_firmwarewsa8835_firmwareqca6564asa4150pqca8072qcm2290_firmwarewcn3990qcn9000sd_675qca6554aar9380_firmwaresdx24qcn9012sd888qcn6122_firmwarewsa8835msm8996ausd888_5gsm6250pipq4018qca6574aqca9889qca6174asm7325pipq8074qca9994_firmwarewcn6750qcn9003ipq8076_firmwaresa515msd855sm4125_firmwareipq8076qcn5021ipq8069qcn5152sd768g_firmwaresd460qca6391sdxr1_firmwareaqt1000_firmwareqcn9100sdx65_firmwareqcm4290sdx50msdx20mdm9215qcn9011sd_455ipq8074_firmwareqca6574ausa8155p_firmwareipq9574wcd9341_firmwareqcm6125wsa8810wcn6856wcn3680bsd835_firmwareipq6010_firmwareqca6696sd845_firmwaresa6150pqcn9022_firmwareqca9990_firmwareipq8070aqcn6100qcn9072_firmwaresm7250psd720g_firmwareipq8071_firmwareqcn9074_firmwaresw5100_firmwareipq4029sd850Snapdragon
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-33285
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.46% / 64.46%
||
7 Day CHG~0.00%
Published-06 Jan, 2023 | 05:02
Updated-09 Apr, 2025 | 15:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer over-read in WLAN

Transient DOS due to buffer over-read in WLAN while parsing WLAN CSA action frames.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaremdm9640_firmwaresm6250p_firmwareipq4028_firmwareqca8337ar9380ipq8173_firmwareqcn5124mdm9645wcn3950_firmwareqca6595au_firmwaresa6155mdm8215sd_455_firmwareapq8076qcs6125_firmwaresa415msm4375wcn3998wcd9371_firmwarewcn3950qcn6024_firmwaresd720gsm4125mdm9206_firmwarewcn3660bqsm8350_firmwareqsm8350sd460_firmwaresm7315_firmwarewcn7850qca8081_firmwarewcn3998_firmwareqca6420qcn9002qca9986ipq8070_firmwareqca9367_firmwareipq8065ipq8078a_firmwaresd_8cx_gen2ipq8072_firmwaresa8155_firmwareipq8068qca6430wcd9340sd765gsd680wcn7851_firmwaremdm9250_firmwareqca9888_firmwareqcn6122qca6696_firmwarewcd9371sd870_firmwareqca1062qcn5154_firmwaremdm8215_firmwaresd_8cxsa8150pqca9992_firmwaresd660sd865_5g_firmwaresd712sd660_firmwaresm8475qcn5022_firmwareqcn7606_firmwarewcn6750_firmwareqca6428_firmwareqca9985_firmwarewcn3991ipq4018_firmwareqca4531_firmwareqca9980_firmwareipq8078qca8084qcn9001_firmwareipq8173sdx55m_firmwaremsm8976_firmwareqca6574sd670_firmwarecsr8811_firmwarewcd9380qcs410qcn5024sd690_5g_firmwareqca9379_firmwaresdx24_firmwareqca9985qcn9012_firmwareqcn9274_firmwareipq6018_firmwarewcd9340_firmwarewsa8815wcn6850pmp8074_firmwareqcn6112qca6584_firmwaremdm9215_firmwaresd695ipq6028ipq8064sd835pmp8074ipq9574_firmwarewcn3980_firmwaresd730qcc5100_firmwaresa8295pqca2062_firmwarewcn6740_firmwaresd678_firmwareapq8064au_firmwareipq8078_firmwareqcn5054qcs603qca9994qca9980sd670qcn9024_firmwareipq8174_firmwareqcm4290_firmwarewcn6855qcn7605_firmwaresw5100p_firmwareqcs610_firmwaresa6145pqca9886_firmwarear8031sdm630_firmwaresd820_firmwareqca6391_firmwaresa4150p_firmwareqca4024wcd9370_firmwaresdx55qcn5021_firmwarecsra6640qca9379sxr2150pqcn7606qsm8250_firmwarewsa8830qca1062_firmwarecsrb31024mdm9628_firmwaremdm9650sd_636qca8082qca9992qcs4290mdm9250qca6420_firmwareapq8009_firmwareqca2064_firmwaresd690_5gmdm9310_firmwaresd675_firmwareipq8072qca6564qca6426wcn3990_firmwareqrb5165n_firmwareqca9984_firmwareqca9377qca4531wcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwarewcn3615_firmwareipq8074aqcn6102_firmwareqcn9011_firmwaresa8155qca6584qcn5122_firmwaresdx55_firmwarewcn3615qcn6023_firmwaresm7250p_firmwarewcn3610_firmwareqrb5165nqca6584ausd778gipq8174wcn7851qcn5052qca9367sdm630mdm9607_firmwareqcn6112_firmwaresa415m_firmwarewcn3988_firmwareqcn9074qca6421qca8085sd778g_firmwaresa8195psm4375_firmwarewcd9326wcd9335qcn6023qcs4290_firmwareqca8085_firmwareqcs6490_firmwareqca6390qca9898_firmwaresd750g_firmwareaqt1000msm8976wcd9375sm6250_firmwareipq5010_firmwareipq8074a_firmwaresd888_5g_firmwaresdx20_firmwarewsa8815_firmwareapq8017qcx315qcm6125_firmwaresd780gsd865_5gqca6595qcc5100ipq8065_firmwareqcx315_firmwaresd665_firmwareqcn5154qca8075_firmwaresc8180xmdm9206wcn6855_firmwareqcn6132_firmwareqcn9003_firmwareqca9888qca6310_firmwareipq8070a_firmwaremdm9615qca6574_firmwareqca9886sm7325p_firmwaresd665qca6175asd765qca6574a_firmwareqrb5165msd850_firmwaresm7315apq8009mdm9310qcn6102csrb31024_firmwareqcm6490_firmwareqcn9070_firmwaresd480_firmwareipq6028_firmwareipq8072a_firmwaresc8180x_firmwareqca9889_firmwaresd710mdm9607qcn5122mdm9645_firmwaresdx20m_firmwareqcn5022qca6564_firmwaresd768gqca1064_firmwarewcn6740qca8075apq8096au_firmwareqcn6024qcn9022sd845mdm9615_firmwareqcn9002_firmwareipq6000_firmwaresdx12qcs410_firmwareqca6175a_firmwaresd_8cx_gen3_firmwareqca2066sa6150p_firmwareqcs610qca6431_firmwarewcd9360_firmwaresdx65qca4024_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqcs2290qca6335qca2062csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareqca6554a_firmwareqam8295psd_8cx_gen2_firmwareipq8076amdm9628qca8386_firmwaresd_8_gen1_5g_firmwareqca8084_firmwaresd710_firmwareqca4020qca6428qca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwaresa6155_firmwaresdx12_firmwarewcd9360sdx20mqca6438_firmwaresd680_firmwarewcn3999qrb5165_firmwareipq5028qrb5165m_firmwareipq4029_firmwareqcs6125ipq6010sd662_firmwareqcs405qcn6132sw5100qca4020_firmwareqca6436wcn6851sa6155pqcs603_firmwarewcd9341ipq8068_firmwareqca2066_firmwareqca6431sd750gipq9008_firmwarewcn3910_firmwaresxr2150p_firmwarewsa8830_firmwaresd855_firmwarewcn3988qca6438wcn7850_firmwaresa8195p_firmwareqca9898sa8295p_firmwareipq4028wcn3610mdm9640ipq5018_firmwareqca8337_firmwarewcd9380_firmwareipq8072asw5100pmsm8996au_firmwarewcd9330ipq8076a_firmwareqca6564auwcn6856_firmwareipq9008qcn5164qcn5054_firmwaresdx50m_firmwareqca8072_firmwareqca6174qca6430_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980qca6335_firmwareqcs605sd7cwcn3910qca6320mdm9650_firmwareqca9986_firmwareqca6426_firmwarewcn3660b_firmwareqca9984qcn9024wcd9330_firmwaresdx55mipq8064_firmwareqca6421_firmwaresd821_firmwarear8031_firmwareqrb5165wcn6851_firmwareipq8070sd_636_firmwareqca6564a_firmwaresd480sd870qsm8250ipq6018sd695_firmwaresdxr1apq8096auqca6595_firmwareqcs405_firmwaresa8145pqca2064sd780g_firmwaresd888_firmwaresa8155psd675ar8035_firmwareqcm2290qcn5024_firmwarewcn3991_firmwaresd678qcn9070sa8145p_firmwareqcs2290_firmwaresd7c_firmwarecsra6620qcn9072qca8386sd765g_firmwareipq8069_firmwareqca6390_firmwareipq6000qca6174_firmwaresd730_firmwarewcd9370qcn5152_firmwareqca6584au_firmwareapq8076_firmwareqcn9000_firmwareipq5018sd_8cx_firmwareqcn7605qca2065sd662qcn5124_firmwareqam8295p_firmwareqca1064qcn6100_firmwareqca8082_firmwareqca6320_firmwarewcn3680b_firmwareqca6595auwcn3999_firmwareqca6436_firmwareipq5010qca6564au_firmwaresa6155p_firmwareqca6310qcn9274qcn9001qca9990qcs6490sa515m_firmwaresdxr2_5gsd821sa6145p_firmwaresm6250sd712_firmwareapq8017_firmwarewsa8810_firmwaresd765_firmwareqca8081ipq8071aqca6174a_firmwareipq8071a_firmwarewcd9385qca2065_firmwaresd_8cx_gen3ar8035csr8811apq8064auqcn9100_firmwaresd820qcm6490wcn6850_firmwarewsa8835_firmwareqca6564asa4150pqca8072qcm2290_firmwarewcn3990qcn9000sd_675qca6554aar9380_firmwaresdx24qcn9012sd888qcn6122_firmwarewsa8835msm8996ausd888_5gsm6250pipq4018qca6574aqca9889qca6174asm7325pipq8074qca9994_firmwarewcn6750qcn9003ipq8076_firmwaresa515msd855sm4125_firmwareipq8076qcn5021ipq8069qcn5152sd768g_firmwaresd460qca6391sdxr1_firmwareaqt1000_firmwareqcn9100sdx65_firmwareqcm4290sdx50msdx20mdm9215qcn9011sd_455ipq8074_firmwareqca6574ausa8155p_firmwareipq9574wcd9341_firmwareqcm6125wsa8810wcn6856wcn3680bsd835_firmwareipq6010_firmwareqca6696sd845_firmwaresa6150pqcn9022_firmwareqca9990_firmwareipq8070aqcn6100qcn9072_firmwaresm7250psd720g_firmwareipq8071_firmwareqcn9074_firmwaresw5100_firmwareipq4029sd850Snapdragon
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-38405
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.44% / 63.35%
||
7 Day CHG~0.00%
Published-04 Nov, 2024 | 10:04
Updated-07 Nov, 2024 | 20:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in WLAN Host

Transient DOS while processing the CU information from RNR IE.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qam8255p_firmwarewsa8830qca6777aqsxr2230p_firmwareqca8337qam8650pqfw7124qam8775pqamsrv1mqca6777aq_firmwareqcn6224_firmwarewsa8840srv1l_firmwarewcn6755_firmwareqca6595au_firmwarevideo_collaboration_vc3_platformwcd9370ssg2115pqcm5430_firmwareqca6584au_firmwaresnapdragon_8_gen_2_mobile_platformqamsrv1hsa8530pqca6554a_firmwarewcd9385_firmwareqam8295pwcn7881_firmwareqamsrv1h_firmwareqca6688aqqam8295p_firmwaresa9000p_firmwareqca6574au_firmwaresa7255pwsa8845h_firmwarewcd9375_firmwaresnapdragon_8_gen_3_mobile_platformqfw7114qca8081_firmwareqca6595auwcn7860qca6564au_firmwaresa8620p_firmwaresa6155p_firmwareqca6584auqcm8550_firmwareqcn9274wcn7881snapdragon_x72_5g_modem-rf_systemqca6678aq_firmwaresa8775p_firmwareqcs6490wsa8840_firmwareqca6698aqvideo_collaboration_vc5_platformqcs8550_firmwaresm8635wcn7880_firmwaresrv1hsa7775p_firmwarewcd9340sa8195pfastconnect_6700_firmwareqcn6224wsa8845hwcn6755wcd9395_firmwaresnapdragon_x75_5g_modem-rf_systemsnapdragon_ar2_gen_1_platform_firmwaresm8750p_firmwaresm8750_firmwaresa8255p_firmwaresa6155pqcs7230qca8081snapdragon_auto_5g_modem-rf_gen_2qca6698aq_firmwaresa7775psxr2250pqcs5430qam8620pwcd9385snapdragon_auto_5g_modem-rf_gen_2_firmwaresa8770p_firmwaresa8255pqam8775p_firmwareqca6696_firmwareqcs6490_firmwareqca6797aqar8035wcd9375wcd9390qcc710_firmwarewsa8830_firmwareqcm6490wsa8835_firmwaresa8195p_firmwarevideo_collaboration_vc5_platform_firmwaresxr2250p_firmwaresa8295p_firmwaresnapdragon_8_gen_2_mobile_platform_firmwarewcn7880sa8770pqca6787aq_firmwareqca6688aq_firmwarewcd9380_firmwareqca8337_firmwaressg2125pqca6554aqca6595qcm8550qca6564auqcs7230_firmwaresa8530p_firmwarewsa8835qca6574sxr1230p_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwaresa8540p_firmwarewcd9380qcn6274snapdragon_x72_5g_modem-rf_system_firmwarefastconnect_6700ssg2125p_firmwaresm8635_firmwareqca6574asxr1230pvideo_collaboration_vc3_platform_firmwareqfw7114_firmwareqcn9274_firmwareqcc2076_firmwarewsa8845qcc2073_firmwaresa8650psa9000pqca6574_firmwarewcd9340_firmwaresxr2230pwsa8845_firmwareqcs8250sm8750psa8775pqca6574a_firmwareqcs9100_firmwareqca6391sa8295pfastconnect_7800qcn6274_firmwareqca6678aqwcn7861_firmwareqcm6490_firmwarewsa8832_firmwaresa8650p_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900srv1h_firmwarefastconnect_6900_firmwareqca6797aq_firmwareqca6574ausa8155p_firmwaresrv1lsa7255p_firmwareqcs8250_firmwaresnapdragon_8\+_gen_2_mobile_platformfastconnect_7800_firmwaresa8620pwsa8832sa8540psm8550psrv1m_firmwaresnapdragon_ar2_gen_1_platformqcm5430qamsrv1m_firmwaresm8750qam8650p_firmwareqcc710wcn7860_firmwareqca6595_firmwarewcn7861wcd9395qcs5430_firmwareqca6787aqqca6696qca6391_firmwareqcs8550wcd9370_firmwaresm8550p_firmwarewcd9390_firmwaresnapdragon_8_gen_3_mobile_platform_firmwaresa8155pqcs9100qcc2076srv1mssg2115p_firmwareqam8620p_firmwareqfw7124_firmwareqam8255pqcc2073ar8035_firmwareSnapdragonqam8255p_firmwareqca8337_firmwarewcd9380_firmwaresxr2230p_firmwareqcs7230_firmwarear8035_firmwareqca6777aq_firmwaresa8530p_firmwareqcn6224_firmwaresxr1230p_firmwaresa8540p_firmwaresrv1l_firmwarewcn6755_firmwareqca6595au_firmwaresnapdragon_x72_5g_modem-rf_system_firmwaressg2125p_firmwaresm8635_firmwareqcm5430_firmwareqca6584au_firmwareqcn9274_firmwareqcc2076_firmwareqfw7114_firmwareqca6554a_firmwarequalcomm_video_collaboration_vc3_platform_firmwarewcd9385_firmwarewcn7881_firmwareqcc2073_firmwareqamsrv1h_firmwareqca6574_firmwarewcd9340_firmwarewsa8845_firmwareqam8295p_firmwaresa9000p_firmwareqca6574a_firmwareqca6574au_firmwareqcs9100_firmwarewcd9375_firmwareqca8081_firmwarewsa8845h_firmwareqca6564au_firmwaresa8620p_firmwaresa6155p_firmwareqcm8550_firmwareqca6678aq_firmwareqcn6274_firmwaresa8775p_firmwarewcn7861_firmwareqcm6490_firmwarewsa8840_firmwaresa8650p_firmwarewsa8832_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900_firmwaresrv1h_firmwareqcs8550_firmwareqca6797aq_firmwarewcn7880_firmwaresa8155p_firmwaresa7775p_firmwarefastconnect_6700_firmwaresa7255p_firmwareqcs8250_firmwarefastconnect_7800_firmwaresnapdragon_ar2_gen_1_platform_firmwaresa8255p_firmwaresm8750_firmwaresm8750p_firmwarewcd9395_firmwareqca6698aq_firmwareqamsrv1m_firmwaresrv1m_firmwareqam8650p_firmwaresa8770p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqam8775p_firmwareqca6696_firmwareqcs6490_firmwarewcn7860_firmwareqca6595_firmwareqcs5430_firmwareqca6391_firmwarewcd9370_firmwaresm8550p_firmwarequalcomm_video_collaboration_vc5_platform_firmwareqcc710_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewcd9390_firmwarewsa8830_firmwaresxr2250p_firmwarewsa8835_firmwaresa8195p_firmwaressg2115p_firmwareqam8620p_firmwareqfw7124_firmwaresa8295p_firmwaresnapdragon_8_gen_2_mobile_platform_firmwareqca6688aq_firmwareqca6787aq_firmware
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-38403
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.56% / 68.58%
||
7 Day CHG~0.00%
Published-04 Nov, 2024 | 10:04
Updated-07 Nov, 2024 | 20:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in WLAN Firmware

Transient DOS while parsing BTM ML IE when per STA profile is not included.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qam8255p_firmwarewsa8830qca6777aqsxr2230p_firmwareqca8337qam8650pqfw7124qam8775pqca6777aq_firmwareqcn6224_firmwarewsa8840wcn6755_firmwareqca6595au_firmwarewcd9370ssg2115pqca6584au_firmwaresnapdragon_8_gen_2_mobile_platformqca6554a_firmwarewcd9385_firmwarewcn7881_firmwarewcn3660bsa9000p_firmwaresnapdragon_429_mobile_platform_firmwarewcn3680b_firmwareqca6574au_firmwaresa7255pwsa8845h_firmwarewcd9375_firmwaresnapdragon_8_gen_3_mobile_platformqfw7114qca8081_firmwareqca6595auwcn3610_firmwaresnapdragon_429_mobile_platformwcn7860qca6564au_firmwaresa8620p_firmwareqca6584auqcm8550_firmwarewcn7881snapdragon_x72_5g_modem-rf_systemsa8775p_firmwarewsa8840_firmwareqca6698aqsc8380xp_firmwaresm8635wcn7880_firmwaresa7775p_firmwarewcd9340qcn6224wsa8845hwcn6755wcd9395_firmwaresnapdragon_x75_5g_modem-rf_systemsm8750_firmwaresnapdragon_ar2_gen_1_platform_firmwaresm8750p_firmwaresa8255p_firmwareqca8081qca6698aq_firmwaresa7775psxr2250pwcd9385sa8255pqam8775p_firmwareqca6696_firmwareqca6797aqar8035wcd9375wcd9390qcc710_firmwarewsa8830_firmwarewcn3620_firmwarewsa8835_firmwarewcn3620sxr2250p_firmwaresnapdragon_8_gen_2_mobile_platform_firmwarewcn3610wcn7880qca6787aq_firmwarewcd9380_firmwareqca8337_firmwaressg2125psdm429wqca6554aqca6595qcm8550qca6564auwsa8835qca6574sxr1230p_firmwaresdm429w_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwarewcd9380qcn6274snapdragon_wear_4100\+_platform_firmwaresnapdragon_x72_5g_modem-rf_system_firmwaressg2125p_firmwaresnapdragon_wear_4100\+_platformsm8635_firmwareqca6574asxr1230pwcn3980qfw7114_firmwareqcc2076_firmwarewsa8845qcc2073_firmwaresa8650psa9000pqca6574_firmwarewcd9340_firmwaresxr2230pwsa8845_firmwarewcn3660b_firmwaresm8750psc8380xpsa8775pqca6574a_firmwarewcn3980_firmwarefastconnect_7800qcn6274_firmwarewcn7861_firmwarewsa8832_firmwaresa8650p_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900fastconnect_6900_firmwareqca6797aq_firmwareqca6574ausa7255p_firmwaresnapdragon_8\+_gen_2_mobile_platformfastconnect_7800_firmwaresa8620pwsa8832sm8550psnapdragon_ar2_gen_1_platformwcn3680bsm8750qam8650p_firmwareqcc710wcn7860_firmwareqca6595_firmwarewcn7861wcd9395qca6696qca6787aqwcd9370_firmwaresm8550p_firmwarewcd9390_firmwaresnapdragon_8_gen_3_mobile_platform_firmwareqcc2076ssg2115p_firmwareqfw7124_firmwareqam8255pqcc2073ar8035_firmwareSnapdragonqam8255p_firmwareqca8337_firmwarewcd9380_firmwaresxr2230p_firmwarear8035_firmwareqca6777aq_firmwareqcn6224_firmwaresxr1230p_firmwaresdm429w_firmwarewcn6755_firmwareqca6595au_firmwaresnapdragon_x72_5g_modem-rf_system_firmwaressg2125p_firmwaresm8635_firmwareqca6584au_firmwareqfw7114_firmwareqcc2076_firmwareqca6554a_firmwarewcd9385_firmwarewcn7881_firmwareqcc2073_firmwareqca6574_firmwarewcd9340_firmwarewsa8845_firmwarewcn3660b_firmwaresa9000p_firmwareqca6574a_firmwaresnapdragon_429_mobile_platform_firmwareqca6574au_firmwarewcn3680b_firmwarewcd9375_firmwareqca8081_firmwarewcn3980_firmwarewsa8845h_firmwarewcn3610_firmwareqca6564au_firmwaresa8620p_firmwareqcm8550_firmwareqcn6274_firmwaresa8775p_firmwarewcn7861_firmwaresa8650p_firmwarewsa8832_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewsa8840_firmwarefastconnect_6900_firmwaresc8380xp_firmwareqca6797aq_firmwarewcn7880_firmwaresa7775p_firmwaresa7255p_firmwarefastconnect_7800_firmwaresnapdragon_ar2_gen_1_platform_firmwaresa8255p_firmwaresm8750_firmwaresm8750p_firmwarewcd9395_firmwareqca6698aq_firmwareqam8650p_firmwareqam8775p_firmwareqca6696_firmwareqca6595_firmwarewcn7860_firmwarewcd9370_firmwaresm8550p_firmwareqcc710_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewcd9390_firmwarewsa8830_firmwarewcn3620_firmwarewsa8835_firmwaressg2115p_firmwareqfw7124_firmwaresxr2250p_firmwaresnapdragon_8_gen_2_mobile_platform_firmwareqca6787aq_firmware
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-47402
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.01% / 0.64%
||
7 Day CHG~0.00%
Published-02 Feb, 2026 | 15:20
Updated-11 Feb, 2026 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in WLAN Firmware

Transient DOS when processing a received frame with an excessively large authentication information element.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sm7675snapdragon_x72_5g_modem-rf_firmwarewcd9378cqcn6224snapdragon_8_gen_3_mobilewsa8845x2000077_firmwaresm8750px2000094qcn9011_firmwaresm7675_firmwareqca6554a_firmwaresa8620psm8635_firmwaresa8255pqca6797aqqcs8550snapdragon_auto_5g_modem-rf_gen_2_firmwarefwa_gen_3_ultra_firmwareqca6554awcd9375wsa8832ssg2115psxr1230pfastconnect_7800qca8337_firmwaresa7775pssg2115p_firmwarex2000090sxr2250pwsa8830lemansau_firmwarewsa8835_firmwareqca6595wcd9385_firmwareqca6698aqqca6584au_firmwareqamsrv1hwcd9390qca6595auqcc2073_firmwarewcn7880x2000092_firmwaresm8635qcn9011xg101002_firmwareqcc2073wsa8845h_firmwareqcn9012_firmwareqca6574aqca8081srv1har8035_firmwaresm7675pcolognewsa8845hlemansaufastconnect_6900_firmwarewcd9340_firmwareqcc2076snapdragon_x72_5g_modem-rfcologne_firmwareqca6698aq_firmwaresa7255pfastconnect_6900wcd9340wcd9370_firmwaresa7255p_firmwareqca6698au_firmwareqca6584auqca6777aqxg101032snapdragon_auto_5g_modem-rf_gen_2wsa8832_firmwareqca6595au_firmwaresm7675p_firmwaresm8750p_firmwareqamsrv1m_firmwarewcd9390_firmwareqfw7124sar2130p_firmwaresm8650q_firmwareqam8255p_firmwarewcn7860_firmwareorne_firmwarewcn7860qamsrv1h_firmwarex2000092snapdragon_8_eliteqmp1000_firmwaresxr1230p_firmwareorneqca6688aqqmp1000snapdragon_x75_5g_modem-rf_firmwaresrv1mlemans_au_lgit_firmwarewcd9395qcn9012wcn7861qca6787aq_firmwarear8035qca6797aq_firmwarewsa8845_firmwaresa8770p_firmwaresa7775p_firmwarewsa8840_firmwareqfw7114qamsrv1msm8635pqca6678aq_firmwareqcn6224_firmwareqca6391_firmwareqca6696_firmwareqcc710sm8635p_firmwarewcd9378_firmwaresa9000pwcn7861_firmwaresnapdragon_x75_5g_modem-rfwcd9378c_firmwarewcd9385lemans_au_lgitsa8255p_firmwareqca6574wcn6755x2000086_firmwaressg2125pwcn7881_firmwaresrv1m_firmwareqca6777aq_firmwareqfw7114_firmwarepalawan25qca6698auqca6574a_firmwareqca6595_firmwarexg101039_firmwarewcn6755_firmwarewcd9370qca8337wcn7880_firmwarex2000077qca6574auwcn7881qcs8550_firmwaresnapdragon_8_gen_3_mobile_firmwaresar2130pqca8081_firmwaresxr2250p_firmwareqca6564au_firmwarex2000090_firmwareqca6787aqsa9000p_firmwarepalawan25_firmwareqcc710_firmwareqam8255pqca6391srv1h_firmwaresa8620p_firmwareqca6574au_firmwareqca6678aqwcd9380snapdragon_8_elite_firmwareqca6688aq_firmwaresm8650qwsa8835wcd9380_firmwarewcd9375_firmwarewsa8840fwa_gen_3_ultrawcd9378qcc2076_firmwareqcn6274_firmwarexg101032_firmwaresa8770pwsa8830_firmwareqcn6274qfw7124_firmwarexg101002xg101039wcd9395_firmwareqca6564aufastconnect_7800_firmwareqca6696x2000086x2000094_firmwaressg2125p_firmwareqca6574_firmwareSnapdragon
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-126
Buffer Over-read
CVE-2025-47403
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 11.84%
||
7 Day CHG+0.01%
Published-04 May, 2026 | 16:43
Updated-06 May, 2026 | 18:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in WLAN Firmware

Transient DOS when processing a malformed Fast Transition response frame with an invalid header structure during wireless roaming.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qxm1083wsa8845h_firmwarewcd9378fastconnect_6700wsa8850qcn9070sm8650q_firmwaresnapdragon_8_elite_gen_5_firmwaresnapdragon_x75_5g_modem-rfg3x_gen_2qcn5054_firmwaresa7775p_firmwarex2000094_firmwarelemans_au_lgitx1e80100_firmwaresdx65m_firmwarewcn7861_firmwarenetworking_pro_810qamsrv1mqcn5154qamsrv1hsm8475p_firmwareimmersive_home_214_firmwareqca6584auqcn6132_firmwarelemansau_firmwareqpa1083bdqxm1094_firmwareqcn5024xg101039_firmwaresm6850qca4024snapdragon_8_elite_firmwareqmp1000_firmwarenetworking_pro_1200qcs8550cq8725sqca9888_firmwarewcn3950_firmwaresm8475pqcs4490_firmwareimmersive_home_216sar1165p_firmwarewcn7881_firmwarefwa_gen_3_ultrasnapdragon_8_eliteipq5010_firmwaresnapdragon_x72_5g_modem-rf_firmwareqcn9002qcn5022_firmwarevideo_collaboration_vc3x2000077snapdragon_8\+_gen_2_mobileipq5302wsa8855c_firmwaresm8845p_firmwarepalawan25_firmwareqca6174asm7550_firmwareqcn5152qam8255p_firmwaresnapdragon_4_gen_2_mobile_firmwareimmersive_home_318_firmwaresm7425_firmwareqln1083bdwcn7881qca6797aq_firmwarenetworking_pro_600_firmwarewcd9370_firmwareimmersive_home_326_firmwareqca6554a_firmwaresm8735pqca6698aqqcm5430qxm1096_firmwaresd_8_gen1_5gqca6564ausc8380xp_firmwaresm7425qcn6132qxm1095_firmwarear8035ipq5302_firmwaresnapdragon_x62_5g_modem-rffastconnect_6900immersive_home_3210_firmwareqca8081_firmwarex2000086_firmwaresnapdragon_4_gen_2_mobilex2000086qca6574aqca9889_firmwareqcc2073_firmwaresm7635p_firmwarefastconnect_7800cq7790sm7525qca6391qca6584au_firmwareqca6688aq_firmwaresm6450p_firmwaresnapdragon_6_gen_4_mobile_firmwaresnapdragon_8\+_gen_1_mobile_firmwaresxr2330psm7525_firmwaresm8425_firmwaresa8620p_firmwareqcn9011fwa_gen_5_elite_firmwareipq6000_firmwareqcf8001qca6595fastconnect_7800_firmwareqcf8000snapdragon_8_elite_gen_5sm6650p_firmwareqcn9022_firmwareqcn9003wcd9371_firmwarekobukqca6777aqsnapdragon_auto_5g_modem-rf_gen_2xg101002x2000092_firmwareipq9554networking_pro_400qxm1093wcd9375networking_pro_800sxr2350p_firmwaresnapdragon_7\+_gen_2_mobilear8035_firmwareqcn9002_firmwaresa8255psnapdragon_8\+_gen_2_mobile_firmwareqfw7124_firmwareqmb715networking_pro_400_firmwareqcn6024_firmwarenetworking_pro_610qca6777aq_firmwaresm8650qsm8750p_firmwareqcn6432qcf8000_firmwareqca8386_firmwarenetworking_pro_1210_firmwarex2000090_firmwarewsa8815marinasxr2350pqcn6432_firmwaresnapdragon_ar1_gen_1lemansauipq8078_firmwareornexg101032_firmwaresm8425qcn6274_firmwaretrestlesqcm4490_firmwareqca6678aqsnapdragon_7s_gen_3_mobileqpa1086bdqcn6422_firmwareqca0000_firmwaresxr2250p_firmwarewsa8850w_firmwareimmersive_home_316_firmwareqca6797aqipq9570ipq6000qca6595_firmwarex2000092sm7550wcn7860cologne_firmwaresm6475p_firmwareipq9574qmp2001_firmwarewsa8830qcn9274sdx61_firmwarewcd9380wsa8845_firmwaresm6475q_firmwaresnapdragon_ar1\+_gen_1wcn3950marina_firmwareqam8397pqln1086bd_firmwareqln1083bd_firmwareqcm5430_firmwarewsa8845hqca8075srv1mwcn7861ipq5300_firmwareqcn9274_firmwarenetworking_pro_1200_firmwarenetworking_pro_1210wcn7880snapdragon_x75_5g_modem-rf_firmwareqcn5164qcc710_firmwarewsa8855cwcn6450qca6678aq_firmwareqca0000ipq9008_firmwareqca6787aq_firmwaremilos_firmwarenetworking_pro_810_firmwarewcd9390snapdragon_8_gen_3_mobileqcn9022sm7675p_firmwaresm7675_firmwarexrv9209snapdragon_7_gen_4_mobile_firmwarecq8725s_firmwareqca6574auqcn9001_firmwaresnapdragon_8_gen_3_mobile_firmwarewcd9378_firmwareqcs6690_firmwareiqx5121_firmwaresm7435xrv9209_firmwaresd_8_gen1_5g_firmwareqcn5052qcn5022qca4024_firmwareqcn5124_firmwaresm7435p_firmwareqcn9100qca6696xrv7209qcn6402_firmwarewcn6755_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_8_gen_1_mobileipq5332wsa8835_firmwaresc8380xppandeiro_firmwarefwa_gen_5_elitesa7255p_firmwaresm8550pcq8750mqcn6422x2000077_firmwareqfw7114qca8075_firmwarenpro_a8_elite_firmwarenetworking_pro_800_firmwarewsa8840snapdragon_8_gen_2_mobilesa7775pqcn9012_firmwarewsa8832_firmwareipq9570_firmwarewcd9395_firmwareqca8072sdx81_firmwaresm8845pipq8076qcn9070_firmwarenetraniqam8255pqxm1083_firmwaresm7435_firmwaresnapdragon_x65_5g_modem-rf_firmwareiqx5121wsa8840_firmwareqca8695au_firmwareipq5332_firmwarefwa_gen_3_ultra_firmwareqca6595au_firmwareqmp1000qca8085qcn6023wsa8850wqcn9024_firmwarenpro_a8_elitesxr2250pqcn6412qca6174a_firmwareqca6574a_firmwaremilos_iot_firmwaremiloscsr8811_firmwarelemans_au_lgit_firmwareqxm1095wcn6650wcn7760_firmwarewcn6650_firmwaresm8635_firmwaresa8770p_firmwarewsa8810_firmwarewsa8832snapdragon_6_gen_3_mobilesrv1hfastconnect_6700_firmwaresar2130pqcn9000qcn6024qcc2076_firmwareqfw7124wcd9378c_firmwareqcc710snapdragon_7_gen_1_mobile_firmwareipq8078qcn5124g3x_gen_2_firmwaresdx65mqcn9003_firmwareqcn9012sa8620pwsa8830_firmwarefastconnect_6200_firmwareipq5028_firmwareqam8397p_firmwareqca6574_firmwaresrv1m_firmwareqca6696_firmwaresxr2330p_firmwarenetworking_pro_610_firmwareimmersive_home_316snapdragon_6_gen_4_mobilewcd9340_firmwarevideo_collaboration_vc3_firmwareqcc2076qcs8550_firmwaremolokaiqcn6122_firmwareipq9554_firmwareqfw7114_firmwareqcf8001_firmwaresa7255pxg101039qca6391_firmwareqcn9011_firmwareqca6574qamsrv1m_firmwaresa9000p_firmwaresnapdragon_7\+_gen_2_mobile_firmwaresxr2230p_firmwareqcn6122sm6650pqcs4490sm6850_firmwarepandeirowsa8850_firmwarecsr8811snapdragon_6_gen_3_mobile_firmwarewsa8835qcn5122wcd9340ipq5312sm7675cq8750m_firmwareqcm4490qcn6224_firmwareqamsrv1h_firmwarewcd9371qcc2073qca9888x2000090qcn5164_firmwareqca8081palawan25qxm1093_firmwarefastconnect_6200sa8770psm7435pqcn6274qcn5052_firmwareqcs6690qmb415qxm1086_firmwareg2_gen_1_firmwareqxm1086trestles_firmwarewcn6450_firmwareg2_gen_1snapdragon_x62_5g_modem-rf_firmwaresnapdragon_7_gen_1_mobilefastconnect_6900_firmwarewsa8810qca8386qmp2001wcd9370qca8337sar2130p_firmwareqcm6490snapdragon_6_gen_1_mobileqcn6023_firmwarenetrani_firmwarewcn3988ipq9574_firmwareorne_firmwareqcn5024_firmwarexrv7209_firmwaresm8735p_firmwarenetworking_pro_600ipq5028snapdragon_ar1_gen_1_firmwareqxm1096srv1h_firmwarex1e80100qcn5122_firmwarexg101002_firmwareqca8080_firmwareqcn5152_firmwaresdx61qpa1083bd_firmwaresnapdragon_ar1\+_gen_1_firmwareqca8072_firmwarenetworking_pro_1610sm6475qipq6018_firmwaresnapdragon_7_gen_4_mobileqca8084qca6698aq_firmwareqcn5054snapdragon_8\+_gen_1_mobileqcn5154_firmwarewcn7760wcd9395iqx7181_firmwarekobuk_firmwareipq5312_firmwaresm7550p_firmwarecolognemilos_iotipq8076_firmwaresar1165pqca8085_firmwarenetworking_pro_1610_firmwareimmersive_home_214ipq6010_firmwareqca8082qcn9001wcd9375_firmwaresnapdragon_8_gen_2_mobile_firmwareiqx7181sm8635p_firmwaresm8550p_firmwaresm7635pqca8337_firmwareqpa1086bd_firmwaresm8635qca6595auqca6787aqsnapdragon_8_gen_1_mobile_firmwareimmersive_home_326sa9000psnapdragon_6_gen_1_mobile_firmwarex2000094qca8080xg101032qca6688aqsm6450pqcn9024wcd9385_firmwaresm8750pqln1086bdqcn6224qca6564au_firmwareqca9889wcn6755qmb715_firmwaresm7550pqcn9000_firmwarecq7790_firmwareimmersive_home_3210qcn6402qcn9100_firmwaresm7675pimmersive_home_216_firmwareqcn6412_firmwarewcn3988_firmwareqca6554asm6475pwcd9378cwcn7860_firmwareqcm6490_firmwareipq5300qmb415_firmwaresnapdragon_x65_5g_modem-rfsa8255p_firmwarewcd9390_firmwareipq6010sm8635psnapdragon_x72_5g_modem-rfqca8082_firmwaresnapdragon_7s_gen_3_mobile_firmwareqca8695auipq6018wsa8815_firmwareqca8084_firmwareimmersive_home_318wcd9380_firmwareqxm1094ipq9008qca6574au_firmwaresdx81sxr2230pmolokai_firmwarewcd9385ipq5010wsa8845wcn7880_firmwareSnapdragon
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-126
Buffer Over-read
CVE-2025-47395
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.03% / 10.33%
||
7 Day CHG~0.00%
Published-06 Jan, 2026 | 22:48
Updated-27 Jan, 2026 | 19:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in WLAN Firmware

Transient DOS while parsing a WLAN management frame with a Vendor Specific Information Element.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn7861wcn7861_firmwareSnapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2021-35093
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.08% / 22.86%
||
7 Day CHG~0.00%
Published-03 Jan, 2022 | 07:26
Updated-04 Aug, 2024 | 00:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible memory corruption in BT controller when it receives an oversized LMP packet over 2-DH1 link and leads to denial of service in BlueCore

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-csr8510_a10_firmwarecsr8510_a10csr8811_a12_firmwarecsr8811_a12BlueCore
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-1957
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.06% / 19.01%
||
7 Day CHG~0.00%
Published-09 Sep, 2021 | 07:35
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper Access Control when ACL link encryption is failed and ACL link is not disconnected during reconnection with paired device in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380_firmwaresa6150p_firmwarewcn3990sa8145p_firmwareqcs610sd865_5gqca6431_firmwaresdx55m_firmwarewcn3950_firmwarewcd9380sa8150p_firmwareqca6390_firmwarequalcomm215wcd9370qcs6125_firmwareqca6174aqca6426wcn3990_firmwarewcd9335_firmwarewcn3980wcn3998wcd9385_firmwaresdxr2_5g_firmwarewcn3950wcd9326_firmwarewcn3615_firmwarewcn3660bsd855wsa8815wcn6850qca6426_firmwarewcn3660b_firmwarewcn3680qca6574au_firmwaresdx55_firmwarewcn3615wcn3998_firmwarewcn3980_firmwareqca6391wcn3610_firmwaresdx55mqca6436_firmwareqca6421_firmwaresa6155p_firmwarewcn3680_firmwareqrb5165_firmwaresdxr2_5gqcs6125qrb5165wcn6851_firmwareqca6574ausa6145p_firmwaresa8155p_firmwareqca6421sa8195papq8017_firmwarewsa8810_firmwarequalcomm215_firmwarewcd9341_firmwareqcm6125wsa8810sd870qca6436wcd9326wcd9335sa6155pwcn6851qcs610_firmwaresa6145pqca6174a_firmwarewcd9385wcd9341qca6431qca6696_firmwaresa8145psd870_firmwareqca6696qca6391_firmwareqca6390wcd9370_firmwaresa8150psa6150psdx55sa8155psd855_firmwaresd865_5g_firmwarewsa8815_firmwarewcn6850_firmwaresa8195p_firmwareapq8017wcn3610qcm6125_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music
CVE-2021-30348
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.07% / 21.73%
||
7 Day CHG~0.00%
Published-03 Jan, 2022 | 07:26
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper validation of LLM utility timers availability can lead to denial of service in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwareqca2066mdm9640_firmwaresa6150p_firmwaresm6250p_firmwareqcs610qca8337wcd9360_firmwaresdx65wcn3950_firmwaresa8150p_firmwareqcs2290qca6595au_firmwaresa6155qca2062csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwaresa415mwcn3998wcn3950mdm9628sd720gsm6375_firmwarewcn3660bsd460_firmwaresm7315_firmwareqca6574au_firmwarewcd9375_firmwareqca8081_firmwaresa6155_firmwarewcn3998_firmwareqca6420wcd9360wcn3999qrb5165_firmwaresa8155_firmwaresd662_firmwareqcs405qca6430sc8280xp_firmwarewcd9340sd765gqca6436wcn6851sa6155pqcs603_firmwarepq8009mdm9250_firmwarewcd9341qca2066_firmwareqca6696_firmwaresd750gsd870_firmwareqca1062wcn3910_firmwaresd_8cxsa8150pwsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwarewcn3988sd660_firmwaresa8195p_firmwareqcn7606_firmwarewcn6750_firmwarewcn3610mdm9640sm6375wcn3991qca8337_firmwarewcd9380_firmwaremsm8996au_firmwareqca6564ausdx55m_firmwarewcn6856_firmwareqca6574wcd9380qcs410sd690_5g_firmwareqca9379_firmwareqca6430_firmwarewcd9335_firmwarewcn3980qcs605wcd9340_firmwarewsa8815wcn6850sd7cwcn3910qca6584_firmwaremdm9650_firmwareqca6426_firmwarewcn3660b_firmwarewcn3980_firmwaresd730sdx55mqca2062_firmwarewcn6740_firmwaresd678_firmwareapq8064au_firmwarear8031_firmwareqrb5165wcn6851_firmwareqcs603qca6564a_firmwareqcm4290_firmwaresd480sd870wcn6855qcn7605_firmwareqcs610_firmwaresa6145pqca9886_firmwaresdxr1apq8096auar8031qcs405_firmwaresa8145pqca6391_firmwareqca2064sd780g_firmwarewcd9370_firmwaresdx55sd888_firmwarepq8009_firmwaresc8280xpsa8155pcsra6640sd675qca9379ar8035_firmwareqcm2290qcn7606wcn3991_firmwarewsa8830sd678sa8145p_firmwareqca1062_firmwareqcs2290_firmwaresd7c_firmwarecsrb31024mdm9628_firmwaremdm9650csra6620qcs4290mdm9250sd765g_firmwareqca6420_firmwareqca6390_firmwareqca2064_firmwaresd690_5gsd730_firmwarewcd9370sd675_firmwareqca6564qca6426wcn3990_firmwareqrb5165n_firmwaresm8450qca9377sd_8cx_firmwareqcn7605sdxr2_5g_firmwarewcd9385_firmwarewcd9326_firmwareqca2065sd662qca1064sa8155qca6584sdx55_firmwareqca6595auwcn3999_firmwaresm7250p_firmwarewcn3610_firmwareqca6436_firmwareqrb5165nqca6564au_firmwaresd778gsa6155p_firmwaresm6225sa515m_firmwareqcs6490sdxr2_5gmdm9607_firmwaresa415m_firmwarewcn3988_firmwaresa6145p_firmwaresm6250sd778g_firmwaresa8195papq8017_firmwarewsa8810_firmwaresm8450_firmwaresd765_firmwarewcd9326wcd9335qca8081qca6174a_firmwareqcs4290_firmwarewcd9385qca2065_firmwareqcs6490_firmwarear8035qca6390sd750g_firmwareapq8064auaqt1000wcd9375sm6250_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewsa8815_firmwarewsa8835_firmwareapq8017qcx315qca6564aqcm2290_firmwarewcn3990sd_675sd780gsd865_5gsm8450p_firmwaresd888wsa8835qcx315_firmwaremsm8996ausd665_firmwaresd888_5gsm6250pqca6574awcn6855_firmwareqca6174asm7325pwcn6750sa515mqca6574_firmwareqca9886sd855sm7325p_firmwaresd665qca6175asd765qca6574a_firmwaresd768g_firmwaresd850_firmwaresm7315sd460qca6391sdxr1_firmwareaqt1000_firmwaresdx65_firmwareqcm4290csrb31024_firmwareqcm6490_firmwaresd480_firmwaresm6225_firmwareqca6574ausa8155p_firmwaremdm9607wcd9341_firmwarewsa8810sm8450pwcn6856qca6564_firmwaresd768gqca1064_firmwarewcn6740qca6696sd845_firmwaresa6150papq8096au_firmwaresd845sm7250psd720g_firmwareqcs410_firmwareqca6175a_firmwaresd850Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2024-33068
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.56% / 68.58%
||
7 Day CHG~0.00%
Published-04 Nov, 2024 | 10:04
Updated-07 Nov, 2024 | 20:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in WLAN Host Communication

Transient DOS while parsing fragments of MBSSID IE from beacon frame.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qam8255p_firmwarewsa8830qca6777aqsxr2230p_firmwareqca8337qam8650pqfw7124sg8275p_firmwareqcf8001qam8775pqamsrv1mqca6777aq_firmwareqcn6224_firmwareqcn5124wsa8840qca8082qca8386srv1l_firmwarewcn6755_firmwareqca6595au_firmwarevideo_collaboration_vc3_platformwcd9370ssg2115pqca6584au_firmwarewcn3990_firmwaresnapdragon_8_gen_2_mobile_platformqcn9000_firmwareqamsrv1hqca6554a_firmwarewcd9385_firmwareqam8295pwcn7881_firmwareqca8386_firmwareqamsrv1h_firmwarewcn3660bqca8084_firmwareqcn6412qcn5124_firmwareqca6688aqqam8295p_firmwaresa9000p_firmwaresnapdragon_429_mobile_platform_firmwareqca8082_firmwareqca6574au_firmwaresa7255pqcn6422_firmwarewsa8845h_firmwarewcd9375_firmwaresnapdragon_8_gen_3_mobile_platformqfw7114qca8081_firmwareqca6595ausnapdragon_429_mobile_platformwcn7860qca6564au_firmwaresa8620p_firmwaresa6155p_firmwareqca6584ausnapdragon_x65_5g_modem-rf_system_firmwareqcm8550_firmwareqcn9274wcn7881snapdragon_x72_5g_modem-rf_systemqca6678aq_firmwaresa8775p_firmwareqcs6490wsa8840_firmwareqca6698aqvideo_collaboration_vc5_platformqcf8001_firmwareqcs8550_firmwaresm8635wcn7880_firmwaresrv1hqcn9074qca8085sdx65msa7775p_firmwarewcd9340sa8195pqcn6224vision_intelligence_400_platformwsa8845hwcn6755wcd9395_firmwarewcd9335snapdragon_x75_5g_modem-rf_systemsnapdragon_ar2_gen_1_platform_firmwaresm8750p_firmwaresm8750_firmwaresa8255p_firmwaresa6155pqcs7230snapdragon_auto_5g_modem-rf_gen_2qcf8000sdx65m_firmwaresa7775psxr2250pqca8081qca6698aq_firmwareqam8620pwcd9385wcd9341snapdragon_auto_5g_modem-rf_gen_2_firmwaresa8770p_firmwaresa8255pqca8085_firmwareqca6696_firmwareqcs6490_firmwareqam8775p_firmwareimmersive_home_3210_platformipq9008_firmwareqca6797aqar8035wcd9375wcd9390vision_intelligence_400_platform_firmwareqcc710_firmwarewsa8830_firmwarewcn3620_firmwarewsa8835_firmwarewcn3620sa8195p_firmwarevideo_collaboration_vc5_platform_firmwaresxr2250p_firmwaresa8295p_firmwarewcn7880snapdragon_8_gen_2_mobile_platform_firmwaresa8770pqca6787aq_firmwareqca6688aq_firmwarewcd9380_firmwareqca8337_firmwaressg2125pwcn3990qcn9000sdm429wqcf8000_firmwareqca6554aqca6595qca8084qcm8550qca6564auqcs7230_firmwareipq9008immersive_home_326_platform_firmwarewsa8835qca6574sxr1230p_firmwaresdm429w_firmwareqcn6402_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwarewcd9380qcn6274qcn6422snapdragon_x72_5g_modem-rf_system_firmwaressg2125p_firmwaresm8635_firmwareqca6574asxr1230pvideo_collaboration_vc3_platform_firmwaresg8275pwcd9335_firmwareqfw7114_firmwareqcn9274_firmwarewsa8845ipq5312sa8650psa9000pqca6574_firmwarewcd9340_firmwaresxr2230pwsa8845_firmwareqcs8250wcn3660b_firmwaresm8750psa8775pqca6574a_firmwareqcn9024ipq9574_firmwareqca6391immersive_home_3210_platform_firmwareipq5302sa8295pfastconnect_7800qcn6274_firmwaresnapdragon_x65_5g_modem-rf_systemwcn7861_firmwareqca6678aqwsa8832_firmwaresa8650p_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900srv1h_firmwarefastconnect_6900_firmwareqcn6432_firmwareqca6797aq_firmwareqca6574auipq5312_firmwaresa8155p_firmwaresrv1lipq9574qcn9024_firmwaresa7255p_firmwareqcs8250_firmwarewcd9341_firmwaresnapdragon_8\+_gen_2_mobile_platformfastconnect_7800_firmwaresa8620pwsa8832qcn6412_firmwareipq5332_firmwaresm8550pipq5332ipq5302_firmwaresrv1m_firmwaresnapdragon_ar2_gen_1_platformqamsrv1m_firmwareimmersive_home_326_platformsm8750qam8650p_firmwareqcc710wcn7860_firmwareqca6595_firmwarewcn7861wcd9395qca6696qca6787aqqca6391_firmwareqcs8550wcd9370_firmwaresm8550p_firmwarewcd9390_firmwaresnapdragon_8_gen_3_mobile_platform_firmwaresa8155pqcn6402srv1mssg2115p_firmwareqcn9074_firmwareqam8620p_firmwareqfw7124_firmwareqam8255pqcn6432ar8035_firmwareSnapdragonqam8255p_firmwareqca8337_firmwarewcd9380_firmwaresxr2230p_firmwareqcf8000_firmwaresg8275p_firmwareqcs7230_firmwarear8035_firmwareqca6777aq_firmwareqcn6224_firmwareimmersive_home_326_platform_firmwaresxr1230p_firmwareqcn6402_firmwaresdm429w_firmwaresrv1l_firmwarewcn6755_firmwareqca6595au_firmwaresnapdragon_x72_5g_modem-rf_system_firmwaressg2125p_firmwaresm8635_firmwareqca6584au_firmwarewcn3990_firmwareqcn9000_firmwarewcd9335_firmwareqcn9274_firmwareqfw7114_firmwareqca6554a_firmwarequalcomm_video_collaboration_vc3_platform_firmwarewcd9385_firmwarewcn7881_firmwareqca8386_firmwareqamsrv1h_firmwareqca6574_firmwarewcd9340_firmwareqca8084_firmwareqcn5124_firmwarewsa8845_firmwareqam8295p_firmwarewcn3660b_firmwareqca8082_firmwaresa9000p_firmwaresnapdragon_429_mobile_platform_firmwareqca6574au_firmwareqca6574a_firmwareqcn6422_firmwarewcd9375_firmwareqca8081_firmwarewsa8845h_firmwareipq9574_firmwareimmersive_home_3210_platform_firmwareqca6564au_firmwaresa8620p_firmwaresa6155p_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareqcm8550_firmwareqca6678aq_firmwareqcn6274_firmwaresa8775p_firmwarewcn7861_firmwarewsa8840_firmwaresa8650p_firmwarewsa8832_firmwaresnapdragon_x75_5g_modem-rf_system_firmwareqcf8001_firmwarefastconnect_6900_firmwaresrv1h_firmwareqcs8550_firmwareqca6797aq_firmwareipq5312_firmwareqcn6432_firmwarewcn7880_firmwaresa8155p_firmwaresa7775p_firmwareqcn9024_firmwaresa7255p_firmwareqcs8250_firmwarewcd9341_firmwarefastconnect_7800_firmwaresnapdragon_ar2_gen_1_platform_firmwaresa8255p_firmwaresm8750_firmwaresm8750p_firmwarewcd9395_firmwareqcn6412_firmwareipq5332_firmwareipq5302_firmwareqca6698aq_firmwareqamsrv1m_firmwaresdx65m_firmwaresrv1m_firmwareqam8650p_firmwaresa8770p_firmwareqca8085_firmwareqam8775p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqca6696_firmwareqcs6490_firmwarewcn7860_firmwareqca6595_firmwareipq9008_firmwareqca6391_firmwarewcd9370_firmwaresm8550p_firmwarequalcomm_video_collaboration_vc5_platform_firmwareqcc710_firmwarevision_intelligence_400_platform_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewsa8830_firmwarewcd9390_firmwarewcn3620_firmwaresxr2250p_firmwarewsa8835_firmwaresa8195p_firmwaressg2115p_firmwareqcn9074_firmwareqam8620p_firmwareqfw7124_firmwaresa8295p_firmwaresnapdragon_8_gen_2_mobile_platform_firmwareqca6688aq_firmwareqca6787aq_firmware
CWE ID-CWE-416
Use After Free
CVE-2025-47371
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.03% / 10.07%
||
7 Day CHG~0.00%
Published-02 Mar, 2026 | 16:53
Updated-04 Mar, 2026 | 19:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reachable Assertion in Modem

Transient DOS when an LTE RLC packet with invalid TB is received by UE.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_x80_5g_modem-rf_system_firmwareqcs4490wcn7861_firmwarewcn6650qcm4325_firmwaresnapdragon_8_gen_2_mobile_platform_firmwarewcd9390wcd9395_firmwarerobotics_rb2_platform_firmwarefastconnect_6200_firmwarewsa8810csra6640_firmwareqca8081_firmwarefastconnect_6700_firmwaresm7550p_firmwarewcn7880qcn6224_firmwarepalawan25qcm4490_firmwaresnapdragon_x72_5g_modem-rf_system_firmwaresnapdragon_x55_5g_modem-rf_systemsnapdragon_8_eliteqcs4490_firmware5g_fixed_wireless_access_platform_firmwaresnapdragon_7_gen_1_mobile_platform_firmwaresm7635pqcm4325sm8550p_firmwaresm6250sm8650qqcs4290snapdragon_865_5g_mobile_platform_firmwareqca6678aq_firmwarerobotics_rb2_platformsnapdragon_4_gen_2_mobile_platform_firmwaresnapdragon_x80_5g_modem-rf_systemfastconnect_6900sm8635psnapdragon_7\+_gen_2_mobile_platformwcd9390_firmwareqca8337snapdragon_6_gen_4_mobile_platformsm6250_firmwaresnapdragon_8_gen_2_mobile_platformsnapdragon_6_gen_1_mobile_platformsnapdragon_460_mobile_platform_firmwaresnapdragon_8\+_gen_1_mobile_platform_firmwareqcm2290palawan25_firmwaresnapdragon_680_4g_mobile_platformsnapdragon_6_gen_1_mobile_platform_firmwareqcn6024_firmwarefastconnect_6800sd662_firmwareqca8337_firmwaresm7675psm6225p_firmwaresnapdragon_6_gen_3_mobile_platform_firmwareqmp1000sm6650pqcn6224qmp1000_firmwaresm7675snapdragon_865\+_5g_mobile_platformwcn7861qcn6274qcn9024wcn3910sm6225psnapdragon_x72_5g_modem-rf_systemsm7550snapdragon_690_5g_mobile_platform_firmwareqcm4490qca6688aq_firmwarewcd9335qfw7124sm8750psnapdragon_8_gen_1_mobile_platformwsa8810_firmwareorne_firmwareqcs2290_firmwaresnapdragon_7_gen_1_mobile_platformsnapdragon_870_5g_mobile_platformsnapdragon_8\+_gen_1_mobile_platformwcn7881_firmwaresnapdragon_4_gen_2_mobile_platformsnapdragon_685_4g_mobile_platformsnapdragon_7c_compute_platform_firmwareqcs2290sdx61_firmwarewcd9378qca6584auqfw7124_firmwareqca6391qfw7114_firmwarewcn3988milossnapdragon_x65_5g_modem-rf_systemsnapdragon_x65_5g_modem-rf_system_firmwarewcd9371wcd9378_firmwarewcn3950fastconnect_6900_firmwareqca6174aqca6584au_firmwaresnapdragon_x75_5g_modem-rf_systemwsa8830_firmwareqca6574auqca6678aqsnapdragon_685_4g_mobile_platform_firmwarewcd9370_firmwareqcs8550_firmwareqcn9012_firmwaresnapdragon_662_mobile_platform_firmwarecsra6640snapdragon_7c_compute_platformqcc710_firmwareqcm2290_firmwaresnapdragon_865\+_5g_mobile_platform_firmwarewcn6755wcn3910_firmwareqca6698au_firmware5g_fixed_wireless_access_platformqfw7114g1_gen_1_firmwareqcn9024_firmwaresm8750p_firmwaresnapdragon_865_5g_mobile_platformwcn7860_firmwarefastconnect_6800_firmwareqca6595auqca6574asnapdragon_auto_5g_modem-rf_gen_2_firmwarefwa_gen_3_ultra_firmwarecsra6620_firmwareqca8081qcn9011sdx61netrani_firmwareqca6698aufastconnect_6200wsa8845h_firmwaresnapdragon_6_gen_3_mobile_platformsnapdragon_870_5g_mobile_platform_firmwarewsa8835_firmwarecsra6620qca6696_firmwareqca6174a_firmwarewcd9360snapdragon_690_5g_mobile_platformsm7550pqca6595au_firmwareqca6797aq_firmwareqca6574a_firmwarewcn7880_firmwaresm8550psnapdragon_auto_5g_modem-rf_firmwareqcn6274_firmwareqca6574au_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarenetranisnapdragon_6_gen_4_mobile_platform_firmwarewcd9341wcd9341_firmwareqcn9012sdx71mqca6696ar8035sm8635wcd9395snapdragon_8\+_gen_2_mobile_platform_firmwarewcd9370wcn6650_firmwareqcs8550wcd9340_firmwarewcn7860sm8650q_firmwarefastconnect_6700qcc710qcs4290_firmwareqca6688aqwcd9380wcd9380_firmwaremilos_firmwareqca6698aq_firmwaresm7635p_firmwarefastconnect_7800_firmwaresnapdragon_7s_gen_3_mobile_platformwcd9371_firmwarewsa8815snapdragon_460_mobile_platformsm7675p_firmwareorneqcn9011_firmwareqca6698aqwcd9375fastconnect_7800snapdragon_7c_gen_2_compute_platform_firmwarewsa8845wsa8845hwsa8845_firmwaresm8475p_firmwaresnapdragon_680_4g_mobile_platform_firmwarewsa8835snapdragon_x55_5g_modem-rf_system_firmwaresnapdragon_8_gen_1_mobile_platform_firmwarewsa8840_firmwarewcd9375_firmwaresnapdragon_8_gen_1_firmwaresnapdragon_8_gen_1sdx71m_firmwarewcd9385_firmwarewcn6755_firmwarewsa8830fwa_gen_3_ultrasnapdragon_8_gen_3_mobile_platform_firmwarear8035_firmwaresnapdragon_662_mobile_platformsnapdragon_7c_gen_2_compute_platformsm8635p_firmwaresnapdragon_7s_gen_3_mobile_platform_firmwarewcd9340sm7675_firmwaresnapdragon_auto_5g_modem-rf_gen_2wcd9360_firmwarewcn3950_firmwarewsa8832_firmwaresm6650p_firmwarewcn3988_firmwarewcd9335_firmwaresd662g1_gen_1wsa8840snapdragon_auto_5g_modem-rfsm7550_firmwarewcd9385wsa8815_firmwarewsa8832snapdragon_8_gen_3_mobile_platformsnapdragon_7\+_gen_2_mobile_platform_firmwaresnapdragon_8_elite_firmwaresm7435snapdragon_8\+_gen_2_mobile_platformsm8475pwcn7881qca6391_firmwaresm8635_firmwaresm7435_firmwareqca6797aqqcn6024Snapdragon
CWE ID-CWE-617
Reachable Assertion
CVE-2024-23350
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.10% / 27.39%
||
7 Day CHG~0.00%
Published-05 Aug, 2024 | 14:21
Updated-26 Nov, 2024 | 15:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reachable Assertion in Multi Mode Call Processor

Permanent DOS when DL NAS transport receives multiple payloads such that one payload contains SOR container whose integrity check has failed, and the other is LPP where UE needs to send status message to network.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800qca6584auqca8337_firmwaresnapdragon_x35_5g_modem-rf_system_firmwaresnapdragon_x72_5g_modem-rf_systemqcn6274_firmwareqca8337wsa8840_firmwareqca6698aqsnapdragon_x75_5g_modem-rf_system_firmwareqfw7124fastconnect_6900fastconnect_6900_firmwareqcn6224_firmwarewsa8840wcd9340qcn6274qcn6224fastconnect_7800_firmwarewsa8845hsnapdragon_x72_5g_modem-rf_system_firmwarewcd9395_firmwaresnapdragon_x75_5g_modem-rf_systemqca8081snapdragon_x35_5g_modem-rf_systemsnapdragon_auto_5g_modem-rf_gen_2qca6698aq_firmwareqca6174a_firmwareqca6174asnapdragon_auto_5g_modem-rf_gen_2_firmwareqep8111_firmwareqcc710qca6584au_firmwarewcd9395qfw7114_firmwarewsa8845ar8035wcd9340_firmwarewcd9390wcd9390_firmwaresnapdragon_8_gen_3_mobile_platform_firmwareqcc710_firmwarewsa8845_firmwarewsa8845h_firmwaresnapdragon_8_gen_3_mobile_platformqca8081_firmwareqfw7124_firmwareqfw7114qep8111ar8035_firmwareSnapdragonqca6174a_firmwareqca8337_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_x35_5g_modem-rf_system_firmwareqca6584au_firmwareqcn6274_firmwareqep8111_firmwareqfw7114_firmwarewsa8840_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900_firmwarewcd9340_firmwareqcc710_firmwaresnapdragon_8_gen_3_mobile_platform_firmwareqcn6224_firmwarewcd9390_firmwarewsa8845_firmwarefastconnect_7800_firmwarewsa8845h_firmwaresnapdragon_x72_5g_modem-rf_system_firmwarewcd9395_firmwareqca8081_firmwareqfw7124_firmwarear8035_firmwareqca6698aq_firmware
CWE ID-CWE-617
Reachable Assertion
CVE-2021-1956
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.07% / 21.73%
||
7 Day CHG~0.00%
Published-09 Sep, 2021 | 07:35
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper handling of ASB-U packet with L2CAP channel ID by slave host can lead to interference with piconet in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca8337_firmwaresa6150p_firmwaresa8145p_firmwareqca8337qca6595qca6564aucsrb31024wcd9360_firmwareqca6574qcx315_firmwaresc8180x\+sdx55sa8150p_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwaresa6155qca6574aqca6584au_firmwareqca6564aqca6430_firmwaresa415mwcn3998sd_8cx_firmwareqcn7605sa515mqca6574_firmwarewcd9340_firmwarewsa8815qca6175asd_8c_firmwaresa8155qca6574a_firmwareqca6574au_firmwaresdx55_firmwareqca6595ausa6155_firmwarewcn3998_firmwareqca6391qca6420wcd9360aqt1000_firmwareqca6564au_firmwareqca6584ausa6155p_firmwaresa515m_firmwarecsrb31024_firmwaresa8155_firmwaresa415m_firmwareqca6430qca6574ausa6145p_firmwaresa8155p_firmwarewcd9340sa8195pqca6564a_firmwarewsa8810_firmwarewcd9341_firmwarewsa8810qcn7605_firmwaresa6155psd_8csa6145pwcd9341qca6696_firmwareqca6595_firmwaresa8145pqca6696qca6391_firmwareqca6390ar8035sd_8cxaqt1000sa8150psc8180x\+sdx55_firmwaresa6150psdx55sa8155pwsa8815_firmwaresa8195p_firmwareqcx315qcn7606_firmwareqca6175a_firmwarear8035_firmwareqcn7606Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music
CVE-2021-1960
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.07% / 21.73%
||
7 Day CHG~0.00%
Published-09 Sep, 2021 | 07:35
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper handling of ASB-C broadcast packets with crafted opcode in LMP can lead to uncontrolled resource consumption in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca2066sm7250sa6150p_firmwaresm6250p_firmwareqcs610qca8337qca6431_firmwarewcd9360_firmwarewcn3950_firmwaresc8180x\+sdx55ipq5028_firmwaresa8150p_firmwareqca6595au_firmwaresa6155qca6335qca2062csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareqcs6125_firmwaresa415mwcn3998wcd9371_firmwarewcn3950qcn6024_firmwaresd720gqsm8350_firmwaresd710_firmwareqsm8350sd460_firmwareqca6574au_firmwarewcd9375_firmwaresa6155_firmwarewcn3998_firmwareqca6420wcd9360wcn3999qrb5165_firmwareipq5028qcs6125sa8155_firmwaresd662_firmwareqcs405qca6430sc8280xp_firmwarewcd9340sd765gqca6436wcn6851sa6155pqcn6122wcd9341qca2066_firmwareqca6431qca6696_firmwarewcd9371sd750gsd870_firmwareqca1062wcn3910_firmwaresd_8cxsa8150pwsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3988sa8195p_firmwareqcn7606_firmwarewcn6750_firmwareipq5018_firmwarewcn3991qca8337_firmwarewcd9380_firmwareqca6564ausdx55m_firmwarewcn6856_firmwaresd670_firmwareqca6574wcd9380qcs410sd690_5g_firmwaresdx50m_firmwareqca6430_firmwareqcn9012_firmwarewcd9335_firmwarewcn3980qca6335_firmwareqcs605wcd9340_firmwarewsa8815wcn6850sd7cwcn3910sd_8c_firmwareqca6426_firmwareqcn9024wcn3980_firmwarewcn6745_firmwaresd730sdx55mqca6421_firmwareqca2062_firmwarewcn6740_firmwaresd678_firmwarear8031_firmwareqrb5165wcn6851_firmwaresd670qca6564a_firmwareqcn9024_firmwaresd480sd870wcn6855qcn7605_firmwareqcs610_firmwaresa6145psdxr1ar8031qca6595_firmwareqcs405_firmwaresa8145pqca6391_firmwareqca2064sd780g_firmwarewcd9370_firmwaresdx55sd888_firmwaresc8280xpsa8155pcsra6640sd675ar8035_firmwareqcn7606wcn3991_firmwarewsa8830sd678qcn9070sa8145p_firmwareqca1062_firmwaresm7250_firmwaresd7c_firmwarecsrb31024csra6620qcn9072sd765g_firmwareqca6420_firmwareqca6390_firmwareqca2064_firmwaresd690_5gsd730_firmwarewcd9370sd675_firmwareqca6426qca6584au_firmwarewcn3990_firmwareqcn9000_firmwareipq5018sd_8cx_firmwareqcn7605sdxr2_5g_firmwarewcd9385_firmwarewcd9326_firmwarewcn6745qca2065sd662qca1064sa8155sdx55_firmwareqca6595auqcn6023_firmwarewcn3999_firmwareqca6436_firmwareipq5010qca6564au_firmwareqca6584ausa6155p_firmwareqca6310sd778gsa515m_firmwareqcs6490sdxr2_5gsa415m_firmwarewcn3988_firmwareqcn9074sa6145p_firmwareqca6421sd778g_firmwaresm6250sa8195pwsa8810_firmwaresd765_firmwarewcd9326wcd9335qcn6023wcd9385qca2065_firmwareqcs6490_firmwarear8035qca6390sd750g_firmwareaqt1000wcd9375sc8180x\+sdx55_firmwaresm6250_firmwareqcn9100_firmwareipq5010_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewsa8815_firmwarewsa8835_firmwareqcx315qca6564aqcm6125_firmwarewcn3990qcn9000sd_675sd780gsd865_5gqca6595qcn9012sd888qcn6122_firmwareqcx315_firmwarewsa8835sd665_firmwaresd888_5gsm6250pqca6574awcn6855_firmwareqca6310_firmwaresm7325wcn6750sa515mqca6574_firmwaresd855sd665qca6175asd765qca6574a_firmwaresd768g_firmwaresd460qca6391sdxr1_firmwareaqt1000_firmwareqcn9100csrb31024_firmwareqcm6490_firmwaresdx50mqcn9070_firmwaresd480_firmwareqca6574ausa8155p_firmwaresd710wcd9341_firmwareqcm6125wsa8810wcn6856sd_8csd768gqca1064_firmwarewcn6740qca6696sd845_firmwaresa6150pqcn9022_firmwareqcn6024qcn9022sd845qcn9072_firmwaresd720g_firmwareqcn9074_firmwareqcs410_firmwareqca6175a_firmwaresm7325_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-20
Improper Input Validation
CVE-2024-23385
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.18% / 39.73%
||
7 Day CHG~0.00%
Published-04 Nov, 2024 | 10:04
Updated-07 Nov, 2024 | 20:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reachable Assertion in Modem

Transient DOS as modem reset occurs when an unexpected MAC RAR (with invalid PDU length) is seen at UE.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055snapdragon_8_gen_1_mobile_platformwsa8830qca8337fsm10056qfw7124sg8275p_firmwarewcd9360_firmwareqcn6224_firmwarefsm10055_firmwarewsa8840snapdragon_212_mobile_platformwcn3950_firmwarewcn6755_firmwareqca6595au_firmwaresnapdragon_x70_modem-rf_systemsnapdragon_480_5g_mobile_platformwcd9370snapdragon_480\+_5g_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwareqep8111_firmwareqca6584au_firmwaresnapdragon_8_gen_2_mobile_platformmsm8108wcd9385_firmwaremsm8108_firmwarewcn3950wcd9326_firmwareqcn6024_firmwarewcn3615_firmwarefastconnect_6200wcn3660bapq8037snapdragon_429_mobile_platform_firmwaresnapdragon_695_5g_mobile_platform_firmwarewcn3680b_firmwaresnapdragon_208_processor_firmwaresdx71m_firmwaresnapdragon_212_mobile_platform_firmwarewsa8845h_firmwarewcn3615wcd9375_firmwaresnapdragon_8_gen_3_mobile_platformsdx55_firmwaresnapdragon_425_mobile_platformwcn3610_firmwarewcd9360snapdragon_429_mobile_platformqfw7114qca8081_firmwareqca6584ausnapdragon_x65_5g_modem-rf_system_firmwareqcm8550_firmwaresnapdragon_x72_5g_modem-rf_systemsnapdragon_208_processorsnapdragon_x70_modem-rf_system_firmwarewsa8840_firmwaresnapdragon_439_mobile_platformqca6698aqqcs8550_firmwaresm8635wcn3988_firmwaresnapdragon_8\+_gen_1_mobile_platformwcd9340fastconnect_6700_firmwareapq8017_firmwarewsa8810_firmwareqcn6224wsa8845hwcn6755wcd9395_firmwarewcd9326snapdragon_x75_5g_modem-rf_systemsnapdragon_x62_5g_modem-rf_systemfsm10056_firmwareqca8081sdx71msnapdragon_x35_5g_modem-rf_systemsnapdragon_auto_5g_modem-rf_gen_2qcm4490qca6698aq_firmwaremsm8209_firmwareqca6174a_firmwarewcd9385snapdragon_auto_5g_modem-rf_gen_2_firmwareqca6696_firmwarear8035wcd9375snapdragon_210_processor_firmwaresnapdragon_430_mobile_platformwcd9390qcc710_firmwarewsa8830_firmwarewcn3620_firmwarewsa8815_firmwarewcn3988wsa8835_firmwarewcn3620apq8017snapdragon_8_gen_2_mobile_platform_firmwarewcn3610msm8608wcd9380_firmwareqca8337_firmwaresdm429wqcm8550ar8035_firmwarewsa8835sdm429w_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwarewcd9380qcn6274snapdragon_wear_4100\+_platform_firmwaresnapdragon_x72_5g_modem-rf_system_firmwarefastconnect_6700snapdragon_210_processorsnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_425_mobile_platform_firmwaresnapdragon_wear_4100\+_platformsm8635_firmwareqca6574asnapdragon_430_mobile_platform_firmwareqca6174asg8275pwcn3980sm6370_firmwareqfw7114_firmwarewsa8845wcd9340_firmwarewsa8815sdx57m_firmwarewsa8845_firmware205_mobile_platform_firmwaresnapdragon_4_gen_1_mobile_platformsnapdragon_439_mobile_platform_firmwarewcn3660b_firmwareqca6574a_firmwarefastconnect_6200_firmwaresnapdragon_x62_5g_modem-rf_system_firmwareqcn9024msm8209wcn3980_firmwarefastconnect_7800snapdragon_x35_5g_modem-rf_system_firmwaresmart_audio_200_platformqcm4490_firmwareqcn6274_firmwareqcs4490_firmwaresnapdragon_x65_5g_modem-rf_systemqca6574au_firmwarewsa8832_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900fastconnect_6900_firmwareqca6574ausmart_audio_200_platform_firmwareqcn9024_firmwaresdx57msnapdragon_8\+_gen_2_mobile_platformwsa8810fastconnect_7800_firmwarewsa8832snapdragon_8_gen_1_mobile_platform_firmwaresm8550psm6370wcn3680bsdx61qcc710qcs4490wcd9395205_mobile_platformqca6696qcs8550wcd9370_firmwaresm8550p_firmwaremsm8608_firmwaresdx55wcd9390_firmwaresnapdragon_8_gen_3_mobile_platform_firmwareqcn6024apq8037_firmwaresnapdragon_695_5g_mobile_platformsnapdragon_8\+_gen_1_mobile_platform_firmwareqca6595auqfw7124_firmwareqep8111sdx61_firmwaresnapdragon_480\+_5g_mobile_platformSnapdragonqca8337_firmwarewcd9380_firmwaresg8275p_firmwarewcd9360_firmwarear8035_firmwarefsm10055_firmwareqcn6224_firmwarefastconnect_6200_firmwaresdm429w_firmwarewcn3950_firmwarewcn6755_firmwareqca6595au_firmwaresnapdragon_x72_5g_modem-rf_system_firmwaresnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_425_mobile_platform_firmwaresm8635_firmwaresnapdragon_430_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwareqca6584au_firmwareqep8111_firmwaresm6370_firmwareqfw7114_firmwaremsm8108_firmwarewcd9385_firmwareqcn6024_firmwarewcd9326_firmwarewcn3615_firmwarewcd9340_firmwaresdx57m_firmwarewsa8845_firmwaresnapdragon_439_mobile_platform_firmwarewcn3660b_firmwaresnapdragon_429_mobile_platform_firmwaresnapdragon_695_5g_mobile_platform_firmwareqca6574au_firmwaresdx55_firmwaresdx71m_firmwaresnapdragon_208_processor_firmwaresnapdragon_212_mobile_platform_firmwareqca8081_firmwarewcd9375_firmwarewcn3680b_firmwarewsa8845h_firmwaresnapdragon_x62_5g_modem-rf_system_firmwarewcn3610_firmwarewcn3980_firmwareqca6574a_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareqcm8550_firmwareqcm4490_firmwaresnapdragon_x35_5g_modem-rf_system_firmwareqcn6274_firmwareqcs4490_firmwaresnapdragon_x70_modem-rf_system_firmwarewsa8840_firmwarewsa8832_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900_firmwareqcs8550_firmwarewcn3988_firmwaresmart_audio_200_platform_firmwarefastconnect_6700_firmwareqcn9024_firmwareapq8017_firmwarewsa8810_firmwarefastconnect_7800_firmwarefsm10056_firmwarewcd9395_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareqca6698aq_firmwaremsm8209_firmwareqca6174a_firmwarequalcomm_205_mobile_platform_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqca6696_firmwaremsm8608_firmwaresm8550p_firmwaresnapdragon_210_processor_firmwarewcd9370_firmwareqcc710_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewcd9390_firmwarewsa8830_firmwarewcn3620_firmwareapq8037_firmwarewsa8815_firmwarewsa8835_firmwaresdx61_firmwareqfw7124_firmwaresnapdragon_8_gen_2_mobile_platform_firmware
CWE ID-CWE-617
Reachable Assertion
CVE-2025-47370
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.01% / 0.87%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:19
Updated-05 Nov, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reachable Assertion in BT Controller

Transient DOS when a remote device sends an invalid connection request during BT connectable LE scan.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcs9100_firmwareqcs6490sm7675qcs5430qamsrv1m_firmwaresa8150p_firmwarewcd9385wsa8835_firmwareqcc2073_firmwaresc8380xpsm8750_firmwaresnapdragon_ar1_gen_1_platform_firmwareqfw7114ar8035_firmwareqca6698aq_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwareqca6391qam8775p_firmwaresm8550psa8145p_firmwareqca8081_firmwarefastconnect_6900sa9000pqam8295p_firmwareqca8081sa8770pqca6574snapdragon_778g_5g_mobile_platform_firmwareqcs5430_firmwareqcm6490qcs8550_firmwaresa8775pwsa8830sm8735wcd9340qcc2073qcc7226snapdragon_auto_5g_modem-rf_gen_2_firmwareqcs8550sa7775p_firmwareqcs4490sa8775p_firmwaresm8550p_firmwareqcc5161_firmwarewcd9380_firmwaresnapdragon_auto_5g_modem-rf_firmwaresm7675pqca6595auqcn9012_firmwareqcm4490snapdragon_8_gen_3_mobile_platform_firmwaresa8255pqcm6490_firmwarewcd9395_firmwareqca8695ausm7325pqca6678aqwsa8845_firmwareqcn7605_firmwarewcd9370_firmwareqcn9011_firmwaresa6150p_firmwareqfw7124snapdragon_782g_mobile_platform_\(sm7325-af\)fastconnect_6900_firmwareqmp1000_firmwaresm8650q_firmwarewcn7750_firmwareqamsrv1ms3_sound_platformwsa8810_firmwaresxr2350p_firmwaresnapdragon_8_gen_2_mobile_platformsa8150psxr2250pqmp1000qcc710_firmwaresa4155pwcd9360snapdragon_ar2_gen_1_platformqca6777aq_firmwarewsa8810s5_sound_platformwcd9395snapdragon_x72_5g_modem-rf_systemwcd9378_firmwares5_sound_platform_firmwareqcc5161ar8035snapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)wsa8832_firmwarewcn6755_firmwareqcn7605sa8195p_firmwaresnapdragon_auto_4g_modemsa6150pqca6678aq_firmwaresnapdragon_8_gen_3_mobile_platformsa8155psnapdragon_778g_5g_mobile_platformssg2125p_firmwaresdx55_firmwareqca6696_firmwarewsa8832wcn3950_firmwaresnapdragon_ar1_gen_1_platformwcd9375video_collaboration_vc3_platformqcs615_firmwaresnapdragon_auto_5g_modem-rf_gen_2sm8735_firmwarewcd9390_firmwaresm7325p_firmwarewsa8815wcd9370wsa8815_firmwareqcc7225qcc7225_firmwaresnapdragon_x75_5g_modem-rf_system_firmwareqcc7228sa8145psnapdragon_7c\+_gen_3_compute_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"_firmwaresrv1hcsrb31024_firmwareqca6574_firmwareqca6698aqsxr1230psxr2230psa8155qca6584auqfw7124_firmwarewsa8845h_firmwaresnapdragon_auto_5g_modem-rfqam8650psa8620pqca6777aqsm8750p_firmwaresm8635ssg2125pqcn9012snapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)_firmwaresa7255p_firmwarewsa8845fastconnect_7800_firmwareqca6391_firmwaresa8255p_firmwaresa4150ps3_gen_2_sound_platformqca6595snapdragon_782g_mobile_platform_\(sm7325-af\)_firmwarewcn7750qcn6274_firmwarefastconnect_6700srv1h_firmwareqam8295psm8635_firmwaresa6155wsa8840sa8650pwcd9385_firmwareqam8775psnapdragon_8\+_gen_2_mobile_platformwsa8830_firmwareqca6688aqs5_gen_2_sound_platform_firmwareqam8255p_firmwaresm7675p_firmwaresa8650p_firmwaresm8635pqca6554a_firmwaressg2115p_firmwarewcd9378qca6797aq_firmwaresxr2350psnapdragon_x75_5g_modem-rf_systemqca6584au_firmwareqcs4490_firmwaresnapdragon_auto_4g_modem_firmwareqca6688aq_firmwareqcn7606_firmwaresa8620p_firmwareqam8255psa8155p_firmwareqca6595au_firmwaresa6155pqcm4490_firmwaresnapdragon_ar2_gen_1_platform_firmwaresxr2250p_firmwareqcc2076qcn6274snapdragon_7c\+_gen_3_computewsa8845hqfw7114_firmwareqca6574a_firmwareqcc710sm8635p_firmwaresnapdragon_x72_5g_modem-rf_system_firmwaresm8750snapdragon_8_gen_2_mobile_platform_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"sxr1230p_firmwareqam8650p_firmwareqca6797aqsa8770p_firmwaresm8750psm7675_firmwaresm8650qqca6554aqca8337qcn6224_firmwares3_gen_2_sound_platform_firmwaresc8380xp_firmwareqcc7226_firmwaresxr2230p_firmwareqca8695au_firmwareqca6595_firmwareqcc2076_firmwareqamsrv1hqca6574au_firmwareqcn9011wsa8835sa8155_firmwaresa6145pwcd9390srv1m_firmwaresa4150p_firmwares5_gen_2_sound_platformsa9000p_firmwareqca6787aqwcd9340_firmwaresa7775psa8195psrv1mssg2115pvideo_collaboration_vc3_platform_firmwaresa6155_firmwaresdx55sa8295pfastconnect_6700_firmwarewcd9375_firmwareqcm5430_firmwareqcm5430wcd9380qamsrv1h_firmwareqca6574ausa4155p_firmwaresa6145p_firmwaresa7255psa6155p_firmwarecsrb31024qcn7606qcs615qca8337_firmwareqca6787aq_firmwarefastconnect_7800wcd9360_firmwareqca6564au_firmwares3_sound_platform_firmwareqca6696wcn6755qca6574aqcs9100sxr2330p_firmwareqcn6224wsa8840_firmwareqca6564auqcc7228_firmwaresa8295p_firmwareqcs6490_firmwarewcn3950sxr2330pSnapdragon
CWE ID-CWE-617
Reachable Assertion
CVE-2023-3024
Matching Score-8
Assigner-Silicon Labs
ShareView Details
Matching Score-8
Assigner-Silicon Labs
CVSS Score-5.9||MEDIUM
EPSS-0.08% / 23.59%
||
7 Day CHG~0.00%
Published-29 Sep, 2023 | 16:32
Updated-25 Sep, 2024 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Bluetooth LE segmented 'prepare write response' packet may lead to out-of-bounds memory access

Forcing the Bluetooth LE stack to segment 'prepare write response' packets can lead to an out-of-bounds memory access.

Action-Not Available
Vendor-silabssilabs.comQualcomm Technologies, Inc.
Product-wsa8830wcd9385wsa8835wcd9380wcd9375gecko_software_development_kitcsrb31024wcd9370aqt1000GSDK
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2025-47384
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.03% / 10.07%
||
7 Day CHG~0.00%
Published-02 Mar, 2026 | 16:53
Updated-05 Mar, 2026 | 20:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reachable Assertion in FW

Transient DOS when MAC configures config id greater than supported maximum value.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3988snapdragon_690_5g_mobile_platformqcm6490_firmwareqca6698aq_firmwarefastconnect_6200_firmwareqca6391wcd9370_firmwarewsa8815_firmwarefastconnect_6700_firmwaresnapdragon_865_5g_mobile_platform_firmwarewcd9360qcm5430_firmwaresm7325pwcd9375video_collaboration_vc3_platform_firmwaresnapdragon_778g\+_5g_mobile_platform_firmwaresnapdragon_888_5g_mobile_platformwcd9341_firmwaresnapdragon_865\+_5g_mobile_platform_firmwareqca6595au_firmwarewsa8810_firmwarewsa8810wcd9341wcd9375_firmwarewcd9380_firmwaresnapdragon_x53_5g_modem-rf_systemsdx57msnapdragon_870_5g_mobile_platform_firmwaresnapdragon_x53_5g_modem-rf_system_firmwaresnapdragon_888\+_5g_mobile_platformsnapdragon_480_5g_mobile_platform_firmwaresnapdragon_865\+_5g_mobile_platformqca6698aqwsa88305g_fixed_wireless_access_platformfastconnect_6800wcd9385qca6391_firmwarewcd9360_firmwaresnapdragon_782g_mobile_platform_firmwaresnapdragon_480_5g_mobile_platformfastconnect_6200qcm6490snapdragon_7c\+_gen_3_computesnapdragon_888\+_5g_mobile_platform_firmwarefastconnect_6900_firmwarewcd9380wcd9385_firmwarewcd9370snapdragon_x55_5g_modem-rf_system_firmwaresnapdragon_865_5g_mobile_platformsnapdragon_x55_5g_modem-rf_systemsnapdragon_778g\+_5g_mobile_platformsnapdragon_auto_5g_modem-rfsnapdragon_7c\+_gen_3_compute_firmwareqca6595ausnapdragon_782g_mobile_platformsdx57m_firmwaresnapdragon_888_5g_mobile_platform_firmwarewsa8835_firmwaresnapdragon_690_5g_mobile_platform_firmwaresnapdragon_480\+_5g_mobile_platformfastconnect_6900fastconnect_6700fastconnect_6800_firmwarewcn3988_firmwaresnapdragon_4_gen_1_mobile_platformwsa8835snapdragon_4_gen_1_mobile_platform_firmwareqcm5430snapdragon_695_5g_mobile_platformsnapdragon_auto_5g_modem-rf_firmware5g_fixed_wireless_access_platform_firmwareqca6574a_firmwaresnapdragon_778g_5g_mobile_platformqca6574asm7325p_firmwarewsa8815wsa8830_firmwaresnapdragon_870_5g_mobile_platformsnapdragon_695_5g_mobile_platform_firmwarevideo_collaboration_vc3_platformsnapdragon_778g_5g_mobile_platform_firmwareqca6696qca6696_firmwaresnapdragon_480\+_5g_mobile_platform_firmwareSnapdragon
CWE ID-CWE-617
Reachable Assertion
CVE-2024-49847
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.35% / 57.69%
||
7 Day CHG~0.00%
Published-06 May, 2025 | 08:32
Updated-09 May, 2025 | 19:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in Multi-Mode Call Processor

Transient DOS while processing of a registration acceptance OTA due to incorrect ciphering key data IE.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wsa8840fastconnect_7800_firmwarewcd9340_firmwareqca6678aqsm8635pwsa8835_firmwareqca6678aq_firmwareqca6698aq_firmwarewsa8845hwsa8845_firmwarewcn3980snapdragon_wear_4100\+_firmwareqfw7114_firmwarewsa8832_firmwareqcn6274wcn6755qcn6224_firmwarewcn3620_firmwaresm8750psnapdragon_x72_5g_modem-rf_firmwaresm7675wcd9340qca8081snapdragon_wear_4100\+wsa8840_firmwaresm7675p_firmwarewsa8845qca6688aq_firmwarewcn3620wsa8845h_firmwareqca8337qca6584ausnapdragon_429_mobileqca6584au_firmwareqca6574au_firmwarewcd9370_firmwaresdm429wsm7675_firmwareqfw7114qfw7124_firmwareqca6595ausm7675pqca6698aqwcn3680bwcn6755_firmwarewsa8832wcn3660bqca8337_firmwarewcd9375snapdragon_429_mobile_firmwaresm8635p_firmwarewsa8835ar8035_firmwarear8035wcd9370sdm429w_firmwarewsa8830qca6574auwcd9390qfw7124wcd9375_firmwarewcd9390_firmwareqca6595au_firmwarewcn3980_firmwarewcd9395sm8650qwcn3610qca6688aqsdx80m_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwarewcn3610_firmwareqca8081_firmwaresnapdragon_x75_5g_modem-rf_firmwaresnapdragon_8_gen_3_mobile_firmwaresnapdragon_x72_5g_modem-rfsm8750_firmwaresm8750p_firmwaresm8635snapdragon_x75_5g_modem-rfwcd9395_firmwarewcn3680b_firmwarewsa8830_firmwaresm8635_firmwaresm8650q_firmwaresnapdragon_8_gen_3_mobileqcn6274_firmwaresnapdragon_auto_5g_modem-rf_gen_2qcc710_firmwaresm8750qcc710wcn3660b_firmwarefastconnect_7800sdx80mqcn6224Snapdragon
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-126
Buffer Over-read
CVE-2025-47362
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 2.74%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:19
Updated-05 Nov, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in Automotive Software platform based on QNX

Information disclosure while processing message from client with invalid payload.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa8150pmsm8996auqam8650psa8620psa8770p_firmwaresrv1l_firmwareqamsrv1m_firmwaresa7255p_firmwaresa8150p_firmwaresnapdragon_820_automotive_platformqca8695au_firmwareqca6595_firmwareqamsrv1hqca6574au_firmwareqca6698aq_firmwaresa8255p_firmwareqam8775p_firmwareqca6595sa6145psa8145p_firmwaresa9000pqam8295p_firmwaresrv1m_firmwaresa8770psa9000p_firmwaresrv1h_firmwaresa7775pqam8295psa8775psa8650psa8195psrv1mqam8775pqca6688aqsa8540p_firmwaresa8195p_firmwaresa8295psa6150pqam8255p_firmwaresa8155psa8650p_firmwaresa7775p_firmwareqamsrv1h_firmwareqca6574ausa8775p_firmwareqam8620p_firmwareqca6797aq_firmwareqca6696_firmwaresa6145p_firmwaresa7255pqca6584au_firmwaresa6155p_firmwareqca6688aq_firmwaresa8620p_firmwareqam8255psa8155p_firmwareqca6797aqsrv1lqca6595au_firmwareqca6595ausa6155pqca6696sa8255psnapdragon_820_automotive_platform_firmwareqca8695ausa8145pmsm8996au_firmwareqam8620psrv1hsa6150p_firmwareqca6698aqqamsrv1msa8540psa8295p_firmwareqca6584auqam8650p_firmwareSnapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2025-47317
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.98%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 15:33
Updated-26 Feb, 2026 | 17:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in BT Controller

Memory corruption due to global buffer overflow when a test command uses an invalid payload type.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcc710_firmwares5_sound_platformwcn3988_firmwaresm8735_firmwaresm7635p_firmwaresm8750p_firmwarewcn7880_firmwarewcd9390s3_gen_2_sound_platformsm7635_firmwarewcn6650s5_gen_2_sound_platform_firmwarewcd9370_firmwarewsa8832_firmwarewcn7880sm7675_firmwareqcc7225_firmwaresm6475wsa8830_firmwaresm8635_firmwaresm7635pfastconnect_7800wcd9371_firmwarewcn6755wsa8845hwsa8830wcd9390_firmwareqcc7225sm7550p_firmwarewcd9375_firmwares3_gen_2_sound_platform_firmwarewsa8840_firmwarefastconnect_6700wcn7860_firmwarewcd9378_firmwarewsa8840s5_sound_platform_firmwaresm8750_firmwarewcd9370snapdragon_6_gen_1_mobile_platformwsa8845h_firmwaresm6475_firmwarefastconnect_6200wcn7881_firmwaresm6650p_firmwarewcd9395sm7675ps3_sound_platformsm7635sm6650wsa8810_firmwarewcn7860fastconnect_6700_firmwaresm8635p_firmwareqcc710qcc711_firmwaresm7550psm8635psm7550qmp1000sm7675wcd9371wsa8815sm7550_firmwares5_gen_2_sound_platformwcn7861qcc5161_firmwarewcd9385_firmwareqmp1000_firmwarewcn7750_firmwarewsa8835s3_sound_platform_firmwarewcd9385sm7435wcn7881wcd9375wcd9378wcn6755_firmwarewsa8845_firmwaresm7435_firmwareqcc5161wsa8835_firmwarefastconnect_6200_firmwaresm8735wsa8815_firmwarewcn7861_firmwareqcc7226_firmwaresm6650pwcn3988sm8635wsa8832sm8750wcd9395_firmwaresm8750pwsa8810qcc7226qcc7228sm6650_firmwarewcn7750wcn6650_firmwareqcc7228_firmwarefastconnect_7800_firmwareqcc711snapdragon_6_gen_1_mobile_platform_firmwaresm7675p_firmwarewsa8845Snapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2024-49838
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-8.2||HIGH
EPSS-0.11% / 29.42%
||
7 Day CHG~0.00%
Published-03 Feb, 2025 | 16:51
Updated-05 Feb, 2025 | 16:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in WLAN HOST

Information disclosure while parsing the OCI IE with invalid length.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800_firmwaresnapdragon_ar2_gen_1qcm6490_firmwareqcn6224_firmwaresa7775p_firmwaresa8775pqca6574au_firmwareqam8775psa8195pqcs615qca6584ausnapdragon_x65_5g_modem-rf_firmwaresa8255psnapdragon_x62_5g_modem-rfwcd9370_firmwaresxr2230pqcc710_firmwaresa8540p_firmwaresnapdragon_8\+_gen_2_mobilesnapdragon_865\+_5g_mobilesxr2230p_firmwareqep8111_firmwaresm7635_firmwaresd_8_gen1_5g_firmwaresxr2130snapdragon_xr2\+_gen_1qca6574ssg2115p_firmwareqcm8550sa8650psa8770p_firmwaretalynplusqca6698aq_firmwaresa8775p_firmwaresnapdragon_x55_5g_modem-rf_firmwareqamsrv1m_firmwaresnapdragon_865_5g_mobiletalynplus_firmwareqca6688aqsnapdragon_xr2_5gqcm4490fastconnect_6800qcs8250sa8530p_firmwarewsa8810mdm9628snapdragon_8_gen_3_mobile_firmwareqam8255p_firmwarewcd9375sdx61sm6650snapdragon_870_5g_mobile_firmwaresnapdragon_w5\+_gen_1_wearable_firmwarefastconnect_6200_firmwaresa6155pvideo_collaboration_vc3_platformsnapdragon_480\+_5g_mobileqamsrv1h_firmwaresw5100pwsa8830_firmwareqca8081sg4150psc8380xpwcd9385wsa8840_firmwareqfw7124_firmwaresxr2250p_firmwarewsa8840qca6426qfw7124qca6696sa8155p_firmwareqca6595snapdragon_460_mobileqca8337qca8337_firmwarevideo_collaboration_vc1_platform_firmwareqam8650pqcs8300sxr1230p_firmwaresxr2330pvision_intelligence_400_firmwaresrv1mqcs5430_firmwaresdx61_firmwareqam8775p_firmwarevideo_collaboration_vc5_platformsnapdragon_ar1_gen_1sm8635p_firmwaresnapdragon_685_4g_mobileqcm5430qcs9100wcd9378qcs7230_firmwaresm7675_firmwaresa8295p_firmwaresm8750pqca9377sa9000pwsa8835snapdragon_4_gen_2_mobile_firmwaresm8750p_firmwareqcn9024qca8081_firmwaresnapdragon_480_5g_mobile_firmwareqca6797aq_firmwarefastconnect_7800wcd9340snapdragon_xr2_5g_firmwaresnapdragon_8_gen_2_mobileqca6174aqcm6125_firmwarewcd9378_firmwarewcd9335_firmwareqca6574auqcn9024_firmwaresm6650_firmwaresnapdragon_auto_5g_modem-rf_gen_2qca6584au_firmwareqca6777aqwcn3990fastconnect_6700qca6696_firmwareqcc2073snapdragon_x72_5g_modem-rf_firmwareqcs9100_firmwaresrv1m_firmwarewsa8832fastconnect_6700_firmwarewcd9390_firmwareqcn6274qcs615_firmwaresm8635snapdragon_695_5g_mobile_firmwareqca6554a_firmwareqcc2073_firmwareqca9367sm8635_firmwareqca6787aqwsa8815sxr1230pqca6574a_firmwaresa8620psm8750_firmwaresrv1lqca6554asa8530psrv1h_firmwareqcs8300_firmwareqcs6490sa8540psa9000p_firmwaresm8550psa7775psnapdragon_auto_5g_modem-rf_gen_2_firmwarewsa8835_firmwareqep8111sa7255psnapdragon_x35_5g_modem-rfwcn7860qamsrv1mqcs5430qam8295p_firmwareqca6787aq_firmwarewcn7881_firmwareqcs8550_firmwareqca9367_firmwareqcm6490wcn7881ssg2125p_firmwaresa8650p_firmwareqcn6274_firmwarewcn3950_firmwareqca6391sm8750snapdragon_x65_5g_modem-rfvision_intelligence_400qcn9274_firmwareqca6564aqca6688aq_firmwarewcn6650snapdragon_480_5g_mobilevideo_collaboration_vc3_platform_firmwaresw5100wcn3950wsa8845_firmwaresnapdragon_w5\+_gen_1_wearablesnapdragon_x55_5g_modem-rfqca6574_firmwareqcm8550_firmwaresw5100p_firmwarewcn6755_firmwarear8035qca6564a_firmwarevideo_collaboration_vc5_platform_firmwaresrv1l_firmwarewsa8845hsa6155p_firmwaresnapdragon_4_gen_1_mobilesnapdragon_680_4g_mobilewcd9341wcn7880_firmwarewcn3988wcd9395_firmwarewcn3990_firmwareqcs6125sm7635snapdragon_680_4g_mobile_firmwareqcc2076fastconnect_6900wcn3988_firmwareqca6574awcd9335wcd9375_firmwarewcd9385_firmwareqam8650p_firmwareqcn9274sa8295psnapdragon_685_4g_mobile_firmwaresa8620p_firmwaresa7255p_firmwareqca6595_firmwareqamsrv1hwcn6740snapdragon_865\+_5g_mobile_firmwarewcd9380snapdragon_x75_5g_modem-rf_firmwaresnapdragon_480\+_5g_mobile_firmwareqca6436_firmwaresa8155pwcn7861_firmwaresnapdragon_4_gen_2_mobilewsa8832_firmwarewcn6755qca6564ausxr2130_firmwaresnapdragon_8_gen_2_mobile_firmwareqcs6490_firmwareqca6595au_firmwareqcn6224sa8255p_firmwareqca6595auqam8255psm4635srv1hqam8620psm8550p_firmwarear8035_firmwaresc8380xp_firmwaresg4150p_firmwaresd865_5gsa8195p_firmwaresd865_5g_firmwaresm7675wsa8845h_firmwaresnapdragon_x62_5g_modem-rf_firmwarewsa8845qcm6125wcn6650_firmwaresnapdragon_ar2_gen_1_firmwarewcd9380_firmwareqca6391_firmwaresnapdragon_662_mobile_firmwareqca6174a_firmwaresm8635pwcn3980qcs4490wcd9370wcd9340_firmwareqcs4490_firmwareqcm4325_firmwareqca6426_firmwaressg2125pqca6678aqsnapdragon_x75_5g_modem-rfwcd9341_firmwaresnapdragon_8_gen_1_mobileqca6564au_firmwareqcc2076_firmwaresnapdragon_865_5g_mobile_firmwaresnapdragon_870_5g_mobileqam8295pqcs8250_firmwaresnapdragon_695_5g_mobilewcn7880sm4635_firmwareqam8620p_firmwareqcn6024qca6797aqqcm4490_firmwaresm7675pqcs7230qcs8550sw5100_firmwaresxr2250pqcm5430_firmwaresnapdragon_8_gen_1_mobile_firmwaresd_8_gen1_5gsm7675p_firmwaresnapdragon_ar1_gen_1_firmwarewsa8810_firmwareqcn6024_firmwareqcc710ssg2115psnapdragon_8_gen_3_mobilesnapdragon_662_mobileqcs6125_firmwaresnapdragon_x72_5g_modem-rfsnapdragon_xr2\+_gen_1_firmwarewcn7861qca9377_firmwarewsa8830wsa8815_firmwaresnapdragon_8\+_gen_2_mobile_firmwaresnapdragon_8\+_gen_1_mobile_firmwaresa8770pwcn7860_firmwareqca6777aq_firmwarefastconnect_6200wcn3980_firmwaresnapdragon_x35_5g_modem-rf_firmwareqca6678aq_firmwarevideo_collaboration_vc1_platformqca6698aqqca6436snapdragon_4_gen_1_mobile_firmwarefastconnect_6900_firmwareqcm4325snapdragon_460_mobile_firmwareqfw7114fastconnect_6800_firmwaresnapdragon_8\+_gen_1_mobilemdm9628_firmwarewcd9390wcd9395qfw7114_firmwarewcn6740_firmwaresxr2330p_firmwareSnapdragon
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-49846
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-8.2||HIGH
EPSS-0.34% / 56.57%
||
7 Day CHG~0.00%
Published-06 May, 2025 | 08:32
Updated-09 May, 2025 | 19:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in Multi-Mode Call Processor

Memory corruption while decoding of OTA messages from T3448 IE.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_w5\+_gen_1_wearablewsa8840fastconnect_7800_firmwarewcd9340_firmwarewsa8835sw5100par8035_firmwarear8035qca6678aqwsa8830wsa8835_firmwareqca6574ausnapdragon_x75_5g_modem-rf_system_firmwareqca6678aq_firmwareqfw7124snapdragon_w5\+_gen_1_wearable_firmwaresnapdragon_x72_5g_modem-rf_systemsnapdragon_x72_5g_modem-rf_system_firmwareqca6595au_firmwarewcd9395qca6698aq_firmwarewsa8845hwsa8845_firmwaresnapdragon_x75_5g_modem-rf_systemqfw7114_firmwaresw5100_firmwaresw5100wsa8832_firmwaresdx80m_firmwareqca6688aqsnapdragon_auto_5g_modem-rf_gen_2_firmwareqcn6274qca8081_firmwareqcn6224_firmwaresm8750_firmwaresm8750pqca8081wcd9340wsa8840_firmwarewsa8845sm8750p_firmwareqca6688aq_firmwarewcd9395_firmwarewsa8845h_firmwarewsa8830_firmwareqca8337qca8337_firmwaresw5100p_firmwareqca6574au_firmwareqcn6274_firmwaresnapdragon_auto_5g_modem-rf_gen_2qfw7114qfw7124_firmwareqcc710_firmwaresm8750qca6595auqcc710qca6698aqwsa8832fastconnect_7800sdx80mqcn6224Snapdragon
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-126
Buffer Over-read
CVE-2024-49839
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-8.2||HIGH
EPSS-0.14% / 34.41%
||
7 Day CHG~0.00%
Published-03 Feb, 2025 | 16:51
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in WLAN Host Cmn

Memory corruption during management frame processing due to mismatch in T2LM info element.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcm8550_firmwareimmersive_home_214wcn6650ipq9574qcn9000_firmwareqca6595qcn9022ipq6028_firmwarewcd9370qca8081_firmwareqca6696qam8620p_firmwarewcn7880_firmwarewcd9340_firmwaresa8530pipq5028_firmwarewcd9395_firmwaresxr2330p_firmwareqcn6024wcn7881_firmwarewcn6450qcc2073_firmwareqcc710_firmwareipq8076fastconnect_6700qcn6422_firmwareipq6018_firmwareqcn6023qcn5124_firmwarewsa8832_firmwareqca8337wcd9395ipq9048ipq6000qca6574au_firmwareipq8078asnapdragon_x72_5g_modem-rfipq8078a_firmwareqam8295pipq5312qca6574auwcd9390sa8620p_firmwarewsa8845h_firmwaresa9000p_firmwaresrv1hqcn9100_firmwareqcn5122qcs9100qca6554aqcs5430wcn7860qcn6024_firmwareqcm5430qcm5430_firmwaresa8770pqcn9000ssg2115pqcc710qcn6132_firmwaresa8540pqca6777aqfastconnect_6900qcn6402qcn6432immersive_home_326_firmwareipq5332_firmwaresa7255psm8635qcn5052qfw7114wcd9385_firmwareipq9574_firmwareqam8255p_firmwareipq8074a_firmwareipq8076aqcn5164snapdragon_x65_5g_modem-rfqca6787aqwsa8845sa6155pqcn9160qca6564au_firmwarecsr8811_firmwareqca8075qam8650pvideo_collaboration_vc5_platform_firmwaresa9000pqca8085srv1h_firmwareqca6595ausxr2250p_firmwaresa6155p_firmwarewsa8840snapdragon_ar1_gen_1srv1m_firmwareqcs8550_firmwaresnapdragon_8_gen_2_mobile_firmwareqfw7124_firmwaresm8750pqcn9012ipq8070a_firmwareqcn9070qcf8001qca8084sm8635psnapdragon_8_gen_2_mobilesdx65mwcd9370_firmwareqcc2076sa7255p_firmwareqca6574asnapdragon_x72_5g_modem-rf_firmwareipq9570snapdragon_8\+_gen_2_mobilesa8195pwcd9340qcs8250_firmwaresnapdragon_auto_5g_modem-rf_gen_2qcm6490ipq5302sa8540p_firmwareqcn6122_firmwareqcn5154_firmwareipq9048_firmwaresm8550p_firmwaresxr2250pqcm8550qcn5122_firmwareqcn9274qcn9024ipq8076a_firmwaresa8775pqca6574ipq9570_firmwaresxr2230p_firmwareqca6777aq_firmwaresa8775p_firmwareqamsrv1hqcn6412_firmwareqcn9024_firmwarewsa8845hqca8082sa8155p_firmwaresa8155pwsa8830ipq5312_firmwaresm8550pqcf8000_firmwareqcn9074_firmwareipq8174immersive_home_318_firmwareqcn6122sa8255p_firmwaresm7675_firmwareqcc2073ipq8174_firmwarear8035sm7635_firmwareipq8072aqamsrv1m_firmwaresa8650p_firmwareimmersive_home_216_firmwarewcn6450_firmwareimmersive_home_316qcf8000sfp_firmwaresrv1l_firmwareqcs9100_firmwareqcn6224ipq8071aqcs615qcn6112qca6698aqqxm8083sa7775p_firmwaresm7635ssg2125p_firmwaresa8530p_firmwarewcd9378sm8635p_firmwarefastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwareqcn6023_firmwareqcn5164_firmwaresnapdragon_x75_5g_modem-rf_firmwareipq8078snapdragon_8_gen_3_mobileqcs6490qcs8250ipq9554_firmwareqcn9072wsa8830_firmwareqcn6224_firmwareqca6678aq_firmwareqca8386_firmwarewsa8845_firmwarewsa8832qca8082_firmwarewcd9378_firmwareqcc2076_firmwaresrv1limmersive_home_216sm7675psrv1mqca6678aqqcn6432_firmwarear8035_firmwareqcn5022_firmwarewcn7860_firmwareqca4024_firmwareqca0000_firmwareipq9008ipq9554qca6564auipq9008_firmwareqcn9074ipq5300_firmwaresa8195p_firmwareqca8337_firmwareqca9888ipq5332sg8275p_firmwareipq8173qcm6490_firmwareipq8072a_firmwareipq6010_firmwareqcn6112_firmwaresm8750qca6797aq_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareipq5028qca8085_firmwareqcf8001_firmwareqcn9070_firmwaresa8295p_firmwareqcn9022_firmwareipq5010_firmwareqcn6132ipq6018qcn9160_firmwareqca6584auqcn6274_firmwarewcn6755_firmwarewcn6650_firmwaresnapdragon_8_gen_3_mobile_firmwareqfw7114_firmwareqca4024qcs7230qca6595_firmwarefastconnect_7800_firmwareqcn6422immersive_home_214_firmwareipq5302_firmwareqxm8083_firmwareipq5300ipq8070asm8635_firmwarefastconnect_6900_firmwarewcd9380qam8255psxr2230pwcn7880sxr2330pqca8075_firmwarewcn6755immersive_home_3210qcf8000qcn5052_firmwaresxr1230pwcn7881sm6650ipq6010sdx65m_firmwarevideo_collaboration_vc3_platformqca6688aqqam8295p_firmwareqcn6402_firmwareqca6698aq_firmwarewcd9385qca8084_firmwaresa8255pqcs7230_firmwaresxr1230p_firmwarewcd9390_firmwareqcn5024qcs615_firmwaresg8275psdx55_firmwareimmersive_home_326ipq8071a_firmwaresm8750_firmwaressg2125pqca6554a_firmwareipq6028snapdragon_x65_5g_modem-rf_firmwareqcn9100qamsrv1mwcn7861_firmwarewcn7861qam8650p_firmwarevideo_collaboration_vc5_platformqcs6490_firmwaresm6650_firmwareipq8076_firmwareqam8620pqca6584au_firmwareqcn5152_firmwareqcn6274qfw7124wsa8835wsa8840_firmwareqca6391_firmwareqca6595au_firmwareqca0000qcs8300_firmwareqca6696_firmwareqcs8300wcd9380_firmwareqca6574_firmwareqca8081qcn5124qam8775psnapdragon_ar2_gen_1_firmwareqca6797aqqcn5152snapdragon_x75_5g_modem-rfqcn6412sa8620pqca6574a_firmwaresdx55qcn9072_firmwareqca9888_firmwareipq8074aimmersive_home_3210_firmwareqca9889qcn5024_firmwareqca6787aq_firmwarewcd9375_firmwareqca8386snapdragon_ar1_gen_1_firmwareqca6391immersive_home_318ipq5010qcn9274_firmwaresa7775pipq8173_firmwareqcs5430_firmwareqcn9012_firmwaresa8770p_firmwaresa8295pqcs8550ipq6000_firmwarefastconnect_7800sa8650pqam8775p_firmwaresm8750p_firmwarewcd9375snapdragon_8\+_gen_2_mobile_firmwareipq8078_firmwareqca6688aq_firmwareqca9889_firmwaresnapdragon_ar2_gen_1immersive_home_316_firmwareqamsrv1h_firmwaresm7675qcn5154wsa8835_firmwaressg2115p_firmwarecsr8811qcn5022sm7675p_firmwareqcf8000sfpSnapdragon
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-126
Buffer Over-read
CVE-2024-21457
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.15% / 35.37%
||
7 Day CHG~0.00%
Published-01 Jul, 2024 | 14:17
Updated-01 Aug, 2024 | 22:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in WLAN Host Communication

INformation disclosure while handling Multi-link IE in beacon frame.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcn5024_firmwareqam8255p_firmwareqcn9070qca8337qam8650pqfw7124ipq8173_firmwareqam8775pqcf8001qamsrv1mqcn6224_firmwareqcn5124qca4024_firmwareqca8082qcn9072qca8386immersive_home_318_platform_firmwareipq8078aipq5028_firmwareqca6595au_firmwareipq6000qcn5152_firmwareqca0000_firmwareqca6584au_firmwareqcn9000_firmwareipq9554qamsrv1hqca6554a_firmwareimmersive_home_216_platformipq8076aimmersive_home_316_platformimmersive_home_316_platform_firmwareqamsrv1h_firmwareqca8386_firmwareqcn6024_firmwareqca8084_firmwareimmersive_home_318_platformipq8074aqcn6412qcn5124_firmwareqca8082_firmwaresa9000p_firmwareqca6574au_firmwareqcn5122_firmwareqcn5164_firmwareqcn6422_firmwareqca6595auqca8081_firmwareqcn6023_firmwareqfw7114sa7255psdx55_firmwareipq5010qca6564au_firmwareqca6584ausa8620p_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareipq8078a_firmwareqcn9274qca6678aq_firmwaresnapdragon_x72_5g_modem-rf_systemsa8775p_firmwareipq8174ipq5028qca6698aqqcn5052qca0000qcf8001_firmwareipq6010qcn6112_firmwareqcn9074srv1hqca8085sa7775p_firmwaresdx65mwcd9340qcn6132qcn6224sa8255p_firmwaresnapdragon_x75_5g_modem-rf_systemqca8081qcf8000qca6698aq_firmwareipq8071aqcn6023sa7775psdx65m_firmwareipq5312ipq8071a_firmwaresnapdragon_auto_5g_modem-rf_gen_2immersive_home_3210_platformqca8085_firmwareipq5300qam8775p_firmwareqca9888_firmwareqcn6122qca6696_firmwaresa8255psa8770p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareipq9008_firmwareipq9570qcn5154_firmwarear8035csr8811qcc710_firmwareqcn9100_firmwareipq5010_firmwareipq8074a_firmwareqcn5022_firmwareimmersive_home_216_platform_firmwaresa8770pqca8337_firmwareqcn9000ipq8072aqcf8000_firmwareqca6554aipq8076a_firmwareqca6595ipq8078qca6564auqca8084ipq8173ipq9008qcn5164immersive_home_326_platform_firmwareqcn6122_firmwareqca6574qcn6402_firmwarecsr8811_firmwareqcn6274qcn6422ipq9554_firmwaresnapdragon_x72_5g_modem-rf_system_firmwareqcn5154qca8075_firmwareqca6574aqcn5024qca9889qcn6132_firmwareqca9888qcn5052_firmwareqcn9274_firmwareqcc2076_firmwareipq8070a_firmwareqfw7114_firmwareqcc2073_firmwareipq6018_firmwareipq8076_firmwaresa8650pqca6574_firmwaresa9000pwcd9340_firmwareqcn6112ipq8076qca6574a_firmwareqcn5152ipq6028sa8775pqcn9024ipq9574_firmwareimmersive_home_3210_platform_firmwareipq5302fastconnect_7800qcn9100qcn6274_firmwareqca6678aqsnapdragon_x65_5g_modem-rf_systemipq5300_firmwareipq8078_firmwareipq9570_firmwareqcn9070_firmwaresa8650p_firmwaresnapdragon_x75_5g_modem-rf_system_firmwaresrv1h_firmwareipq6028_firmwareipq8072a_firmwareqcn6432_firmwareipq5312_firmwareqca6574auqca9889_firmwareipq9574qcn5122qcn9024_firmwareipq8174_firmwaresa7255p_firmwarefastconnect_7800_firmwaresa8620pqcn6412_firmwareipq5332_firmwareipq5332ipq5302_firmwareimmersive_home_326_platformqamsrv1m_firmwareipq6018qcn5022srv1m_firmwareqam8650p_firmwareqcc710ipq6010_firmwareimmersive_home_214_platformqca6595_firmwareqca6696immersive_home_214_platform_firmwareqca4024sdx55qca8075qcn6402qcn9022_firmwareqcn6024qcn9022qcc2076ipq8070aqcn9072_firmwareipq6000_firmwaresrv1mqcn9074_firmwareqfw7124_firmwareqam8255pqcc2073qcn6432ar8035_firmwareSnapdragonqcn5024_firmwareqam8255p_firmwareqca8337_firmwareqcf8000_firmwareipq8076a_firmwareipq8173_firmwareqcn6224_firmwareqca4024_firmwareimmersive_home_326_platform_firmwareqcn6122_firmwareqcn6402_firmwareimmersive_home_318_platform_firmwarecsr8811_firmwareipq5028_firmwareqca6595au_firmwareipq9554_firmwaresnapdragon_x72_5g_modem-rf_system_firmwareqca8075_firmwareqcn5152_firmwareqca0000_firmwareqcn6132_firmwareqca6584au_firmwareqcn9000_firmwareqcn5052_firmwareqcn9274_firmwareqcc2076_firmwareipq8070a_firmwareqca6554a_firmwareqfw7114_firmwareqcn6024_firmwareqca8386_firmwareqcc2073_firmwareimmersive_home_316_platform_firmwareqamsrv1h_firmwareipq6018_firmwareipq8076_firmwareqca6574_firmwareqca8084_firmwarewcd9340_firmwareqcn5124_firmwareqca8082_firmwaresa9000p_firmwareqca6574a_firmwareqca6574au_firmwareqcn5122_firmwareqcn5164_firmwareqcn6422_firmwaresdx55_firmwareqca8081_firmwareqcn6023_firmwareipq9574_firmwareimmersive_home_3210_platform_firmwareqca6564au_firmwaresa8620p_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareipq8078a_firmwareqca6678aq_firmwareqcn6274_firmwaresa8775p_firmwareipq5300_firmwareipq8078_firmwareipq9570_firmwareqcn9070_firmwaresa8650p_firmwaresnapdragon_x75_5g_modem-rf_system_firmwareqcf8001_firmwaresrv1h_firmwareipq6028_firmwareipq8072a_firmwareqcn6112_firmwareqcn6432_firmwareipq5312_firmwareqca9889_firmwaresa7775p_firmwareqcn9024_firmwareipq8174_firmwaresa7255p_firmwarefastconnect_7800_firmwaresa8255p_firmwareqcn6412_firmwareipq5332_firmwareipq5302_firmwareqca6698aq_firmwareqamsrv1m_firmwaresdx65m_firmwaresrv1m_firmwareipq8071a_firmwareqam8650p_firmwaresa8770p_firmwareqca8085_firmwareqam8775p_firmwareqca9888_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareipq6010_firmwareqca6696_firmwareqca6595_firmwareipq9008_firmwareqcn5154_firmwareimmersive_home_214_platform_firmwareqcc710_firmwareqcn9100_firmwareqcn9022_firmwareipq5010_firmwareipq8074a_firmwareqcn9072_firmwareipq6000_firmwareqcn9074_firmwareqcn5022_firmwareqfw7124_firmwareimmersive_home_216_platform_firmwarear8035_firmware
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-3653
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.24% / 46.95%
||
7 Day CHG~0.00%
Published-16 Apr, 2020 | 10:46
Updated-04 Aug, 2024 | 07:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible buffer over-read in windows wlan driver function due to lack of check of length of variable received from userspace in Snapdragon Compute, Snapdragon Connectivity in MSM8998, QCA6390, SC7180, SC8180X, SDM850

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sdm850_firmwaresc7180_firmwaremsm8998sdm850sc7180qca6390_firmwaremsm8998_firmwareqca6390sc8180xsc8180x_firmwareSnapdragon Compute, Snapdragon Connectivity
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-20
Improper Input Validation
CVE-2017-18304
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 13.63%
||
7 Day CHG~0.00%
Published-23 Oct, 2018 | 13:00
Updated-05 Aug, 2024 | 21:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient memory allocation in boot due to incorrect size being passed could result in out of bounds access in Small Cell SoC, Snapdragon Automobile, Snapdragon Mobile and Snapdragon Wear in version FSM9055, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SDA660 and SDX20

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm9055mdm9640_firmwaresd_820asd_617_firmwaremsm8996au_firmwaresdx20sd_415sd_616sd_425sd_430_firmwaremdm9607_firmwaresd_615mdm9650sd_650_firmwaresd_625sd_615_firmwaremsm8909w_firmwaremdm9607msm8996ausd_210sd_650sd_820_firmwaresd_820fsm9055_firmwaresd_450_firmwaresd_617sd_820a_firmwaremdm9206sd_652sd_425_firmwaresd_212_firmwaresd_625_firmwaresd_450sda660_firmwaremdm9206_firmwaresd_430sd_810sd_835_firmwaremdm9650_firmwaresdx20_firmwaresd_835sd_205sda660sd_210_firmwaresd_415_firmwaresd_652_firmwaremsm8909wsd_810_firmwaresd_616_firmwaresd_205_firmwaresd_212mdm9640Small Cell SoC, Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear
CWE ID-CWE-125
Out-of-bounds Read
CVE-2017-18130
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.21% / 42.78%
||
7 Day CHG~0.00%
Published-11 Apr, 2018 | 15:00
Updated-16 Sep, 2024 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Android before security patch level 2018-04-05 on Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 400, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 808, SD 820, SD 820A, SD 835, SD 845, while playing an ASF file, a buffer over-read can potentially occur.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd_820asd_808_firmwaresd_400sd_415sd_616sd_425sd_430_firmwaremdm9607_firmwaresd_615mdm9650sd_650_firmwaresd_625sd_615_firmwaresd_210mdm9607sd_820_firmwaresd_820sd_650sd_808sd_450_firmwaresd_845_firmwaresd_617sd_400_firmwaresd_820a_firmwaremdm9206sd_652sd_425_firmwaresd_212_firmwaresd_625_firmwaresd_450sd_845mdm9206_firmwaresd_430sd_835_firmwaremdm9650_firmwaresd_835sd_205sd_210_firmwaresd_415_firmwaresd_652_firmwaresd_616_firmwaresd_205_firmwaresd_212sd_617_firmwareSnapdragon Automobile, Snapdragon Mobile, Snapdragon Wear
CWE ID-CWE-125
Out-of-bounds Read
CVE-2017-18159
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.78%
||
7 Day CHG~0.00%
Published-06 Jul, 2018 | 17:00
Updated-16 Sep, 2024 | 20:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Android releases from CAF using the linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before security patch level 2018-06-05, while processing a StrHwPlatform with length smaller than EFICHIPINFO_MAX_ID_LENGTH, an array out of bounds access may occur.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.Google LLC
Product-androidAndroid for MSM, Firefox OS for MSM, QRD Android
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-3664
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-6||MEDIUM
EPSS-0.02% / 7.04%
||
7 Day CHG~0.00%
Published-22 Feb, 2021 | 06:26
Updated-04 Aug, 2024 | 07:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of bound read access in hypervisor due to an invalid read access attempt by passing invalid addresses in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qfs2580qca9377_firmwareqpm5679_firmwaresm6250p_firmwareqca8337qfs2530qpm8870_firmwareqln1030qpa8688pm6125qat5522_firmwarewcn3950_firmwarepm8150aqdm5670qca6595au_firmwareqpm5541_firmwareqpa5581_firmwaresa6155pm7150lqpa8821pm8998_firmwarewtr5975_firmwarepm456_firmwareqpa5580_firmwaresa415mwcn3998wcd9371_firmwarewcn3950sm4125sd720gqsw8573_firmwareqsw8574_firmwaresd460_firmwaresmb2351_firmwaresd6905gqpa4360_firmwareqca8081_firmwarewcn3998_firmwarepm855pqca6420pm6150apm660_firmwarepm8150bsa8155_firmwareqca4004_firmwareqca6430qat3522pmr735awcd9306_firmwarewcd9340sdm830_firmwaresd765gsdr660sdr865qdm5620_firmwaresmr545qca6696_firmwareqln5020wcd9371pmm855au_firmwaresm4350_firmwaresa8150ppm6350qdm5621qtc800sqca4004sd712pm640p_firmwareqcn5121qcn5022_firmwarewcn6750_firmwareqat5516_firmwarepm6150lsd8885gpm855l_firmwareqtc410swcn3991qpa8801pm8150l_firmwareqat5533_firmwaresdx55m_firmwaresdxr25gqpa8673_firmwarepm6150smb1354_firmwaresd670_firmwareqca6574qpa8842csr8811_firmwaresdr052_firmwarewcd9380qln4640qcs410qpm5579_firmwaresmb1380_firmwaresmb1381pm855p_firmwarepm7250qpa8803sdx24_firmwaresdxr25g_firmwareqdm2301ipq6018_firmwarewcd9340_firmwarewsa8815wcn6850qdm5621_firmwareqdm2301_firmwareqpm6375ipq6028wcn3980_firmwaresd730pm660l_firmwarepm6250_firmwarepm8008qtm525_firmwarepme605_firmwarepme605qpm5621_firmwareqln1021aq_firmwareqcs603qpa6560_firmwareqpa8802_firmwareqln4640_firmwareqpm5621qpm6582sd670pm8009_firmwareqfs2580_firmwareqcm4290_firmwarepm8150lpmi8998_firmwareqcs610_firmwaresa6145psdr105pm4250ar8031qpm5577wtr2965mdm9205_firmwareqca6391_firmwarepm8150qca4024wcd9370_firmwareqat3516_firmwaresdx55qcn5021_firmwarecsra6640qat3555_firmwareqpa8803_firmwarepm855bsmb2351qln1031qsm8250_firmwarewsa8830pm660qet6110_firmwareqpm6325pm6125_firmwareqbt1500qpa5581csrb31024pmx24_firmwarefsm10055_firmwareqbt1500_firmwareqcs4290qet6100pmm855auqca6420_firmwaresmb1396pm7150asd675_firmwarepm8350qca6564qpa4361_firmwareqca6426wcn3990_firmwareqca9984_firmwareqca9377wcd9385_firmwareqdm5650_firmwarewhs9410wcd9326_firmwarepm7250_firmwaresdr845_firmwareqdm5620qln1021aqsmb1380pmk8002_firmwareqsw6310_firmwaresa8155qln1031_firmwareqcn5122_firmwarepmm6155au_firmwareqat5533sdx55_firmwaresm7250p_firmwareqsm7250_firmwarepm7150l_firmwarewcd9306qca6584auqat5515_firmwarepm855qpm8830_firmwarepm8250qcn5052qfs2530_firmwaresa415m_firmwarepmx55wcn3988_firmwareqcn9074pm8150c_firmwareqca6421qdm3301qpa8842_firmwareqat3519_firmwaresa8195psdr735_firmwareqpm5677qat5515wcd9326wcd9335pm6350_firmwarepm8004_firmwaresdr8150_firmwareqcs4290_firmwareqtc800h_firmwareqpm5620qca6390wcd9375sd750g_firmwareaqt1000sm6250_firmwarepmm8195auqln4642qpm5677_firmwarewsa8815_firmwarewtr3925_firmwaresmr525_firmwarepm8998qpm8820_firmwareqln1020_firmwarepm670a_firmwarepmx55_firmwareqca6595pm8150_firmwareqpm8830qat5522pm8150cpmr735bsd665_firmwareqpa4360pmk8003_firmwareqca8075_firmwaresc8180xqpa4361ipq6005_firmwareqpm5577_firmwareqdm5679_firmwaresmr525qca6310_firmwarepm6150l_firmwarepmr525pm8150a_firmwareqca6574_firmwareqln1036aq_firmwaresd665pm6150a_firmwarepm6150_firmwareqca6175asd765qca6574a_firmwareqat3555sd850_firmwaresd8c_firmwarewtr2965_firmwarepm670_firmwarecsrb31024_firmwareqln1036aqqtc801sipq6028_firmwaresc8180x_firmwaresd710qcn5122pm8008_firmwarepmr735a_firmwarepmx50qcn5022qca6564_firmwaresdr8250sd768gqln1030_firmwarepm8004pm640lpmk8002qca8075sd845sdm830ipq6000_firmwareqcs410_firmwareqca6175a_firmwareqpa5580qpm5579fsm10055sa6150p_firmwareqcs610qpm5620_firmwareqdm2307qca6431_firmwareqpa8802wcd9360_firmwareqpm6585_firmwareqat3519qbt2000_firmwareqca4024_firmwarepm855a_firmwareqtc800hsa8150p_firmwareqcs2290sdr8250_firmwareqca6335csra6620_firmwareqcs605_firmwareqln1020smr546_firmwareqdm5671csra6640_firmwarepmc1000hqpm4650_firmwareqat3518sd8csdr425_firmwaresmr526_firmwareqpa5460pm640a_firmwarewgr7640_firmwareqdm2305_firmwareqpm5670_firmwaresd710_firmwareqdm5652qca6574au_firmwareqpm8870wcd9375_firmwareqpm5679qbt2000sa6155_firmwarewcd9360pmx50_firmwareqpa8675_firmwarewhs9410_firmwaresdr735gqpa5460_firmwarewcn3999qdm3301_firmwareqsm7250ipq6010sd662_firmwareqcs405qdm2308_firmwarefsm10056_firmwareqca6436wcn6851sa6155pqcs603_firmwareqpa6560sdr675_firmwarewcd9341qca6431qet4100_firmwaresd750gwcn3910_firmwareqpm5657wsa8830_firmwaresd855_firmwareqdm5650wcn3988wtr3925sdr052sa8195p_firmwaresmb1390qet4100qpa8686_firmwareqpm6585qca8337_firmwarewcd9380_firmwaresmb1355qln4650sdr735g_firmwarewgr7640qet5100qdm5671_firmwareqpa8801_firmwareqca6564auqtm527_firmwarepm8005_firmwareqet4101_firmwarepm7250bqln4642_firmwaresmb1355_firmwarepm7250b_firmwarepmd9655_firmwaresmb1351_firmwareqet4200aq_firmwaresdx50m_firmwaresdr735smb1395pm660lsmr526qca8072_firmwarewtr5975qca6430_firmwarepmk8003qcn5052_firmwareqtc801s_firmwareqat3522_firmwarewcd9335_firmwarewcn3980qca6335_firmwareqsw8573qcs605sd7cwcn3910qca6426_firmwarepm8350_firmwareqca9984pm8009qpa8675sdr051_firmwaresdx55mpm670aqca6421_firmwareqat3518_firmwareqsw8574pmi8998sd6905g_firmwarear8031_firmwarepm855lwcn6851_firmwareqdm5670_firmwaresd8655gpm7150a_firmwarepm8150b_firmwaresmr545_firmwarepmc1000h_firmwareqca6564a_firmwareqdm2310_firmwarepm4250_firmwaresdr105_firmwareqcn5121_firmwaresd8885g_firmwarepm670qdm5677pm8005qsm8250ipq6018pm855_firmwareqdm2302pmm6155ausdxr1pm855b_firmwareqca6595_firmwareqcs405_firmwareqpm6582_firmwareqpm6375_firmwarepm640l_firmwareqln4650_firmwareqet5100msa8155psd675qet4101qat3516pm670lqpm5658ar8035_firmwareqcm2290qpm5658_firmwarewcn3991_firmwareqdm5652_firmwarepmm8155au_firmwaresdr051qln5030qcs2290_firmwarepm4125fsm10056pmi632qpa2625_firmwarepm456sd7c_firmwarepmr735b_firmwarecsra6620qet5100_firmwareqet6100_firmwarepm670l_firmwaresdr660gsd765g_firmwareqpa8686qca6390_firmwareipq6000sd730_firmwarewcd9370qcn5152_firmwaresdr425pmr525_firmwareqca6584au_firmwareqcn9000_firmwarepmi632_firmwareqpm5541qat5516sd662qpa8821_firmwaresdr660g_firmwarepm3003aqca6595auwcn3999_firmwareqca6436_firmwaresmb1354qca6564au_firmwareqdm2305sa6155p_firmwareqca6310qpm8820qpm2630qln5020_firmwaresa6145p_firmwaresdr675sm6250sd712_firmwarewsa8810_firmwaresmb231sd765_firmwareqdm5677_firmwareqca8081qet4200aqqca6174a_firmwarewcd9385qpm6325_firmwareqdm2302_firmwareqat3550_firmwarepmm8155auqln5040_firmwarepm4125_firmwarear8035csr8811qpa8673qdm2310qln5030_firmwaresmb1396_firmwarewcn6850_firmwarewsa8835_firmwareqca6564asmr546pmx24qet6110qln5040qca8072qcm2290_firmwareqpm8895sdr845qpm5670wcn3990qcn9000qtm527sdx24qdm2307_firmwarewsa8835qpm5657_firmwaresm6250ppm855asdr660_firmwareqca6574asmb1390_firmwareqca6174awcn6750qet5100m_firmwareqpm4650mdm9205qtm525wtr6955sd855sm4125_firmwaresd8cxwtr6955_firmwarepm640pqcn5021qcn5152sd768g_firmwaresdr865_firmwarepm8250_firmwaresd460qca6391sd8cx_firmwaresdxr1_firmwaresmb1351ipq6005aqt1000_firmwareqpm8895_firmwareqcm4290sdx50mpm640asdr8150smb1395_firmwarepmd9655qca6574ausa8155p_firmwareqsw6310sd8655g_firmwarewcd9341_firmwarewsa8810qtc410s_firmwareqpm2630_firmwaresmb231_firmwareqdm2308qat3550qdm5679ipq6010_firmwarepm3003a_firmwareqca6696qtc800s_firmwaresm4350sd845_firmwaresmb1381_firmwareqpa2625sa6150pqpa8688_firmwarepmm8195au_firmwaresm7250psd720g_firmwareqcn9074_firmwaresd850pm6250Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-40524
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 5.63%
||
7 Day CHG~0.00%
Published-05 Sep, 2023 | 06:23
Updated-03 Aug, 2024 | 12:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer over-read in Modem

Memory corruption due to buffer over-read in Modem while processing SetNativeHandle RTP service.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380_firmwarewsa8830sa6150p_firmwaresa8145p_firmwaresw5100psd865_5gqcc5100sdx55m_firmwarewsa8835wcd9380sa8150p_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwareqca6426qca6430_firmwarewcn3980wcn3998sdxr2_5g_firmwaresd855wcn3660bwcn6850wsa8815qca6426_firmwarewcn3660b_firmwareqca6574au_firmwarewcn3680b_firmwareqca6595auwcn3998_firmwarewcn3980_firmwareqca6391sdx55mqca6420qca6436_firmwareqcc5100_firmwareaqt1000_firmwaresa6155p_firmwaresdxr2_5gwcn6851_firmwarewcn3988_firmwareqca6430qca6574ausa6145p_firmwaresa8155p_firmwaresa8195pwsa8810_firmwarewcd9341_firmwaresw5100sd870wsa8810qca6436wcn6851sa6155psw5100p_firmwaresa6145pwcn3680bwcd9341qca6696_firmwaresa8145psd870_firmwareqca6696qca6391_firmwareqca6390aqt1000sa8150psa6150psa8155pwsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3988wcn6850_firmwarewsa8815_firmwarewsa8835_firmwaresa8195p_firmwaresw5100_firmwareSnapdragon
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-40535
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.36% / 58.17%
||
7 Day CHG-0.00%
Published-07 Mar, 2023 | 04:43
Updated-03 Aug, 2024 | 12:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in WLAN

Transient DOS due to buffer over-read in WLAN while sending a packet to device.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcn5024_firmwarewcn3991_firmwarewsa8830qcn9070ipq8173_firmwareqca6431_firmwaresnapdragon_4_gen_1_firmwaresdx65qcn5124qca4024_firmwareqca8082qcn9072qca8386wcn3950_firmwareipq8078aqca6390_firmwarewcd9370qca6426qcn9000_firmwarewcn3998wcd9385_firmwarewcn3950ipq8076aqca8386_firmwareqcn6024_firmwaresm4125wcd9326_firmwareqca8084_firmwareipq8074asd662qcn5124_firmwaresd460_firmwareqca8082_firmwareqcn5164_firmwarewcd9375_firmwareqca8081_firmwareqcn6023_firmwarewcn3998_firmwareqca6436_firmwaresd680_firmwareipq8078a_firmwareqcn9274ipq8174sd662_firmwarewcn3988_firmwareqcn9074qca6421qca8085sdx65mwsa8810_firmwaresw5100qca6436sd680wcd9326wcd9335wcn6851qca8081ipq8071aqcn6023sdx65m_firmwareipq8071a_firmwarewcd9385qca8085_firmwareqca9888_firmwareqca6431sd870_firmwareipq9008_firmwareqcn5154_firmwareqca6390csr8811wcd9375wcn3910_firmwarewsa8830_firmwaresd865_5g_firmwaresnapdragon_4_gen_1ipq8074a_firmwarewcn3988wcn6850_firmwarewsa8815_firmwarewsa8835_firmwarewcn3991wcd9380_firmwareqcn9000ipq8072asw5100pipq8076a_firmwaresd865_5gipq8078qca8084sdx55m_firmwareipq8173ipq9008qcn5164wsa8835csr8811_firmwarewcd9380qcn5154qcn5024qca9889qca9888wcd9335_firmwarewcn3980qcn9274_firmwareipq8070a_firmwareipq8076_firmwaresm4125_firmwarewsa8815wcn6850wcn3910ipq8076qca6426_firmwaresd695qcn9024ipq9574_firmwarewcn3980_firmwaresd460qca6391sdx55mqca6421_firmwaresdx65_firmwareipq8078_firmwareqcn9070_firmwaresd480_firmwarewcn6851_firmwareipq8072a_firmwareqca9889_firmwareipq9574qcn9024_firmwareipq8174_firmwaresd480sd870wsa8810sw5100p_firmwaresd695_firmwareqca6391_firmwareqca4024wcd9370_firmwareqcn6024ipq8070aqcn9072_firmwaresw5100_firmwareqcn9074_firmwareSnapdragonqcn5024_firmwarewcn3991_firmwarewcd9380_firmwareipq8076a_firmwareipq8173_firmwareqca6431_firmwaresdx55m_firmwaresnapdragon_4_gen_1_firmwareqca4024_firmwarewcn3950_firmwarecsr8811_firmwareqca6390_firmwareqcn9000_firmwarewcd9335_firmwareqcn9274_firmwareipq8070a_firmwarewcd9385_firmwareqcn6024_firmwareipq8076_firmwareqca8386_firmwarewcd9326_firmwaresm4125_firmwareqca8084_firmwareqcn5124_firmwaresd460_firmwareqca6426_firmwareqca8082_firmwareqcn5164_firmwarewcd9375_firmwareipq9574_firmwareqca8081_firmwareqcn6023_firmwarewcn3980_firmwarewcn3998_firmwareqca6436_firmwareqca6421_firmwaresd680_firmwaresdx65_firmwareipq8078a_firmwareipq8078_firmwareqcn9070_firmwaresd480_firmwarewcn6851_firmwareipq8072a_firmwaresd662_firmwarewcn3988_firmwareqca9889_firmwareqcn9024_firmwareipq8174_firmwarewsa8810_firmwaresw5100p_firmwaresdx65m_firmwareipq8071a_firmwareqca8085_firmwareqca9888_firmwaresd695_firmwaresd870_firmwareipq9008_firmwareqca6391_firmwareqcn5154_firmwarewcn3910_firmwarewcd9370_firmwarewsa8830_firmwaresd865_5g_firmwareipq8074a_firmwareqcn9072_firmwarewcn6850_firmwarewsa8815_firmwarewsa8835_firmwaresw5100_firmwareqcn9074_firmware
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-40503
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-8.2||HIGH
EPSS-0.12% / 31.13%
||
7 Day CHG~0.00%
Published-04 Apr, 2023 | 04:46
Updated-03 Aug, 2024 | 12:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer over-read in Bluetooth Host.

Information disclosure due to buffer over-read in Bluetooth Host while A2DP streaming.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresm7325-ae_firmwaresa6150p_firmwareqcs610qca8337snapdragon_820_automotive_platform_firmwaresnapdragon_wear_2100_platform_firmwarewcn3950_firmwaresa8150p_firmwareqcs2290qca6595au_firmwareqca6335sm8350sdm670csra6620_firmwareqcs605_firmwarecsra6640_firmwareqcs6125_firmwareapq5053-aa_firmwarewcn685x-1qcs400_firmwaresm7350-ab_firmwaremsm8108sm4375wcn3998qca6554a_firmwaremsm8108_firmwareqam8295pwcn3950sm4125mdm9628sm6375_firmwarewcn3660bsm7150-acsm7315_firmwaresm7325-aeqca6574au_firmwaresm4250-aawcd9375_firmwarewcn3998_firmwaresm6225-admsm8909wqca6420snapdragon_xr2\+_gen_1_platformsdx20mqca9367_firmware8909sm6225-ad_firmwareqrb5165m_firmwareqrb5165_firmwareqcs6125sm7250-ab_firmwareqca64308905_firmwarewcd9340sd626_firmwaresw5100qca64368953_firmwaresa6155pmsm8209_firmwarewcn685x-1_firmwaremdm9250_firmwaresm8150_firmwarewcd9341snapdragon_wear_2500_platformqca6696_firmwaresnapdragon_x12_lte_modemwcn3910_firmwaresm4350_firmwaresa8150psm8250-ac_firmwarewsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwaresm7225_firmwarewcn3988sd660_firmwaresm4250-aa_firmwaresa8195p_firmwarewcn6750_firmwareqcn7606_firmwaresm6125_firmwaresa8295p_firmwarewcn3610msm8608sm6375sm6115_firmwareqca8337_firmwarewcd9380_firmwaresdm429wsw5100pmsm8996au_firmwarewcd9330snapdragon_w5\+_gen_1_wearable_platformqca6564ausdm429sd670_firmwareqca6574apq8053-acwcd9380qcs410apq8053-ac_firmwaresm7150-aa_firmwarec-v2x_9150_firmwareqcn9012_firmwaresd626qca6430_firmwarewcd9335_firmwarewcn3980qca6335_firmwaresm7225qcs605wcd9340_firmwarewsa8815sm6150-ac_firmwarewcn3910qca6320sdm429_firmwaremdm9650_firmwareqca6426_firmwarewcn3660b_firmwarewcn3680sd835wcn3980_firmwaresd730snapdragon_xr2\+_gen_1_platform_firmwarewcd9330_firmwaresnapdragon_x50_5g_modem-rf_system_firmwaresm7150-aasa8295psnapdragon_820_automotive_platformsm6350wcn6740_firmwaresm7125snapdragon_xr2_5g_platformapq8064au_firmwarear8031_firmwarewcn3680_firmwaresm7150-ab_firmwareqrb5165sm8350_firmwaresdm660sm6350_firmware9206_lte_modem_firmwarewcn785x-1_firmwaresdm710sd670qca6564a_firmwareapq8053-lite_firmwareqcm4290_firmwaresnapdragon_x24_lte_modemsw5100p_firmwareqcs610_firmwaresa6145par8031qca6595_firmwaresa8145pqca6391_firmwarewcd9370_firmwareqm215_firmwaresm4350-ac_firmwaresdx55sd888_firmwaresm8250csra6640sa8155psnapdragon_x20_lte_modemsnapdragon_1200_wearable_platformqcm2290qcn7606sdm845_firmwaresnapdragon_wear_2100_platformwsa8830sa8145p_firmwaresm6125snapdragon_x24_lte_modem_firmwareqcs2290_firmwarewcn785x-5mdm9628_firmwareflight_rb5_5g_platformmdm9650csra6620flight_rb5_5g_platform_firmwaresm7250-ac_firmwareqcs4290snapdragon_x20_lte_modem_firmwaremdm9250apq8053-liteqca6420_firmwareqca6390_firmwaresd730_firmwarewcd9370snapdragon_835_mobile_platform_firmwareqca6564sm6115qca6426qca6584au_firmwarewcn3990_firmwareqrb5165n_firmwaresm8450qca9377sm8250-abwcd9385_firmwarewcd9326_firmwarewcn3615_firmwaresnapdragon_1200_wearable_platform_firmwareqam8295p_firmwaresm7325-afqcn9011_firmwaresnapdragon_x55_5g_modem-rf_systemqca6320_firmwarewcn3680b_firmwaresdx55_firmwaresda\/sdm845_firmwaresnapdragon_208_processor_firmwarewcn3615qca6595ausm7325-af_firmwaresm7250p_firmware8953wcn3610_firmwareqca6436_firmwaresm4350-acqrb5165nsnapdragon_w5\+_gen_1_wearable_platform_firmwareqca6564au_firmwareqca6584ausd778gsa6155p_firmwareqca6310apq8053-aa_firmwaresm6225snapdragon_208_processorqcs6490snapdragon_x5_lte_modem_firmware9206_lte_modemqca9367snapdragon_wear_3100_platformsm8250_firmwaresm8250-acwcn3988_firmwareqcn9074sa6145p_firmwareqm215sm6250sd778g_firmwaresm7250-aac-v2x_9150sa8195psxr1120sdm710_firmwareapq8017_firmwarewsa8810_firmwaresm4375_firmwaresm8450_firmwarewcd9326wcd9335apq8053-aaqca6174a_firmwareqcs4290_firmwarewcd9385sxr2130_firmwareqcs6490_firmwaresnapdragon_x12_lte_modem_firmwaresm7150-abqca6390wcd9375sda\/sdm845aqt1000apq8064au8909_firmwaresm6250_firmwaresm6150_firmwarewcn3620_firmwaresm8150wsa8815_firmwareqcm6490wsa8835_firmwarewcn3620sm7350-abapq8017sxr1120_firmwareqca6564awcn785x-1qcm6125_firmwaresnapdragon_x5_lte_modemqcm2290_firmwareapq5053-aawcn3990qca6554asdm845sd865_5g8953proqca6595sm8350-ac_firmwaresm8150-acqcn9012sd888sm6150msm8909w_firmwarewsa8835msm8996ausdm429w_firmwaresnapdragon_835_mobile_platformsxr2130qca6574awcn685x-5_firmwareqca6174asm7325psdm670_firmwareqca6310_firmwaresm7325wcn6750sm7150-ac_firmwaresm7250-abqca6574_firmwaresd855sm4125_firmwaresm7325p_firmwaresnapdragon_xr2_5g_platform_firmwareqca6574a_firmware8953pro_firmwaremsm8209qrb5165mwcn785x-5_firmwaresm7315snapdragon_x55_5g_modem-rf_system_firmwaresm8250-ab_firmwareqca6391aqt1000_firmwareqcm4290qcm6490_firmwaresnapdragon_xr1_platformwcn685x-5qcn9011sm6225_firmwareqca6574ausa8155p_firmwarewcd9341_firmwaresdx20m_firmwareqcm6125sm7250-aa_firmwarewsa88108905sm7250-acsm8150-ac_firmwarewcn3680bsm8350-acsd835_firmwareqca6564_firmwaresnapdragon_wear_2500_platform_firmwarewcn6740qca6696sm4350msm8608_firmwaresm6150-acsm7125_firmwaresnapdragon_x50_5g_modem-rf_systemsa6150psm7250psnapdragon_wear_3100_platform_firmwaresw5100_firmwareqcn9074_firmwareqcs410_firmwareqcs400sdm660_firmwaresnapdragon_xr1_platform_firmwaresm7325_firmwareSnapdragon
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-40519
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.10% / 27.65%
||
7 Day CHG~0.00%
Published-06 Jan, 2023 | 05:02
Updated-09 Apr, 2025 | 14:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer over-read in Core

Information disclosure due to buffer overread in Core

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresd_8cx_gen3_firmwaresa6150p_firmwaresm6250p_firmwareqcs610qca8337qca6431_firmwarewcd9360_firmwaresdx65qca4024_firmwarewcn3950_firmwaresa8150p_firmwareqcs2290qca6595au_firmwaresa6155qca6335sd_455_firmwarecsra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareqcs6125_firmwaresa415msm4375wcn3998wcd9371_firmwareqam8295pwcn3950qcn6024_firmwaresd720gsm4125sd_8cx_gen2_firmwareqca8386_firmwaresd_8_gen1_5g_firmwareqca8084_firmwareqsm8350_firmwaresd710_firmwareqsm8350sd460_firmwaresm7315_firmwarewcn7850qca6574au_firmwarewcd9375_firmwareqca8081_firmwarewcn3998_firmwaresa6155_firmwareqca6420wcd9360sd680_firmwarewcn3999sd_8cx_gen2qrb5165_firmwareqrb5165m_firmwaresa4155p_firmwareqcs6125sa8155_firmwareqca4004_firmwareipq6010sd662_firmwareqcs405qca6430wcd9306_firmwarewcd9340sd765gsw5100fsm10056_firmwaresd680qca6436wcn6851sa6155pqcs603_firmwarewcn7851_firmwarewcd9341qca6431qca6696_firmwarewcd9371sd870_firmwaresd750gipq9008_firmwarewcn3910_firmwaresxr2150p_firmwaresd_8cxsa8150pqca4004wsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwaresd712wcn3988sd660_firmwarewcn7850_firmwaresa8195p_firmwareqcn5121sm8475qcn5022_firmwareqcn7606_firmwarewcn6750_firmwaresa8295p_firmwarewcn3991qca8337_firmwarewcd9380_firmwaresw5100pqca8084qca6564ausdx55m_firmwarewcn6856_firmwareipq9008sd670_firmwareqca6574csr8811_firmwarewcd9380qcs410sd690_5g_firmwaresdx50m_firmwaresdx24_firmwareqca8072_firmwareqcn9012_firmwareqca6430_firmwareqcn9274_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980qca6335_firmwareipq6018_firmwareqcs605wcd9340_firmwarewsa8815wcn6850sd7cwcn3910qca6320qca6426_firmwaresd695ipq6028sd835qca9984qcn9024ipq9574_firmwarewcn3980_firmwaresd730sdx55mqcc5100_firmwaresa8295pqca6421_firmwarewcn6740_firmwaresd678_firmwarear8031_firmwareqrb5165wcn6851_firmwareqcs603sd670sd_636_firmwareqcn9024_firmwareqca6564a_firmwareqcm4290_firmwaresd480sd870wcn6855qcn5121_firmwaresw5100p_firmwaresa8540pqcs610_firmwareqsm8250sa6145pipq6018sd695_firmwaresdxr1ar8031qca6595_firmwareqcs405_firmwaresa8145psdm630_firmwaremdm9205_firmwareqca6391_firmwaresa4150p_firmwareqca4024wcd9370_firmwaresd780g_firmwaresdx55sd888_firmwareqcn5021_firmwaresa8155pcsra6640sd675qcs8155_firmwaresa4155psxr2150par8035_firmwareqsm8250_firmwareqcn7606qcm2290wcn3991_firmwaremdm9150_firmwarewsa8830sd678qcn9070sa8145p_firmwareqcs2290_firmwarefsm10056sd7c_firmwarecsrb31024sd_636csra6620qca8082qcn9072qca8386qcs4290sd765g_firmwareqca6420_firmwareqca6390_firmwaresd690_5gipq6000sd730_firmwarewcd9370sd675_firmwareqcn5152_firmwareqca6564qca6426wcn3990_firmwareqrb5165n_firmwareqcn9000_firmwareqca9984_firmwareqca9377sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwaresd662qam8295p_firmwareqcn9011_firmwaresa8155qca8082_firmwareqca6320_firmwaresa9000p_firmwareqcn5122_firmwaresdx55_firmwareqca6595auqcn6023_firmwarewcn3999_firmwaresm7250p_firmwareqca6436_firmwareqrb5165nwcd9306sd778gqca6564au_firmwaresa6155p_firmwareqca6310qcn9274qcs8155wcn7851sa515m_firmwareqcs6490sdxr2_5gqcn5052sdm630sa415m_firmwarewcn3988_firmwareqcn9074sa6145p_firmwareqca6421qca8085sd778g_firmwaresm6250sa8195psd712_firmwarewsa8810_firmwaresm4375_firmwaresd765_firmwarewcd9326wcd9335qca8081qcn6023qca6174a_firmwareqcs4290_firmwarewcd9385qca8085_firmwareqcs6490_firmwaresd_8cx_gen3qca6390wcd9375sd750g_firmwareaqt1000ar8035csr8811sm6250_firmwarewsa8815_firmwaresd888_5g_firmwareqcm6490wcn6850_firmwarewsa8835_firmwareqcx315qca6564asa4150pqcm6125_firmwareqca8072qcm2290_firmwarewcn3990qcn9000sd_675sd780gsd865_5gqca6595qcc5100sdx24qcn9012sd888wsa8835qcx315_firmwaresd665_firmwaresa8540p_firmwaresd888_5gsm6250pqca8075_firmwaresc8180xqca6574aipq6005_firmwarewcn6855_firmwareqca6174asm7325pqca6310_firmwarewcn6750mdm9205sa9000pqca6574_firmwaresa515msd855sm4125_firmwaresm7325p_firmwaresd665sd765qca6574a_firmwareqcn5021qcn5152sd768g_firmwareqrb5165msd850_firmwaresm7315sd460qca6391sdxr1_firmwareipq6005aqt1000_firmwaresdx65_firmwareqcm4290csrb31024_firmwareqcm6490_firmwaresdx50mqcn9070_firmwaresd480_firmwareipq6028_firmwareqcn9011sc8180x_firmwaresd_455qca6574ausd710sa8155p_firmwareqcn5122ipq9574wcd9341_firmwareqcm6125wsa8810mdm9150wcn6856qcn5022sd835_firmwareqca6564_firmwaresd768gipq6010_firmwarewcn6740qca6696sd845_firmwaresa6150pqca8075qcn9022_firmwareqcn6024qcn9022sd845qcn9072_firmwaresm7250pipq6000_firmwaresd720g_firmwaresw5100_firmwareqcn9074_firmwareqcs410_firmwaresd850Snapdragon
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-40518
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.10% / 27.65%
||
7 Day CHG~0.00%
Published-06 Jan, 2023 | 05:02
Updated-09 Apr, 2025 | 14:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer overread in Core

Information disclosure due to buffer overread in Core

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresd_8cx_gen3_firmwaresa6150p_firmwaresm6250p_firmwareqcs610qca8337qca6431_firmwarewcd9360_firmwaresdx65wcn3950_firmwaresa8150p_firmwareqcs2290qca6595au_firmwaresa6155qca6335csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareqcs6125_firmwaresa415msm4375wcn3998wcd9371_firmwareqam8295pwcn3950qcn6024_firmwaresd720gsm4125sd_8cx_gen2_firmwaresd_8_gen1_5g_firmwareqsm8350_firmwaresd710_firmwareqsm8350sd460_firmwaresm7315_firmwarewcn7850qca6574au_firmwarewcd9375_firmwareqca8081_firmwarewcn3998_firmwaresa6155_firmwareqca6420wcd9360sd680_firmwarewcn3999sd_8cx_gen2qrb5165_firmwareqrb5165m_firmwaresa4155p_firmwareqcs6125sa8155_firmwareqca4004_firmwaresd662_firmwareqcs405qca6430wcd9306_firmwarewcd9340sd765gfsm10056_firmwaresd680qca6436wcn6851sa6155pqcs603_firmwarewcn7851_firmwarewcd9341qca6431qca6696_firmwarewcd9371sd870_firmwaresd750gwcn3910_firmwaresxr2150p_firmwaresd_8cxsa8150pqca4004wsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwaresd712wcn3988sd660_firmwarewcn7850_firmwaresa8195p_firmwaresm8475qcn7606_firmwarewcn6750_firmwaresa8295p_firmwarewcn3991qca8337_firmwarewcd9380_firmwareqca6564ausdx55m_firmwarewcn6856_firmwaresd670_firmwareqca6574wcd9380qcs410sd690_5g_firmwaresdx50m_firmwaresdx24_firmwareqcn9012_firmwareqca6430_firmwarewcd9335_firmwarewcn3980qca6335_firmwareqcs605wcd9340_firmwarewsa8815wcn6850sd7cwcn3910qca6320qca6426_firmwaresd695qca9984sd835qcn9024wcn3980_firmwaresd730sdx55msa8295pqca6421_firmwarewcn6740_firmwaresd678_firmwarear8031_firmwareqrb5165wcn6851_firmwareqcs603sd670qcn9024_firmwareqca6564a_firmwareqcm4290_firmwaresd480sd870wcn6855sa8540pqcs610_firmwareqsm8250sa6145psd695_firmwaresdxr1ar8031qca6595_firmwareqcs405_firmwaresa8145pmdm9205_firmwareqca6391_firmwaresa4150p_firmwarewcd9370_firmwaresd780g_firmwaresdx55sd888_firmwaresa8155pcsra6640sd675qcs8155_firmwaresa4155psxr2150par8035_firmwareqsm8250_firmwareqcn7606qcm2290wcn3991_firmwaremdm9150_firmwarewsa8830sd678sa8145p_firmwareqcs2290_firmwarefsm10056sd7c_firmwarecsrb31024csra6620qcs4290sd765g_firmwareqca6420_firmwareqca6390_firmwaresd690_5gsd730_firmwarewcd9370sd675_firmwareqca6564qca6426wcn3990_firmwareqrb5165n_firmwareqca9984_firmwareqca9377sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwaresd662qam8295p_firmwareqcn9011_firmwaresa8155sa9000p_firmwareqca6320_firmwaresdx55_firmwareqca6595auwcn3999_firmwaresm7250p_firmwareqca6436_firmwareqrb5165nwcd9306sd778gqca6564au_firmwaresa6155p_firmwareqca6310qcs8155wcn7851sa515m_firmwareqcs6490sdxr2_5gsa415m_firmwarewcn3988_firmwareqcn9074sa6145p_firmwareqca6421sd778g_firmwaresm6250sd712_firmwaresa8195pwsa8810_firmwaresm4375_firmwaresd765_firmwarewcd9326wcd9335qca8081qca6174a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwaresd_8cx_gen3qca6390wcd9375sd750g_firmwareaqt1000ar8035sm6250_firmwarewsa8815_firmwaresd888_5g_firmwareqcm6490wcn6850_firmwarewsa8835_firmwareqcx315qca6564asa4150pqcm6125_firmwareqcm2290_firmwarewcn3990sd_675sd780gsd865_5gqca6595sdx24qcn9012sd888wsa8835qcx315_firmwaresd665_firmwaresa8540p_firmwaresd888_5gsm6250psc8180xqca6574awcn6855_firmwareqca6174asm7325pqca6310_firmwarewcn6750mdm9205sa9000pqca6574_firmwaresa515msd855sm4125_firmwaresm7325p_firmwaresd665sd765qca6574a_firmwaresd768g_firmwareqrb5165msd850_firmwaresm7315sd460qca6391sdxr1_firmwareaqt1000_firmwaresdx65_firmwareqcm4290csrb31024_firmwareqcm6490_firmwaresdx50msd480_firmwareqcn9011sc8180x_firmwareqca6574ausd710sa8155p_firmwarewcd9341_firmwareqcm6125wsa8810mdm9150wcn6856sd835_firmwareqca6564_firmwaresd768gwcn6740qca6696sd845_firmwaresa6150pqcn6024sd845sm7250psd720g_firmwareqcn9074_firmwareqcs410_firmwaresd850Snapdragon
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-40505
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-8.2||HIGH
EPSS-0.30% / 53.14%
||
7 Day CHG~0.00%
Published-02 May, 2023 | 05:08
Updated-03 Aug, 2024 | 12:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer over-read in Modem

Information disclosure due to buffer over-read in Modem while parsing DNS hostname.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-9205_lte_modem_firmwarewcd9306snapdragon_1100_wearable_platformsnapdragon_wear_1300_platform_firmware9207_lte_modem_firmware9207_lte_modemmdm8207wcd9330snapdragon_wear_1300_platformsnapdragon_x5_lte_modem_firmwaremdm8207_firmware9206_lte_modemqca4004_firmware9205_lte_modemsnapdragon_1200_wearable_platform_firmwaresnapdragon_1100_wearable_platform_firmware9206_lte_modem_firmwareqca4004qts110wcd9306_firmwaresnapdragon_1200_wearable_platformqca4010wcd9330_firmwareqca4010_firmwaresnapdragon_x5_lte_modemqts110_firmwareSnapdragon9205_lte_modem_firmware9206_lte_modem_firmwaresnapdragon_wear_1300_platform_firmware9207_lte_modem_firmwarewcd9306_firmwaresnapdragon_x5_lte_modem_firmwaremdm8207_firmwarewcd9330_firmwareqca4004_firmwaresnapdragon_1200_wearable_platform_firmwareqca4010_firmwaresnapdragon_1100_wearable_platform_firmwareqts110_firmware
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-40512
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.36% / 58.17%
||
7 Day CHG~0.00%
Published-09 Feb, 2023 | 06:58
Updated-03 Aug, 2024 | 12:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer over-read in WLAN Firmware.

Transient DOS in WLAN Firmware due to buffer over-read while processing probe response or beacon.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaremdm9640_firmwaresm6250p_firmwareipq4028_firmwareqca1023qca8337ar9380ipq8173_firmwareqcn5124mdm9645msm8992_firmwarewcn3950_firmwareqca6595au_firmwaresa6155mdm8215sd_455_firmwareapq8076qcs6125_firmwaresa415mwcn3998wcd9371_firmwarewcn3950qcn6024_firmwaresd720gsm4125mdm9206_firmwarewcn3660bqsm8350_firmwareqsm8350sd460_firmwaresm7315_firmwarewcn7850qca8081_firmwarewcn3998_firmwareqca6420qcn9002qca9986ipq8070_firmwareqca9367_firmwareipq8065ipq8078a_firmwaresd_8cx_gen2ipq8072_firmwareqca0000sa8155_firmwareipq8068qca6430wcd9340sd765gsd680wcn7851_firmwareqca6698aq_firmwaremdm9250_firmwareqca9888_firmwareqcn6122qca6696_firmwarewcd9371sd870_firmwareqca1062qcn5154_firmwaremdm8215_firmwaresd_8cxsa8150pqca9992_firmwaresd660sd865_5g_firmwaresnapdragon_4_gen_1sd712sd660_firmwaresm8475qcn5022_firmwareqcn7606_firmwarewcn6750_firmwareqca6428_firmwareqca9985_firmwarewcn3991ipq4018_firmwareqca4531_firmwaressg2125pqca9980_firmwareipq8078qca8084qcn9001_firmwareipq8173sdx55m_firmwaremsm8976_firmwareqca6574sd670_firmwarecsr8811_firmwarewcd9380qcs410qcn5024sd690_5g_firmwareqca9379_firmwaresxr1230psdx24_firmwareqca9985qcn9012_firmwareqcn9274_firmwareipq6018_firmwareqcm4325_firmwarewcd9340_firmwarewsa8815wcn6850pmp8074_firmwareqcn6112qca6584_firmwaremdm9215_firmwaresd695ipq6028ipq8064sd835pmp8074ipq9574_firmwareqca1990wcn3980_firmwaresd730qcc5100_firmwaresa8295pqca2062_firmwarewcn6740_firmwareqca6678aqsd678_firmwareapq8064au_firmwareipq8078_firmwareqcn5054qcs603qca9994qca9980sd670qcn9024_firmwareipq8174_firmwareqcm4290_firmwarewcn6855qcn7605_firmwaresw5100p_firmwareqcs610_firmwaresa6145pqca9886_firmwarear8031qca1023_firmwaresdm630_firmwaresd820_firmwareqca6391_firmwaresa4150p_firmwareqca4024wcd9370_firmwaresdx55qcn5021_firmwarecsra6640ssg2115p_firmwareqca9379sa4155psxr2150pqcn7606qsm8250_firmwarewsa8830sxr2230p_firmwareqca1062_firmwarecsrb31024mdm9628_firmwaremdm9650sd_636qca8082qca9992qcs4290mdm9250qca6420_firmwareapq8009_firmwareqca2064_firmwaresd690_5gmdm9310_firmwaresd675_firmwareipq8072qca6564qca6426wcn3990_firmwareqrb5165n_firmwareqca9984_firmwareqca9377qca4531wcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwarewcn3615_firmwareipq8074aqcn6102_firmwareapq8094qcn9011_firmwaresa8155qca6584qcn5122_firmwaresdx55_firmwarewcn3615qcn6023_firmwaresm7250p_firmwarewcn3610_firmwareqrb5165nqca6584ausd778gipq8174wcn7851qcn5052qca9367apq8092sdm630mdm9607_firmwareqcn6112_firmwaresa415m_firmwarewcn3988_firmwareqcn9074qca6421qca8085sd778g_firmwaresa8195pwcd9326wcd9335qcn6023qcs4290_firmwareqca8085_firmwareqcs6490_firmwareqca6390qca9898_firmwaresd750g_firmwareaqt1000msm8976wcd9375sm6250_firmwaremsm8994apq8092_firmwareipq5010_firmwareipq8074a_firmwaresd888_5g_firmwaresdx20_firmwarewsa8815_firmwareapq8017qcx315qcm6125_firmwaresd780gsd865_5gqca6595qcc5100ipq8065_firmwareqcx315_firmwaresxr1230p_firmwaresd665_firmwareqcn5154qca8075_firmwaresc8180xmdm9206wcn6855_firmwareqcn6132_firmwareqcn9003_firmwareqca9888qca6310_firmwareapq8094_firmwareipq8070a_firmwaremdm9615qca6574_firmwareqca9886sm7325p_firmwaresd665sxr2230pqca6175asd765qca6574a_firmwareqrb5165msd850_firmwaresm7315apq8009mdm9310qcn6102csrb31024_firmwareqcm6490_firmwarewsa8832_firmwareqcn9070_firmwaresd480_firmwareipq6028_firmwareipq8072a_firmwaresc8180x_firmwareqca9889_firmwaresd710mdm9607qcn5122mdm9645_firmwaresdx20m_firmwareqcn5022qca6564_firmwaresd768gqca1064_firmwarewcn6740qca8075apq8096au_firmwareqcn6024qcn9022sd845mdm9615_firmwareqcn9002_firmwareipq6000_firmwaresdx12qcs410_firmwareqca6175a_firmwaresd_8cx_gen3_firmwareqca2066sa6150p_firmwareqcs610qca6431_firmwarewcd9360_firmwaresdx65qca4024_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqcs2290qca6335qca2062csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareqca6554a_firmwareqam8295psd_8cx_gen2_firmwareipq8076amdm9628qca8386_firmwaresd_8_gen1_5g_firmwareqca8084_firmwaresd710_firmwareqca4020qca6428qca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwaresa6155_firmwaresdx12_firmwarewcd9360sdx20mqca6438_firmwaresd680_firmwareqca6678aq_firmwarewcn3999qrb5165_firmwareipq5028qrb5165m_firmwareipq4029_firmwareqca6698aqqcs6125sa4155p_firmwareipq6010sd662_firmwareqcs405qcn6132qca1990_firmwaresw5100qca4020_firmwareqca6436wcn6851sa6155pqcs603_firmwarewcd9341ipq8068_firmwareqca2066_firmwareqca6431sd750gipq9008_firmwarewcn3910_firmwaresxr2150p_firmwarewsa8830_firmwaresd855_firmwarewcn3988qca6438wcn7850_firmwaresa8195p_firmwareqca9898sa8295p_firmwareipq4028wcn3610mdm9640ipq5018_firmwareqca8337_firmwarewcd9380_firmwareipq8072asw5100pmsm8996au_firmwarewcd9330ipq8076a_firmwareqca6564auwcn6856_firmwareipq9008qcn5164qcn5054_firmwaresdx50m_firmwareqca8072_firmwareqca6174qca6430_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980qca6335_firmwareqcs605sd7cwcn3910qca6320mdm9650_firmwareqca9986_firmwareqca6426_firmwarewcn3660b_firmwareqca9984qcn9024wcd9330_firmwaresdx55mipq8064_firmwareqca6421_firmwaresd821_firmwarear8031_firmwareqrb5165wcn6851_firmwareipq8070sd_636_firmwareqca6564a_firmwaresd480sd870wsa8832qsm8250ipq6018sd695_firmwaresdxr1apq8096auqca6595_firmwareqcs405_firmwaresa8145pqca2064sd780g_firmwaresd888_firmwaresa8155psd675ar8035_firmwareqcm2290qcn5024_firmwarewcn3991_firmwaresd678qcn9070sa8145p_firmwareqcs2290_firmwaresd7c_firmwaresnapdragon_4_gen_1_firmwarecsra6620qcn9072qca8386sd765g_firmwareipq8069_firmwareqca6390_firmwareipq6000qca6174_firmwaresd730_firmwarewcd9370ssg2115pqcn5152_firmwareqca0000_firmwareqca6584au_firmwareapq8076_firmwareqcn9000_firmwareipq5018sd_8cx_firmwareqcn7605qca2065sd662qcn5124_firmwareqam8295p_firmwareqca1064qcn6100_firmwareqca8082_firmwareqca6320_firmwarewcn3680b_firmwareqca6595auwcn3999_firmwareqca6436_firmwareipq5010qca6564au_firmwaresa6155p_firmwareqca6310qcn9274qcn9001qca9990qcs6490sa515m_firmwaresdxr2_5gsd821msm8994_firmwaresa6145p_firmwaremsm8992sm6250sd712_firmwareapq8017_firmwarewsa8810_firmwaresd765_firmwaresg4150pqca8081ipq8071aqca6174a_firmwareipq8071a_firmwarewcd9385qca2065_firmwaresd_8cx_gen3ar8035csr8811apq8064auqcn9100_firmwaresd820qcm6490wcn6850_firmwarewsa8835_firmwareqca6564asa4150psg4150p_firmwareqcm4325qca8072qcm2290_firmwarewcn3990qcn9000sd_675qca6554aar9380_firmwaresdx24qcn9012sd888qcn6122_firmwarewsa8835msm8996ausd888_5gsm6250pssg2125p_firmwareipq4018qca6574aqca9889qca6174asm7325pipq8074qca9994_firmwarewcn6750qcn9003ipq8076_firmwaresa515msd855sm4125_firmwareipq8076qcn5021ipq8069qcn5152sd768g_firmwaresd460qca6391sdxr1_firmwareaqt1000_firmwareqcn9100sdx65_firmwareqcm4290sdx50msdx20mdm9215qcn9011sd_455ipq8074_firmwareqca6574ausa8155p_firmwareipq9574wcd9341_firmwareqcm6125wsa8810wcn6856wcn3680bsd835_firmwareipq6010_firmwareqca6696sd845_firmwaresa6150pqcn9022_firmwareqca9990_firmwareipq8070aqcn6100qcn9072_firmwaresm7250psd720g_firmwareipq8071_firmwareqcn9074_firmwaresw5100_firmwareipq4029sd850Snapdragonqca9377_firmwaresd_8cx_gen3_firmwaremdm9640_firmwaresa6150p_firmwaresm6250p_firmwareipq4028_firmwareipq8173_firmwareqca6431_firmwarewcd9360_firmwareqca4024_firmwaremsm8992_firmwarewcn3950_firmwareipq5028_firmwaresa8150p_firmwareqca6595au_firmwaresd_455_firmwarecsra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareqcs6125_firmwareqca6554a_firmwarewcd9371_firmwaresd_8cx_gen2_firmwareqcn6024_firmwareqca8386_firmwaremdm9206_firmwaresd_8_gen1_5g_firmwareqca8084_firmwareqsm8350_firmwaresd710_firmwaresd460_firmwaresm7315_firmwareqca6574au_firmwareqcn5164_firmwarewcd9375_firmwareqca8081_firmwaresa6155_firmwaresdx12_firmwarewcn3998_firmwareqca6438_firmwaresd680_firmwareipq8070_firmwareqca9367_firmwareipq8078a_firmwareqca6678aq_firmwareqrb5165_firmwareqrb5165m_firmwareipq4029_firmwareipq8072_firmwaresa4155p_firmwaresa8155_firmwaresd662_firmwareqca1990_firmwareqca4020_firmwareqcs603_firmwarewcn7851_firmwareqca6698aq_firmwaremdm9250_firmwareqca9888_firmwareipq8068_firmwareqca2066_firmwareqca6696_firmwaresd870_firmwareipq9008_firmwareqcn5154_firmwaremdm8215_firmwarewcn3910_firmwaresxr2150p_firmwarewsa8830_firmwareqca9992_firmwaresd855_firmwaresd865_5g_firmwaresd660_firmwarewcn7850_firmwaresa8195p_firmwareqcn5022_firmwareqcn7606_firmwaresa8295p_firmwarewcn6750_firmwareqca6428_firmwareipq5018_firmwareqca9985_firmwareipq4018_firmwareqca4531_firmwareqca8337_firmwarewcd9380_firmwareqca9980_firmwaremsm8996au_firmwareipq8076a_firmwareqcn9001_firmwaresdx55m_firmwarewcn6856_firmwaremsm8976_firmwaresd670_firmwarecsr8811_firmwareqcn5054_firmwaresd690_5g_firmwaresdx50m_firmwareqca9379_firmwaresdx24_firmwareqca8072_firmwareqca6430_firmwareqcn5052_firmwareqcn9012_firmwareqcn9274_firmwarewcd9335_firmwareqca6335_firmwareipq6018_firmwareqcm4325_firmwarewcd9340_firmwarepmp8074_firmwareqca6584_firmwaremdm9650_firmwareqca9986_firmwaremdm9215_firmwareqca6426_firmwarewcn3660b_firmwareipq9574_firmwarewcn3980_firmwarewcd9330_firmwareipq8064_firmwareqcc5100_firmwareqca6421_firmwareqca2062_firmwarewcn6740_firmwaresd821_firmwaresd678_firmwareapq8064au_firmwarear8031_firmwareipq8078_firmwarewcn6851_firmwaresd_636_firmwareqca6564a_firmwareipq8174_firmwareqcn9024_firmwareqcm4290_firmwareqcn7605_firmwaresw5100p_firmwareqcs610_firmwareqca9886_firmwaresd695_firmwareqca1023_firmwareqca6595_firmwareqcs405_firmwaresdm630_firmwaresd820_firmwareqca6391_firmwaresa4150p_firmwaresd780g_firmwarewcd9370_firmwaresd888_firmwareqcn5021_firmwaressg2115p_firmwarear8035_firmwareqsm8250_firmwareqcn5024_firmwarewcn3991_firmwaresa8145p_firmwaresxr2230p_firmwareqca1062_firmwareqcs2290_firmwaresd7c_firmwaremdm9628_firmwaresnapdragon_4_gen_1_firmwaresd765g_firmwareqca6420_firmwareipq8069_firmwareapq8009_firmwareqca2064_firmwareqca6390_firmwareqca6174_firmwaresd730_firmwaremdm9310_firmwaresd675_firmwareqcn5152_firmwareqca0000_firmwareqca6584au_firmwareapq8076_firmwareqrb5165n_firmwareqcn9000_firmwareqca9984_firmwarewcn3990_firmwaresd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwarewcn3615_firmwareqcn5124_firmwareqam8295p_firmwareqcn6100_firmwareqcn6102_firmwareqcn9011_firmwareqca8082_firmwareqca6320_firmwarewcn3680b_firmwareqcn5122_firmwaresdx55_firmwarewcn3999_firmwareqcn6023_firmwaresm7250p_firmwarewcn3610_firmwareqca6436_firmwareqca6564au_firmwaresa6155p_firmwaresa515m_firmwaremdm9607_firmwaremsm8994_firmwareqcn6112_firmwaresa415m_firmwarewcn3988_firmwaresa6145p_firmwaresd712_firmwaresd778g_firmwareapq8017_firmwarewsa8810_firmwaresd765_firmwareqca6174a_firmwareipq8071a_firmwareqcs4290_firmwareqca8085_firmwareqca2065_firmwareqcs6490_firmwareqca9898_firmwaresd750g_firmwaresm6250_firmwareqcn9100_firmwareapq8092_firmwareipq5010_firmwareipq8074a_firmwaresd888_5g_firmwaresdx20_firmwarewcn6850_firmwarewsa8815_firmwarewsa8835_firmwaresg4150p_firmwareqcm6125_firmwareqcm2290_firmwarear9380_firmwareqcn6122_firmwareipq8065_firmwareqcx315_firmwaresxr1230p_firmwaresd665_firmwareqca8075_firmwaressg2125p_firmwarewcn6855_firmwareqcn6132_firmwareqcn9003_firmwareqca6310_firmwareapq8094_firmwareqca9994_firmwareipq8070a_firmwareipq8076_firmwareqca6574_firmwaresm4125_firmwaresm7325p_firmwareqca6574a_firmwaresd768g_firmwaresd850_firmwaresdxr1_firmwareaqt1000_firmwaresdx65_firmwarecsrb31024_firmwareqcm6490_firmwarewsa8832_firmwareqcn9070_firmwaresd480_firmwareipq6028_firmwareipq8072a_firmwareipq8074_firmwareqca9889_firmwaresa8155p_firmwaremdm9645_firmwarewcd9341_firmwaresdx20m_firmwaresd835_firmwareqca6564_firmwareipq6010_firmwareqca1064_firmwaresd845_firmwareqcn9022_firmwareapq8096au_firmwaremdm9615_firmwareqca9990_firmwareqcn9002_firmwareqcn9072_firmwareipq6000_firmwaresd720g_firmwareipq8071_firmwareqcn9074_firmwareqcs410_firmwaresw5100_firmwareqca6175a_firmware
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2017-14903
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.09% / 25.48%
||
7 Day CHG~0.00%
Published-05 Dec, 2017 | 17:00
Updated-13 May, 2026 | 00:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while processing the SENDACTIONFRAME IOCTL, a buffer over-read can occur if the payload length is less than 7.

Action-Not Available
Vendor-Google LLCQualcomm Technologies, Inc.
Product-androidAndroid for MSM, Firefox OS for MSM, QRD Android
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-3670
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.32% / 55.12%
||
7 Day CHG~0.00%
Published-02 Nov, 2020 | 06:21
Updated-04 Aug, 2024 | 07:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

u'Potential out of bounds read while processing downlink NAS transport message due to improper length check of Information Element(IEI) NAS message container' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in Agatti, APQ8053, APQ8096AU, APQ8098, Kamorta, MDM9150, MDM9205, MDM9206, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909W, MSM8917, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCM2150, QCM6125, QCS605, QCS610, QM215, Rennell, SA415M, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-mdm9150_firmwarekamorta_firmwaremdm9635m_firmwaremdm9640_firmwareqcm2150_firmwareqcs610sdm429wmsm8996au_firmwaresdm632_firmwaresdm845sdm450_firmwaresdm632sdx24sdm439mdm9650sdm429msm8940_firmwaresm7150_firmwaresm6150msm8909w_firmwareagatti_firmwaremdm9645msm8996ausdm429w_firmwaresm7150msm8917sdm670qcs605_firmwaresc8180xmdm9206sdm670_firmwaresdx24_firmwaresdm636sda845_firmwaresa415mmdm9635mapq8098mdm9205mdm9206_firmwareqcs605sdm429_firmwaremdm9650_firmwaremsm8905_firmwaresda660sdx55_firmwaresxr1130_firmwaresxr1130msm8909wapq8053_firmwareagattisda845nicobarsdm850_firmwaremsm8953sdm450sdm636_firmwaresdm845_firmwareapq8098_firmwaresdx20msm8998_firmwareqcm2150sdm660sdm630mdm9655_firmwaresc8180x_firmwaresa415m_firmwaresdm710qm215sc7180_firmwaremdm9645_firmwaremdm9625_firmwaresdm710_firmwareqcm6125qcs610_firmwaremdm9150msm8905sm8150_firmwaremdm9655apq8096ausdm439_firmwarerennellsc7180sdm630_firmwaremdm9205_firmwaresda660_firmwaremdm9625rennell_firmwareqm215_firmwaresdx55msm8953_firmwaremsm8940saipan_firmwaresm6150_firmwareapq8053msm8917_firmwareapq8096au_firmwaremsm8998sm8150sdx20_firmwaresdm850kamortasaipannicobar_firmwaresdm660_firmwareqcm6125_firmwaremdm9640Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
CWE ID-CWE-125
Out-of-bounds Read
CVE-2017-14905
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.09% / 25.48%
||
7 Day CHG~0.00%
Published-05 Dec, 2017 | 17:00
Updated-13 May, 2026 | 00:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while processing a specially crafted cfg80211 vendor command, a buffer over-read can occur.

Action-Not Available
Vendor-Google LLCQualcomm Technologies, Inc.
Product-androidAndroid for MSM, Firefox OS for MSM, QRD Android
CWE ID-CWE-125
Out-of-bounds Read
CVE-2017-14893
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 12.63%
||
7 Day CHG~0.00%
Published-06 Jul, 2018 | 17:00
Updated-16 Sep, 2024 | 22:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

While flashing meta image, a buffer over-read may potentially occur when the image size is smaller than the image header size or is smaller than the image header size + total image header entry in Android releases from CAF using the linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before security patch level 2018-06-05.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.Google LLC
Product-androidAndroid for MSM, Firefox OS for MSM, QRD Android
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-3674
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.10% / 26.37%
||
7 Day CHG~0.00%
Published-09 Sep, 2020 | 06:25
Updated-04 Aug, 2024 | 07:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Information can leak into userspace due to improper transfer of data from kernel to userspace in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in Nicobar, QCS405, Saipan, SC8180X, SDX55, SM8150, SM8250, SXR2130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sm8150_firmwaresxr2130_firmwareqcs405_firmwaresm8250_firmwaresdx55sc8180x_firmwareqcs405saipan_firmwaresm8250sm8150sdx55_firmwarenicobar_firmwaresaipansxr2130sc8180xnicobarSnapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-3700
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.47% / 64.57%
||
7 Day CHG~0.00%
Published-30 Jul, 2020 | 11:40
Updated-04 Aug, 2024 | 07:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible out of bounds read due to a missing bounds check and could lead to local information disclosure in the wifi driver with no additional execution privileges needed in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8053, APQ8096AU, IPQ4019, IPQ8064, IPQ8074, MDM9607, MSM8909W, MSM8996AU, QCA6574AU, QCA9531, QCA9558, QCA9980, SC8180X, SDM439, SDX55, SM8150, SM8250, SXR2130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9980_firmwaremsm8996au_firmwaresdm439mdm9607_firmwaresm8250_firmwaresc8180x_firmwareqca9531qca9558_firmwareipq8074_firmwareqca6574auqca9558msm8909w_firmwaremdm9607msm8996auqca9980sxr2130sc8180xipq4019_firmwaresm8150_firmwaresxr2130_firmwareipq8074apq8096ausdm439_firmwareipq4019sdx55apq8053apq8096au_firmwaresm8250sm8150qca9531_firmwareipq8064qca6574au_firmwaresdx55_firmwaremsm8909wapq8053_firmwareipq8064_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-3652
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.24% / 46.95%
||
7 Day CHG~0.00%
Published-16 Apr, 2020 | 10:46
Updated-04 Aug, 2024 | 07:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible buffer over-read issue in windows x86 wlan driver function while processing beacon or request frame due to lack of check of length of variable received. in Snapdragon Compute, Snapdragon Connectivity in MSM8998, QCA6390, SC7180, SC8180X, SDM850

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sdm850_firmwaresc7180_firmwaremsm8998sdm850sc7180qca6390_firmwaremsm8998_firmwareqca6390sc8180xsc8180x_firmwareSnapdragon Compute, Snapdragon Connectivity
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-20
Improper Input Validation
CVE-2020-3658
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.32% / 54.88%
||
7 Day CHG~0.00%
Published-22 Jun, 2020 | 07:10
Updated-04 Aug, 2024 | 07:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible null-pointer dereference can occur while parsing mp4 clip with corrupted sample table atoms in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, Kamorta, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, QCA6574AU, QCS405, QCS605, QM215, Rennell, Saipan, SDA660, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-kamorta_firmwaresdm429wmsm8996au_firmwaresdm632_firmwaresdm845sdm450_firmwaresdm632sdm439sdm429msm8940_firmwaresm7150_firmwaresm6150msm8909w_firmwaremsm8996ausdm429w_firmwaresm7150apq8009_firmwaremsm8917sdm670sxr2130qcs605_firmwaremdm9206sdm670_firmwaresdm636apq8098mdm9206_firmwareqcs605msm8937_firmwaresdm429_firmwaremsm8905_firmwareqca6574au_firmwaresda660sxr1130_firmwaresxr1130msm8909wapq8009apq8053_firmwaremsm8920msm8953sdm450sdm636_firmwareapq8098_firmwaresdx20msm8998_firmwaresdm660msm8920_firmwaresdm630mdm9607_firmwaresm8250_firmwareqcs405qca6574ausdm710qm215mdm9607apq8017_firmwaresdm710_firmwaremsm8937mdm9207c_firmwaremsm8996_firmwaremsm8905mdm9207csm8150_firmwaresxr2130_firmwareapq8096ausdm439_firmwareqcs405_firmwarerennellsdm630_firmwaresda660_firmwarerennell_firmwareqm215_firmwaremsm8953_firmwaremsm8940saipan_firmwaresm6150_firmwareapq8053msm8917_firmwareapq8096au_firmwaremsm8998sm8150sdx20_firmwaresm8250kamortaapq8017msm8996saipansdm660_firmwaresdm845_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2020-3703
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.29% / 52.83%
||
7 Day CHG~0.00%
Published-02 Nov, 2020 | 06:21
Updated-04 Aug, 2024 | 07:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

u'Buffer over-read issue in Bluetooth peripheral firmware due to lack of check for invalid opcode and length of opcode received from central device(This CVE is equivalent to Link Layer Length Overfow issue (CVE-2019-16336,CVE-2019-17519) and Silent Length Overflow issue(CVE-2019-17518) mentioned in sweyntooth paper)' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music in APQ8053, APQ8076, AR9344, Bitra, Kamorta, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8917, MSM8937, MSM8940, MSM8953, Nicobar, QCA6174A, QCA9377, QCM2150, QCM6125, QCS404, QCS405, QCS605, QCS610, QM215, Rennell, SC8180X, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SDX24, SM6150, SM7150, SM8150, SXR1130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarekamorta_firmwareqcm2150_firmwareqcs610sdm632_firmwaresdm845sdm450_firmwaresdm632sdx24sdm439qcs404_firmwaresdm429msm8940_firmwaresm7150_firmwaresm6150ar9344sm7150msm8917sdm670qcs605_firmwareapq8076sc8180xmdm9206qca6174asdm670_firmwareqcs404sdx24_firmwareapq8076_firmwaresdm636qca9377bitramdm9206_firmwareqcs605bitra_firmwaremsm8937_firmwaresdm429_firmwaremsm8905_firmwaresxr1130_firmwaresxr1130apq8053_firmwarenicobarmsm8953sdm450sdm636_firmwaresdx20qcm2150sdm660sdm630mdm9607_firmwaresc8180x_firmwareqcs405sdm710qm215mdm9607sdm710_firmwareqcm6125qcs610_firmwaremsm8937mdm9207c_firmwaremsm8905mdm9207cqca6174a_firmwaresm8150_firmwaresdm439_firmwareqcs405_firmwarerennellsdm630_firmwarerennell_firmwareqm215_firmwaremsm8953_firmwaremsm8940sm6150_firmwareapq8053msm8917_firmwaresm8150ar9344_firmwaresdx20_firmwarekamortanicobar_firmwaresdm660_firmwareqcm6125_firmwaresdm845_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-20
Improper Input Validation
CVE-2020-3617
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-7.1||HIGH
EPSS-0.03% / 9.80%
||
7 Day CHG~0.00%
Published-09 Sep, 2020 | 06:25
Updated-04 Aug, 2024 | 07:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

u'Buffer over-read Issue in Q6 testbus framework due to diag packet length is not completely validated before accessing the field and leads to Information disclosure.' in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in Kamorta, Nicobar, QCS605, QCS610, Rennell, SC7180, SDA660, SDM630, SDM636, SDM660, SDM670, SDM710, SM6150, SM7150, SM8150, SXR1130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-kamorta_firmwareqcs610sdm636_firmwaresdm660sdm630sm7150_firmwaresdm710sc7180_firmwaresm6150sdm710_firmwaresm7150sdm670qcs610_firmwareqcs605_firmwaresdm670_firmwaresm8150_firmwaresdm636rennellsc7180sdm630_firmwaresda660_firmwarerennell_firmwareqcs605sm6150_firmwaresm8150sda660kamortasxr1130_firmwarenicobar_firmwaresxr1130sdm660_firmwarenicobarSnapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-20
Improper Input Validation
CVE-2022-33273
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-7.3||HIGH
EPSS-0.04% / 13.69%
||
7 Day CHG~0.00%
Published-02 May, 2023 | 07:30
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer over-read in Trusted Execution Environment

Information disclosure due to buffer over-read in Trusted Execution Environment while QRKS report generation.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarewsa8830sxr2230p_firmwaresnapdragon_x24_lte_modem_firmwareqca8337wcn785x-5qca6431_firmwaresm7250-ac_firmwarewcn3950_firmwaresa8150p_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwaresa6155qca6335sm8350sdm670wcd9370qcs605_firmwaresd_675_firmwaresd675_firmwaressg2115pqca6426wcn685x-1wcn3990_firmwaresm8450qca9377sm8250-abwcn3998sd_8cx_firmwarewcd9385_firmwareqam8295pwcn3950wcd9326_firmwaresd_8_gen1_5g_firmwareqsm8350_firmwareqsm8350qam8295p_firmwaresa8155sa9000p_firmwaresnapdragon_x55_5g_modem-rf_systemqca6574au_firmwaresdx55_firmwaresda\/sdm845_firmwareqca6595auwcn3998_firmwareqca8081_firmwaresa6155_firmwaresm7250p_firmwarewcd9375_firmwareqca6420qca6436_firmwareqca6564au_firmwaresa6155p_firmwareqca6310snapdragon_x65_5g_modem-rf_system_firmwaresa8155_firmwaresm8250_firmwaresm7250-ab_firmwaresm8250-acqca6430sa6145p_firmwareqca6421sm7250-aawcd9340snapdragon_8cx_compute_platformwsa8810_firmwaresm8450_firmwareqca6436snapdragon_ar2_gen_1_platform_firmwarewcd9326sa6155pqca8081qcs603_firmwareqca6174a_firmwarewcn685x-1_firmwarewcd9385sm8150_firmwaresxr2130_firmwarewcd9341qca6431qca6696_firmwareqca6390ar8035sda\/sdm845aqt1000sa8150psd_8cxwcd9375sm6150_firmwaresm8250-ac_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwaresm8150sdm850wsa8815_firmwarewsa8835_firmwaresa8295p_firmwareqca6564awcn785x-1qca8337_firmwarewcd9380_firmwaressg2125pwcn3990sd_675snapdragon_8cx_gen_2_5g_compute_platformsdm845sd865_5gqca6595qca6564ausm8350-ac_firmwaresm8150-acsnapdragon_8c_compute_platformsm6150sd670_firmwareqca6574sxr1230p_firmwarewsa8835sa8540p_firmwaresd_8_gen1_5gwcd9380ssg2125p_firmwaresxr2130qca6574awcn685x-5_firmwareqca6174asdm670_firmwaresxr1230pqca6310_firmwareqca6430_firmwarewcn3980qca6335_firmwaresa9000pqca6574_firmwaresm7250-abqcs605sd855sm6150-ac_firmwarewcd9340_firmwarewsa8815sxr2230psdx57m_firmwaresnapdragon_xr2_5g_platform_firmwareqca6426_firmwareqca6574a_firmwarewcn785x-5_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresm8250-ab_firmwareqca6391wcn3980_firmwaresnapdragon_8cx_gen_3_compute_platform_firmwaresnapdragon_x50_5g_modem-rf_system_firmwaresa8295pqca6421_firmwareaqt1000_firmwaresdm850_firmwaresnapdragon_8cx_compute_platform_firmwaresnapdragon_xr2_5g_platformsnapdragon_x65_5g_modem-rf_systemwsa8832_firmwaresm8350_firmwareqcs603wcn685x-5wcn785x-1_firmwareqca6574ausa8155p_firmwaresd670qca6564a_firmwaresdx57mwcd9341_firmwarewsa8810sm7250-aa_firmwaresnapdragon_x24_lte_modemwsa8832sa8540psm7250-acsnapdragon_8cx_gen_3_compute_platformsm8150-ac_firmwaresnapdragon_ar2_gen_1_platformsa6145psnapdragon_8c_compute_platform_firmwaresm8350-acqca6595_firmwareqca6696qca6391_firmwarewcd9370_firmwaresm6150-acsdx55snapdragon_x50_5g_modem-rf_systemsa8155psd675sm8250sm7250pssg2115p_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_firmwarear8035_firmwaresdm845_firmwareSnapdragon
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 10
  • 11
  • Next
Details not found