Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-27783

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-16 Mar, 2023 | 00:00
Updated At-26 Feb, 2025 | 20:18
Rejected At-
Credits

An issue found in TCPreplay tcprewrite v.4.4.3 allows a remote attacker to cause a denial of service via the tcpedit_dlt_cleanup function at plugins/dlt_plugins.c.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:16 Mar, 2023 | 00:00
Updated At:26 Feb, 2025 | 20:18
Rejected At:
â–¼CVE Numbering Authority (CNA)

An issue found in TCPreplay tcprewrite v.4.4.3 allows a remote attacker to cause a denial of service via the tcpedit_dlt_cleanup function at plugins/dlt_plugins.c.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/appneta/tcpreplay/issues/780
N/A
https://github.com/appneta/tcpreplay/pull/781
N/A
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/
vendor-advisory
Hyperlink: https://github.com/appneta/tcpreplay/issues/780
Resource: N/A
Hyperlink: https://github.com/appneta/tcpreplay/pull/781
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/
Resource:
vendor-advisory
â–¼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/appneta/tcpreplay/issues/780
x_transferred
https://github.com/appneta/tcpreplay/pull/781
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/
vendor-advisory
x_transferred
Hyperlink: https://github.com/appneta/tcpreplay/issues/780
Resource:
x_transferred
Hyperlink: https://github.com/appneta/tcpreplay/pull/781
Resource:
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/
Resource:
vendor-advisory
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-617CWE-617 Reachable Assertion
Type: CWE
CWE ID: CWE-617
Description: CWE-617 Reachable Assertion
Metrics
VersionBase scoreBase severityVector
3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:16 Mar, 2023 | 15:15
Updated At:26 Feb, 2025 | 21:15

An issue found in TCPreplay tcprewrite v.4.4.3 allows a remote attacker to cause a denial of service via the tcpedit_dlt_cleanup function at plugins/dlt_plugins.c.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Secondary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Secondary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Broadcom Inc.
broadcom
>>tcpreplay>>4.4.3
cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-617Primarynvd@nist.gov
CWE-617Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-617
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-617
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/appneta/tcpreplay/issues/780cve@mitre.org
Exploit
Issue Tracking
Patch
https://github.com/appneta/tcpreplay/pull/781cve@mitre.org
Issue Tracking
Patch
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/cve@mitre.org
N/A
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/cve@mitre.org
N/A
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/cve@mitre.org
N/A
https://github.com/appneta/tcpreplay/issues/780af854a3a-2127-422b-91ae-364da2661108
Exploit
Issue Tracking
Patch
https://github.com/appneta/tcpreplay/pull/781af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Patch
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/af854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/af854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: https://github.com/appneta/tcpreplay/issues/780
Source: cve@mitre.org
Resource:
Exploit
Issue Tracking
Patch
Hyperlink: https://github.com/appneta/tcpreplay/pull/781
Source: cve@mitre.org
Resource:
Issue Tracking
Patch
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://github.com/appneta/tcpreplay/issues/780
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Issue Tracking
Patch
Hyperlink: https://github.com/appneta/tcpreplay/pull/781
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Patch
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

299Records found

CVE-2006-4574
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-6.82% / 91.16%
||
7 Day CHG~0.00%
Published-28 Oct, 2006 | 00:00
Updated-17 Jan, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Off-by-one error in the MIME Multipart dissector in Wireshark (formerly Ethereal) 0.10.1 through 0.99.3 allows remote attackers to cause a denial of service (crash) via certain vectors that trigger an assertion error related to unexpected length values.

Action-Not Available
Vendor-n/aWireshark Foundation
Product-wiresharkn/a
CWE ID-CWE-193
Off-by-one Error
CWE ID-CWE-617
Reachable Assertion
CVE-2025-66443
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.06% / 18.72%
||
7 Day CHG~0.00%
Published-25 Dec, 2025 | 00:00
Updated-05 Jan, 2026 | 18:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Pexip Infinity 35.0 through 38.1 before 39.0, in non-default configurations that use Direct Media for WebRTC, has Improper Input Validation in signalling that allows an attacker to trigger a software abort, resulting in a temporary denial of service.

Action-Not Available
Vendor-pexipPexip
Product-pexip_infinityInfinity
CWE ID-CWE-617
Reachable Assertion
CVE-2024-45403
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-3.7||LOW
EPSS-0.33% / 55.54%
||
7 Day CHG~0.00%
Published-11 Oct, 2024 | 14:28
Updated-12 Nov, 2024 | 19:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
H2O assertion failure when HTTP/3 requests are cancelled

h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. When h2o is configured as a reverse proxy and HTTP/3 requests are cancelled by the client, h2o might crash due to an assertion failure. The crash can be exploited by an attacker to mount a Denial-of-Service attack. By default, the h2o standalone server automatically restarts, minimizing the impact. However, HTTP requests that were served concurrently will still be disrupted. The vulnerability has been addressed in commit 1ed32b2. Users may disable the use of HTTP/3 to mitigate the issue.

Action-Not Available
Vendor-denah2o
Product-h2oh2o
CWE ID-CWE-617
Reachable Assertion
CVE-2025-65559
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.07% / 22.48%
||
7 Day CHG~0.00%
Published-18 Dec, 2025 | 00:00
Updated-06 Jan, 2026 | 20:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Open5GS 2.7.5-49-g465e90f, when processing a PFCP Session Establishment Request (type=50), the UPF crashes with a reachable assertion in `lib/pfcp/context.c` (`ogs_pfcp_object_teid_hash_set`) if the CreatePDR?PDI?F-TEID has CH=1 and the F-TEID address-family flag(s) (IPv4/IPv6) do not match the GTP-U resource family configured for the selected DNN (Network Instance), resulting in a denial of service.

Action-Not Available
Vendor-open5gsn/a
Product-open5gsn/a
CWE ID-CWE-617
Reachable Assertion
CVE-2006-4095
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-9.22% / 92.56%
||
7 Day CHG~0.00%
Published-06 Sep, 2006 | 00:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

BIND before 9.2.6-P1 and 9.3.x before 9.3.2-P1 allows remote attackers to cause a denial of service (crash) via certain SIG queries, which cause an assertion failure when multiple RRsets are returned.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.Apple Inc.Canonical Ltd.
Product-mac_os_x_servermac_os_xubuntu_linuxbindn/a
CWE ID-CWE-617
Reachable Assertion
CVE-2024-42645
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.06% / 17.37%
||
7 Day CHG~0.00%
Published-29 Jul, 2025 | 00:00
Updated-06 Aug, 2025 | 20:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in FlashMQ v1.14.0 allows attackers to cause an assertion failure via sending a crafted retain message, leading to a Denial of Service (DoS).

Action-Not Available
Vendor-flashmqn/a
Product-flashmqn/a
CWE ID-CWE-617
Reachable Assertion
CVE-2024-42644
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.03% / 8.55%
||
7 Day CHG~0.00%
Published-29 Jul, 2025 | 00:00
Updated-06 Aug, 2025 | 20:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

FlashMQ v1.14.0 was discovered to contain an assertion failure in the function PublishCopyFactory::getNewPublish, which occurs when the QoS value of the publish object is greater than 0.

Action-Not Available
Vendor-flashmqn/a
Product-flashmqn/a
CWE ID-CWE-617
Reachable Assertion
CVE-2024-4076
Matching Score-4
Assigner-Internet Systems Consortium (ISC)
ShareView Details
Matching Score-4
Assigner-Internet Systems Consortium (ISC)
CVSS Score-7.5||HIGH
EPSS-0.11% / 29.31%
||
7 Day CHG~0.00%
Published-23 Jul, 2024 | 14:40
Updated-13 Feb, 2025 | 17:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Assertion failure when serving both stale cache data and authoritative zone content

Client queries that trigger serving stale data and that also require lookups in local authoritative zone data may result in an assertion failure. This issue affects BIND 9 versions 9.16.13 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.11.33-S1 through 9.11.37-S1, 9.16.13-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.27-S1.

Action-Not Available
Vendor-Internet Systems Consortium, Inc.
Product-BIND 9bind
CWE ID-CWE-617
Reachable Assertion
CVE-2025-59530
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.13% / 32.89%
||
7 Day CHG~0.00%
Published-10 Oct, 2025 | 16:09
Updated-14 Oct, 2025 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
quic-go has Client Crash Due to Premature HANDSHAKE_DONE Frame

quic-go is an implementation of the QUIC protocol in Go. In versions prior to 0.49.0, 0.54.1, and 0.55.0, a misbehaving or malicious server can cause a denial-of-service (DoS) attack on the quic-go client by triggering an assertion failure, leading to a process crash. This requires no authentication and can be exploited during the handshake phase. This was observed in the wild with certain server implementations. quic-go needs to be able to handle misbehaving server implementations, including those that prematurely send a HANDSHAKE_DONE frame. Versions 0.49.0, 0.54.1, and 0.55.0 discard Initial keys when receiving a HANDSHAKE_DONE frame, thereby correctly handling premature HANDSHAKE_DONE frames.

Action-Not Available
Vendor-quic-go
Product-quic-go
CWE ID-CWE-617
Reachable Assertion
CWE ID-CWE-755
Improper Handling of Exceptional Conditions
CVE-2023-37029
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.15% / 34.98%
||
7 Day CHG~0.00%
Published-21 Jan, 2025 | 00:00
Updated-27 Jan, 2025 | 14:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Magma versions <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) are susceptible to an assertion-based crash when an oversized NAS packet is received. An attacker may leverage this behavior to repeatedly crash the MME via either a compromised base station or via an unauthenticated cellphone within range of a base station managed by the MME, causing a denial of service.

Action-Not Available
Vendor-n/aThe Linux Foundation
Product-magman/a
CWE ID-CWE-617
Reachable Assertion
CVE-2023-34868
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.09% / 25.51%
||
7 Day CHG~0.00%
Published-14 Jun, 2023 | 00:00
Updated-02 Jan, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the parser_parse_for_statement_start at jerry-core/parser/js/js-parser-statm.c.

Action-Not Available
Vendor-jerryscriptn/a
Product-jerryscriptn/a
CWE ID-CWE-617
Reachable Assertion
CVE-2023-34867
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.09% / 25.51%
||
7 Day CHG~0.00%
Published-14 Jun, 2023 | 00:00
Updated-03 Jan, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the ecma_property_hashmap_create at jerry-core/ecma/base/ecma-property-hashmap.c.

Action-Not Available
Vendor-jerryscriptn/a
Product-jerryscriptn/a
CWE ID-CWE-617
Reachable Assertion
CVE-2023-32842
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-7.5||HIGH
EPSS-5.39% / 89.94%
||
7 Day CHG~0.00%
Published-04 Dec, 2023 | 03:46
Updated-02 Aug, 2024 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01130256; Issue ID: MOLY01130256 (MSV-848).

Action-Not Available
Vendor-MediaTek Inc.
Product-mt6896mt6855mt6990nr17mt6873mt6893mt2735mt6886mt6983mt6891mt6298nr16mt6883mt6980dmt6297mt6813mt6835mt6880mt6875mt6889mt2737mt6985mt6890mt6833mt6885mt6989mt6877nr15mt6853mt6980mt6875tmt6895mt6897mt6815mt6895tmt6879MT2735, MT2737, MT6297, MT6298, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6875T, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983, MT6985, MT6989, MT6990
CWE ID-CWE-617
Reachable Assertion
CVE-2023-33044
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.24% / 47.44%
||
7 Day CHG~0.00%
Published-05 Dec, 2023 | 03:04
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reachable Assertion in Data Modem

Transient DOS in Data modem while handling TLB control messages from the Network.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6431qcm8550_firmwarewsa8845_firmwaresd865_5gwsa8832sdx57m_firmwaresm6350sxr2130_firmwarewcd9370qca8081_firmwarear8035_firmwareqca6696sm7250-absm8475wcd9341_firmwaresm8250-ab_firmwarewcd9395_firmwareqcn6024sd888_firmwareqca6390qca6426wcn6740_firmwaresm7325-af_firmwarewsa8815_firmwaresm7325-ae_firmwaresm8250-abwsa8832_firmwareqca8337_firmwareqca8337sm7325qca6426_firmwarewcd9395qcm6490_firmwareqca6574au_firmwarewcn785x-5sm7250p_firmwaresm8350-ac_firmwarewcd9341qcm4490_firmwareqca6574auwcd9390wcn785x-5_firmwarewcn3950wsa8810_firmwaresnapdragon_xr2_5g_platformwsa8845h_firmwaresnapdragon_x65_5g_modem-rf_system_firmwaresnapdragon_7c\+_gen_3_computesm4350_firmwaresm7350-ab_firmwarewcn3991sm8150-acsm6375_firmwareqcn6024_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaresm7250psm8350sd888snapdragon_4_gen_2_mobile_platformsm6375wcn685x-5wcn6740sm7250-aa_firmware315_5g_iot_modem_firmwaresm8250-acsm8450_firmwaresm8250_firmwarewcd9385_firmware315_5g_iot_modemqca6421sm7225snapdragon_x55_5g_modem-rf_systemwcd9380wcd9360snapdragon_xr2_5g_platform_firmwareqcs4490snapdragon_8\+_gen_2_mobile_platform_firmwarewsa8845qca6421_firmwaresm7350-absnapdragon_auto_5g_modem-rf_firmwaresm8350_firmwarewsa8810snapdragon_8\+_gen_2_mobile_platformsm4350-acsm8350-acvideo_collaboration_vc3_platformqca6595ausm7315_firmwaresm7325_firmwarewsa8840wcn3991_firmwaresd855qcs8550_firmwareqca6390_firmwareqca6431_firmwaresm7225_firmwaresm7315qca6698aq_firmwareqca6436_firmwarewcd9385qcs4490_firmwaresnapdragon_8_gen_2_mobile_platformsnapdragon_7c\+_gen_3_compute_firmwarewcd9390_firmwaresm8250-ac_firmwarewcn6750wcn6750_firmwarewcd9370_firmwaresnapdragon_x70_modem-rf_system_firmwaresdx55_firmwaresnapdragon_auto_5g_modem-rfsnapdragon_x55_5g_modem-rf_system_firmwaresm7250-ab_firmwareqca6574asm7325-aesxr2130qcm4490sm4350sm7325pqcm6490wcn3998sm8150-ac_firmwaresm8550p_firmwarewcn3998_firmwareqcm8550wcn3988qcs6490_firmwaresm8450snapdragon_x65_5g_modem-rf_systemqcn9024sd855_firmwareqca6436sm7325-afwsa8835qca6595au_firmwareqca6391_firmwarewsa8840_firmwaresm8250qca6696_firmwareqcn9024_firmwaresdx57mwsa8845hwcd9380_firmwaresm7250-aaqca8081wsa8815sm4375wsa8830sm8550psm4375_firmwarewcn785x-1_firmwarear8035qca6574a_firmwaresdx55sm6350_firmwarewcd9375_firmwareqca6391snapdragon_x70_modem-rf_systemwcn785x-1sm8475_firmwareqca6698aqwcn3950_firmwaresnapdragon_8_gen_2_mobile_platform_firmwareqcs8550sm7250-acwcn685x-1sm7325p_firmwaresd865_5g_firmwarewcd9360_firmwarewcd9375wcn685x-5_firmwarewcn3988_firmwarevideo_collaboration_vc3_platform_firmwaresm4350-ac_firmwarewsa8835_firmwareqcs6490sm7250-ac_firmwarewsa8830_firmwarewcn685x-1_firmwareSnapdragon
CWE ID-CWE-617
Reachable Assertion
CVE-2023-32845
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-7.5||HIGH
EPSS-3.27% / 86.92%
||
7 Day CHG~0.00%
Published-04 Dec, 2023 | 03:46
Updated-28 Aug, 2024 | 19:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01139296 (MSV-860).

Action-Not Available
Vendor-MediaTek Inc.
Product-mt6896mt6855mt6990nr17mt6873mt6893mt2735mt6886mt6983mt6891mt6298nr16mt6883mt6980dmt6297mt6813mt6835mt6880mt6875mt6889mt2737mt6985mt6890mt6833mt6885mt6989mt6877nr15mt6853mt6980mt6875tmt6895mt6897mt6815mt6895tmt6879MT2735, MT2737, MT6297, MT6298, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6875T, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983, MT6985, MT6989, MT6990mt6896mt6855mt6990mt6873mt6893mt2735mt6886mt6983mt6891mt6883mt6298mt6980dmt6297mt6813mt6835mt6880mt6875mt6889mt2737mt6985mt6890mt6833mt6885mt6989mt6877mt6853mt6980mt6875tmt6895mt6897mt6815mt6895tmt6879
CWE ID-CWE-617
Reachable Assertion
CVE-2023-32841
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-7.5||HIGH
EPSS-1.80% / 82.55%
||
7 Day CHG~0.00%
Published-04 Dec, 2023 | 03:45
Updated-02 Aug, 2024 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01128524 (MSV-846).

Action-Not Available
Vendor-MediaTek Inc.
Product-mt6896mt6855mt6990nr17mt6873mt6893mt2735mt6886mt6983mt6891mt6298nr16mt6883mt6980dmt6297mt6813mt6835mt6880mt6875mt6889mt2737mt6985mt6890mt6833mt6885mt6989mt6877nr15mt6853mt6980mt6875tmt6895mt6897mt6815mt6895tmt6879MT2735, MT2737, MT6297, MT6298, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6875T, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983, MT6985, MT6989, MT6990
CWE ID-CWE-617
Reachable Assertion
CVE-2023-32843
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-7.5||HIGH
EPSS-0.59% / 68.72%
||
7 Day CHG~0.00%
Published-04 Dec, 2023 | 03:46
Updated-29 May, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01130204; Issue ID: MOLY01130204 (MSV-849).

Action-Not Available
Vendor-MediaTek Inc.
Product-mt6813mt6895tmt6893mt2737mt6980dmt6815mt6897mt6875tnr15mt6879mt6880mt6886mt2735mt6890mt6853mt6889mt6895mt6989mt6297mt6990nr16mt6855mt6873mt6298mt6980mt6833mt6985mt6885mt6835mt6875mt6896mt6983nr17mt6877mt6883mt6891MT2735, MT2737, MT6297, MT6298, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6875T, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983, MT6985, MT6989, MT6990
CWE ID-CWE-617
Reachable Assertion
CVE-2023-33041
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.15% / 35.30%
||
7 Day CHG~0.00%
Published-05 Dec, 2023 | 03:04
Updated-02 Aug, 2024 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reachable assertion in WLAN Firmware

Under certain scenarios the WLAN Firmware will reach an assertion due to state confusion while looking up peer ids.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcn5024_firmwareqam8255p_firmwarewsa8830qcn9070sxr2230p_firmwareqca8337qam8650pqfw7124ipq8173_firmwarewcn785x-5qam8775pqcf8001flight_rb5_5g_platformflight_rb5_5g_platform_firmwareqcn6224_firmwareqcn5124qca4024_firmwareqca8082qcn9072qca8386wsa8840immersive_home_318_platform_firmwareipq8078aipq5028_firmwareqca6595au_firmwareipq6000ssg2115pqcn5152_firmwareqca0000_firmwareqca6584au_firmwarewcn685x-1qrb5165n_firmwareqcn9000_firmwaresnapdragon_8_gen_2_mobile_platformipq9554qca6554a_firmwarewcd9385_firmwareimmersive_home_216_platformipq8076aimmersive_home_316_platformimmersive_home_316_platform_firmwareqca8386_firmwareqcn6024_firmwareqca8084_firmwareimmersive_home_318_platformipq8074aqcn5124_firmwareqcn9011_firmwareqca8082_firmwareqca6574au_firmwareqcn5122_firmwareqcn5164_firmwaresdx55_firmwareqca6595auqca8081_firmwareqcn6023_firmwareqfw7114wsa8832_firmwarewsa8845h_firmwareqrb5165nipq5010qca6564au_firmwareqca6584auipq8070_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareqcm8550_firmwareipq8078a_firmwareqcn9274ipq8174qrb5165m_firmwareipq5028qrb5165_firmwareqca6698aqqcn5052wsa8840_firmwareqca0000qcf8001_firmwareipq6010sc8380xp_firmwareqcn6112_firmwareqcn9074qca8085sdx65mwcd9340qcn6132qcn6224qcn9013wsa8845hsnapdragon_ar2_gen_1_platform_firmwaresnapdragon_x75_5g_modem-rf_systemwcd9395_firmwareqca8081qcf8000qca6698aq_firmwareipq8071aqcn6023sdx65m_firmwareipq8071a_firmwarewcn685x-1_firmwareimmersive_home_3210_platformqca8085_firmwareqam8775p_firmwareqca9888_firmwareqcn6122wcd9385qca6696_firmwareipq9008_firmwareipq9570qcn5154_firmwareqca6797aqar8035csr8811wcd9390qcc710_firmwareqcn9100_firmwarewsa8830_firmwareipq5010_firmwareipq8074a_firmwarewsa8835_firmwareqcn5022_firmwareimmersive_home_216_platform_firmwaresnapdragon_8_gen_2_mobile_platform_firmwarewcn785x-1qca8072qca8337_firmwarewcd9380_firmwaressg2125pqcn9000ipq8072aqcf8000_firmwareqca6554aipq8076a_firmwareqca6595ipq8078qca6564auqca8084ipq8173qcm8550ipq9008qcn9012qcn5164immersive_home_326_platform_firmwareqcn6122_firmwareqca6574sxr1230p_firmwarewsa8835snapdragon_8\+_gen_2_mobile_platform_firmwarecsr8811_firmwareqcn6274wcd9380ipq9554_firmwareqcn5054_firmwareqcn5154qca8075_firmwaressg2125p_firmwareqca6574aqcn5024wcn685x-5_firmwareqca9889qcn6132_firmwaresxr1230pqca9888qca8072_firmwareqcn9012_firmwareqcn5052_firmwareqcn9274_firmwareqcc2076_firmwareipq8070a_firmwareqfw7114_firmwarewcn3980wsa8845qcc2073_firmwareipq6018_firmwareipq8076_firmwareqca6574_firmwarewcd9340_firmwarepmp8074_firmwareqcn6112ipq8076sxr2230pwsa8845_firmwareqca6574a_firmwareqcn5021ipq6028qcn5152qcn9024pmp8074qrb5165mipq9574_firmwarewcn785x-5_firmwaresc8380xpwcn3980_firmwareimmersive_home_3210_platform_firmwareqca6391qcn9100qcn6274_firmwaresnapdragon_x65_5g_modem-rf_systemipq8078_firmwareipq9570_firmwareqcn5054qcn9070_firmwareqrb5165snapdragon_x75_5g_modem-rf_system_firmwarewcn685x-5ipq8070ipq6028_firmwareipq8072a_firmwareqcn9011qca6797aq_firmwarewcn785x-1_firmwareqca6574auqca9889_firmwareipq9574qcn5122qcn9024_firmwareipq8174_firmwaresnapdragon_8\+_gen_2_mobile_platformwsa8832ipq5332_firmwareipq5332sm8550pimmersive_home_326_platformsnapdragon_ar2_gen_1_platformipq6018qcn5022qcn9013_firmwareqam8650p_firmwareqcc710ipq6010_firmwareimmersive_home_214_platformqca6595_firmwarewcd9395qca6696qca6391_firmwareimmersive_home_214_platform_firmwareqca4024sm8550p_firmwaresdx55qca8075qcn5021_firmwareqcn9022_firmwareqcn6024qcn9022qcc2076wcd9390_firmwareipq8070aqcn9072_firmwareipq6000_firmwaressg2115p_firmwareqcn9074_firmwareqfw7124_firmwareqam8255pqcc2073ar8035_firmwareSnapdragon
CWE ID-CWE-617
Reachable Assertion
CVE-2023-33043
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.24% / 47.44%
||
7 Day CHG~0.00%
Published-05 Dec, 2023 | 03:04
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reachable Assertion in Modem

Transient DOS in Modem when a Beam switch request is made with a non-configured BWP.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcm8550_firmwarewsa8845_firmwaresm7315_firmwarewsa8832wsa8840wcn3991_firmwaresdx57m_firmwareqcs8550_firmwarewcd9370qca8081_firmwaresm7315ar8035_firmwaresm8475wsa8830_firmwarewcd9385wcd9395_firmwareqcn6024qcs4490_firmwaresd888_firmwaresnapdragon_8_gen_2_mobile_platformsnapdragon_7c\+_gen_3_compute_firmwarewcn6740_firmwarewcd9390_firmwarewcn6750sm7325-af_firmwarewsa8815_firmwaresm7325-ae_firmwarewsa8832_firmwarewcn6750_firmwareqca8337_firmwarewcd9370_firmwareqca8337snapdragon_x70_modem-rf_system_firmwarewcd9395qcm6490_firmwaresm7325-aeqcm4490wcn785x-5sm8350-ac_firmwaresm4350qcm4490_firmwarewcd9390sm7325pwcn785x-5_firmwarewcn3950qcm6490wsa8810_firmwarewsa8845h_firmwarewcn3998sm8550p_firmwarewcn3998_firmwareqcm8550wcn3988qcs6490_firmwaresm8450snapdragon_x65_5g_modem-rf_systemqcn9024snapdragon_x65_5g_modem-rf_system_firmwaresm7325-afsnapdragon_7c\+_gen_3_computewsa8835wsa8840_firmwaresm4350_firmwaresm7350-ab_firmwareqca6391_firmwarewcn3991sm6375_firmwaresdx57mqcn9024_firmwareqcn6024_firmwarewsa8845hwcd9380_firmwaresnapdragon_4_gen_2_mobile_platform_firmwarewcn685x-1_firmwareqca8081wsa8815sm4375sm8350wsa8830sm8550psm4375_firmwaresd888snapdragon_4_gen_2_mobile_platformwcn785x-1_firmwaresm6375ar8035wcn685x-5wcn6740wcd9375_firmwaresm8450_firmwareqca6391snapdragon_x70_modem-rf_systemwcn785x-1sm8475_firmwarewcn3950_firmwarewcd9385_firmwaresnapdragon_8_gen_2_mobile_platform_firmwarewcd9380qcs8550wcn685x-1sm7325p_firmwareqcs4490wcd9375wcn685x-5_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwarewsa8845wcn3988_firmwaresm7350-abvideo_collaboration_vc3_platform_firmwaresm4350-ac_firmwarewsa8835_firmwaresm8350_firmwarewsa8810qcs6490snapdragon_8\+_gen_2_mobile_platformsm4350-acsm8350-acvideo_collaboration_vc3_platformSnapdragon
CWE ID-CWE-617
Reachable Assertion
CVE-2023-33096
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.14% / 34.69%
||
7 Day CHG~0.00%
Published-04 Mar, 2024 | 10:48
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reachable Assertion in Multi-Mode Call Processor

Transient DOS while processing DL NAS Transport message, as specified in 3GPP 24.501 v16.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6431qcm8550_firmwarewsa8845_firmwaresd865_5gwsa8832snapdragon_480_5g_mobilesnapdragon_750g_5g_mobile_firmwaresdx57m_firmwaresxr2130_firmwarewcd9370qca8081_firmwaresnapdragon_860_mobile_firmwaresnapdragon_x35_5g_modem-rfar8035_firmwareqca6696snapdragon_778g\+_5g_mobilesnapdragon_x70_modem-rf_firmwarewcd9340_firmwarewcd9341_firmwarewcd9395_firmwareqcn6024sd888_firmwareqcc710_firmwareqca6426snapdragon_8\+_gen_1_mobilewcn6740_firmwarefastconnect_6700snapdragon_780g_5g_mobilesnapdragon_750g_5g_mobilesnapdragon_782g_mobile_firmwarewsa8815_firmwarewsa8832_firmwareqca8337_firmwareqca8337qca6426_firmwarewcd9395sg8275p_firmwareqcm6490_firmwaresnapdragon_690_5g_mobile_firmwaresm7250p_firmwarewcd9341qcm4490_firmwarewcd9390snapdragon_888\+_5g_mobile_firmwarewcn3950wsa8810_firmwarewsa8845h_firmwaresnapdragon_870_5g_mobile_firmwaresnapdragon_778g_5g_mobile_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_690_5g_mobilefastconnect_6800_firmwaresnapdragon_778g\+_5g_mobile_firmwaresnapdragon_870_5g_mobileqcn6024_firmwaresm7250pqca6584auqcn6274_firmwaresd888qcc710snapdragon_xr2_5g_firmwarewcn6740snapdragon_768g_5g_mobilesnapdragon_780g_5g_mobile_firmwaresnapdragon_8_gen_3_mobile_firmwarefastconnect_6800qfw7114_firmware315_5g_iot_modem_firmwarefastconnect_7800_firmwarefastconnect_6900snapdragon_865_5g_mobile_firmwareqep8111qfw7114wcd9385_firmware315_5g_iot_modemqca6421fastconnect_6900_firmwarewcd9380wcd9360snapdragon_xr2_5gsnapdragon_x65_5g_modem-rfqcs4490wsa8845qca6421_firmwaresnapdragon_auto_5g_modem-rf_firmwarewsa8810snapdragon_888_5g_mobile_firmwarevideo_collaboration_vc3_platformqca6595ausnapdragon_888_5g_mobilesnapdragon_4_gen_1_mobile_firmwaresm7315_firmwarewsa8840sd855qcs8550_firmwaresnapdragon_782g_mobilesnapdragon_x35_5g_modem-rf_firmwareqca6431_firmwaresm7315snapdragon_8_gen_2_mobile_firmwaresnapdragon_x55_5g_modem-rfqfw7124_firmwareqca6698aq_firmwareqca6436_firmwaresnapdragon_4_gen_2_mobile_firmwaresnapdragon_888\+_5g_mobilewcd9385snapdragon_8_gen_1_mobilesnapdragon_695_5g_mobile_firmwareqcs4490_firmwaresnapdragon_x55_5g_modem-rf_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewcd9390_firmwaresnapdragon_8_gen_2_mobilesnapdragon_865\+_5g_mobileqep8111_firmwaresg8275psnapdragon_855\+_mobilewcd9370_firmwaresdx55_firmwaresnapdragon_765_5g_mobilesnapdragon_860_mobilesnapdragon_auto_5g_modem-rfqca6574asnapdragon_8\+_gen_2_mobilesxr2130qcm4490qca6174asnapdragon_x65_5g_modem-rf_firmwarewcd9340snapdragon_480\+_5g_mobile_firmwaresnapdragon_auto_5g_modem-rf_gen_2qca6174a_firmwareqcm6490sm7325psm8550p_firmwareqcm8550wcn3988qcs6490_firmwaresnapdragon_765_5g_mobile_firmwareqcn9024qca6584au_firmwaresd855_firmwareqcn6274qca6436qfw7124snapdragon_x70_modem-rfwsa8835qca6595au_firmwareqca6391_firmwarewsa8840_firmwaresnapdragon_855_mobile_firmwareqca6696_firmwareqcn9024_firmwaresdx57mwsa8845hwcd9380_firmwareqca8081wsa8815snapdragon_765g_5g_mobile_firmwarewsa8830sm8550psnapdragon_x75_5g_modem-rfsnapdragon_768g_5g_mobile_firmwarear8035qca6574a_firmwaresdx55snapdragon_4_gen_1_mobilesnapdragon_4_gen_2_mobilesnapdragon_865_5g_mobilesnapdragon_855\+_mobile_firmwarewcd9375_firmwareqca6391qcn6224snapdragon_865\+_5g_mobile_firmwareqca6698aqwcn3950_firmwareqcs8550snapdragon_480\+_5g_mobilefastconnect_6200fastconnect_7800sm7325p_firmwaresd865_5g_firmwarewcd9360_firmwaresnapdragon_480_5g_mobile_firmwaresnapdragon_8\+_gen_2_mobile_firmwarewcd9375snapdragon_765g_5g_mobilewcn3988_firmwarefastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwaresnapdragon_8\+_gen_1_mobile_firmwaresnapdragon_x75_5g_modem-rf_firmwarewsa8835_firmwareqcs6490snapdragon_695_5g_mobilesnapdragon_8_gen_3_mobilesnapdragon_855_mobilesnapdragon_778g_5g_mobilefastconnect_6200_firmwarewsa8830_firmwareqcn6224_firmwaresnapdragon_8_gen_1_mobile_firmwareSnapdragonqca6574a_firmwaresnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_xr2_5g_platform_firmwarewsa8832_firmwareqcs4490_firmwareqep8111_firmwareqca6431_firmwaresnapdragon_x35_5g_modem-rf_system_firmwaresdx57m_firmwareqca6696_firmwaresd888_firmwareqcn9024_firmwarewsa8835_firmwaresd855_firmwaresnapdragon_780g_5g_mobile_platform_firmwaresnapdragon_8_gen_3_mobile_platform_firmwareqca8337_firmwaresm7325p_firmwarewcn3988_firmwarefastconnect_6700_firmwareqca6595au_firmwaresnapdragon_855_mobile_platform_firmwarewcd9390_firmwareqcm6490_firmwaresm8550p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqcs6490_firmwarefastconnect_6200_firmwarewcd9395_firmwareqcn6224_firmwaresnapdragon_888_5g_mobile_platform_firmwarewcd9375_firmwareqca6174a_firmwaresm7250p_firmwareqfw7124_firmwareqca6391_firmwaresm7315_firmwareqca6698aq_firmwaresnapdragon_x70_modem-rf_system_firmwareqca8081_firmwarefastconnect_6900_firmwarewcd9385_firmwarewcd9370_firmwarewsa8840_firmwaresxr2130_firmwarewcd9380_firmwareqca6584au_firmwaresnapdragon_8_gen_1_mobile_platform_firmwarewsa8810_firmwarefastconnect_7800_firmwarewcd9341_firmwarewsa8845h_firmwareqfw7114_firmwaresnapdragon_865_5g_mobile_platform_firmwareqcm8550_firmwarewsa8830_firmwarewcd9360_firmwaresg8275p_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareqcn6024_firmwareqca6436_firmwareqcn6274_firmwareqcm4490_firmwarequalcomm_video_collaboration_vc3_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwarewcn3950_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaresnapdragon_778g_5g_mobile_platform_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewsa8815_firmwaresnapdragon_8_gen_2_mobile_platform_firmwaresnapdragon_690_5g_mobile_platform_firmwarewcd9340_firmwarear8035_firmwaresnapdragon_695_5g_mobile_platform_firmware315_5g_iot_modem_firmwarefastconnect_6800_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewsa8845_firmwaresd865_5g_firmwaresnapdragon_750g_5g_mobile_platform_firmwareqca6426_firmwareqcc710_firmwaresdx55_firmwaresnapdragon_auto_5g_modem-rf_firmwareqca6421_firmwarewcn6740_firmwareqcs8550_firmware
CWE ID-CWE-617
Reachable Assertion
CVE-2023-32820
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-7.5||HIGH
EPSS-0.44% / 62.78%
||
7 Day CHG~0.00%
Published-02 Oct, 2023 | 02:05
Updated-23 Sep, 2024 | 16:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In wlan firmware, there is a possible firmware assertion due to improper input handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07932637; Issue ID: ALPS07932637.

Action-Not Available
Vendor-Linux Kernel Organization, IncGoogle LLCMediaTek Inc.The Linux Foundation
Product-mt6855mt6873mt6893mt8675mt6886mt6983mt7902mt8666mt7663mt6891mt6883mt5221mt6853tmt7921mt8768mt8789mt6875mt8797mt6889mt8781mt8766mt8786mt6985mt8695mt6833mt6885mt8673yoctomt6877mt6781mt8365mt6853mt8518smt6895linux_kernelmt8168mt8798androidiot_yoctomt8791mt7668mt8532mt6879MT5221, MT6781, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT7663, MT7668, MT7902, MT7921, MT8168, MT8365, MT8518S, MT8532, MT8666, MT8673, MT8675, MT8695, MT8766, MT8768, MT8781, MT8786, MT8789, MT8791, MT8797, MT8798mt6855mt6873mt6893mt8675mt6886mt6983mt7902mt8666mt7663mt6891mt6883mt5221mt6853tmt7921mt8768mt8789mt6875mt8797mt6889mt8781mt8766mt8786mt6985mt8695mt6833mt6885mt8673mt6877mt6781mt8365mt6853mt8518smt6895mt8168mt8798androidmt8791mt7668mt8532mt6879
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-617
Reachable Assertion
CVE-2023-32846
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-7.5||HIGH
EPSS-5.39% / 89.94%
||
7 Day CHG~0.00%
Published-04 Dec, 2023 | 03:46
Updated-02 Aug, 2024 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01138453 (MSV-861).

Action-Not Available
Vendor-MediaTek Inc.
Product-mt6896mt6855mt6990nr17mt6873mt6893mt2735mt6886mt6983mt6891mt6298nr16mt6883mt6980dmt6297mt6813mt6835mt6880mt6875mt6889mt2737mt6985mt6890mt6833mt6885mt6989mt6877nr15mt6853mt6980mt6875tmt6895mt6897mt6815mt6895tmt6879MT2735, MT2737, MT6297, MT6298, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6875T, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983, MT6985, MT6989, MT6990
CWE ID-CWE-617
Reachable Assertion
CVE-2023-32844
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-7.5||HIGH
EPSS-5.39% / 89.94%
||
7 Day CHG~0.00%
Published-04 Dec, 2023 | 03:46
Updated-02 Aug, 2024 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01130183 (MSV-850).

Action-Not Available
Vendor-MediaTek Inc.
Product-mt6896mt6855mt6990nr17mt6873mt6893mt2735mt6886mt6983mt6891mt6298nr16mt6883mt6980dmt6297mt6813mt6835mt6880mt6875mt6889mt2737mt6985mt6890mt6833mt6885mt6989mt6877nr15mt6853mt6980mt6875tmt6895mt6897mt6815mt6895tmt6879MT2735, MT2737, MT6297, MT6298, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6875T, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983, MT6985, MT6989, MT6990
CWE ID-CWE-617
Reachable Assertion
CVE-2025-27066
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.03% / 6.79%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 07:26
Updated-28 Nov, 2025 | 15:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reachable Assertion in WLAN Firmware

Transient DOS while processing an ANQP message.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcn9000_firmwareqca8072_firmwaresdx55sm4125qam8650pqca1062_firmwaresnapdragon_x72_5g_modem-rf_systemqca6787aqsa6155psnapdragon_870_5g_mobile_platform_\(sm8250-ac\)snapdragon_7c\+_gen_3_compute_firmwareipq8174snapdragon_8\+_gen_2_mobile_platformsnapdragon_8cx_compute_platform_\(sc8180xp-ac\)_firmwareqfw7124_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwareqcc2073sdx61aqt1000snapdragon_8cx_compute_platform_\(sc8180x-ab\)snapdragon_8_gen_2_mobile_platform_firmwaresm7325p_firmwareqcn9022_firmwaresrv1l_firmwareqam8255p_firmwarevision_intelligence_400_platformsa8150p_firmwareqca2066_firmwareqcm8550_firmwareqamsrv1h_firmwaresnapdragon_auto_4g_modemsd855wcd9341_firmwaresd_8_gen1_5gsnapdragon_xr2\+_gen_1_platform_firmwaresnapdragon_845_mobile_platformipq4029_firmwareipq8068_firmwareqca2064_firmwareqca8075qca9990wcd9385_firmwareqcm6490_firmwaresa7255p_firmwareqcn9072snapdragon_x62_5g_modem-rf_systemqca6777aq_firmwareqcs4290qcs4290_firmwareqca6335_firmwareqca6584au_firmwaresnapdragon_480_5g_mobile_platformsnapdragon_x72_5g_modem-rf_system_firmwaresnapdragon_x62_5g_modem-rf_system_firmwaresd_675_firmwareqcc2076_firmwaresm8635p_firmwaresm8650q_firmwaresnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmwaresc8380xp_firmwareqcs8300qcn9024snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)_firmwaresm7315qcm8550wsa8815srv1hqcm4490_firmwaresnapdragon_855_mobile_platformvideo_collaboration_vc5_platformwcd9326_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)snapdragon_480_5g_mobile_platform_firmwareqca2065qca6421_firmwaresm8550p_firmwarevideo_collaboration_vc3_platform_firmwareqca6574au_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-aa\)qcm4290_firmwaresnapdragon_662_mobile_platform_firmwareqca6595au_firmwaresnapdragon_460_mobile_platformipq8074a_firmwaresnapdragon_8_gen_2_mobile_platformqsm8250_firmwareqcn7605csra6620qca6584auwcn3980ipq8071_firmwaresd662_firmwarevision_intelligence_300_platform_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"_firmwaresa8145p_firmwareqcn5024_firmwareqcn6224_firmwaresm8750_firmwareqcm2290smart_audio_400_platformsa8155pqcm6125wcd9385qca4024_firmwarewcd9380_firmwareqca8386_firmwareqsm8250qcn5124_firmwaresm8750pwcn6450sm8735_firmwaresnapdragon_680_4g_mobile_platformsnapdragon_675_mobile_platformsc8180x\+sdx55_firmwareipq9048wcn7880ipq6028sg8275p_firmwareqca8337_firmwareipq8076sd662wcn3988_firmwarecsra6640_firmwaresnapdragon_8c_compute_platform_\(sc8180x-ad\)_firmwareqca6554a_firmwareqca6698aqqca9889qsm8350_firmwareipq9554_firmwareqca9992sm7675psm6250ipq8072a_firmwarefastconnect_6800qca6574a_firmwarewsa8832_firmwaresa8650psxr2230p_firmwaresnapdragon_690_5g_mobile_platform_firmwareqsm8350sm6250_firmwareqca6678aq_firmwareqcn9070snapdragon_680_4g_mobile_platform_firmwareimmersive_home_216_platform_firmwareipq8069ipq8065_firmwaresm8550pwcd9378_firmwareqca6431_firmwareqcn6023_firmwareqcn9274_firmwarewcn7881_firmwaressg2115p_firmwaresm7315_firmwareqcs615fastconnect_6900_firmwareqca6678aqqcn5154_firmwarewsa8835_firmwareqca9888qca9986sa8295psc8380xpsdx55_firmwaresnapdragon_xr1_platform_firmwaresd730wcn3988ipq8070aqca2062_firmwareqca9980qca6696_firmwarepmp8074immersive_home_214_platform_firmwarevision_intelligence_300_platformsd660_firmwareqca8084snapdragon_8c_compute_platform_\(sc8180xp-ad\)_firmwaresnapdragon_x55_5g_modem-rf_system_firmwareqcs4490_firmwaresm7675_firmwareqcn5022qcn9012snapdragon_662_mobile_platformsxr2250psxr2330p_firmwarewcn6755_firmwaresnapdragon_x65_5g_modem-rf_system_firmwarewsa8810_firmwarewcn6650wcd9360sd660ipq9554qcm4325wsa8840snapdragon_778g_5g_mobile_platformqcn7605_firmwarecsr8811ipq9574wsa8840_firmwaresnapdragon_460_mobile_platform_firmwareqcn5054_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwareipq6000qca9985ipq8072ipq8074asm7250p_firmwarewcn3950_firmwareqcn5122_firmwareipq8071awsa8845hqcn6100_firmwareqrb5165mipq4028qcn6100snapdragon_auto_5g_modem-rf_firmwareqca6310snapdragon_780g_5g_mobile_platform_firmwareqcn5054qcn5154ssg2125p_firmwaresxr1120_firmwareqcn5164snapdragon_720g_mobile_platform_firmwareqcn9274snapdragon_865_5g_mobile_platformsnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)snapdragon_x32_5g_modem-rf_systemsm7325pqca0000qcn6024_firmwareqcm4290qcs9100qfw7114snapdragon_665_mobile_platform_firmwareqca6421wcd9370_firmwaresnapdragon_855_mobile_platform_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)ar8035_firmwareqcn9000qcn9100srv1lwsa8845ipq8072aipq8070a_firmwarewcn7860_firmwareqamsrv1hsm8750ipq8070_firmwaresnapdragon_xr2_5g_platformsa6150p_firmwaresg4150p_firmwarewcn3910_firmwaresm8750p_firmwareqcs615_firmwaresnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_8\+_gen_1_mobile_platform_firmwaresg8275pqcn6122_firmwarefastconnect_7800_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwaresnapdragon_8c_compute_platform_\(sc8180xp-ad\)sxr2230pqca9984sa8620p_firmwaresnapdragon_ar2_gen_1_platformqcs7230snapdragon_850_mobile_compute_platform_firmwaresnapdragon_695_5g_mobile_platformrobotics_rb2_platform_firmwareipq4028_firmwareqrb5165nsa8770pipq8070srv1m_firmwarewcd9375qca6574_firmwareipq8078a_firmwaresa6145p_firmwaresnapdragon_x75_5g_modem-rf_system_firmwareqca6430qcn9001qca6391_firmwarewcn6755snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)_firmwareipq9570_firmwareqca1064snapdragon_8_gen_3_mobile_platformqcn5052qmp1000qca6688aq_firmwareqcf8001qcn5124sw5100p_firmwaresnapdragon_850_mobile_compute_platformsa6155_firmwaresnapdragon_7c_gen_2_compute_platform_\(sc7180-ad\)_\"rennell_pro\"immersive_home_318_platformsnapdragon_x75_5g_modem-rf_systemwcn7861sa8775pwcn6650_firmwareqcn5022_firmwareqca6428ipq8174_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)qca6431fastconnect_6800_firmwarewcd9375_firmwareimmersive_home_318_platform_firmwareqcn9074_firmwareqca6564auqmp1000_firmwareipq4018_firmwareipq8074_firmwareqca6595auqcc710immersive_home_316_platformssg2125pqamsrv1mqca2065_firmwareqca8085_firmwaresnapdragon_710_mobile_platformsnapdragon_ar2_gen_1_platform_firmwareqfw7114_firmwaresm8635psnapdragon_670_mobile_platformsnapdragon_x50_5g_modem-rf_system_firmwareqcs9100_firmwaresnapdragon_8_gen_3_mobile_platform_firmwareqca6174a_firmwaresm4635qcc2073_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwaresa4150p_firmwaresw5100ipq8076_firmwareqcn6132_firmwarewsa8830qcn5122csrb31024wsa8830_firmwareqcn6023qca6430_firmwareipq5028_firmwaresa8155p_firmwareqca2066immersive_home_216_platformipq5010ipq8064snapdragon_678_mobile_platform_\(sm6150-ac\)_firmwareqcm6490snapdragon_xr2_5g_platform_firmwareqca6436_firmwaresd865_5g_firmwareqca6595wcn3999ipq9574_firmwaresnapdragon_750g_5g_mobile_platformwcd9380smart_audio_400_platform_firmwareipq8173_firmware315_5g_iot_modem_firmwareqcs6490_firmwaresnapdragon_xr1_platformsnapdragon_888_5g_mobile_platform_firmwarewcn7750_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-ab\)_firmwareqca6310_firmwareipq6000_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqca6420_firmwaresd670_firmwarewcd9340_firmwareqca6688aqqcn9002qcn9001_firmwareipq8076a_firmwareqamsrv1m_firmwaresnapdragon_720g_mobile_platformsnapdragon_730g_mobile_platform_\(sm7150-ab\)ar8031qcs8550sxr1120qca9984_firmwareqep8111_firmwareqcn5021_firmwareqcn9003_firmwaresnapdragon_x50_5g_modem-rf_systemsdx61_firmwaresnapdragon_w5\+_gen_1_wearable_platformsnapdragon_665_mobile_platformsm4635_firmwaresnapdragon_auto_5g_modem-rf_gen_2qcn6112wcd9360_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)_firmwaressg2115pqam8295pqca2062sm7675qep8111qca6391csr8811_firmwaresa8295p_firmwareqcs6490ipq9570wsa8810qcs610ipq8173snapdragon_xr2\+_gen_1_platformsnapdragon_778g_5g_mobile_platform_firmwareqca6438sg4150pvideo_collaboration_vc5_platform_firmwareimmersive_home_214_platformsnapdragon_x32_5g_modem-rf_system_firmwareipq4018snapdragon_4_gen_2_mobile_platform_firmwaresm6370sd_8_gen1_5g_firmwareqcn6102wcd9378snapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)_firmwareipq6028_firmwareqcs8300_firmwareqca8386snapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmwareqcs8250_firmwareqca1064_firmwarewcn7880_firmwaresnapdragon_730g_mobile_platform_\(sm7150-ab\)_firmwaresm6650p_firmwareqcn6274snapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)sa8150pqcs610_firmwaresm6650pqcn5164_firmwaresnapdragon_660_mobile_platformqca6797aqqam8650p_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)sw5100_firmwareqcs410ar9380_firmwareimmersive_home_316_platform_firmwareqcn6024qca8075_firmwareqca6574asnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)wcd9340wcn3999_firmwareqca8082_firmwareqca6436qrb5165n_firmwarewsa8845_firmwarewcd9341sa7255pqca6426_firmwaresnapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmwaresd460fastconnect_6200snapdragon_7c_compute_platform_\(sc7180-ac\)sd888snapdragon_x35_5g_modem-rf_systemsnapdragon_675_mobile_platform_firmwaresnapdragon_765_5g_mobile_platform_\(sm7250-aa\)_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-aa\)_firmwareipq6018qca2064snapdragon_660_mobile_platform_firmwareaqt1000_firmwaresnapdragon_ar1_gen_1_platform_firmwaresd675_firmwarewsa8832qcn6224snapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)snapdragon_7c\+_gen_3_computesnapdragon_670_mobile_platform_firmwareqcs2290snapdragon_ar1_gen_1_platformsm6250pwcd9370qcc2076qca8081_firmwareqcc710_firmwareqca6698aq_firmwarecsra6640qca9980_firmwaresnapdragon_712_mobile_platformsw5100psa4150pqca9994qca6428_firmwaresc8180x\+sdx55wcn7860sm7250psm6650qcs5430qcn9003qcn6102_firmwareqcs2290_firmwaresa8145pwsa8845h_firmwarewcd9371sd670wcd9395_firmwaresnapdragon_x35_5g_modem-rf_system_firmwaresa8195psa9000psnapdragon_4_gen_1_mobile_platformipq6010snapdragon_712_mobile_platform_firmwareipq5028qcn9072_firmwaresnapdragon_888_5g_mobile_platformar8035wcd9390qcn6122sa8775p_firmwaresm7675p_firmwareqcn7606_firmwareqam8775pqcm2290_firmwarevision_intelligence_400_platform_firmwareqca6797aq_firmwareqcs8250qca6564au_firmwaresnapdragon_730_mobile_platform_\(sm7150-aa\)snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)_firmwaresa8650p_firmwareqca9898_firmwareqcn9011_firmwaresnapdragon_678_mobile_platform_\(sm6150-ac\)robotics_rb3_platform_firmwaresxr2250p_firmwarewcn7881qca1062snapdragon_780g_5g_mobile_platformsrv1mipq8069_firmwareqcn9012_firmwarecsra6620_firmwarewcd9395qcs410_firmwareqcn5052_firmwareipq8068qcm4490robotics_rb2_platformipq8072_firmwaresnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)_firmwareqca8085qcn9002_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-af\)qca6554asxr1230pipq8071wcn7861_firmwareqcn7606fastconnect_6700_firmwaresnapdragon_685_4g_mobile_platform_\(sm6225-ad\)sa8155_firmwareqca6787aq_firmwaresnapdragon_782g_mobile_platform_\(sm7325-af\)_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-af\)_firmwareqca9985_firmwareqca9990_firmwarefastconnect_6700qca9888_firmwaresnapdragon_730_mobile_platform_\(sm7150-aa\)_firmwarewcn3980_firmwareqca6696qcm5430_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-ac\)sxr2330pqcs8550_firmwarerobotics_rb5_platformqca9992_firmwareqca6426sa4155p_firmwareipq9008qcn9100_firmwareqcn9074qcn9011snapdragon_8\+_gen_1_mobile_platformqca8084_firmwareqam8295p_firmwarewcn3910qcf8001_firmwaresm7635_firmwareipq4029snapdragon_690_5g_mobile_platformsnapdragon_4_gen_2_mobile_platformwcd9326snapdragon_x55_5g_modem-rf_systemqca9898snapdragon_870_5g_mobile_platform_\(sm8250-ac\)_firmwaresnapdragon_8_gen_1_mobile_platformipq8064_firmwareqcn6132snapdragon_865_5g_mobile_platform_firmwaresnapdragon_7c_gen_2_compute_platform_\(sc7180-ad\)_\"rennell_pro\"_firmwaresnapdragon_695_5g_mobile_platform_firmwaresa8155snapdragon_710_mobile_platform_firmwaresnapdragon_845_mobile_platform_firmwareqcn9022qca9886_firmwareqca6574qcm6125_firmwareipq5010_firmwarewcn6740_firmwaresa8255p_firmwareqcs7230_firmwaresa6155sxr1230p_firmwaresd855_firmwaresnapdragon_782g_mobile_platform_\(sm7325-af\)ipq8078arobotics_rb5_platform_firmwarevideo_collaboration_vc1_platform_firmwaresnapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"snapdragon_765_5g_mobile_platform_\(sm7250-aa\)qca9886ipq8071a_firmwareqca9986_firmwaresd675sa7775pvideo_collaboration_vc1_platformipq8076aqcn5024ipq8074snapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)snapdragon_8_gen_1_mobile_platform_firmwarear9380qcs4490flight_rb5_5g_platform_firmwareipq8065sa8620psnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)snapdragon_auto_5g_modem-rfwcn6450_firmwareqca6777aqsm6370_firmwareqrb5165m_firmwareqca6595_firmwareqam8775p_firmwaresa8195p_firmwaresnapdragon_x65_5g_modem-rf_systemwcn6740sm7635qca8081qcm4325_firmwareipq8078qcn5152qcn5152_firmwaresnapdragon_732g_mobile_platform_\(sm7150-ac\)wcd9335_firmwaresd888_firmwaresm8635pmp8074_firmwareqcn6112_firmwarecsrb31024_firmwaresa7775p_firmwaresnapdragon_750g_5g_mobile_platform_firmwarewcd9335wsa8815_firmwaresa9000p_firmwaresnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)wcd9390_firmwarefastconnect_6900qam8255pvideo_collaboration_vc3_platformqcn6274_firmwaresnapdragon_8c_compute_platform_\(sc8180x-ad\)fastconnect_6200_firmwarewsa8835sd865_5grobotics_rb3_platformqca8072flight_rb5_5g_platformsa6150pqam8620pipq8078_firmwareipq6010_firmwaresnapdragon_732g_mobile_platform_\(sm7150-ac\)_firmwaresm4125_firmwarear8031_firmwareqcn9070_firmwaresnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)_firmwareqcn9024_firmwaresa6155p_firmwareqca4024sa4155pipq9008_firmwaresrv1h_firmwaresm6650_firmwaresxr2130_firmwarewcn3950fastconnect_7800qcs6125_firmwareqfw7124qca8082sd_675qcs6125qcn5021sa6145pqcm5430sm8650qsd730_firmwaresm6250p_firmwareqca6174aqca6335snapdragon_7c_compute_platform_\(sc7180-ac\)_firmwareqca8337snapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)ipq9048_firmwareqca9889_firmwaresd460_firmwareqca0000_firmwareqam8620p_firmware315_5g_iot_modemsnapdragon_auto_4g_modem_firmwarewcd9371_firmwarewcn3990_firmwarewcn3990qca6574auipq6018_firmwareqcs5430_firmwaresa8770p_firmwaresm8735wcn7750qca6420qca6438_firmwaresxr2130sa8255pqca9994_firmwaresm8635_firmwareSnapdragon
CWE ID-CWE-617
Reachable Assertion
CVE-2020-23314
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.27% / 50.52%
||
7 Day CHG~0.00%
Published-10 Jun, 2021 | 22:14
Updated-04 Aug, 2024 | 14:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is an Assertion 'block_found' failed at js-parser-statm.c:2003 parser_parse_try_statement_end in JerryScript 2.2.0.

Action-Not Available
Vendor-jerryscriptn/a
Product-jerryscriptn/a
CWE ID-CWE-617
Reachable Assertion
CVE-2023-24843
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.09% / 24.90%
||
7 Day CHG~0.00%
Published-03 Oct, 2023 | 05:00
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reachable Assertion in Modem

Transient DOS in Modem while triggering a camping on an 5G cell.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6431sd865_5gsxr2130_firmwarewcd9370qca8081_firmwarear8035_firmwareqca6696sm7250-absnapdragon_888_5g_mobile_platformwcd9341_firmwaresm8250-ab_firmwareqcn6024qca6426wcn6740_firmwarefastconnect_6700sm7325-af_firmwarewsa8815_firmwaresm7325-ae_firmwaresm8250-abqca8337_firmwareqca8337qca6426_firmwareqcm6490_firmwaresm8350-ac_firmwaresm7250p_firmwarewcd9341snapdragon_855_mobile_platformwsa8810_firmwaresnapdragon_xr2_5g_platformsnapdragon_x65_5g_modem-rf_system_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_780g_5g_mobile_platformfastconnect_6800_firmwaresm8150-acqcn6024_firmwaresm7250psnapdragon_695_5g_mobile_platformsnapdragon_780g_5g_mobile_platform_firmwarewcn6740sm7250-aa_firmwaresnapdragon_695_5g_mobile_platform_firmwarefastconnect_6800315_5g_iot_modem_firmwaresm8250-acfastconnect_7800_firmwarefastconnect_6900wcd9385_firmware315_5g_iot_modemqca6421fastconnect_6900_firmwaresnapdragon_x55_5g_modem-rf_systemwcd9380snapdragon_888_5g_mobile_platform_firmwaresnapdragon_xr2_5g_platform_firmwarewcd9360snapdragon_8_gen_1_mobile_platform_firmwaresnapdragon_778g_5g_mobile_platformqca6421_firmwaresnapdragon_auto_5g_modem-rf_firmwarewsa8810sm4350-acsm8350-acvideo_collaboration_vc3_platformqca6595ausnapdragon_865_5g_mobile_platform_firmwaresd855qca6431_firmwarewcd9385qca6436_firmwaresnapdragon_8\+_gen_1_mobile_platformsnapdragon_7c\+_gen_3_compute_firmwaresm8250-ac_firmwaresnapdragon_690_5g_mobile_platformwcd9370_firmwaresdx55_firmwaresnapdragon_auto_5g_modem-rfsnapdragon_750g_5g_mobile_platform_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresm7250-ab_firmwareqca6574asm7325-aesxr2130sm7325pqcm6490sm8150-ac_firmwaresnapdragon_855_mobile_platform_firmwarewcn3988qcs6490_firmwaresnapdragon_x65_5g_modem-rf_systemqcn9024sd855_firmwareqca6436snapdragon_480_5g_mobile_platform_firmwaresm7325-afwsa8835qca6595au_firmwareqca6391_firmwareqca6696_firmwareqcn9024_firmwaresnapdragon_865_5g_mobile_platformwcd9380_firmwarefastconnect_6200_firmwaresm7250-aaqca8081wsa8815wsa8830snapdragon_8\+_gen_1_mobile_platform_firmwarear8035qca6574a_firmwaresdx55wcd9375_firmwareqca6391snapdragon_778g_5g_mobile_platform_firmwaresnapdragon_480_5g_mobile_platformsnapdragon_8_gen_1_mobile_platformsm7250-acfastconnect_6200fastconnect_7800sm7325p_firmwaresd865_5g_firmwarewcd9360_firmwarewcd9375wcn3988_firmwarefastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwaresm4350-ac_firmwarewsa8835_firmwareqcs6490sm7250-ac_firmwaresnapdragon_690_5g_mobile_platform_firmwaresnapdragon_750g_5g_mobile_platformwsa8830_firmwareSnapdragonwcn6740_firmwaresnapdragon_auto_5g_modem-rf_firmwareqca8337_firmwaresnapdragon_x65_5g_modem-rf_system_firmwaresnapdragon_778g_5g_mobile_platform_firmwaresnapdragon_690_5g_mobile_platform_firmwarewcd9380_firmware315_5g_iot_modem_firmwareqcm6490_firmwareqca6431_firmwarefastconnect_6900_firmwarewcd9360_firmwarewcn3988_firmwarefastconnect_6700_firmwareqcn9024_firmwarewsa8810_firmwaresnapdragon_888_5g_mobile_platform_firmwarewcd9341_firmwarefastconnect_7800_firmwareqca6595au_firmwaresnapdragon_8_gen_1_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwaresxr2130_firmwareqca6696_firmwareqcs6490_firmwarequalcomm_video_collaboration_vc3_platform_firmwareqca6391_firmwarewcd9385_firmwareqcn6024_firmwaresnapdragon_855_mobile_platform_firmwarewcd9370_firmwaresm7325p_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwaresnapdragon_xr2_5g_platform_firmwareqca6426_firmwarewsa8815_firmwarewsa8835_firmwareqca6574a_firmwarefastconnect_6200_firmwaresnapdragon_695_5g_mobile_platform_firmwaresdx55_firmwaresnapdragon_780g_5g_mobile_platform_firmwaresnapdragon_865_5g_mobile_platform_firmwarewcd9375_firmwareqca8081_firmwarefastconnect_6800_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresm7250p_firmwareqca6436_firmwarear8035_firmwaresnapdragon_750g_5g_mobile_platform_firmwareqca6421_firmware
CWE ID-CWE-617
Reachable Assertion
CVE-2023-23759
Matching Score-4
Assigner-Meta Platforms, Inc.
ShareView Details
Matching Score-4
Assigner-Meta Platforms, Inc.
CVSS Score-7.5||HIGH
EPSS-0.26% / 49.31%
||
7 Day CHG~0.00%
Published-18 May, 2023 | 21:21
Updated-21 Jan, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is a vulnerability in the fizz library prior to v2023.01.30.00 where a CHECK failure can be triggered remotely. This behavior requires the client supported cipher advertisement changing between the original ClientHello and the second ClientHello, crashing the process (impact is limited to denial of service).

Action-Not Available
Vendor-Facebook
Product-fizzfizz
CWE ID-CWE-617
Reachable Assertion
CVE-2023-21646
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.09% / 24.90%
||
7 Day CHG~0.00%
Published-05 Sep, 2023 | 06:23
Updated-02 Aug, 2024 | 09:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reachable Assertion in Modem

Transient DOS in Modem while processing invalid System Information Block 1.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewcn3991wsa8830qca8337_firmwarewcd9380_firmwaresd780gqca8337sd865_5gsdx55m_firmwarewcn6856_firmwarewcd9360_firmwaresdx65wsa8835qcx315_firmwarewcd9380sd765g_firmwaresd888_5gqca6595au_firmwareqca6390_firmwaresd690_5gwcd9370qca6574asd690_5g_firmwarewcn6855_firmwaresm7325psm8450wcn6750sm4375wcn3998wcd9385_firmwareqcn6024_firmwaresa515mwsa8815sm7325p_firmwarewcn6850sd765wcn7850qca6574a_firmwaresd695sd768g_firmwaresdx55_firmwareqcn9024qca6595auqca8081_firmwarewcd9375_firmwarewcn3998_firmwaresm7250p_firmwareqca6391sdx55mwcd9360wcn6740_firmwaresd778gsdx65_firmwaresa515m_firmwareqcs6490wcn7851qcm6490_firmwaresd480_firmwarewcn6851_firmwarewcn3988_firmwaresd778g_firmwareqcn9024_firmwarewsa8810_firmwaresd765gwcd9341_firmwaresm4375_firmwaresm8450_firmwaresd765_firmwaresd480sd870wcn6851wsa8810wcn6855qca8081wcn7851_firmwarewcn6856wcd9385wcd9341sd695_firmwaresd768gqca6696_firmwareqcs6490_firmwaresd870_firmwarewcn6740qca6696sdx70m_firmwareqca6391_firmwareqca6390ar8035wcd9375sd780g_firmwarewcd9370_firmwaresdx55wsa8830_firmwareqcn6024sdx70msd865_5g_firmwareqcm6490sd888_5g_firmwarewcn3988wcn6850_firmwarewcn7850_firmwarewsa8815_firmwarewsa8835_firmwaresm7250pqcx315wcn6750_firmwarear8035_firmwareSnapdragonwcn6740_firmwarewcn3991_firmwareqca8337_firmwarewcd9380_firmwaresdx65_firmwaresa515m_firmwareqcm6490_firmwaresd480_firmwarewcn6851_firmwaresdx55m_firmwarewcn6856_firmwaresnapdragon_4_gen_1_firmwarewcd9360_firmwarewcn3988_firmwareqcx315_firmwaresd778g_firmwareqcn9024_firmwarewsa8810_firmwaresd765g_firmwarewcd9341_firmwareqca6595au_firmwaresd765_firmwareqca6390_firmwarewcn7851_firmwaresd690_5g_firmwarewcn6855_firmwaresd695_firmwareqca6696_firmwareqcs6490_firmwaresd870_firmwaresdx70m_firmwareqca6391_firmwarewcd9385_firmwareqcn6024_firmwaresd780g_firmwarewcd9370_firmwaresd_8_gen1_5g_firmwarewcn6750_firmwaresm7325p_firmwarewsa8830_firmwaresd865_5g_firmwarewsa8815_firmwaresd888_5g_firmwarewcn6850_firmwareqca6574a_firmwarewcn7850_firmwaresd768g_firmwaresdx55_firmwarewsa8835_firmwarewcd9375_firmwareqca8081_firmwarewcn3998_firmwaresm7250p_firmwarear8035_firmware
CWE ID-CWE-617
Reachable Assertion
CVE-2023-21653
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.09% / 24.90%
||
7 Day CHG~0.00%
Published-05 Sep, 2023 | 06:23
Updated-02 Aug, 2024 | 09:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reachable Assertion in Modem

Transient DOS in Modem while processing RRC reconfiguration message.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn6855_firmwareqca8337_firmwarewcd9380_firmwaresdx65_firmwareqca8337sdx70m_firmwareqcn6024_firmwarear8035wcn6856_firmwarear8035_firmwaresdx65qcn6024sdx70mqcn9024_firmwarewcd9380qcn9024wcn6855qca8081_firmwareqca8081wcn6856Snapdragonwcn6855_firmwareqca8337_firmwarewcd9380_firmwaresdx65_firmwareqcn9024_firmwaresdx70m_firmwareqca8081_firmwareqcn6024_firmwarewcn6856_firmwarear8035_firmware
CWE ID-CWE-617
Reachable Assertion
CVE-2025-20666
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.39% / 59.60%
||
7 Day CHG~0.00%
Published-05 May, 2025 | 02:49
Updated-17 Feb, 2026 | 15:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00650610; Issue ID: MSV-2933.

Action-Not Available
Vendor-MediaTek Inc.
Product-mt8666mt8673mt6853tmt8791tmt6883nr15mt6855mt8771mt6833pmt2735mt6890mt6893mt6877tmt6877mt6875tmt6853mt6891mt8675mt8795tmt8797mt8798mt6875mt8791mt6885mt6855tmt6833mt8667mt6889mt6873mt6877ttmt6880MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8666, MT8667, MT8673, MT8675, MT8771, MT8791, MT8791T, MT8795T, MT8797, MT8798
CWE ID-CWE-617
Reachable Assertion
CVE-2023-2156
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.43% / 62.51%
||
7 Day CHG~0.00%
Published-09 May, 2023 | 00:00
Updated-02 Aug, 2024 | 06:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. This issue results from the lack of proper handling of user-supplied data, which can lead to an assertion failure. This may allow an unauthenticated remote attacker to create a denial of service condition on the system.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncFedora ProjectDebian GNU/LinuxRed Hat, Inc.
Product-debian_linuxlinux_kernelfedoraenterprise_linuxLinux kernel (RPL protocol)
CWE ID-CWE-617
Reachable Assertion
CVE-2023-1428
Matching Score-4
Assigner-Google LLC
ShareView Details
Matching Score-4
Assigner-Google LLC
CVSS Score-7.5||HIGH
EPSS-0.07% / 22.11%
||
7 Day CHG~0.00%
Published-09 Jun, 2023 | 10:46
Updated-26 Sep, 2024 | 18:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Denial-of-Service in gRPC

There exists an vulnerability causing an abort() to be called in gRPC.  The following headers cause gRPC's C++ implementation to abort() when called via http2: te: x (x != trailers) :scheme: x (x != http, https) grpclb_client_stats: x (x == anything) On top of sending one of those headers, a later header must be sent that gets the total header size past 8KB. We recommend upgrading past git commit 2485fa94bd8a723e5c977d55a3ce10b301b437f8 or v1.53 and above.

Action-Not Available
Vendor-grpcgrpcGoogle LLC
Product-grpcgRPCgrpc
CWE ID-CWE-617
Reachable Assertion
CVE-2025-15530
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.03% / 9.90%
||
7 Day CHG-0.02%
Published-17 Jan, 2026 | 11:02
Updated-23 Feb, 2026 | 09:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Open5GS s11-handler.c assertion

A vulnerability was determined in Open5GS up to 2.7.6. This affects the function sgwc_s11_handle_create_indirect_data_forwarding_tunnel_request of the file /src/sgwc/s11-handler.c. Executing a manipulation can lead to reachable assertion. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. The issue report is flagged as already-fixed.

Action-Not Available
Vendor-open5gsn/a
Product-open5gsOpen5GS
CWE ID-CWE-617
Reachable Assertion
CVE-2024-31744
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.03% / 6.99%
||
7 Day CHG~0.00%
Published-19 Apr, 2024 | 00:00
Updated-02 Aug, 2024 | 01:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Jasper 4.2.2, the jpc_streamlist_remove function in src/libjasper/jpc/jpc_dec.c:2407 has an assertion failure vulnerability, allowing attackers to cause a denial of service attack through a specific image file.

Action-Not Available
Vendor-n/aJasPer
Product-n/ajasper
CWE ID-CWE-617
Reachable Assertion
CVE-2024-32475
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.14% / 34.01%
||
7 Day CHG~0.00%
Published-18 Apr, 2024 | 14:18
Updated-04 Sep, 2025 | 19:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Envoy RELEASE_ASSERT using auto_sni with :authority header > 255 bytes

Envoy is a cloud-native, open source edge and service proxy. When an upstream TLS cluster is used with `auto_sni` enabled, a request containing a `host`/`:authority` header longer than 255 characters triggers an abnormal termination of Envoy process. Envoy does not gracefully handle an error when setting SNI for outbound TLS connection. The error can occur when Envoy attempts to use the `host`/`:authority` header value longer than 255 characters as SNI for outbound TLS connection. SNI length is limited to 255 characters per the standard. Envoy always expects this operation to succeed and abnormally aborts the process when it fails. This vulnerability is fixed in 1.30.1, 1.29.4, 1.28.3, and 1.27.5.

Action-Not Available
Vendor-envoyproxyenvoyproxyenvoyproxy
Product-envoyenvoyenvoy
CWE ID-CWE-253
Incorrect Check of Function Return Value
CWE ID-CWE-617
Reachable Assertion
CVE-2022-48363
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.10% / 27.00%
||
7 Day CHG~0.00%
Published-26 Feb, 2023 | 00:00
Updated-11 Mar, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In MPD before 0.23.8, as used on Automotive Grade Linux and other platforms, the PipeWire output plugin mishandles a Drain call in certain situations involving truncated files. Eventually there is an assertion failure in libmpdclient because libqtappfw passes in a NULL pointer.

Action-Not Available
Vendor-n/aThe Linux Foundation
Product-automotive_grade_linuxn/a
CWE ID-CWE-617
Reachable Assertion
CVE-2021-24029
Matching Score-4
Assigner-Meta Platforms, Inc.
ShareView Details
Matching Score-4
Assigner-Meta Platforms, Inc.
CVSS Score-7.5||HIGH
EPSS-0.47% / 64.09%
||
7 Day CHG~0.00%
Published-15 Mar, 2021 | 21:15
Updated-03 Aug, 2024 | 19:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A packet of death scenario is possible in mvfst via a specially crafted message during a QUIC session, which causes a crash via a failed assertion. Per QUIC specification, this particular message should be treated as a connection error. This issue affects mvfst versions prior to commit a67083ff4b8dcbb7ee2839da6338032030d712b0 and proxygen versions prior to v2021.03.15.00.

Action-Not Available
Vendor-Facebook
Product-proxygenmvfstproxygenmvfst
CWE ID-CWE-617
Reachable Assertion
CVE-2024-45795
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.68% / 71.14%
||
7 Day CHG-0.21%
Published-16 Oct, 2024 | 18:34
Updated-22 Oct, 2024 | 13:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Suricata detect/datasets: reachable assertion with unimplemented rule option

Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to version 7.0.7, rules using datasets with the non-functional / unimplemented "unset" option can trigger an assertion during traffic parsing, leading to denial of service. This issue is addressed in 7.0.7. As a workaround, use only trusted and well tested rulesets.

Action-Not Available
Vendor-oisfOISFoisf
Product-suricatasuricatasuricata
CWE ID-CWE-617
Reachable Assertion
CVE-2022-47516
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.24% / 46.68%
||
7 Day CHG~0.00%
Published-18 Dec, 2022 | 00:00
Updated-17 Apr, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the libsofia-sip fork in drachtio-server before 0.8.20. It allows remote attackers to cause a denial of service (daemon crash) via a crafted UDP message that leads to a failure of the libsofia-sip-ua/tport/tport.c self assertion.

Action-Not Available
Vendor-drachtion/a
Product-drachtio-servern/a
CWE ID-CWE-617
Reachable Assertion
CVE-2025-49630
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-7.5||HIGH
EPSS-0.69% / 71.50%
||
7 Day CHG-0.54%
Published-10 Jul, 2025 | 16:57
Updated-04 Nov, 2025 | 22:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache HTTP Server: mod_proxy_http2 denial of service

In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_http2. Configurations affected are a reverse proxy is configured for an HTTP/2 backend, with ProxyPreserveHost set to "on".

Action-Not Available
Vendor-The Apache Software Foundation
Product-http_serverApache HTTP Server
CWE ID-CWE-617
Reachable Assertion
CVE-2020-6097
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-7.5||HIGH
EPSS-0.29% / 51.90%
||
7 Day CHG~0.00%
Published-10 Sep, 2020 | 14:13
Updated-04 Aug, 2024 | 08:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An exploitable denial of service vulnerability exists in the atftpd daemon functionality of atftp 0.7.git20120829-3.1+b1. A specially crafted sequence of RRQ-Multicast requests trigger an assert() call resulting in denial-of-service. An attacker can send a sequence of malicious packets to trigger this vulnerability.

Action-Not Available
Vendor-atftp_projectn/aDebian GNU/LinuxopenSUSE
Product-atftpdebian_linuxleapatftpd
CWE ID-CWE-617
Reachable Assertion
CVE-2021-21778
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-7.5||HIGH
EPSS-0.78% / 73.35%
||
7 Day CHG~0.00%
Published-25 Aug, 2021 | 18:27
Updated-03 Aug, 2024 | 18:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A denial of service vulnerability exists in the ASDU message processing functionality of MZ Automation GmbH lib60870.NET 2.2.0. A specially crafted network request can lead to loss of communications. An attacker can send an unauthenticated message to trigger this vulnerability.

Action-Not Available
Vendor-mz-automationn/a
Product-lib60870MZ Automation"
CWE ID-CWE-617
Reachable Assertion
CVE-2025-47913
Matching Score-4
Assigner-Go Project
ShareView Details
Matching Score-4
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.03% / 9.44%
||
7 Day CHG~0.00%
Published-13 Nov, 2025 | 21:29
Updated-09 Jan, 2026 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential denial of service in golang.org/x/crypto/ssh/agent

SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.

Action-Not Available
Vendor-golang.org/x/cryptoGo
Product-sshgolang.org/x/crypto/ssh/agent
CWE ID-CWE-617
Reachable Assertion
CVE-2022-24777
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.33% / 55.86%
||
7 Day CHG~0.00%
Published-25 Mar, 2022 | 16:35
Updated-23 Apr, 2025 | 18:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Denial of Service via reachable assertion in grpc-swift

grpc-swift is the Swift language implementation of gRPC, a remote procedure call (RPC) framework. Prior to version 1.7.2, a grpc-swift server is vulnerable to a denial of service attack via a reachable assertion. This is due to incorrect logic when handling GOAWAY frames. The attack is low-effort: it takes very little resources to construct and send the required sequence of frames. The impact on availability is high as the server will crash, dropping all in flight connections and requests. This issue is fixed in version 1.7.2. There are currently no known workarounds.

Action-Not Available
Vendor-grpcThe Linux Foundation
Product-grpc_swiftgrpc-swift
CWE ID-CWE-617
Reachable Assertion
CVE-2021-1982
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.26% / 49.06%
||
7 Day CHG~0.00%
Published-12 Nov, 2021 | 06:15
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible denial of service scenario due to improper input validation of received NAS OTA message in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewsa8830sd678sm7250sm6250p_firmwareqcs610qca8337sm7250_firmwareqca6431_firmwarewcd9360_firmwaresdx65wcn3950_firmwaresd765g_firmwareqca6595au_firmwareqca6390_firmwaresd690_5gsd730_firmwarewcd9370sd_675_firmwaresd675_firmwareqca6426wcn3990_firmwaresm8450wcn3998wcd9371_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcn3950sd720gsm6375_firmwareqsm8350_firmwareqsm8350wcn7850qca6574au_firmwaresdx55_firmwareqca6595auqca8081_firmwarewcd9375_firmwarewcn3998_firmwarewcd9360qca6436_firmwaresd778gsa515m_firmwareqcs6490wcn7851sdxr2_5gwcn3988_firmwareqca6421sd778g_firmwaresm6250wsa8810_firmwaresd765gsm8450_firmwaresd765_firmwareqca6436wcn6851qca8081wcn7851_firmwarewcd9385wcd9341qca6431qca6696_firmwareqcs6490_firmwarewcd9371sd750gsd870_firmwareqca6390ar8035sd750g_firmwarewcd9375wcn3910_firmwaresm6250_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwareqcm6490sd888_5g_firmwarewcn3988wcn6850_firmwarewcn7850_firmwarewsa8815_firmwarewsa8835_firmwareqcx315wcn6750_firmwaresm6375wcn3991qca8337_firmwarewcd9380_firmwarewcn3990sd_675sd865_5gsdx55m_firmwarewcn6856_firmwaresm8450p_firmwarewsa8835qcx315_firmwarewcd9380sd888_5gsm6250pqcs410qca6574asd690_5g_firmwarewcn6855_firmwaresm7325wcn3980wcn6750sa515msd855wsa8815wcn6850wcn3910sd765qca6426_firmwareqca6574a_firmwaresd768g_firmwarewcn3980_firmwaresd730qca6391sdx55mqca6421_firmwaresdx65_firmwaresd678_firmwareqcm6490_firmwaresd480_firmwarewcn6851_firmwareqca6574auwcd9341_firmwaresd480sd870sm8450pwcn6855wsa8810qcs610_firmwarewcn6856sd768gqca6696qca6391_firmwarewcd9370_firmwaresdx55sd675sd720g_firmwareqcs410_firmwarear8035_firmwaresm7325_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-617
Reachable Assertion
CVE-2025-46354
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-7.5||HIGH
EPSS-0.06% / 17.50%
||
7 Day CHG-0.00%
Published-22 Jul, 2025 | 15:26
Updated-03 Nov, 2025 | 20:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A denial of service vulnerability exists in the Distributed Transaction Commit/Abort Operation functionality of Bloomberg Comdb2 8.1. A specially crafted network packet can lead to a denial of service. An attacker can send a malicious packet to trigger this vulnerability.

Action-Not Available
Vendor-bloombergBloomberg
Product-comdb2Comdb2
CWE ID-CWE-617
Reachable Assertion
CVE-2025-46705
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-7.5||HIGH
EPSS-0.08% / 22.75%
||
7 Day CHG~0.00%
Published-05 Nov, 2025 | 14:56
Updated-07 Nov, 2025 | 20:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A denial of service vulnerability exists in the g_assert_not_reached functionality of Entr&#39;ouvert Lasso 2.5.1 and 2.8.2. A specially crafted SAML assertion response can lead to a denial of service. An attacker can send a malformed SAML response to trigger this vulnerability.

Action-Not Available
Vendor-entrouvertEntr'ouvert
Product-lassoLasso
CWE ID-CWE-617
Reachable Assertion
CVE-2020-8617
Matching Score-4
Assigner-Internet Systems Consortium (ISC)
ShareView Details
Matching Score-4
Assigner-Internet Systems Consortium (ISC)
CVSS Score-7.5||HIGH
EPSS-92.63% / 99.74%
||
7 Day CHG~0.00%
Published-19 May, 2020 | 14:05
Updated-16 Sep, 2024 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c

Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local session key even on servers whose configuration does not otherwise make use of it, almost all current BIND servers are vulnerable. In releases of BIND dating from March 2018 and after, an assertion check in tsig.c detects this inconsistent state and deliberately exits. Prior to the introduction of the check the server would continue operating in an inconsistent state, with potentially harmful results.

Action-Not Available
Vendor-Debian GNU/LinuxCanonical Ltd.openSUSEFedora ProjectInternet Systems Consortium, Inc.
Product-ubuntu_linuxdebian_linuxfedorabindleapBIND9
CWE ID-CWE-617
Reachable Assertion
CVE-2022-41893
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.17% / 37.48%
||
7 Day CHG~0.00%
Published-18 Nov, 2022 | 00:00
Updated-22 Apr, 2025 | 16:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
`CHECK_EQ` fail in `tf.raw_ops.TensorListResize` in Tensorflow

TensorFlow is an open source platform for machine learning. If `tf.raw_ops.TensorListResize` is given a nonscalar value for input `size`, it results `CHECK` fail which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 888e34b49009a4e734c27ab0c43b0b5102682c56. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.

Action-Not Available
Vendor-Google LLCTensorFlow
Product-tensorflowtensorflow
CWE ID-CWE-617
Reachable Assertion
CVE-2022-41901
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.30% / 52.56%
||
7 Day CHG~0.00%
Published-18 Nov, 2022 | 00:00
Updated-22 Apr, 2025 | 16:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
`CHECK_EQ` fail via input in `SparseMatrixNNZ` in Tensorflow

TensorFlow is an open source platform for machine learning. An input `sparse_matrix` that is not a matrix with a shape with rank 0 will trigger a `CHECK` fail in `tf.raw_ops.SparseMatrixNNZ`. We have patched the issue in GitHub commit f856d02e5322821aad155dad9b3acab1e9f5d693. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.

Action-Not Available
Vendor-Google LLCTensorFlow
Product-tensorflowtensorflow
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-617
Reachable Assertion
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next
Details not found