Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-20820

Summary
Assigner-SamsungMobile
Assigner Org ID-3af57064-a867-422c-b2ad-40307b65c458
Published At-06 Feb, 2024 | 02:23
Updated At-01 Aug, 2024 | 22:06
Rejected At-
Credits

Improper input validation in bootloader prior to SMR Feb-2024 Release 1 allows local privileged attackers to cause an Out-Of-Bounds read.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:SamsungMobile
Assigner Org ID:3af57064-a867-422c-b2ad-40307b65c458
Published At:06 Feb, 2024 | 02:23
Updated At:01 Aug, 2024 | 22:06
Rejected At:
▼CVE Numbering Authority (CNA)

Improper input validation in bootloader prior to SMR Feb-2024 Release 1 allows local privileged attackers to cause an Out-Of-Bounds read.

Affected Products
Vendor
Samsung ElectronicsSamsung Mobile
Product
Samsung Mobile Devices
Default Status
affected
Versions
Unaffected
  • SMR Feb-2024 Release in Selected Android 11, 12, 13 MediaTek devices
Problem Types
TypeCWE IDDescription
N/AN/ACWE-20: Improper Input Validation
Type: N/A
CWE ID: N/A
Description: CWE-20: Improper Input Validation
Metrics
VersionBase scoreBase severityVector
3.14.4MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Version: 3.1
Base score: 4.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=02
N/A
Hyperlink: https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=02
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=02
x_transferred
Hyperlink: https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=02
Resource:
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:mobile.security@samsung.com
Published At:06 Feb, 2024 | 03:15
Updated At:02 Apr, 2024 | 01:15

Improper input validation in bootloader prior to SMR Feb-2024 Release 1 allows local privileged attackers to cause an Out-Of-Bounds read.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.1HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Secondary3.14.4MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Type: Primary
Version: 3.1
Base score: 7.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Type: Secondary
Version: 3.1
Base score: 4.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
CPE Matches

Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-apr-2023-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-aug-2023-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-dec-2023-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-feb-2024-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-jan-2023-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-jan-2024-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-jul-2023-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-jun-2023-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-mar-2023-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-may-2023-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-nov-2021-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-nov-2023-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-oct-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-oct-2023-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-sep-2023-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>12.0
cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*
Samsung
samsung
>>android>>12.0
cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>12.0
cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>12.0
cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>12.0
cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>12.0
cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>12.0
cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>12.0
cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>12.0
cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>12.0
cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-125Primarynvd@nist.gov
CWE ID: CWE-125
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=02mobile.security@samsung.com
Vendor Advisory
Hyperlink: https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=02
Source: mobile.security@samsung.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

529Records found

CVE-2019-14101
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.1||HIGH
EPSS-0.04% / 12.05%
||
7 Day CHG~0.00%
Published-30 Jul, 2020 | 11:40
Updated-05 Aug, 2024 | 00:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of bounds read can happen in diag event set mask command handler when user provided length in the command request is less than expected length in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8096, APQ8096AU, APQ8098, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9625, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCM2150, QCN7605, QCS404, QCS405, QCS605, QM215, Rennell, SA415M, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-mdm9150_firmwarekamorta_firmwaremdm9635m_firmwaremdm9640_firmwareapq8096_firmwareqcm2150_firmwaresdm429wmsm8996au_firmwaresdm632_firmwaresdm845sdm450_firmwaresdm632apq8096sdx24sdm439qcs404_firmwaremdm9650sdm429msm8940_firmwaresm7150_firmwaresm6150msm8909w_firmwaremsm8996ausdm429w_firmwaresm7150apq8009_firmwaremsm8917sdm670qcs605_firmwaresc8180xmdm9206sdm670_firmwareqcs404sdx24_firmwaresdm636sda845_firmwaresa415mmdm9635mapq8098qcn7605mdm9205mdm9206_firmwareqcs605msm8937_firmwaremdm9650_firmwaresdm429_firmwaremsm8905_firmwaresda660sdx55_firmwaresxr1130_firmwaresxr1130msm8909wapq8009msm8909_firmwaresda845nicobarsdm850_firmwaremsm8920msm8953sdm450sdm636_firmwaresdm845_firmwareapq8098_firmwaremsm8998_firmwareqcm2150msm8920_firmwaresdm630mdm9607_firmwaresdm660mdm9655_firmwaresc8180x_firmwaresa415m_firmwareqcs405sdm710qm215sc7180_firmwaremdm9607mdm9625_firmwaresdm710_firmwareqcn7605_firmwaremdm9150msm8937msm8996_firmwaremsm8905sm8150_firmwaremsm8909mdm9655apq8096ausdm439_firmwarerennellsc7180qcs405_firmwaresdm630_firmwaremdm9205_firmwaresda660_firmwaremdm9625rennell_firmwareqm215_firmwaresdx55msm8953_firmwaremsm8940saipan_firmwaresm6150_firmwareapq8096au_firmwaremsm8917_firmwaremsm8998sm8150sdm850kamortamsm8996saipannicobar_firmwaresdm660_firmwaremdm9640Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-32815
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.01% / 1.40%
||
7 Day CHG~0.00%
Published-04 Sep, 2023 | 02:28
Updated-08 Oct, 2024 | 20:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In gnss service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08037801; Issue ID: ALPS08037801.

Action-Not Available
Vendor-MediaTek Inc.Google LLCOpenWrtThe Linux Foundation
Product-mt6855mt6990mt8175mt6873mt2735mt6580mt6886mt6983mt8188tmt6765mt6883mt6853topenwrtmt6835mt6739mt6880mt6761mt2713mt6889mt6768mt6985mt6890mt8188mt6833mt6885yoctomt6877mt6855tmt6781mt8365mt8195mt6853mt6980mt6895mt8168mt6789androidmt6779mt6785mt6879MT2713, MT2735, MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6895, MT6980, MT6983, MT6985, MT6990, MT8168, MT8175, MT8188, MT8188T, MT8195, MT8365
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-33065
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.03% / 5.95%
||
7 Day CHG~0.00%
Published-06 Feb, 2024 | 05:47
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in Audio

Information disclosure in Audio while accessing AVCS services from ADSP payload.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sdm429w_firmwareqcs410_firmwaresa6150p_firmwaresd865_5gsnapdragon_429_mobile_platform_firmwareqcs610_firmwarewcd9335sxr2130_firmwaresrv1mqca8081_firmwarewcd9370ar8035_firmwareqca6696wcd9340_firmwaresnapdragon_888_5g_mobile_platformwcd9341_firmwareqca6320sd888_firmwareqcc710_firmwareqca6426wcn6740_firmwarefastconnect_6700qca6564auwcn3610qcn9074wsa8815_firmwaresa8195p_firmwareqca8337_firmwareqca8337qca6426_firmwareqca6574au_firmwareqam8295pwcd9341qca6574ausnapdragon_855_mobile_platformwcn3950wsa8810_firmwaresnapdragon_xr2_5g_platformsnapdragon_429_mobile_platformsa9000p_firmwaresrv1hsnapdragon_835_mobile_pc_platform_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_7c\+_gen_3_computewcn3660b_firmwaresnapdragon_780g_5g_mobile_platformfastconnect_6800_firmwaresa8295p_firmwaresd835_firmwarevideo_collaboration_vc1_platform_firmwaresnapdragon_778g\+_5g_mobile_platformsa8770psnapdragon_780g_5g_mobile_platform_firmwarec-v2x_9150qca6584auqca6320_firmwareqcn6274_firmwaresd888qcc710wcn6740qca6310_firmwarefastconnect_6800qfw7114_firmwarefastconnect_7800_firmwarefastconnect_6900video_collaboration_vc1_platformqfw7114snapdragon_782g_mobile_platform_firmwarewcd9385_firmwaresnapdragon_x55_5g_modem-rf_systemfastconnect_6900_firmwareqca6310qam8255p_firmwarewcd9380sa6145p_firmwareqam8255psnapdragon_888_5g_mobile_platform_firmwaresnapdragon_xr2_5g_platform_firmwaresa8150psnapdragon_778g_5g_mobile_platformmsm8996au_firmwaresa6155psnapdragon_835_mobile_pc_platformqca6564au_firmwarewsa8810qam8650psnapdragon_865\+_5g_mobile_platformsa9000psrv1h_firmwarevideo_collaboration_vc3_platformaqt1000sm7315_firmwaresnapdragon_865_5g_mobile_platform_firmwarec-v2x_9150_firmwaresa6155p_firmwareqam8295p_firmwaresrv1m_firmwaresd855sd835wcn3990_firmwaresm7315snapdragon_870_5g_mobile_platform_firmwareqfw7124_firmwareqca6564a_firmwareqca6436_firmwareqca6698aq_firmwaresnapdragon_wear_4100\+_platform_firmwarewcd9385mdm9650_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewcn3610_firmwaresa8255psnapdragon_855\+\/860_mobile_platform_firmwaresnapdragon_778g\+_5g_mobile_platform_firmwareqca6420snapdragon_865\+_5g_mobile_platform_firmwareqca6430wcd9370_firmwaremdm9650snapdragon_x55_5g_modem-rf_system_firmwarewcn3660bqca6574asxr2130wcn3620_firmwaresa8195pwcd9340qamsrv1msnapdragon_820_automotive_platform_firmwaresnapdragon_auto_5g_modem-rf_gen_2sm7325pqam8650p_firmwaresnapdragon_855_mobile_platform_firmwareqca6420_firmwareaqt1000_firmwaresdm429wqca6584au_firmwaresd855_firmwareqcn6274qca6436qfw7124sa8775psnapdragon_x75_5g_modem-rf_systemwcd9335_firmwareqca6391_firmwarewcn3980_firmwarewsa8835qca6430_firmwaresnapdragon_870_5g_mobile_platformsa8775p_firmwaresnapdragon_782g_mobile_platformqamsrv1hqca6696_firmwaresnapdragon_865_5g_mobile_platformwcd9380_firmwaresa6150pqcs410sa8155p_firmwareqca8081qca6564awsa8815sa8155pwsa8830qam8775psa6145pqcn9074_firmwaresa8255p_firmwarear8035qca6574a_firmwareqamsrv1m_firmwaremsm8996ausa8650p_firmwarewcn3620wcd9375_firmwareqca6391qcn6224snapdragon_778g_5g_mobile_platform_firmwareqca6698aqwcn3950_firmwaresa8770p_firmwaresa8295pfastconnect_6200fastconnect_7800sa8145p_firmwaresa8650pqam8775p_firmwaresd865_5g_firmwaresm7325p_firmwarewcn3680bsnapdragon_888\+_5g_mobile_platformwcd9375sa8150p_firmwaresnapdragon_855\+\/860_mobile_platformfastconnect_6700_firmwareqamsrv1h_firmwarevideo_collaboration_vc3_platform_firmwaresa8145pwcn3990snapdragon_wear_4100\+_platformsnapdragon_888\+_5g_mobile_platform_firmwarewsa8835_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewcn3980snapdragon_820_automotive_platformfastconnect_6200_firmwarewsa8830_firmwarewcn3680b_firmwareqcn6224_firmwareqcs610Snapdragonqam8255p_firmwarequalcomm_video_collaboration_vc1_platform_firmwareqca8337_firmwarewcd9380_firmwaresa6150p_firmwaresnapdragon_778g_5g_mobile_platform_firmwaresa8145p_firmwaremsm8996au_firmwaresnapdragon_820_automotive_platform_firmwareqcn6224_firmwaresdm429w_firmwarewcn3950_firmwaresnapdragon_888_5g_mobile_platform_firmwaresa8150p_firmwareqca6420_firmwareqca6584au_firmwarewcn3990_firmwarec-v2x_9150_firmwareqca6310_firmwareqca6430_firmwarewcd9335_firmwareqfw7114_firmwarequalcomm_video_collaboration_vc3_platform_firmwarewcd9385_firmwareqamsrv1h_firmwarewcd9340_firmwaresm7325p_firmwareqam8295p_firmwaremdm9650_firmwaresnapdragon_xr2_5g_platform_firmwareqca6426_firmwarewcn3660b_firmwaresa9000p_firmwareqca6320_firmwaresm7315_firmwareqca6574au_firmwaresnapdragon_429_mobile_platform_firmwaresnapdragon_835_mobile_pc_platform_firmwarewcn3680b_firmwarewcd9375_firmwareqca8081_firmwareqca6574a_firmwarefastconnect_6200_firmwarewcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcn3610_firmwareqca6436_firmwareaqt1000_firmwareqca6564au_firmwarewcn6740_firmwaresa6155p_firmwareqcn6274_firmwaresa8775p_firmwaresa8650p_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900_firmwaresrv1h_firmwaresa6145p_firmwaresa8155p_firmwarefastconnect_6700_firmwareqca6564a_firmwarewsa8810_firmwarewcd9341_firmwarefastconnect_7800_firmwaresa8255p_firmwareqcs610_firmwareqca6698aq_firmwareqamsrv1m_firmwaresrv1m_firmwaresd835_firmwareqam8650p_firmwaresa8770p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqam8775p_firmwaresxr2130_firmwareqca6696_firmwareqca6391_firmwaresnapdragon_855_mobile_platform_firmwarewcd9370_firmwaresd888_firmwareqcc710_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3620_firmwarewsa8815_firmwarewsa8835_firmwaresnapdragon_780g_5g_mobile_platform_firmwaresa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwareqcn9074_firmwarefastconnect_6800_firmwareqcs410_firmwaresa8295p_firmwareqfw7124_firmwarear8035_firmware
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-126
Buffer Over-read
CVE-2023-32876
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.01% / 1.62%
||
7 Day CHG~0.00%
Published-02 Jan, 2024 | 02:49
Updated-03 Jun, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In keyInstall, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308612; Issue ID: ALPS08308612.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt6873mt6771mt6985mt6757cdmt8765mt8185mt8321mt6763mt6580mt6765mt6757mt6735mt6757chmt6785mt8667mt6855mt6893mt8797mt6889mt6757cmt6753mt6853mt8791mt6768mt8798mt6875mt6739mt6879mt6779mt6891mt8673mt6983mt8766mt8768mt8791tmt6781mt8789mt6877mt6853tmt8788mt6769mt6886mt8666mt8385mt6835mt6762mt8781mt8786mt6789mt6731androidmt6883mt8675mt6761mt6833mt6895mt6885mt6737MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8185, MT8321, MT8385, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797, MT8798
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-32807
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.01% / 1.40%
||
7 Day CHG~0.00%
Published-04 Sep, 2023 | 02:28
Updated-08 Oct, 2024 | 20:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In wlan service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588360; Issue ID: ALPS07588360.

Action-Not Available
Vendor-Google LLCMediaTek Inc.The Linux Foundation
Product-mt6855mt6873mt8765mt8786mt8385mt6833mt8788yoctomt8666mt6781mt8365mt8183mt8167mt6853mt8667mt8168mt6789mt6835mt8768androidmt8321iot_yoctomt6779mt6785mt8781mt8766mt8173MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT8167, MT8168, MT8173, MT8183, MT8321, MT8365, MT8385, MT8666, MT8667, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-32810
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.02% / 4.56%
||
7 Day CHG~0.00%
Published-04 Sep, 2023 | 02:28
Updated-02 Aug, 2024 | 15:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In bluetooth driver, there is a possible out of bounds read due to improper input validation. This could lead to local information leak with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07867212; Issue ID: ALPS07867212.

Action-Not Available
Vendor-Linux Kernel Organization, IncGoogle LLCMediaTek Inc.The Linux Foundation
Product-mt6855mt8175mt6873mt6893mt8765mt8788mt8791tmt6983mt8188tmt8666mt8167mt6883mt5221mt8768mt8789mt8797mt8321mt8781mt8766mt8786mt6890mt8188mt8385mt6833mt6885mt8673yoctomt6877mt8365mt8195mt6853mt8518smt6895linux_kernelmt8168androidmt8185mt8791mt2713mt8532mt6879mt8173MT2713, MT5221, MT6833, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6890, MT6893, MT6895, MT6983, MT8167, MT8168, MT8173, MT8175, MT8185, MT8188, MT8188T, MT8195, MT8321, MT8365, MT8385, MT8518S, MT8532, MT8666, MT8673, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-32814
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.01% / 1.40%
||
7 Day CHG~0.00%
Published-04 Sep, 2023 | 02:28
Updated-08 Oct, 2024 | 20:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In gnss service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08031947; Issue ID: ALPS08031947.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt6855mt6990mt8175mt6873mt2735mt6580mt6886mt6983mt8666mt6765mt6883mt6853tmt6835mt6739mt6880mt6761mt2713mt6889mt6768mt6985mt6890mt8188mt6833mt6885mt8673mt6877mt6855tmt6781mt8365mt8195mt6853mt8667mt6980mt6895mt8168mt6789androidmt6779mt6785mt6879MT2713, MT2735, MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6895, MT6980, MT6983, MT6985, MT6990, MT8168, MT8175, MT8188, MT8195, MT8365, MT8666, MT8667, MT8673
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-32856
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.04% / 11.52%
||
7 Day CHG~0.00%
Published-04 Dec, 2023 | 03:45
Updated-29 Aug, 2024 | 13:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In display, there is a possible out of bounds read due to an incorrect status check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07993705; Issue ID: ALPS07993705.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt6985mt6893mt8798mt8188androidmt6833mt6885mt8797mt6889mt6983mt6768mt8195mt6765mt6879mt6883MT6765, MT6768, MT6833, MT6879, MT6883, MT6885, MT6889, MT6893, MT6983, MT6985, MT8188, MT8195, MT8797, MT8798mt6985mt6893mt8798mt8188mt6833mt6885mt8797mt6889mt6983mt6768mt8195mt6765mt6879mt6883
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-32878
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.01% / 0.33%
||
7 Day CHG~0.00%
Published-02 Jan, 2024 | 02:49
Updated-16 May, 2025 | 18:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In battery, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308070; Issue ID: ALPS08307992.

Action-Not Available
Vendor-MediaTek Inc.Google LLC
Product-mt6762mt6885mt8788mt8167mt6765mt8768mt8797mt8321mt6983mt6833mt8789mt8781mt8168mt8798mt8188mt8791tmt6879androidmt6883mt8786mt8765mt8766MT6762, MT6765, MT6833, MT6879, MT6883, MT6885, MT6983, MT8167, MT8168, MT8188, MT8321, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8797, MT8798
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-53150
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.16% / 37.15%
||
7 Day CHG~0.00%
Published-24 Dec, 2024 | 11:28
Updated-30 Jul, 2025 | 01:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2025-04-30||Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
ALSA: usb-audio: Fix out of bounds reads when finding clock sources

In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix out of bounds reads when finding clock sources The current USB-audio driver code doesn't check bLength of each descriptor at traversing for clock descriptors. That is, when a device provides a bogus descriptor with a shorter bLength, the driver might hit out-of-bounds reads. For addressing it, this patch adds sanity checks to the validator functions for the clock descriptor traversal. When the descriptor length is shorter than expected, it's skipped in the loop. For the clock source and clock multiplier descriptors, we can just check bLength against the sizeof() of each descriptor type. OTOH, the clock selector descriptor of UAC2 and UAC3 has an array of bNrInPins elements and two more fields at its tail, hence those have to be checked in addition to the sizeof() check.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinuxKernel
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-2977
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.1||HIGH
EPSS-0.02% / 3.47%
||
7 Day CHG~0.00%
Published-01 Jun, 2023 | 00:00
Updated-09 Jan, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerbility was found in OpenSC. This security flaw cause a buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package. The attacker can supply a smart card package with malformed ASN1 context. The cardos_have_verifyrc_package function scans the ASN1 buffer for 2 tags, where remaining length is wrongly caculated due to moved starting pointer. This leads to possible heap-based buffer oob read. In cases where ASAN is enabled while compiling this causes a crash. Further info leak or more damage is possible.

Action-Not Available
Vendor-opensc_projectn/aRed Hat, Inc.
Product-enterprise_linuxopenscOpenSC
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-50115
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.1||HIGH
EPSS-0.05% / 14.84%
||
7 Day CHG~0.00%
Published-05 Nov, 2024 | 17:10
Updated-04 May, 2025 | 09:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory

In the Linux kernel, the following vulnerability has been resolved: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory Ignore nCR3[4:0] when loading PDPTEs from memory for nested SVM, as bits 4:0 of CR3 are ignored when PAE paging is used, and thus VMRUN doesn't enforce 32-byte alignment of nCR3. In the absolute worst case scenario, failure to ignore bits 4:0 can result in an out-of-bounds read, e.g. if the target page is at the end of a memslot, and the VMM isn't using guard pages. Per the APM: The CR3 register points to the base address of the page-directory-pointer table. The page-directory-pointer table is aligned on a 32-byte boundary, with the low 5 address bits 4:0 assumed to be 0. And the SDM's much more explicit: 4:0 Ignored Note, KVM gets this right when loading PDPTRs, it's only the nSVM flow that is broken.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-46723
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.1||HIGH
EPSS-0.06% / 18.32%
||
7 Day CHG~0.00%
Published-18 Sep, 2024 | 06:32
Updated-04 May, 2025 | 09:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
drm/amdgpu: fix ucode out-of-bounds read warning

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix ucode out-of-bounds read warning Clear warning that read ucode[] may out-of-bounds.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-47028
Matching Score-4
Assigner-Google Devices
ShareView Details
Matching Score-4
Assigner-Google Devices
CVSS Score-5.1||MEDIUM
EPSS-0.01% / 0.52%
||
7 Day CHG~0.00%
Published-25 Oct, 2024 | 10:34
Updated-28 Oct, 2024 | 17:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ffu_flash_pack of ffu.c, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroidpixel
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2024-46731
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.1||HIGH
EPSS-0.05% / 14.07%
||
7 Day CHG~0.00%
Published-18 Sep, 2024 | 06:32
Updated-04 May, 2025 | 09:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
drm/amd/pm: fix the Out-of-bounds read warning

In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: fix the Out-of-bounds read warning using index i - 1U may beyond element index for mc_data[] when i = 0.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-25600
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.1||HIGH
EPSS-0.07% / 22.90%
||
7 Day CHG~0.00%
Published-03 Aug, 2023 | 00:00
Updated-17 Oct, 2024 | 20:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in InsydeH2O. A malicious operating system can tamper with a runtime-writable EFI variable, leading to out-of-bounds memory reads and a denial of service. This is fixed in version 01.01.04.0016.

Action-Not Available
Vendor-n/aInsyde Software Corp. (ISC)
Product-insydecrpkgn/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-46954
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.1||HIGH
EPSS-0.02% / 3.03%
||
7 Day CHG~0.00%
Published-27 Feb, 2024 | 18:46
Updated-04 May, 2025 | 07:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
net/sched: sch_frag: fix stack OOB read while fragmenting IPv4 packets

In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_frag: fix stack OOB read while fragmenting IPv4 packets when 'act_mirred' tries to fragment IPv4 packets that had been previously re-assembled using 'act_ct', splats like the following can be observed on kernels built with KASAN: BUG: KASAN: stack-out-of-bounds in ip_do_fragment+0x1b03/0x1f60 Read of size 1 at addr ffff888147009574 by task ping/947 CPU: 0 PID: 947 Comm: ping Not tainted 5.12.0-rc6+ #418 Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014 Call Trace: <IRQ> dump_stack+0x92/0xc1 print_address_description.constprop.7+0x1a/0x150 kasan_report.cold.13+0x7f/0x111 ip_do_fragment+0x1b03/0x1f60 sch_fragment+0x4bf/0xe40 tcf_mirred_act+0xc3d/0x11a0 [act_mirred] tcf_action_exec+0x104/0x3e0 fl_classify+0x49a/0x5e0 [cls_flower] tcf_classify_ingress+0x18a/0x820 __netif_receive_skb_core+0xae7/0x3340 __netif_receive_skb_one_core+0xb6/0x1b0 process_backlog+0x1ef/0x6c0 __napi_poll+0xaa/0x500 net_rx_action+0x702/0xac0 __do_softirq+0x1e4/0x97f do_softirq+0x71/0x90 </IRQ> __local_bh_enable_ip+0xdb/0xf0 ip_finish_output2+0x760/0x2120 ip_do_fragment+0x15a5/0x1f60 __ip_finish_output+0x4c2/0xea0 ip_output+0x1ca/0x4d0 ip_send_skb+0x37/0xa0 raw_sendmsg+0x1c4b/0x2d00 sock_sendmsg+0xdb/0x110 __sys_sendto+0x1d7/0x2b0 __x64_sys_sendto+0xdd/0x1b0 do_syscall_64+0x33/0x40 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f82e13853eb Code: 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 f3 0f 1e fa 48 8d 05 75 42 2c 00 41 89 ca 8b 00 85 c0 75 14 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 75 c3 0f 1f 40 00 41 57 4d 89 c7 41 56 41 89 RSP: 002b:00007ffe01fad888 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 00005571aac13700 RCX: 00007f82e13853eb RDX: 0000000000002330 RSI: 00005571aac13700 RDI: 0000000000000003 RBP: 0000000000002330 R08: 00005571aac10500 R09: 0000000000000010 R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe01faefb0 R13: 00007ffe01fad890 R14: 00007ffe01fad980 R15: 00005571aac0f0a0 The buggy address belongs to the page: page:000000001dff2e03 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x147009 flags: 0x17ffffc0001000(reserved) raw: 0017ffffc0001000 ffffea00051c0248 ffffea00051c0248 0000000000000000 raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff888147009400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff888147009480: f1 f1 f1 f1 04 f2 f2 f2 f2 f2 f2 f2 00 00 00 00 >ffff888147009500: 00 00 00 00 00 00 00 00 00 00 f2 f2 f2 f2 f2 f2 ^ ffff888147009580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff888147009600: 00 00 00 00 00 00 00 00 00 00 00 00 00 f2 f2 f2 for IPv4 packets, sch_fragment() uses a temporary struct dst_entry. Then, in the following call graph: ip_do_fragment() ip_skb_dst_mtu() ip_dst_mtu_maybe_forward() ip_mtu_locked() the pointer to struct dst_entry is used as pointer to struct rtable: this turns the access to struct members like rt_mtu_locked into an OOB read in the stack. Fix this changing the temporary variable used for IPv4 packets in sch_fragment(), similarly to what is done for IPv6 few lines below.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-42516
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-4.4||MEDIUM
EPSS-0.05% / 14.64%
||
7 Day CHG~0.00%
Published-16 Dec, 2022 | 00:00
Updated-17 Apr, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ProtocolSimBuilderLegacy::BuildSimGetGbaAuth of protocolsimbuilderlegacy.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241763577References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-42512
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-4.4||MEDIUM
EPSS-0.05% / 14.64%
||
7 Day CHG~0.00%
Published-16 Dec, 2022 | 00:00
Updated-18 Apr, 2025 | 13:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In VsimOperationDataExt::encode of vsimdata.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241763050References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-42522
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-4.4||MEDIUM
EPSS-0.03% / 8.27%
||
7 Day CHG~0.00%
Published-16 Dec, 2022 | 00:00
Updated-17 Apr, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In DoSetCarrierConfig of miscservice.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-243130038References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2019-10625
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.1||HIGH
EPSS-0.04% / 12.05%
||
7 Day CHG~0.00%
Published-16 Apr, 2020 | 10:46
Updated-04 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of bound access in diag services when DCI command buffer reallocation is not done properly with required capacity in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8009, APQ8096AU, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, QCS605, Rennell, SC8180X, SDM429W, SDM710, SDX55, SM7150, SM8150

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-mdm9206mdm9207csc8180xmdm9640_firmwaresm8150_firmwareapq8096ausdm429wrennellrennell_firmwaremdm9206_firmwaremdm9607_firmwareqcs605mdm9650sc8180x_firmwaresdx55sm7150_firmwareapq8096au_firmwaresdm710mdm9607mdm9650_firmwaresdm429w_firmwaresm8150sdm710_firmwaresdx55_firmwaresm7150apq8009_firmwareapq8009qcs605_firmwaremdm9207c_firmwaremdm9640Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-14377
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.1||HIGH
EPSS-0.08% / 24.58%
||
7 Day CHG~0.00%
Published-30 Sep, 2020 | 18:53
Updated-04 Aug, 2024 | 12:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A complete lack of validation of attacker-controlled parameters can lead to a buffer over read. The results of the over read are then written back to the guest virtual machine memory. This vulnerability can be used by an attacker in a virtual machine to read significant amounts of host memory. The highest threat from this vulnerability is to data confidentiality and system availability.

Action-Not Available
Vendor-dpdkn/aCanonical Ltd.openSUSE
Product-ubuntu_linuxdata_plane_development_kitleapdpdk
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-41577
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-7.1||HIGH
EPSS-0.03% / 7.77%
||
7 Day CHG~0.00%
Published-14 Oct, 2022 | 00:00
Updated-14 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The kernel server has a vulnerability of not verifying the length of the data transferred in the user space.Successful exploitation of this vulnerability may cause out-of-bounds read in the kernel, which affects the device confidentiality and availability.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-harmonyosemuiHarmonyOSEMUI
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-40135
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-4.4||MEDIUM
EPSS-0.04% / 12.32%
||
7 Day CHG~0.00%
Published-30 Jan, 2023 | 21:20
Updated-27 Mar, 2025 | 15:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An information leak vulnerability in the Smart USB Protection SMI Handler in some Lenovo models may allow an attacker with local access and elevated privileges to read SMM memory.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinkcentre_m70q_firmwarev330-20icbthinkcentre_e75_t\/sthinkcentre_m720eideacentre_a340-24igmthinksmart_core_device\thinkstation_p350_tiny_firmwarethinkcentre_m70t_gen_3thinkcentre_m90q_gen_2thinkcentre_e96zthinkcentre_m818z_firmwarethinkcentre_m720qideacentre_5_14iab7_firmwarev55t_gen_2_13acnthinkstation_p520yta8900fthinkcentre_m710ev50t-13imbthinkstation_p310ideacentre_5-14are05v530-22icbv330-20icb_firmwareideacentre_510-15ick_firmwareideacentre_gaming_5_17acn7_firmwarethinkcentre_m70c_firmwarev530s-07icb_firmwarev55t_gen_2_13acn_firmwarethinkstation_p340ideacentre_5-14iob6_firmwarethinkcentre_m715t_firmwarethinkcentre_m920tthinkcentre_m710tideacentre_510a-15ickthinkstation_p620thinkstation_p318_firmwarethinkstation_p350thinkcentre_m720tlegion_c530-19icb_firmwarelegion_t530-28icbthinksmart_core_\&_controller_full_room_kit\ideacentre_5-14are05_firmwareqt_m415_firmwareideacentre_510s-07icb_firmwarethinkcentre_m75s-1stadia_ggp-120thinkcentre_m70q_gen_2_firmwarev50s-07imbthinkcentre_m75s_gen_2thinkstation_p340_firmwareideacentre_5-14acn6_firmwareideacentre_gaming_5-14acn6thinkcentre_m625q_firmwarethinkstation_p520c_firmwareqt_b415_firmwarethinkcentre_m75t_gen_2_firmwarethinkcentre_m910x_firmwarethinkcentre_m910s_firmwarethinkcentre_m75q-1yangtian_afq150_firmwarev50t-13iob_g2ideacentre_gaming_5-14iob6v520sthinkcentre_neo_50t_gen_3ideacentre_g5-14imb05thinkcentre_m70a_gen_2_firmwareideacentre_t540-15ama_gthinksmart_core_\&_controller_kit\thinkcentre_m910q_firmwarethinkstation_p350_tinythinkcentre_m720s_firmwarelegion_t530-28aprthinkcentre_m70q_gen_2thinkcentre_m75s_gen_2_firmwareqt_m410_firmwarethinkcentre_m920q_firmwarethinkcentre_m920sideacentre_a340-24igm_firmwareideacentre_510s-07icbthinksystem_st58_firmwarethinkcentre_m710q_firmwarethinkcentre_m818zqt_m415v520thinkstation_p318ideacentre_t540-15ama_g_firmwarethinksmart_core_device_for_polyideacentre_g5-14amr05_firmwarethinkcentre_m75n_firmwarethinkcentre_m910qthinkcentre_m6600t_firmwarethinkcentre_m720sideacentre_720-18apr_firmwarethinkcentre_m715q_firmwarethinksmart_hub_teamsthinkcentre_m920t_firmwarethinkcentre_m810zthinksmart_core_device_for_logitechthinkcentre_m75nthinksmart_hub_zoomthinkcentre_m810z_firmwarelegion_t5-26iob6_firmwarethinkcentre_m710qthinkcentre_m60e_tinythinkcentre_m70t_gen_3_firmwareideacentre_3-07ada05thinkcentre_m710e_firmwarev530-15icbthinkcentre_m6600sstadia_ggp-120_firmwarethinkcentre_m60e_tiny_firmwarethinkcentre_m70q_gen_3_firmwarethinkcentre_m75s-1_firmwarelegion_t5-28icb05_firmwarev35s-07ada_firmwarethinksmart_core_device_for_poly_firmwarev520_firmwareideacentre_720-18aprlegion_t5-28icb05thinkcentre_m70av530s-07icr_firmwareideacentre_510-15ickthinkcentre_m6600qideacentre_3-07ada05_firmwarev55t-15areyoga_a940-27icb_firmwarev530s-07icrthinkcentre_m75q-1_firmwarev50t-13imb_firmwareideacentre_gaming_5_17iab7thinkcentre_m820zideacentre_3-07imb05_firmwarev50t-13iob_g2_firmwareqitian_a815_firmwarethinkcentre_m70q_gen_3ideacentre_t540-15ick_firmwareideacentre_g5-14amr05yta8900f_firmwareideacentre_gaming_5-14iob6_firmwarethinkcentre_m910tv540-24iwlthinkcentre_m920x_firmwarev530-15arr_firmwarethinkcentre_m920qthinksmart_hub_teams_firmwarethinkcentre_m720t_firmwarethinkstation_p320_tinythinkcentre_e75_t\/s_firmwarethinkcentre_m90q_tiny_firmwareideacentre_3_07iab7_firmwareideacentre_g5-14imb05_firmwarethinkcentre_neo_50s_gen_3thinkcentre_m6600tthinkcentre_m70qthinkstation_p330_tiny_firmwarev35s-07adathinkcentre_m630eideacentre_510a-15arrthinkcentre_m625qthinkcentre_m90a_gen2v530-15arrthinkstation_p310_firmwarethinkcentre_neo_50s_gen_3_firmwarethinkcentre_e96z_firmwareideacentre_5-14iob6v50a-24imb_firmwarev530-15icb_firmwareideacentre_510s-07ick_firmwarelegion_t530-28icb_firmwarethinkcentre_m715qideacentre_510a-15arr_firmwarethinkcentre_m70s_gen_3_firmwarethinkcentre_m70a_firmwarethinkedge_se30_firmwarev530-15icrv530s-07icbv50a-22imbyangtian_afq150v50a-24imbv530-22icb_firmwarethinkstation_p330_tinyideacentre_creator_5-14iob6legion_t530-28apr_firmwarethinkcentre_m70a_gen_2ideacentre_5-14imb05legion_c530-19icbthinksystem_st50thinkcentre_m90a_firmwarethinkcentre_m920s_firmwareideacentre_510s-07ickthinkcentre_m710s_firmwarethinkcentre_m610v55t-15are_firmwarelegion_t5-26iob6thinkcentre_m90q_tinylegion_t7-34imz5_firmwarethinkcentre_m920xv530-15icr_firmwarethinkstation_p620_firmwarev55t-15api_firmwareqt_m410ideacentre_a340-22igmthinkstation_p340_tinyv30a-24imlthinkstation_p520_firmwarethinksmart_core_device_for_logitech_firmwarethinkcentre_m910xthinkcentre_m80q_firmwarethinkcentre_m6600s_firmwarethinkcentre_m630e_firmwarethinkcentre_m910sv530-24icb_firmwareideacentre_gaming_5_17acn7ideacentre_3_07iab7thinkstation_p348thinkcentre_neo_50t_gen_3_firmwarethinkcentre_m6600q_firmwarethinkcentre_m710t_firmwareideacentre_t540-15ickqitian_a815thinkcentre_m720e_firmwarethinkcentre_m80qthinkedge_se30ideacentre_5_14iab7thinkcentre_m725sqt_b415legion_t7-34imz5v30a-24iml_firmwarethinkcentre_m725s_firmwarethinkcentre_m70cthinksystem_st50_firmwarev520s_firmwarethinkcentre_m75q_gen_2thinkcentre_m90athinkstation_p350_firmwarethinkstation_p320_tiny_firmwarethinksystem_st58ideacentre_c5-14imb05thinkcentre_m70s_gen_3v50a-22imb_firmwarethinkcentre_m90q_gen_2_firmwarev50s-07imb_firmwarev530-24icbv30a-22imlthinkstation_p340_tiny_firmwarethinkcentre_m90a_gen2_firmwareideacentre_c5-14imb05_firmwareyoga_a940-27icbthinkcentre_m610_firmwarev30a-22iml_firmwarethinkcentre_m820z_firmwarethinksmart_hub_zoom_firmwarev540-24iwl_firmwarethinkcentre_m75q_gen_2_firmwarev55t-15apiideacentre_5-14imb05_firmwarethinkcentre_m715tthinkstation_p348_firmwareideacentre_510a-15ick_firmwarethinkcentre_m910t_firmwarethinkcentre_m710sideacentre_a340-22igm_firmwareideacentre_5-14acn6ideacentre_3-07imb05ideacentre_gaming_5_17iab7_firmwareideacentre_gaming_5-14acn6_firmwarethinkcentre_m75t_gen_2ideacentre_creator_5-14iob6_firmwarethinkcentre_m720q_firmwarethinkstation_p520cBIOS
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-9408
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5.5||MEDIUM
EPSS-0.03% / 5.13%
||
7 Day CHG~0.00%
Published-04 Dec, 2024 | 23:34
Updated-19 Dec, 2024 | 16:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In m3326_gps_write and m3326_gps_read of gps.s, there is a possible Out Of Bounds Read due to a missing bounds check. This could lead to a local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-40136
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-4.4||MEDIUM
EPSS-0.04% / 12.32%
||
7 Day CHG~0.00%
Published-30 Jan, 2023 | 21:20
Updated-27 Mar, 2025 | 15:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An information leak vulnerability in SMI Handler used to configure platform settings over WMI in some Lenovo models may allow an attacker with local access and elevated privileges to read SMM memory.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinkcentre_m70q_firmwarev330-20icbthinkcentre_e75_t\/sthinkcentre_m720eideacentre_a340-24igmthinksmart_core_device\thinkstation_p350_tiny_firmwarethinkcentre_m70t_gen_3thinkcentre_m90q_gen_2thinkcentre_e96zthinkcentre_m818z_firmwarethinkcentre_m720qideacentre_5_14iab7_firmwarev55t_gen_2_13acnthinkstation_p520yta8900fthinkcentre_m710ev50t-13imbthinkstation_p310ideacentre_5-14are05v530-22icbv330-20icb_firmwareideacentre_510-15ick_firmwareideacentre_gaming_5_17acn7_firmwarethinkcentre_m70c_firmwarev530s-07icb_firmwarev55t_gen_2_13acn_firmwarethinkstation_p340ideacentre_5-14iob6_firmwarethinkcentre_m715t_firmwarethinkcentre_m920tthinkcentre_m710tideacentre_510a-15ickthinkstation_p620thinkstation_p318_firmwarethinkstation_p350thinkcentre_m720tlegion_c530-19icb_firmwarelegion_t530-28icbthinkcentre_m90sthinksmart_core_\&_controller_full_room_kit\ideacentre_5-14are05_firmwareqt_m415_firmwareideacentre_510s-07icb_firmwarethinkcentre_m75s-1stadia_ggp-120thinkcentre_m70q_gen_2_firmwarev50s-07imbthinkcentre_m75s_gen_2thinkstation_p340_firmwareideacentre_5-14acn6_firmwareideacentre_gaming_5-14acn6thinkcentre_m70tthinkcentre_m625q_firmwarethinkstation_p520c_firmwareqt_b415_firmwarethinkcentre_m75t_gen_2_firmwarethinkcentre_m910x_firmwarethinkcentre_m910s_firmwarethinkcentre_m75q-1yangtian_afq150_firmwarev50t-13iob_g2thinkcentre_m900xideacentre_gaming_5-14iob6v520sthinkcentre_neo_50t_gen_3thinkstation_p720_firmwarethinkcentre_m70a_gen_2_firmwareideacentre_g5-14imb05ideacentre_t540-15ama_gthinksmart_core_\&_controller_kit\thinkcentre_m910q_firmwarethinkstation_p350_tinythinkcentre_m720s_firmwarelegion_t530-28aprthinkcentre_m70q_gen_2thinkcentre_m75s_gen_2_firmwareqt_m410_firmwarethinkcentre_m920q_firmwarethinkcentre_m920sideacentre_a340-24igm_firmwareideacentre_510s-07icbthinksystem_st58_firmwarethinkcentre_m710q_firmwarethinkcentre_m818zqt_m415v520thinkstation_p318ideacentre_t540-15ama_g_firmwarethinksmart_core_device_for_polyideacentre_g5-14amr05_firmwarethinkcentre_m75n_firmwarethinkcentre_m910qthinkcentre_m6600t_firmwarethinkcentre_m720sideacentre_720-18apr_firmwarethinkcentre_m715q_firmwarethinksmart_hub_teamsthinkcentre_m920t_firmwarethinkcentre_m810zthinksmart_core_device_for_logitechthinkcentre_m75nthinksmart_hub_zoomthinkcentre_m810z_firmwarelegion_t5-26iob6_firmwarethinkcentre_m710qthinkcentre_m60e_tinythinkcentre_m70t_gen_3_firmwareideacentre_3-07ada05thinkcentre_m710e_firmwarethinkcentre_m900_firmwarev530-15icbthinkcentre_m6600sstadia_ggp-120_firmwarethinkcentre_m60e_tiny_firmwarethinkcentre_m70q_gen_3_firmwarethinkcentre_m75s-1_firmwarelegion_t5-28icb05_firmwarev35s-07ada_firmwarethinksmart_core_device_for_poly_firmwarethinkcentre_m70sv520_firmwareideacentre_720-18aprlegion_t5-28icb05thinkcentre_m70av530s-07icr_firmwareideacentre_510-15ickthinkcentre_m6600qideacentre_3-07ada05_firmwarev55t-15areyoga_a940-27icb_firmwarev530s-07icrthinkcentre_m75q-1_firmwarev50t-13imb_firmwareideacentre_gaming_5_17iab7thinkcentre_m820zideacentre_3-07imb05_firmwarev50t-13iob_g2_firmwareqitian_a815_firmwarethinkcentre_m70q_gen_3ideacentre_t540-15ick_firmwareideacentre_g5-14amr05yta8900f_firmwareideacentre_gaming_5-14iob6_firmwarethinkcentre_m80t_firmwarethinkcentre_m910tthinkcentre_m80s_firmwarev540-24iwlthinkcentre_m920x_firmwarev530-15arr_firmwarethinkcentre_m920qthinksmart_hub_teams_firmwarethinkcentre_m720t_firmwarethinkcentre_m70s_firmwarethinkstation_p320_tinythinkcentre_m800thinkcentre_e75_t\/s_firmwarethinkcentre_m90q_tiny_firmwarethinkcentre_m900ideacentre_3_07iab7_firmwareideacentre_g5-14imb05_firmwarethinkcentre_neo_50s_gen_3thinkcentre_m6600tthinkcentre_m70qthinkstation_p330_tiny_firmwarev35s-07adathinkcentre_m630eideacentre_510a-15arrthinkcentre_m625qthinkcentre_m90a_gen2v530-15arrthinkstation_p310_firmwarethinkcentre_neo_50s_gen_3_firmwarethinkcentre_e96z_firmwareideacentre_5-14iob6v50a-24imb_firmwarev530-15icb_firmwareideacentre_510s-07ick_firmwarelegion_t530-28icb_firmwarethinkcentre_m715qideacentre_510a-15arr_firmwarethinkcentre_m70s_gen_3_firmwarethinkcentre_m70a_firmwarethinkedge_se30_firmwarev530-15icrv530s-07icbv50a-22imbyangtian_afq150v50a-24imbv530-22icb_firmwarethinkstation_p330_tinyideacentre_creator_5-14iob6legion_t530-28apr_firmwarethinkcentre_m70a_gen_2ideacentre_5-14imb05legion_c530-19icbthinkcentre_m80tthinksystem_st50thinkcentre_m90a_firmwarethinkcentre_m920s_firmwareideacentre_510s-07ickthinkstation_p720thinkcentre_m710s_firmwarethinkcentre_m610v55t-15are_firmwarelegion_t5-26iob6thinkstation_p920_firmwarethinkcentre_m90q_tinylegion_t7-34imz5_firmwarethinkcentre_m920xthinkcentre_m70t_firmwarev530-15icr_firmwarethinkstation_p620_firmwarev55t-15api_firmwareqt_m410ideacentre_a340-22igmthinkstation_p340_tinyv30a-24imlthinkstation_p520_firmwarethinksmart_core_device_for_logitech_firmwarethinkcentre_m80sthinkcentre_m910xthinkcentre_m80q_firmwarethinkcentre_m6600s_firmwarethinkcentre_m90s_firmwarethinkcentre_m630e_firmwarethinkstation_p320thinkcentre_m910sv530-24icb_firmwareideacentre_gaming_5_17acn7thinkstation_p320_firmwareideacentre_3_07iab7thinkstation_p348thinkcentre_neo_50t_gen_3_firmwarethinkcentre_m6600q_firmwarethinkcentre_m710t_firmwareideacentre_t540-15ickqitian_a815thinkcentre_m720e_firmwarethinkcentre_m80qthinkedge_se30ideacentre_5_14iab7thinkcentre_m800_firmwarethinkcentre_m725sqt_b415legion_t7-34imz5v30a-24iml_firmwarethinkcentre_m725s_firmwarethinkcentre_m70cthinksystem_st50_firmwarev520s_firmwarethinkcentre_m75q_gen_2thinkcentre_m90athinkstation_p350_firmwarethinkstation_p320_tiny_firmwarethinksystem_st58ideacentre_c5-14imb05thinkcentre_m70s_gen_3v50a-22imb_firmwarethinkcentre_m90q_gen_2_firmwarethinkstation_p920thinkcentre_m900x_firmwarev50s-07imb_firmwarev530-24icbv30a-22imlthinkstation_p340_tiny_firmwarethinkcentre_m90a_gen2_firmwareideacentre_c5-14imb05_firmwareyoga_a940-27icbthinkcentre_m610_firmwarev30a-22iml_firmwarethinkcentre_m820z_firmwarethinksmart_hub_zoom_firmwarev540-24iwl_firmwarethinkcentre_m75q_gen_2_firmwarev55t-15apiideacentre_5-14imb05_firmwarethinkcentre_m715tthinkstation_p348_firmwareideacentre_510a-15ick_firmwarethinkcentre_m910t_firmwarethinkcentre_m710sideacentre_a340-22igm_firmwareideacentre_5-14acn6ideacentre_3-07imb05ideacentre_gaming_5_17iab7_firmwareideacentre_gaming_5-14acn6_firmwarethinkcentre_m75t_gen_2ideacentre_creator_5-14iob6_firmwarethinkcentre_m720q_firmwarethinkstation_p520cBIOS
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-40134
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-4.4||MEDIUM
EPSS-0.04% / 12.32%
||
7 Day CHG~0.00%
Published-30 Jan, 2023 | 21:20
Updated-27 Mar, 2025 | 15:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An information leak vulnerability in the SMI Set BIOS Password SMI Handler in some Lenovo models may allow an attacker with local access and elevated privileges to read SMM memory.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinkpad_t14sv330-20icbthinksystem_sr530_firmwarethinkagile_hx5530thinkpad_e490thinkstation_p350_tiny_firmwarethinkcentre_m90q_gen_2v55t_gen_2_13acnthinkpad_p53yta8900fthinkpad_x1_yoga_5th_genthinkpad_p72_firmwarethinkpad_r14_gen_2thinkagile_vx3320_firmwarethinkagile_hx2330thinkagile_vx7820thinkpad_l590thinksystem_sn850thinkpad_p52thinkagile_vx3320ideacentre_5-14are05thinkcentre_m810z_all-in-onethinkagile_hx2320_firmwarethinksystem_hr630x_firmwarethinkagile_vx_2u4nthinkcentre_m70c_firmwarev530s-07icb_firmwarethinksystem_sr630_v2thinkagile_hx7820_firmwarev55t_gen_2_13acn_firmwarethinkpad_t14s_firmwarethinksystem_sn850_firmwarethinkstation_p340thinkagile_vx_4u_firmwareideacentre_5-14iob6_firmwarethinkstation_p318_firmwarethinkserver_ts560_firmwarethinkagile_vx2320_firmwarethinksystem_sr250_v2_firmwarelegion_t530-28icbthinkcentre_m90sthinkserver_rd450_firmwareideacentre_5-14are05_firmwareideacentre_510s-07icb_firmwarethinkserver_sr588_firmwarethinkpad_t15_firmwarethinksystem_sr670_v2_firmwarethinkcentre_m75s_gen_2thinksystem_sr670_v2thinkagile_mx3331-f_firmwarethinkagile_hx2320-e_firmwarethinkcentre_m625q_firmwarethinkagile_hx3331thinkagile_vx5520thinkserver_rd350g_firmwarethinkserver_sd350_firmwarethinkserver_ts150thinkpad_x1_carbon_8th_genthinkagile_hx2321_firmwarethinksystem_sr860_v2_firmwareqt_b415_firmwarethinkcentre_m910x_firmwarethinkcentre_m910s_firmwareyangtian_afq150_firmwareideacentre_g5-14imb05thinkcentre_m70a_gen_2_firmwarethinkagile_mx3530_f_firmwarethinksystem_st258_firmwarethinkagile_hx3376_firmwarethinkpad_p52_firmwarethinkagile_hx7821_firmwarethinkcentre_m90t_firmwarethinkagile_vx_2u4n_firmwarelegion_t530-28aprthinkcentre_m70q_gen_2thinkagile_hx2330_firmwarethinkagile_hx1321thinkagile_mx_certified_node_-_hybrid_firmwarethinksystem_sd650-n_v2_firmwarethinkstation_p318thinksystem_st558_firmwareideacentre_g5-14amr05_firmwarethinkcentre_m75n_firmwarethinkcentre_m6600t_firmwarethinkcentre_m8600s_firmwarethinkcentre_m715q_firmwarethinksmart_hub_teamsthinkagile_hx3520-gthinkpad_x1_extreme_1st_genthinkcentre_m75nthinksystem_sr860legion_t5-26iob6_firmwarethinkcentre_m710qthinkcentre_m60e_tinythinkcentre_m70t_gen_3_firmwarethinkcentre_m710e_firmwarev530-15icbthinkagile_hx5530_firmwarethinkcentre_e75sthinkserver_sd350legion_t5-28icb05_firmwarethinkpad_p15s_gen_2_firmwarethinksystem_sd650_v2thinkcentre_m70sthinksystem_sr650_v2thinkserver_rd350_firmwarev520_firmwarethinkpad_p1_gen_3_firmwarethinkagile_mx3321_h_firmwarelegion_t5-28icb05thinkagile_mx3530_fthinkagile_hx1520-rthinkcentre_m70athinksystem_sd630_v2thinkagile_vx_1se_firmwarethinkcentre_m6600qthinkagile_mx1021ideacentre_3-07ada05_firmwareyoga_a940-27icb_firmwarethinkagile_hx2331thinkagile_hx2320-ethinkagile_vx5530v50t-13iob_g2_firmwarethinkpad_t15_gen_2thinkserver_sr860p_firmwarethinkserver_rd550_firmwarethinkcentre_m70q_gen_3thinkagile_vx1320thinksystem_sr950_firmwarethinkcentre_m80t_firmwarethinkcentre_m90a_gen_2thinkpad_p53s_firmwarethinkagile_hx3376v540-24iwlthinkagile_vx3530-gthinksystem_sd650_dwc_dual_node_traythinkagile_mx3531-fthinkpad_l13_yoga_firmwarethinksystem_sr570_firmwarethinksystem_sr158thinkcentre_m90q_tiny_firmwareideacentre_g5-14imb05_firmwarethinkcentre_m6600tthinkpad_t590thinksystem_st250thinkpad_x1_carbon_9th_gen_firmwarethinksystem_sr850thinkpad_x1_carbon_8th_gen_firmwarethinkagile_hx7530_firmwarethinksmart_hub_500thinkagile_hx5520thinkagile_vx7530_firmwarethinkcentre_m630ethinkpad_r14_gen_2_firmwarev530-15arrthinkstation_p310_firmwarethinkserver_ts450thinkpad_x1_carbon_7th_gen_firmwarethinksystem_sr950thinkcentre_e96z_firmwarethinkpad_l390_yoga_firmwarethinkagile_vx7520_nthinksystem_sr860_firmwarethinksystem_sr650_v2_firmwarethinkagile_mx_certified_node_-_all_flash_firmwarethinkpad_t14_gen_2_firmwarethinkagile_hx3720thinkagile_mx3321_hthinksystem_sd530thinkcentre_m90tthinkcentre_m715qthinksystem_st650_v2thinksystem_sr258_v2thinkcentre_m70s_gen_3_firmwarethinkedge_se30_firmwarethinkagile_hx1021v530-15icrthinksystem_hr610xthinkagile_vx3330thinkagile_mx3330-h_firmwarethinkpad_x1_yoga_6th_gen_firmwarethinkagile_hx3331_firmwarethinkpad_p15s_gen_1_firmwarethinkpad_x1_extreme_2nd_genthinksystem_st250_firmwarev50a-24imbthinksystem_hr610x_firmwarethinkpad_x390_yoga_firmwarethinkpad_p15v_gen_1legion_t530-28apr_firmwarethinkpad_t590_firmwarethinkserver_ts550legion_c530-19icbthinkpad_l490_firmwarethinkcentre_m90a_firmwarethinkagile_hx1331thinkagile_hx2320thinkagile_hx7521thinksystem_sr550thinkcentre_m8600sthinkagile_vx3520-g_firmwarethinkserver_rd650thinkagile_mx3530-hthinkagile_vx_2u_firmwarethinkpad_x13_gen_2thinkserver_rs160thinksystem_st250_v2thinkagile_hx2321ideacentre_510s-07ickthinkagile_mx3330-f_firmwarethinkpad_l15_gen_2_firmwarethinksystem_dx8200d_firmwarethinkagile_hx1320thinkcentre_m710s_firmwarethinkagile_hx1321_firmwarethinkpad_l14_gen_2_firmwarethinkpad_e590thinkpad_t15p_gen_1_legion_t5-26iob6thinkagile_hx1320_firmwarethinksystem_sn550_v2thinkpad_s3_2nd_gen_firmwarethinkagile_hx3521-gthinkcentre_m90q_tinylegion_t7-34imz5_firmwarethinkcentre_m70t_firmwarethinkpad_t15v530-15icr_firmwarethinkpad_x1_extreme_3rd_genthinkserver_ts150_firmwarethinkstation_p620_firmwarethinksystem_st650_v2_firmwarethinkpad_p14s_gen_2_firmwareqt_m410thinkagile_vx2330ideacentre_a340-22igmthinkcentre_m820z_all-in-onethinkpad_p15s_gen_1thinksystem_st550thinkpad_t14s_gen_2thinksystem_hr650x_firmwarethinkserver_td350_firmwarethinksystem_st658_v2_firmwarev30a-24imlthinkserver_rd450thinkcentre_m80sthinksystem_sr250_v2thinkagile_mx3520_hthinkcentre_m630e_firmwarethinkagile_mx3530-h_firmwarethinksystem_st250_v2_firmwarev530-24icb_firmwareideacentre_gaming_5_17acn7thinkstation_p348thinksystem_sr650_firmwarethinkserver_rd650_firmwarethinkcentre_m710t_firmwarethinkpad_p43sqitian_a815thinkagile_hx7530thinksystem_sr530thinkcentre_m720e_firmwarethinkcentre_m80qthinkpad_l390_firmwarethinkpad_t14_gen_2thinkedge_se30thinkagile_mx3520_fn4610_storage_firmwareqt_b415thinkagile_hx7821thinkagile_hx5521_firmwarelegion_t7-34imz5v30a-24iml_firmwarethinkagile_hx1021_firmwarethinkcentre_m70cthinkpad_x13_gen_2_firmwarethinkagile_vx3331v520s_firmwarethinksystem_st258_v2thinkagile_vx7820_firmwarethinkagile_hx5520-c_firmwarethinkcentre_m75q_gen_2thinkcentre_m90athinkstation_p350_firmwarethinksystem_st58thinkpad_l390ideacentre_c5-14imb05thinkpad_t15_gen_2_firmwarethinkcentre_m70s_gen_3thinkagile_mx3331-hv50s-07imb_firmwarethinksystem_sn550_firmwarethinksystem_sr258_firmwaren4610_storagethinkcentre_m8600t_firmwarethinkpad_l14v30a-22iml_firmwarethinkagile_hx1521-rthinkserver_rd350gthinkagile_hx3320thinkserver_ts460thinkpad_p1_gen_1ideacentre_5-14imb05_firmwarethinkpad_t14_gen_1thinkagile_mx3331-fthinkagile_hx7531_firmwarethinksystem_sr670thinkpad_e14_firmwarethinksystem_sr590ideacentre_a340-22igm_firmwareideacentre_5-14acn6thinkagile_vx2330_firmwarethinkagile_vx3530-g_firmwareideacentre_3-07imb05ideacentre_gaming_5-14acn6_firmwarethinkcentre_m75t_gen_2ideacentre_creator_5-14iob6_firmwarethinkpad_p43s_firmwarethinkserver_sr860pthinkcentre_m70q_firmwarethinkpad_x13_yoga_gen_1thinkagile_mx3520_h_firmwarethinkpad_p17_gen_1thinkcentre_m720eideacentre_a340-24igmthinksystem_sr665_firmwarethinkserver_ts550_firmwarethinksystem_sd630_v2_firmwarethinkserver_rs260_firmwarethinkcentre_m70t_gen_3thinkagile_hx3521-g_firmwarethinkagile_mx3531_h_firmwarethinkcentre_e96zthinkcentre_m818z_firmwareideacentre_5_14iab7_firmwarethinkstation_p520thinksystem_sr158_firmwarethinkpad_x12_detachable_gen_1_firmwarethinkagile_vx_1u_firmwarethinkserver_sr590_firmwarethinkcentre_m710ev50t-13imbthinksystem_dn8836_firmwarethinkagile_vx5520_firmwarethinksystem_st550_firmwarethinkstation_p310v530-22icbthinkpad_x1_yoga_6th_genv330-20icb_firmwareideacentre_gaming_5_17acn7_firmwarethinkpad_e15_firmwarethinkagile_hx5520-cthinkpad_x390thinkstation_p620thinkcentre_m710tthinkstation_p350thinkpad_t15g_gen_1thinkserver_sr590legion_c530-19icb_firmwareqt_m415_firmwarethinkagile_mx3321_fthinkagile_hx3330_firmwarethinkpad_t490_firmwarethinkcentre_m70q_gen_2_firmwarestadia_ggp-120thinksystem_sd650-n_v2v50s-07imbthinkagile_hx3321_firmwarethinkstation_p340_firmwaren3310_storagethinkpad_l390_yogaideacentre_5-14acn6_firmwareideacentre_gaming_5-14acn6thinkcentre_m70tthinkcentre_m90a_gen_2_firmwarethinkpad_t15p_gen_1__firmwarethinkstation_p520c_firmwarethinkagile_mx3330-hthinkagile_vx7530thinkpad_x1_extreme_1st_gen_firmwarethinkpad_x13_firmwarethinksystem_se350_firmwarethinkserver_rs160_firmwarethinkagile_hx3721_firmwarethinksystem_dn8836thinksystem_sr850p_firmwarethinkcentre_m75t_gen_2_firmwarev50t-13iob_g2thinksystem_sr258_v2_firmwarethinkagile_hx3320_firmwarethinkpad_e490sideacentre_gaming_5-14iob6v520sthinkpad_x1_extreme_3rd_gen_firmwaren3310_storage_firmwarethinkpad_l13_yogathinkagile_mx3330-fthinksystem_sd650_dwc_dual_node_tray_firmwarethinksystem_st258_v2_firmwarethinkpad_x1_yoga_4th_genthinkpad_t15g_gen_1_firmwarethinkagile_vx7330_firmwarethinkagile_vx7531_firmwarethinksystem_sr850_firmwarethinkagile_vx3330_firmwarethinkcentre_m910q_firmwarethinkagile_hx7531thinkstation_p350_tinythinkagile_vx7531thinkpad_e15qt_m410_firmwarethinkcentre_m75s_gen_2_firmwarethinksystem_sr850_v2_firmwarethinksystem_st558ideacentre_a340-24igm_firmwareideacentre_510s-07icbthinksystem_st58_firmwarethinkagile_mx1021_firmwarethinkcentre_m710q_firmwarethinkpad_x390_yogathinkcentre_m818zthinkagile_hx7520thinkagile_hx3330qt_m415thinkcentre_m8600tv520thinkagile_mx3331-h_firmwarethinkagile_hx1331_firmwarethinkpad_p14s_gen_1thinkagile_hx3321thinkcentre_m910qthinksystem_sr250thinksystem_sr850_v2thinksystem_se350thinkagile_mx1020_firmwarethinkpad_p1_gen_3thinkpad_l14_gen_2thinksmart_hub_zoomthinkpad_x1_titanium_firmwarethinkagile_hx3720_firmwarethinkpad_t14s_gen_2_firmwareideacentre_3-07ada05thinkcentre_m6600sstadia_ggp-120_firmwarethinkcentre_m60e_tiny_firmwarethinkcentre_m70q_gen_3_firmwarethinkagile_vx_2uv35s-07ada_firmwarethinkcentre_m700qthinkpad_x12_detachable_gen_1thinkagile_mx_certified_node_-_all_flashthinkagile_hx5521-cthinkagile_vx_1uthinkpad_l490thinkagile_vx3720_firmwarethinkagile_hx1520-r_firmwarev530s-07icr_firmwarethinkagile_hx5531thinksystem_sr630_firmwarethinkpad_l590_firmwarethinksystem_sr550_firmwarethinkpad_e15_gen_2_firmwarev530s-07icrthinkpad_e15_gen_2thinkcentre_e75tthinkpad_l15v50t-13imb_firmwareideacentre_gaming_5_17iab7ideacentre_3-07imb05_firmwareqitian_a815_firmwareideacentre_g5-14amr05yta8900f_firmwarethinkpad_x1_titaniumthinksystem_sr645ideacentre_gaming_5-14iob6_firmwarethinkpad_x1_nano_gen_1_firmwarethinkcentre_m80s_firmwarethinkcentre_m910tthinkpad_p14s_gen_2thinksystem_sr630_v2_firmwarethinkpad_p15v_gen_1_firmwarethinkserver_ts250thinkcentre_e75t_firmwarethinkpad_p15_gen_1thinkagile_vx5530_firmwarethinksystem_sr258thinkagile_hx5521thinkagile_mx3531-f_firmwarev530-15arr_firmwarethinksmart_hub_teams_firmwarethinkcentre_m820z_all-in-one_firmwarethinksystem_sr645_firmwarethinksystem_sn550thinkagile_hx3375_firmwarethinkagile_hx3721thinkpad_e590_firmwarethinkcentre_m70s_firmwarethinkstation_p320_tinythinkagile_hx3520-g_firmwareideacentre_3_07iab7_firmwarethinkcentre_neo_50s_gen_3thinkpad_t490thinkcentre_m70qthinkpad_p73_firmwarethinkagile_mx_certified_node_-_hybridv35s-07adathinkagile_vx1320_firmwarethinkpad_x1_carbon_9th_genthinkcentre_m625qthinkpad_x1_carbon_7th_genthinksystem_sr630thinkcentre_neo_50s_gen_3_firmwarethinkagile_vx7320_nthinkpad_x390_firmwarethinksystem_st658_v2thinkagile_hx1521-r_firmwarethinkagile_hx7820thinkagile_vx2320ideacentre_5-14iob6thinkagile_hx7520_firmwarev50a-24imb_firmwarev530-15icb_firmwareideacentre_510s-07ick_firmwarelegion_t530-28icb_firmwarethinksystem_sr860_v2thinkpad_x13thinkpad_e14_gen_2thinkagile_hx7521_firmwarethinkcentre_m70a_firmwarethinkcentre_m700q_firmwarethinkagile_hx3375thinksystem_hr650xv530s-07icbthinkagile_hx2720-e_firmwarethinksystem_dx1100uv50a-22imbyangtian_afq150thinkpad_x13_yoga_gen_1_firmwarev530-22icb_firmwarethinkpad_l15_gen_2thinksmart_hub_500_firmwarethinksystem_sr570thinkcentre_m810z_all-in-one_firmwarethinkagile_vx7520ideacentre_creator_5-14iob6thinkcentre_m70a_gen_2thinkagile_vx_4uideacentre_5-14imb05thinkcentre_m80tthinksystem_st50thinkpad_p1_gen_2_firmwarethinkpad_l13_firmwarethinksystem_st258thinkcentre_m610thinksystem_sr850pthinkserver_td350thinkpad_x1_nano_gen_1thinkagile_hx2331_firmwarethinkpad_p15_gen_1_firmwarethinkstation_p340_tinythinkagile_vx3520-gthinkstation_p520_firmwarethinksystem_sr670_firmwarethinkcentre_m910xthinksystem_sr150thinkcentre_m80q_firmwarethinkagile_vx3720thinksystem_dx1100u_firmwarethinkcentre_m6600s_firmwarethinkcentre_m90s_firmwarethinkpad_p53sthinksystem_sd650_v2_firmwarethinkpad_x13_yoga_gen_2thinkcentre_m910sthinkpad_e14ideacentre_3_07iab7thinkagile_hx2720-ethinkcentre_m6600q_firmwarethinksystem_sn550_v2_firmwarethinkpad_x1_yoga_4th_gen_firmwarethinkserver_sr588thinkpad_l14_firmwarethinkpad_t490s_firmwarethinkagile_hx5520_firmwarethinkpad_p14s_gen_1_firmwareideacentre_5_14iab7thinkagile_mx1020thinkserver_ts250_firmwarethinksystem_sr665thinksystem_sr150_firmwarethinkagile_vx7320_n_firmwarethinkpad_e490s_firmwarethinkpad_p1_gen_2thinkpad_x13_yoga_gen_2_firmwarethinkserver_rs260thinksystem_st50_firmwarethinkpad_e490_firmwarethinkagile_mx3321_f_firmwarethinksystem_dx8200dthinksystem_hr630xthinkagile_mx3520_f_firmwarethinkpad_e14_gen_2_firmwarethinksystem_sd530_firmwarethinkpad_p17_gen_1_firmwarethinkagile_vx_1sethinkstation_p320_tiny_firmwarethinkpad_p53_firmwarev50a-22imb_firmwarethinkcentre_m90q_gen_2_firmwarethinkagile_hx5521-c_firmwarethinkagile_vx7330thinkpad_l15_firmwarev530-24icbv30a-22imlthinkserver_rd350thinkstation_p340_tiny_firmwarethinksystem_sr250_firmwarethinkcentre_e75s_firmwareideacentre_c5-14imb05_firmwareyoga_a940-27icbthinkcentre_m610_firmwarethinkserver_ts450_firmwarethinksmart_hub_zoom_firmwarethinkpad_l13thinkpad_t490sv540-24iwl_firmwarethinkagile_vx7520_n_firmwarethinkpad_p73thinkcentre_m75q_gen_2_firmwarethinkpad_x1_extreme_2nd_gen_firmwarethinkstation_p348_firmwarethinkpad_p72thinkcentre_m910t_firmwarethinkpad_s3_2nd_genthinkcentre_m710sthinkpad_t14_gen_1_firmwarethinkagile_vx3331_firmwarethinkagile_vx7520_firmwarethinkpad_p1_gen_1_firmwarethinkserver_ts460_firmwarethinkpad_x1_yoga_5th_gen_firmwarethinkpad_p15s_gen_2ideacentre_gaming_5_17iab7_firmwarethinkserver_ts560thinkagile_hx5531_firmwarethinkagile_mx3531_hthinksystem_sr650thinksystem_sr590_firmwarethinkstation_p520cthinkserver_rd550BIOS
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-32639
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.02% / 4.38%
||
7 Day CHG~0.00%
Published-03 Jan, 2023 | 00:00
Updated-10 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In watchdog, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07494487; Issue ID: ALPS07494487.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt8362amt8532mt8167sandroidmt6833mt8765mt6771mt6877mt6785mt8786mt6739mt8791mt8167mt8385mt6781mt8518smt6873mt6768mt6853MT6739, MT6768, MT6771, MT6781, MT6785, MT6833, MT6853, MT6873, MT6877, MT8167, MT8167S, MT8362A, MT8385, MT8518S, MT8532, MT8765, MT8786, MT8791
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-32595
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.04% / 10.96%
||
7 Day CHG~0.00%
Published-06 Feb, 2023 | 00:00
Updated-26 Mar, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In widevine, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07446236; Issue ID: ALPS07446236.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt6895mt6769mt8765mt6853tmt6877mt6785mt6781mt6855mt6885mt6889mt6875mt6779mt8768mt8766mt8781mt6833mt6768mt6765androidmt6893mt8786mt8788mt8791mt6883mt6853mt8385mt6762mt8789mt6879mt6789mt6891mt8797mt6873MT6762, MT6765, MT6768, MT6769, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT8385, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8797
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-31612
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-7.1||HIGH
EPSS-0.06% / 18.30%
||
7 Day CHG~0.00%
Published-18 Nov, 2022 | 00:00
Updated-29 Apr, 2025 | 14:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where a local user with basic capabilities can cause an out-of-bounds read, which may lead to a system crash or a leak of internal kernel information.

Action-Not Available
Vendor-Microsoft CorporationNVIDIA Corporation
Product-studiogpu_display_drivervirtual_gpuwindowsteslacloud_gaming_guestgeforceNVIDIA Cloud Gaming (guest driver)
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-21782
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.1||HIGH
EPSS-0.03% / 7.44%
||
7 Day CHG-0.00%
Published-27 Feb, 2025 | 02:18
Updated-04 May, 2025 | 07:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
orangefs: fix a oob in orangefs_debug_write

In the Linux kernel, the following vulnerability has been resolved: orangefs: fix a oob in orangefs_debug_write I got a syzbot report: slab-out-of-bounds Read in orangefs_debug_write... several people suggested fixes, I tested Al Viro's suggestion and made this patch.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-31616
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.06% / 19.19%
||
7 Day CHG~0.00%
Published-18 Nov, 2022 | 00:00
Updated-29 Apr, 2025 | 14:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where a local user with basic capabilities can cause an out-of-bounds read, which may lead to denial of service, or information disclosure.

Action-Not Available
Vendor-Microsoft CorporationNVIDIA Corporation
Product-studiogpu_display_drivervirtual_gpuwindowsteslacloud_gaming_guestgeforceNVIDIA Cloud Gaming (guest driver)
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-21742
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.1||HIGH
EPSS-0.03% / 5.41%
||
7 Day CHG~0.00%
Published-27 Feb, 2025 | 02:12
Updated-04 May, 2025 | 07:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
usbnet: ipheth: use static NDP16 location in URB

In the Linux kernel, the following vulnerability has been resolved: usbnet: ipheth: use static NDP16 location in URB Original code allowed for the start of NDP16 to be anywhere within the URB based on the `wNdpIndex` value in NTH16. Only the start position of NDP16 was checked, so it was possible for even the fixed-length part of NDP16 to extend past the end of URB, leading to an out-of-bounds read. On iOS devices, the NDP16 header always directly follows NTH16. Rely on and check for this specific format. This, along with NCM-specific minimal URB length check that already exists, will ensure that the fixed-length part of NDP16 plus a set amount of DPEs fit within the URB. Note that this commit alone does not fully address the OoB read. The limit on the amount of DPEs needs to be enforced separately.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-21905
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.1||HIGH
EPSS-0.01% / 1.44%
||
7 Day CHG-0.01%
Published-01 Apr, 2025 | 15:40
Updated-04 May, 2025 | 07:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
wifi: iwlwifi: limit printed string from FW file

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: limit printed string from FW file There's no guarantee here that the file is always with a NUL-termination, so reading the string may read beyond the end of the TLV. If that's the last TLV in the file, it can perhaps even read beyond the end of the file buffer. Fix that by limiting the print format to the size of the buffer we have.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-21920
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.1||HIGH
EPSS-0.01% / 1.44%
||
7 Day CHG-0.01%
Published-01 Apr, 2025 | 15:40
Updated-04 May, 2025 | 07:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
vlan: enforce underlying device type

In the Linux kernel, the following vulnerability has been resolved: vlan: enforce underlying device type Currently, VLAN devices can be created on top of non-ethernet devices. Besides the fact that it doesn't make much sense, this also causes a bug which leaks the address of a kernel function to usermode. When creating a VLAN device, we initialize GARP (garp_init_applicant) and MRP (mrp_init_applicant) for the underlying device. As part of the initialization process, we add the multicast address of each applicant to the underlying device, by calling dev_mc_add. __dev_mc_add uses dev->addr_len to determine the length of the new multicast address. This causes an out-of-bounds read if dev->addr_len is greater than 6, since the multicast addresses provided by GARP and MRP are only 6 bytes long. This behaviour can be reproduced using the following commands: ip tunnel add gretest mode ip6gre local ::1 remote ::2 dev lo ip l set up dev gretest ip link add link gretest name vlantest type vlan id 100 Then, the following command will display the address of garp_pdu_rcv: ip maddr show | grep 01:80:c2:00:00:21 Fix the bug by enforcing the type of the underlying device during VLAN device initialization.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-21743
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.1||HIGH
EPSS-0.03% / 5.41%
||
7 Day CHG~0.00%
Published-27 Feb, 2025 | 02:12
Updated-04 May, 2025 | 07:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
usbnet: ipheth: fix possible overflow in DPE length check

In the Linux kernel, the following vulnerability has been resolved: usbnet: ipheth: fix possible overflow in DPE length check Originally, it was possible for the DPE length check to overflow if wDatagramIndex + wDatagramLength > U16_MAX. This could lead to an OoB read. Move the wDatagramIndex term to the other side of the inequality. An existing condition ensures that wDatagramIndex < urb->actual_length.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-22038
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.1||HIGH
EPSS-0.02% / 4.34%
||
7 Day CHG~0.00%
Published-16 Apr, 2025 | 14:11
Updated-26 May, 2025 | 05:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ksmbd: validate zero num_subauth before sub_auth is accessed

In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate zero num_subauth before sub_auth is accessed Access psid->sub_auth[psid->num_subauth - 1] without checking if num_subauth is non-zero leads to an out-of-bounds read. This patch adds a validation step to ensure num_subauth != 0 before sub_auth is accessed.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-30531
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.08% / 23.66%
||
7 Day CHG~0.00%
Published-16 Feb, 2023 | 20:00
Updated-27 Jan, 2025 | 18:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in the Intel(R) Iris(R) Xe MAX drivers for Windows before version 100.0.5.1474 may allow a privileged user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aMicrosoft CorporationIntel Corporation
Product-windowsiris_xe_max_dedicated_graphicsIntel(R) Iris(R) Xe MAX drivers for Windows
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-21741
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.1||HIGH
EPSS-0.03% / 5.41%
||
7 Day CHG~0.00%
Published-27 Feb, 2025 | 02:12
Updated-04 May, 2025 | 07:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
usbnet: ipheth: fix DPE OoB read

In the Linux kernel, the following vulnerability has been resolved: usbnet: ipheth: fix DPE OoB read Fix an out-of-bounds DPE read, limit the number of processed DPEs to the amount that fits into the fixed-size NDP16 header.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-28183
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-7.7||HIGH
EPSS-0.14% / 35.19%
||
7 Day CHG+0.05%
Published-17 May, 2022 | 00:00
Updated-03 Aug, 2024 | 05:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where an unprivileged regular user can cause an out-of-bounds read, which may lead to denial of service and information disclosure.

Action-Not Available
Vendor-NVIDIA Corporation
Product-virtual_gpugpu_display_driverNVIDIA GPU Display Driver
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-39735
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.1||HIGH
EPSS-0.03% / 5.68%
||
7 Day CHG~0.00%
Published-18 Apr, 2025 | 07:01
Updated-26 May, 2025 | 05:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
jfs: fix slab-out-of-bounds read in ea_get()

In the Linux kernel, the following vulnerability has been resolved: jfs: fix slab-out-of-bounds read in ea_get() During the "size_check" label in ea_get(), the code checks if the extended attribute list (xattr) size matches ea_size. If not, it logs "ea_get: invalid extended attribute" and calls print_hex_dump(). Here, EALIST_SIZE(ea_buf->xattr) returns 4110417968, which exceeds INT_MAX (2,147,483,647). Then ea_size is clamped: int size = clamp_t(int, ea_size, 0, EALIST_SIZE(ea_buf->xattr)); Although clamp_t aims to bound ea_size between 0 and 4110417968, the upper limit is treated as an int, causing an overflow above 2^31 - 1. This leads "size" to wrap around and become negative (-184549328). The "size" is then passed to print_hex_dump() (called "len" in print_hex_dump()), it is passed as type size_t (an unsigned type), this is then stored inside a variable called "int remaining", which is then assigned to "int linelen" which is then passed to hex_dump_to_buffer(). In print_hex_dump() the for loop, iterates through 0 to len-1, where len is 18446744073525002176, calling hex_dump_to_buffer() on each iteration: for (i = 0; i < len; i += rowsize) { linelen = min(remaining, rowsize); remaining -= rowsize; hex_dump_to_buffer(ptr + i, linelen, rowsize, groupsize, linebuf, sizeof(linebuf), ascii); ... } The expected stopping condition (i < len) is effectively broken since len is corrupted and very large. This eventually leads to the "ptr+i" being passed to hex_dump_to_buffer() to get closer to the end of the actual bounds of "ptr", eventually an out of bounds access is done in hex_dump_to_buffer() in the following for loop: for (j = 0; j < len; j++) { if (linebuflen < lx + 2) goto overflow2; ch = ptr[j]; ... } To fix this we should validate "EALIST_SIZE(ea_buf->xattr)" before it is utilised.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-26463
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.02% / 3.54%
||
7 Day CHG~0.00%
Published-06 Sep, 2022 | 17:19
Updated-03 Aug, 2024 | 05:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In vow, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07032686; Issue ID: ALPS07032686.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt6855mt6895mt6873mt6893androidmt6833mt6885mt8797mt6889mt6983mt8791mt6877mt6879mt6853mt6883MT6833, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6889, MT6893, MT6895, MT6983, MT8791, MT8797
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-26436
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.02% / 2.95%
||
7 Day CHG~0.00%
Published-01 Aug, 2022 | 13:58
Updated-03 Aug, 2024 | 05:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In emi mpu, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07023666; Issue ID: ALPS07023666.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt6855mt6895androidmt6983mt6879MT6855, MT6879, MT6895, MT6983
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-26462
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.02% / 3.54%
||
7 Day CHG~0.00%
Published-06 Sep, 2022 | 17:19
Updated-03 Aug, 2024 | 05:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In vow, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07032660; Issue ID: ALPS07032660.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt6855mt6895mt6873mt6893androidmt6833mt6885mt8797mt6889mt6983mt8791mt6877mt6879mt6853mt6883MT6833, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6889, MT6893, MT6895, MT6983, MT8791, MT8797
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-25665
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.04% / 12.76%
||
7 Day CHG~0.00%
Published-12 Oct, 2022 | 00:00
Updated-15 May, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Information disclosure due to buffer over read in kernel in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcs605wcn6855_firmwareqca6391_firmwaresd888_5g_firmwaresd850qca6574_firmwaresdx50m_firmwarear8035qca6430sa8155wcn7850_firmwaresdx24_firmwarewcd9375_firmwaresd855_firmwaresa8540p_firmwarewcn3990qca6174a_firmwarewsa8835_firmwareqca6696_firmwareqca8337sa6145pqca6431_firmwarewcn6855qam8295pwsa8830qca6696sm8475sdx65qsm8350_firmwareqca6420sa6155pwcn3998_firmwaresdx55qca6390_firmwaresm7250par8035_firmwaresd765sdx55_firmwareqca6574a_firmwarewcd9385_firmwareqca8081_firmwarewcn3950_firmwareqcs605_firmwaresdx24sdxr2_5g_firmwareqca6436_firmwarewsa8815_firmwaresd678sdx57m_firmwaresa6145p_firmwaresa9000pqca6430_firmwareqca6595sd675_firmwarewcd9370_firmwareaqt1000qca6391wcn3991_firmwaresa8295pqca6174asa8295p_firmwarewsa8835sm7250p_firmwarewcn6851_firmwaresd768g_firmwarewcn3980_firmwareqca6574aqca6564asdx65_firmwareqca6595auwcn6851wcn6850_firmwaresd865_5gwcd9340_firmwaresd865_5g_firmwareqca6564au_firmwareqca9377_firmwarewsa8830_firmwarewcd9341sd845_firmwarewcn3991wcn3998wcn6856_firmwareqca6574auwcn3990_firmwaresdx55mwcd9341_firmwareqcs603_firmwaresd670qca6420_firmwareqca6564ausd_675sa9000p_firmwarewsa8815sd850_firmwaresd_8cx_gen3wcd9326wcn6856qca6564a_firmwarewcn7850sd_8_gen1_5g_firmwareqca6426wcd9380sa8155p_firmwareqsm8350sd_8cx_firmwareqca8337_firmwaresd870_firmwarewcd9326_firmwaresd_8cx_gen3_firmwareqca6574sd_8cx_gen2_firmwaresd870sd765_firmwarewcn7851_firmwaresdx57mqca6426_firmwaresd845qam8295p_firmwaresd_675_firmwaresd768gwsa8810qca6335wcn6850sd855sd_8cx_gen2qca6310_firmwarewcd9380_firmwaresd678_firmwaresd888_5gsa8155_firmwaresd670_firmwareqca6335_firmwareqca6390qca6421sa6155qca6595au_firmwarewsa8810_firmwareqca6310sdx55m_firmwarewcd9375wcd9370sa8150p_firmwarewcn7851wcd9340qca6436qca9377wcd9385sa6155p_firmwaresd_8cxsa8150psd765gwcn3950qca6595_firmwareqcs603sdxr2_5gsa6155_firmwareaqt1000_firmwaresdx50mqca6431sd675wcn3980qca8081qca6574au_firmwaresa8155psa8540pqca6421_firmwaresd765g_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Mobile
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-56650
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.1||HIGH
EPSS-0.04% / 10.06%
||
7 Day CHG~0.00%
Published-27 Dec, 2024 | 15:02
Updated-04 May, 2025 | 10:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
netfilter: x_tables: fix LED ID check in led_tg_check()

In the Linux kernel, the following vulnerability has been resolved: netfilter: x_tables: fix LED ID check in led_tg_check() Syzbot has reported the following BUG detected by KASAN: BUG: KASAN: slab-out-of-bounds in strlen+0x58/0x70 Read of size 1 at addr ffff8881022da0c8 by task repro/5879 ... Call Trace: <TASK> dump_stack_lvl+0x241/0x360 ? __pfx_dump_stack_lvl+0x10/0x10 ? __pfx__printk+0x10/0x10 ? _printk+0xd5/0x120 ? __virt_addr_valid+0x183/0x530 ? __virt_addr_valid+0x183/0x530 print_report+0x169/0x550 ? __virt_addr_valid+0x183/0x530 ? __virt_addr_valid+0x183/0x530 ? __virt_addr_valid+0x45f/0x530 ? __phys_addr+0xba/0x170 ? strlen+0x58/0x70 kasan_report+0x143/0x180 ? strlen+0x58/0x70 strlen+0x58/0x70 kstrdup+0x20/0x80 led_tg_check+0x18b/0x3c0 xt_check_target+0x3bb/0xa40 ? __pfx_xt_check_target+0x10/0x10 ? stack_depot_save_flags+0x6e4/0x830 ? nft_target_init+0x174/0xc30 nft_target_init+0x82d/0xc30 ? __pfx_nft_target_init+0x10/0x10 ? nf_tables_newrule+0x1609/0x2980 ? nf_tables_newrule+0x1609/0x2980 ? rcu_is_watching+0x15/0xb0 ? nf_tables_newrule+0x1609/0x2980 ? nf_tables_newrule+0x1609/0x2980 ? __kmalloc_noprof+0x21a/0x400 nf_tables_newrule+0x1860/0x2980 ? __pfx_nf_tables_newrule+0x10/0x10 ? __nla_parse+0x40/0x60 nfnetlink_rcv+0x14e5/0x2ab0 ? __pfx_validate_chain+0x10/0x10 ? __pfx_nfnetlink_rcv+0x10/0x10 ? __lock_acquire+0x1384/0x2050 ? netlink_deliver_tap+0x2e/0x1b0 ? __pfx_lock_release+0x10/0x10 ? netlink_deliver_tap+0x2e/0x1b0 netlink_unicast+0x7f8/0x990 ? __pfx_netlink_unicast+0x10/0x10 ? __virt_addr_valid+0x183/0x530 ? __check_object_size+0x48e/0x900 netlink_sendmsg+0x8e4/0xcb0 ? __pfx_netlink_sendmsg+0x10/0x10 ? aa_sock_msg_perm+0x91/0x160 ? __pfx_netlink_sendmsg+0x10/0x10 __sock_sendmsg+0x223/0x270 ____sys_sendmsg+0x52a/0x7e0 ? __pfx_____sys_sendmsg+0x10/0x10 __sys_sendmsg+0x292/0x380 ? __pfx___sys_sendmsg+0x10/0x10 ? lockdep_hardirqs_on_prepare+0x43d/0x780 ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 ? exc_page_fault+0x590/0x8c0 ? do_syscall_64+0xb6/0x230 do_syscall_64+0xf3/0x230 entry_SYSCALL_64_after_hwframe+0x77/0x7f ... </TASK> Since an invalid (without '\0' byte at all) byte sequence may be passed from userspace, add an extra check to ensure that such a sequence is rejected as possible ID and so never passed to 'kstrdup()' and further.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-23805
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7.1||HIGH
EPSS-0.11% / 29.44%
||
7 Day CHG~0.00%
Published-04 Feb, 2022 | 22:32
Updated-03 Aug, 2024 | 03:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A security out-of-bounds read information disclosure vulnerability in Trend Micro Worry-Free Business Security Server could allow a local attacker to send garbage data to a specific named pipe and crash the server. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-windowsworry-free_business_securityTrend Micro Worry-Free Business Security
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-20984
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-4.4||MEDIUM
EPSS-0.01% / 0.72%
||
7 Day CHG~0.00%
Published-24 Mar, 2023 | 00:00
Updated-25 Feb, 2025 | 14:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ParseBqrLinkQualityEvt of btif_bqr.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-242993878

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-21208
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-4.4||MEDIUM
EPSS-0.02% / 2.55%
||
7 Day CHG~0.00%
Published-28 Jun, 2023 | 00:00
Updated-04 Dec, 2024 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In setCountryCodeInternal of sta_iface.cpp, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262245254

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-53162
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.1||HIGH
EPSS-0.03% / 6.96%
||
7 Day CHG~0.00%
Published-24 Dec, 2024 | 11:29
Updated-04 May, 2025 | 09:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
crypto: qat/qat_4xxx - fix off by one in uof_get_name()

In the Linux kernel, the following vulnerability has been resolved: crypto: qat/qat_4xxx - fix off by one in uof_get_name() The fw_objs[] array has "num_objs" elements so the > needs to be >= to prevent an out of bounds read.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-125
Out-of-bounds Read
  • Previous
  • 1
  • 2
  • ...
  • 5
  • 6
  • 7
  • ...
  • 10
  • 11
  • Next
Details not found