Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-23376

Summary
Assigner-qualcomm
Assigner Org ID-2cfc7d3e-20d3-47ac-8db7-1b7285aff15f
Published At-07 Oct, 2024 | 12:58
Updated At-07 Oct, 2024 | 13:16
Rejected At-
Credits

Use After Free in ComputerVision

Memory corruption while sending the persist buffer command packet from the user-space to the kernel space through the IOCTL call.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:qualcomm
Assigner Org ID:2cfc7d3e-20d3-47ac-8db7-1b7285aff15f
Published At:07 Oct, 2024 | 12:58
Updated At:07 Oct, 2024 | 13:16
Rejected At:
▼CVE Numbering Authority (CNA)
Use After Free in ComputerVision

Memory corruption while sending the persist buffer command packet from the user-space to the kernel space through the IOCTL call.

Affected Products
Vendor
Qualcomm Technologies, Inc.Qualcomm, Inc.
Product
Snapdragon
Platforms
  • Snapdragon Auto
  • Snapdragon Connectivity
  • Snapdragon Mobile
  • Snapdragon Wearables
Default Status
unaffected
Versions
Affected
  • FastConnect 6900
  • FastConnect 7800
  • QCA6174A
  • QCA6574AU
  • QCA6696
  • SA6145P
  • SA6150P
  • SA6155P
  • SA8145P
  • SA8150P
  • SA8155P
  • SA8195P
  • Snapdragon 8 Gen 1 Mobile Platform
  • Snapdragon W5+ Gen 1 Wearable Platform
  • SW5100
  • SW5100P
  • WCD9380
  • WCN3980
  • WCN3988
  • WSA8830
  • WSA8835
Problem Types
TypeCWE IDDescription
CWECWE-416CWE-416 Use After Free
Type: CWE
CWE ID: CWE-416
Description: CWE-416 Use After Free
Metrics
VersionBase scoreBase severityVector
3.16.7MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 6.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html
N/A
Hyperlink: https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Vendor
Qualcomm Technologies, Inc.qualcomm
Product
fastconnect_6900_firmware
CPEs
  • cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through * (custom)
Vendor
Qualcomm Technologies, Inc.qualcomm
Product
fastconnect_7800_firmware
CPEs
  • cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through * (custom)
Vendor
Qualcomm Technologies, Inc.qualcomm
Product
qca6174a_firmware
CPEs
  • cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through * (custom)
Vendor
Qualcomm Technologies, Inc.qualcomm
Product
qca6574au_firmware
CPEs
  • cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through * (custom)
Vendor
Qualcomm Technologies, Inc.qualcomm
Product
qca6696_firmware
CPEs
  • cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through * (custom)
Vendor
Qualcomm Technologies, Inc.qualcomm
Product
sa6145p_firmware
CPEs
  • cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through * (custom)
Vendor
Qualcomm Technologies, Inc.qualcomm
Product
sa6150p_firmware
CPEs
  • cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through * (custom)
Vendor
Qualcomm Technologies, Inc.qualcomm
Product
sa6155p_firmware
CPEs
  • cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through * (custom)
Vendor
Qualcomm Technologies, Inc.qualcomm
Product
sa8145p_firmware
CPEs
  • cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through * (custom)
Vendor
Qualcomm Technologies, Inc.qualcomm
Product
sa8150p_firmware
CPEs
  • cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through * (custom)
Vendor
Qualcomm Technologies, Inc.qualcomm
Product
sa8155p_firmware
CPEs
  • cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through * (custom)
Vendor
Qualcomm Technologies, Inc.qualcomm
Product
sa8195p_firmware
CPEs
  • cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through * (custom)
Vendor
Qualcomm Technologies, Inc.qualcomm
Product
snapdragon_8_gen_1_mobile_platform_firmware
CPEs
  • cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through * (custom)
Vendor
Qualcomm Technologies, Inc.qualcomm
Product
sw5100_firmware
CPEs
  • cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through * (custom)
Vendor
Qualcomm Technologies, Inc.qualcomm
Product
sw5100p_firmware
CPEs
  • cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through * (custom)
Vendor
Qualcomm Technologies, Inc.qualcomm
Product
wcd9380_firmware
CPEs
  • cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through * (custom)
Vendor
Qualcomm Technologies, Inc.qualcomm
Product
wcn3980_firmware
CPEs
  • cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through * (custom)
Vendor
Qualcomm Technologies, Inc.qualcomm
Product
wcn3988_firmware
CPEs
  • cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through * (custom)
Vendor
Qualcomm Technologies, Inc.qualcomm
Product
wsa8830_firmware
CPEs
  • cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through * (custom)
Vendor
Qualcomm Technologies, Inc.qualcomm
Product
wsa8835_firmware
CPEs
  • cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through * (custom)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:product-security@qualcomm.com
Published At:07 Oct, 2024 | 13:15
Updated At:16 Oct, 2024 | 20:07

Memory corruption while sending the persist buffer command packet from the user-space to the kernel space through the IOCTL call.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.7MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 6.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Qualcomm Technologies, Inc.
qualcomm
>>wsa8835_firmware>>-
cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wsa8835>>-
cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wsa8830_firmware>>-
cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wsa8830>>-
cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcn3988_firmware>>-
cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcn3988>>-
cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcn3980_firmware>>-
cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcn3980>>-
cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcd9380_firmware>>-
cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcd9380>>-
cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sw5100p_firmware>>-
cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sw5100p>>-
cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sw5100_firmware>>-
cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sw5100>>-
cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>snapdragon_w5\+_gen_1_wearable_platform_firmware>>-
cpe:2.3:o:qualcomm:snapdragon_w5\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>snapdragon_w5\+_gen_1_wearable_platform>>-
cpe:2.3:h:qualcomm:snapdragon_w5\+_gen_1_wearable_platform:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>snapdragon_8_gen_1_mobile_platform_firmware>>-
cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>snapdragon_8_gen_1_mobile_platform>>-
cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sa8195p_firmware>>-
cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sa8195p>>-
cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sa8155p_firmware>>-
cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sa8155p>>-
cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sa8150p_firmware>>-
cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sa8150p>>-
cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sa8145p_firmware>>-
cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sa8145p>>-
cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sa6155p_firmware>>-
cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sa6155p>>-
cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sa6150p_firmware>>-
cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sa6150p>>-
cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sa6145p_firmware>>-
cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sa6145p>>-
cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6696_firmware>>-
cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6696>>-
cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6574au_firmware>>-
cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6574au>>-
cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6174a_firmware>>-
cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6174a>>-
cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_7800_firmware>>-
cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_7800>>-
cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_6900_firmware>>-
cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_6900>>-
cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-416Primarynvd@nist.gov
CWE-416Secondaryproduct-security@qualcomm.com
CWE ID: CWE-416
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-416
Type: Secondary
Source: product-security@qualcomm.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.htmlproduct-security@qualcomm.com
Vendor Advisory
Hyperlink: https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html
Source: product-security@qualcomm.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

448Records found

CVE-2024-49848
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.01% / 1.16%
||
7 Day CHG~0.00%
Published-07 Apr, 2025 | 10:15
Updated-08 Apr, 2025 | 03:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in DSP Service

Memory corruption while processing multiple IOCTL calls from HLOS to DSP.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-Snapdragon
CWE ID-CWE-416
Use After Free
CVE-2021-35133
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 10.65%
||
7 Day CHG~0.00%
Published-02 Sep, 2022 | 11:31
Updated-04 Aug, 2024 | 00:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use after free in the synx driver issue while performing other functions during multiple invocation of synx release calls in Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarewcn3991_firmwarewcn3991qca8337_firmwarewcd9380_firmwarewsa8830sd780gqca8337wcn6856_firmwaresdx65wsa8835wcd9380sd888_5gwcd9370wcn6855_firmwaresm8475p_firmwareqca6174awcd9335_firmwareqca9377wcn6750wcd9385_firmwaresd_8_gen1_5g_firmwarewcn6850wcn7850wcd9375_firmwareqca8081_firmwaresdx12_firmwareqca6391sm8475_firmwaresm7450_firmwarewcn6740_firmwaresdx65_firmwarewcn7851qcs6490qcm6490_firmwarewsa8832_firmwaresd480_firmwarewcn6851_firmwarewcn3988_firmwarewcd9341_firmwaresd480wsa8832wcn6855wcn6851wcd9335qca8081wcn7851_firmwarewcn6856qca6174a_firmwarewcd9385wcd9341qcs6490_firmwarewcn6740qca6391_firmwarear8035wcd9375sd780g_firmwarewcd9370_firmwarewsa8830_firmwareqcm6490sd888_5g_firmwarewcn3988wcn6850_firmwarewcn7850_firmwarewsa8835_firmwaresm7450sdx12sm8475wcn6750_firmwarear8035_firmwaresm8475pSnapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-416
Use After Free
CVE-2021-30313
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.08% / 23.32%
||
7 Day CHG~0.00%
Published-13 Jan, 2022 | 11:40
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use after free condition can occur in wired connectivity due to a race condition while creating and deleting folders in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresa6150p_firmwareqcs610ipq4028_firmwareqcn5550qca8337ar9380ipq8173_firmwaresdx65qcn5124qca4024_firmwarewcn3950_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqcs2290qca6595au_firmwaresa6155qcn5064csra6620_firmwareqcs605_firmwarecsra6640_firmwareqca9987_firmwarewcn3998wcn3950qcn6024_firmwareipq8076asd_8_gen1_5g_firmwaresm6375_firmwarewcn3660bsd460_firmwaresm7315_firmwareqca6428qca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwareqca8081_firmwarewcn3998_firmwaresa6155_firmwaresdx12_firmwareqca6438_firmwareqca9986ipq8070_firmwareipq8065ipq8078a_firmwarewcn3999qrb5165_firmwareipq5028qca7500ipq8072_firmwareipq4029_firmwaresa8155_firmwareipq6010sd662_firmwareipq8068qcs405wcd9340sd765gqualcomm215_firmwareqca6436wcn6851sa6155pqcs603_firmwareqca9888_firmwareqcn6122wcd9341ipq8068_firmwareqca6696_firmwaresd870_firmwareqca9988_firmwareqcn5154_firmwarewcn3910_firmwaresa8150pwsa8830_firmwareqca9992_firmwaresd865_5g_firmwarewcn3988qca6438sa8195p_firmwaresm8475qcn5022_firmwarewcn6750_firmwareqca9898ipq4028wcn3610qca6428_firmwareipq5018_firmwaresm6375qca9985_firmwarewcn3991ipq4018_firmwareqca8337_firmwaresda429w_firmwarewcd9380_firmwareipq8072aqca7500_firmwareqca9980_firmwareipq8076a_firmwareipq8078qca6564ausdx55m_firmwareipq8173wcn6856_firmwareqcn5164qca9558qca6574csr8811_firmwarewcd9380qualcomm215qcn5054_firmwareqcs410qcn5024ipq4019_firmwareqca8072_firmwareqca9985qcn9012_firmwarewcd9335_firmwareqcn5052_firmwarewcn3980ipq6018_firmwareqcs605wcd9340_firmwarewsa8815wcn6850pmp8074_firmwarewcn3910qca6320qca9986_firmwareqca6426_firmwarewcn3660b_firmwareqca9984ipq6028ipq8064qcn9024pmp8074wcn3980_firmwareqcn5550_firmwaresdx55mipq8064_firmwarewcn6740_firmwareqcn5064_firmwarear8031_firmwareipq8078_firmwareqcn5054qrb5165wcn6851_firmwareqcs603ipq8070qcn5502qca9994qca9980qcn9024_firmwareipq8174_firmwareqca6564a_firmwareqca9880qcm4290_firmwaresd480sd870wcn6855sd210_firmwareqcs610_firmwareqsm8250sa6145pipq6018qca9886_firmwarear8031apq8096auqcs405_firmwaresa8145pqca6391_firmwareqca4024wcd9370_firmwaresd780g_firmwaresdx55sd888_firmwareqcn5021_firmwaresa8155pcsra6640qca9531_firmwarear8035_firmwareqcm2290qsm8250_firmwareqcn5024_firmwarewcn3991_firmwaremdm9150_firmwarewsa8830qcn9070sa8145p_firmwareqcs2290_firmwareqca9563_firmwarecsra6620qca9987qcn9072qca9880_firmwareqca9992qcs4290sd765g_firmwareipq8069_firmwareqca6390_firmwareipq6000wcd9370ipq8072qcn5152_firmwareqca6426wcn3990_firmwareqrb5165n_firmwareqcn9000_firmwareqca9984_firmwareqca9377ipq5018wcd9385_firmwaresdxr2_5g_firmwareqca9563ipq8074asd662qcn5124_firmwaresa8155qca6320_firmwareqcn5122_firmwaresdx55_firmwareqca6595auqcn6023_firmwarewcn3999_firmwaresm7250p_firmwarewcn3610_firmwareqca6436_firmwareqrb5165nipq5010qca6564au_firmwaresd778gsa6155p_firmwaresm6225ipq8174qca9990qcs6490sdxr2_5gqcn5052wcn3988_firmwareqcn9074sd205sa6145p_firmwaresd778g_firmwaresa8195pwsa8810_firmwaresd765_firmwarewcd9335qca8081qcn6023ipq8071aqca6174a_firmwareipq8071a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwareqca6390qca9898_firmwarewcd9375ar8035csr8811ipq4019qcn9100_firmwaresda429wsd210wcn3620_firmwareipq5010_firmwareipq8074a_firmwaresd888_5g_firmwarewsa8815_firmwareqcm6490wcn6850_firmwarewsa8835_firmwarewcn3620qca6564aqca9988qca8072qcm2290_firmwarewcn3990qcn9000sd780gsd865_5gar9380_firmwareqcn9012sd888qca9558_firmwareqcn6122_firmwareipq8065_firmwarewsa8835sd665_firmwaresd888_5gqcn5154qca8075_firmwareipq4018qca6574awcn6855_firmwareqca9889qca6174asm7325pqca9888ipq8074qca9994_firmwarewcn6750ipq8070a_firmwareipq8076_firmwareqca6574_firmwareqca9886qcn5502_firmwaresm7325p_firmwaresd665ipq8076sd765qca6574a_firmwareqcn5021ipq8069qcn5152sd768g_firmwaresm7315sd460qca6391qcn9100sdx65_firmwareqcm4290qcm6490_firmwareqcn9070_firmwaresd480_firmwareipq6028_firmwareipq8072a_firmwaresm6225_firmwareqca9531ipq8074_firmwareqca6574auqca9889_firmwaresa8155p_firmwareqcn5122sd205_firmwarewcd9341_firmwarewsa8810mdm9150wcn6856qcn5022sd768gipq6010_firmwarewcn6740qca6696sa6150pqca8075qcn9022_firmwareapq8096au_firmwareqcn6024qcn9022qca9990_firmwareipq8070aqcn9072_firmwaresm7250pipq6000_firmwaresdx12ipq8071_firmwareqcs410_firmwareqcn9074_firmwareipq4029Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-416
Use After Free
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2021-30263
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 10.90%
||
7 Day CHG~0.00%
Published-12 Nov, 2021 | 06:15
Updated-03 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible race condition can occur due to lack of synchronization mechanism when On-Device Logging node open twice concurrently in Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-aqt1000_firmwareqca8337_firmwarewcn3999ar8031_firmwareqca8337qcs6125sdx55m_firmwarecsra6620qca6430qcs405wcd9340wcn3950_firmwarewsa8810_firmwarewcd9341_firmwareqcm6125qca6420_firmwarewsa8810wcd9335wcd9370csra6620_firmwaresd_8ccsra6640_firmwareqcs6125_firmwarewcd9341ar8031qca6430_firmwareqcs405_firmwarewcd9335_firmwarewcn3980wcn3998sd_8cx_firmwareqca6391_firmwarewcn3950ar8035sd_8cxaqt1000wcd9340_firmwarewcd9370_firmwaresd855sdx55wsa8815csra6640sd855_firmwaresd_8c_firmwarewsa8815_firmwaresdx55_firmwarewcn3999_firmwarewcn3998_firmwarewcn3980_firmwareqca6391sdx55mqca6420ar8035_firmwareqcm6125_firmwareSnapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music
CWE ID-CWE-416
Use After Free
CVE-2021-30264
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 14.37%
||
7 Day CHG~0.00%
Published-12 Nov, 2021 | 06:15
Updated-03 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible use after free due improper validation of reference from call back to internal store table in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarefsm10055sm7250sa6150p_firmwareqcs610ipq4028_firmwareqcn5550qca8337ar9380ipq8173_firmwareqca9561_firmwaresdx65qcn5124qca4024_firmwarewcn3950_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqca6595au_firmwaresa6155qcn5064csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareqcs6125_firmwarewcn3998wcn3950qcn6024_firmwareipq8076amdm9206_firmwaresm6375_firmwarewcn3660bsd460_firmwareqca6428qca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwareqca8081_firmwarewcn3998_firmwaresa6155_firmwareqca6420apq8053_firmwareqca6438_firmwareipq8070_firmwareqca9367_firmwareipq8065ipq8078a_firmwareqrb5165_firmwareipq5028qca7500ipq8072_firmwareipq4029_firmwareqcs6125sa8155_firmwareipq6010sd662_firmwareipq8068qcs405qca6430sd765gfsm10056_firmwarewcn6851sa6155pqcs603_firmwareqca9888_firmwareqcn6122wcd9341ipq8068_firmwareqca6696_firmwaresd870_firmwareqcn5154_firmwaresa8150pwsa8830_firmwareqca9992_firmwaresd865_5g_firmwaresd855_firmwarewcn3988qca6438sa8195p_firmwareqcn5121qcn5022_firmwarewcn6750_firmwareqca9898ipq4028wcn3610qca6428_firmwareipq5018_firmwaresm6375qca9985_firmwarewcn3991ipq4018_firmwareqca8337_firmwaresda429w_firmwarewcd9380_firmwareipq8072aqca7500_firmwareqca9980_firmwarewcd9330msm8996au_firmwareipq8076a_firmwareipq8078qca6564ausdx55m_firmwareipq8173wcn6856_firmwareqcn5164qca9558qca6574csr8811_firmwarewcd9380qcn5054_firmwareqcs410qcn5024sd690_5g_firmwareipq4019_firmwareqca8072_firmwareqca9985qcn9012_firmwareqca6430_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980ipq6018_firmwareqcs605wsa8815wcn6850pmp8074_firmwareqca6426_firmwarewcn3660b_firmwareqca9984ipq6028ipq8064qcn9024pmp8074wcn3980_firmwaresd730qcn5550_firmwarewcd9330_firmwaresdx55mipq8064_firmwarewcn6740_firmwaremsm8953qcn5064_firmwaresd678_firmwarear8031_firmwareipq8078_firmwareqcn5054qrb5165wcn6851_firmwareqcs603ipq8070qca9896qcn5502qca9994qca9887_firmwareqca9980qcn9024_firmwareipq8174_firmwareqca6564a_firmwareqca9880sd480sd870wcn6855qcn5121_firmwaresd210_firmwareqcs610_firmwaresa6145pipq6018qca9886_firmwarear8031apq8096auqca6595_firmwareqcs405_firmwaresa8145pqca6391_firmwareqca4024wcd9370_firmwaresd780g_firmwaresdx55apq8053qcn5021_firmwarecsra6640sa8155psd675qca9531_firmwarear8035_firmwareqcn5024_firmwarewcn3991_firmwaremdm9150_firmwareqcn5500wsa8830qca9561sd678qcn9070sa8145p_firmwarefsm10056sm7250_firmwareqca9563_firmwarecsra6620fsm10055_firmwareqcn9072qca9880_firmwareqca9992sd765g_firmwareqca6420_firmwareqca6390_firmwareapq8009_firmwaresd690_5gipq6000sd730_firmwarewcd9370sd675_firmwareipq8072qcn5152_firmwareqca6426qca6584au_firmwarewcn3990_firmwareqrb5165n_firmwareqcn9000_firmwareqca9984_firmwareqca9377sm8450ipq5018wcd9385_firmwarewcd9326_firmwarewcn3615_firmwareqca9563ipq8074asd662qcn5124_firmwareqca9982sa8155wcn3680b_firmwareqcn5122_firmwaresdx55_firmwarewcn3615qcn6023_firmwareqca6595auwcn3610_firmwareqrb5165nipq5010qca6564au_firmwareqca6584ausd778gsa6155p_firmwareipq8174qca9990qcs6490qcn5052qca9367wcn3988_firmwareqcn9074sd205sa6145p_firmwaresd778g_firmwaresa8195pwsa8810_firmwareqca6694sm8450_firmwaresd765_firmwarewcd9326wcd9335qca8081qca9982_firmwareqcn6023ipq8071aipq8071a_firmwarewcd9385qcs6490_firmwareqca6390qca9898_firmwarewcd9375aqt1000ar8035csr8811ipq4019qca6694_firmwaremsm8953_firmwareqcn9100_firmwaresda429wsd210wcn3620_firmwareipq5010_firmwareipq8074a_firmwaresd888_5g_firmwarewsa8815_firmwareqcm6490wcn6850_firmwarewsa8835_firmwarewcn3620qca6564aqcm6125_firmwareqca9882qca8072wcn3990qcn9000sd_675sd780gsd865_5gqca6595ar9380_firmwaresm8450p_firmwareqcn9012qca9558_firmwareqca9896_firmwareqcn6122_firmwareipq8065_firmwarewsa8835msm8996ausd665_firmwaresd888_5gqcn5154qca8075_firmwareipq4018qca6574aipq6005_firmwaremdm9206wcn6855_firmwareqca9889qca9888ipq8074sm7325qca9994_firmwarewcn6750ipq8070a_firmwareipq8076_firmwareqca6574_firmwareqca9886qcn5502_firmwaresd855sd665ipq8076sd765qca9887qca6574a_firmwareqcn5021qcn5152sd768g_firmwareapq8009sd460qca6391ipq6005aqt1000_firmwareqcn9100sdx65_firmwareqcm6490_firmwareqca9882_firmwareqcn9070_firmwaresd480_firmwareipq6028_firmwareipq8072a_firmwareqca9531ipq8074_firmwareqca6574auqca9889_firmwaresa8155p_firmwareqcn5122sd205_firmwarewcd9341_firmwareqcm6125wsa8810sm8450pqcn5500_firmwaremdm9150wcn6856qcn5022wcn3680bsd768gipq6010_firmwarewcn6740qca6696sa6150pqca8075qcn9022_firmwareapq8096au_firmwareqcn6024qcn9022qca9990_firmwareipq8070aqcn9072_firmwareipq6000_firmwareipq8071_firmwareqcn9074_firmwareqcs410_firmwareipq4029sm7325_firmwareSnapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-416
Use After Free
CVE-2021-30266
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 7.79%
||
7 Day CHG~0.00%
Published-12 Nov, 2021 | 06:16
Updated-03 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible use after free due to improper memory validation when initializing new interface via Interface add command in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresm7250sa6150p_firmwareqcs610ipq4028_firmwareqcn5550qca8337ar9380ipq8173_firmwareqca9561_firmwaresdx65qcn5124qca4024_firmwarewcn3950_firmwareipq8078asa8150p_firmwareqca6595au_firmwaresa6155qca6335qcn5064csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareqcs6125_firmwareqca9987_firmwaresa415mwcn3998wcn3950qcn6024_firmwareipq8076amdm9206_firmwaresm6375_firmwarewcn3660bsd460_firmwarewcn7850qca6428qca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwareqca8081_firmwarewcn3998_firmwaresa6155_firmwareqca6420apq8053_firmwareqca6438_firmwareqca9986ipq8070_firmwareqca9367_firmwareipq8065ipq8078a_firmwarewcn3999qrb5165_firmwareqca7500ipq8072_firmwareipq4029_firmwareqcs6125sa8155_firmwareipq6010sd662_firmwareipq8068qcs405qca6430sd765gqualcomm215_firmwareqca6436wcn6851sa6155pqcs603_firmwarewcn7851_firmwareqca9888_firmwarewcd9341ipq8068_firmwareqca6696_firmwaresd870_firmwareqca9988_firmwareqcn5154_firmwaresa8150pwsa8830_firmwareqca9992_firmwaresd865_5g_firmwaresd855_firmwarewcn3988qca6438wcn7850_firmwaresa8195p_firmwareqcn5121qcn5022_firmwarewcn6750_firmwareqca9898ipq4028wcn3610qca6428_firmwareipq5018_firmwaresm6375qca9985_firmwarewcn3991ipq4018_firmwareqca8337_firmwarewcd9380_firmwareipq8072aqca7500_firmwareqca9980_firmwarewcd9330msm8996au_firmwareipq8076a_firmwareipq8078qca6564ausdx55m_firmwareipq8173wcn6856_firmwareqcn5164qca9558qca6574csr8811_firmwarewcd9380qualcomm215qcn5054_firmwareqcs410qcn5024sd690_5g_firmwareipq4019_firmwareqca9985qcn9012_firmwareqca6430_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980qca6335_firmwareipq6018_firmwareqcs605wsa8815wcn6850qca6320mdm9650_firmwareqca9986_firmwareqca6426_firmwarewcn3660b_firmwarewcn3680qca9984ipq6028ipq8064qcn9024wcn3980_firmwaresd730qcn5550_firmwarewcd9330_firmwaresdx55mipq8064_firmwarewcn6740_firmwaremsm8953qcn5064_firmwaresd678_firmwarear8031_firmwarewcn3680_firmwareipq8078_firmwareqcn5054qrb5165wcn6851_firmwareqcs603ipq8070qca9896qcn5502qca9994qca9887_firmwareqca9980qcn9024_firmwareipq8174_firmwareqca6564a_firmwareqca9880qcm4290_firmwaresd480sd870wcn6855qcn5121_firmwaresd210_firmwareqcs610_firmwaresa6145pipq6018qca9886_firmwarear8031apq8096auqca6595_firmwareqcs405_firmwaresa8145pqca6391_firmwareqca4024wcd9370_firmwaresd780g_firmwaresdx55apq8053qcn5021_firmwarecsra6640sa8155psd675qca9531_firmwarear8035_firmwareqcn5024_firmwarewcn3991_firmwareqcn5500wsa8830sd678qca9561qcn9070sa8145p_firmwaresm7250_firmwarecsrb31024qca9563_firmwaremdm9650csra6620qca9987qcn9072qca9880_firmwareqca9992qcs4290sd765g_firmwareqca6420_firmwareipq8069_firmwareapq8009_firmwareqca6390_firmwaresd690_5gipq6000sd730_firmwarewcd9370sd675_firmwareipq8072qcn5152_firmwareqca6426qca6584au_firmwarewcn3990_firmwareqrb5165n_firmwareqcn9000_firmwareqca9984_firmwareqca9377sm8450ipq5018wcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwarewcn3615_firmwareqca9563ipq8074asd662qcn5124_firmwareqca9982sa8155qca6320_firmwarewcn3680b_firmwareqcn5122_firmwaresdx55_firmwarewcn3615qcn6023_firmwareqca6595auwcn3999_firmwarewcn3610_firmwareqca6436_firmwareqrb5165nipq5010qca6564au_firmwareqca6584ausd778gsa6155p_firmwareqca6310ipq8174wcn7851qca9990qcs6490sdxr2_5gqcn5052qca9367sa415m_firmwarewcn3988_firmwareqcn9074sd205sa6145p_firmwaresd778g_firmwaresa8195pwsa8810_firmwareqca6694sm8450_firmwaresd765_firmwarewcd9326wcd9335qca8081qca9982_firmwareqcn6023ipq8071aipq8071a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwareqca6390qca9898_firmwarewcd9375aqt1000ar8035csr8811ipq4019qca6694_firmwaremsm8953_firmwareqcn9100_firmwaresd210ipq5010_firmwareipq8074a_firmwaresd888_5g_firmwarewsa8815_firmwareqcm6490wcn6850_firmwarewsa8835_firmwareqca6564aqca9988qcm6125_firmwareqca9882wcn3990qcn9000sd_675sd780gsd865_5gqca6595ar9380_firmwaresm8450p_firmwareqcn9012qca9558_firmwareqca9896_firmwarewsa8835ipq8065_firmwaremsm8996ausd665_firmwaresd888_5gqcn5154qca8075_firmwareipq4018qca6574aipq6005_firmwaremdm9206wcn6855_firmwareqca9889qca9888qca6310_firmwaresm7325ipq8074qca9994_firmwarewcn6750ipq8070a_firmwareipq8076_firmwareqca6574_firmwareqca9886qcn5502_firmwaresd855sd665ipq8076sd765qca9887qca6574a_firmwareqcn5021ipq8069qcn5152sd768g_firmwareapq8009sd460qca6391ipq6005aqt1000_firmwareqcn9100sdx65_firmwareqcm4290csrb31024_firmwareqcm6490_firmwareqca9882_firmwareqcn9070_firmwaresd480_firmwareipq6028_firmwareipq8072a_firmwareqca9531ipq8074_firmwareqca6574auqca9889_firmwaresa8155p_firmwareqcn5122sd205_firmwarewcd9341_firmwareqcm6125wsa8810sm8450pqcn5500_firmwarewcn6856qcn5022wcn3680bsd768gipq6010_firmwarewcn6740qca6696sa6150pqca8075qcn9022_firmwareapq8096au_firmwareqcn6024qcn9022qca9990_firmwareipq8070aqcn9072_firmwareipq6000_firmwareipq8071_firmwareqcn9074_firmwareqcs410_firmwareipq4029sm7325_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-416
Use After Free
CVE-2024-33055
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 3.85%
||
7 Day CHG~0.00%
Published-06 Jan, 2025 | 10:33
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Computer Vision

Memory corruption while invoking IOCTL calls to unmap the DMA buffers.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcm8550_firmwaresa6150p_firmwarewsa8845_firmwaresxr2250p_firmwarewsa8832sa6155p_firmwarewsa8840qam8295p_firmwareqcs8550_firmwareqca6696snapdragon_8_gen_2_mobile_firmwarewcd9385wcd9395_firmwaresxr1230p_firmwarewcd9390_firmwaresnapdragon_8_gen_2_mobilesg8275pwsa8832_firmwaresa8195p_firmwarewcd9395ssg2125psg8275p_firmwaresnapdragon_8\+_gen_2_mobileqca6574au_firmwaresa8195pqam8295pqca6574auwcd9390wsa8845h_firmwaresm8550p_firmwaresxr2250pqcm8550qcs6490_firmwarewsa8835wsa8840_firmwaresxr2230p_firmwaresa8295p_firmwareqca6696_firmwarewsa8845hwcd9380_firmwaresa6150psa8155p_firmwaresa8155psd_8_gen1_5gwsa8830snapdragon_ar2_gen_1_firmwaresm8550psa6145pssg2115psnapdragon_8_gen_3_mobile_firmwaresd_8_gen1_5g_firmwarefastconnect_7800_firmwarefastconnect_6900ssg2125p_firmwarewcd9385_firmwarefastconnect_6900_firmwaresa8295pwcd9380sa6145p_firmwareqcs8550sxr2230pfastconnect_7800sa8145p_firmwaresa8150psnapdragon_8\+_gen_2_mobile_firmwaresa8150p_firmwarewsa8845snapdragon_ar2_gen_1sa6155pvideo_collaboration_vc3_platform_firmwaresa8145pwsa8835_firmwaresxr1230pssg2115p_firmwareqcs6490snapdragon_8_gen_3_mobilewsa8830_firmwarevideo_collaboration_vc3_platformSnapdragon
CWE ID-CWE-416
Use After Free
CVE-2024-33029
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.07%
||
7 Day CHG~0.00%
Published-04 Nov, 2024 | 10:04
Updated-08 Nov, 2024 | 04:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in DSP Services

Memory corruption while handling the PDR in driver for getting the remote heap maps.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6584ausnapdragon_auto_5g_modem-rf_gen_2_firmwareqca6584au_firmwaresnapdragon_auto_5g_modem-rf_gen_2qca6698aqqca6698aq_firmwareSnapdragonqca6584au_firmwareqca6698aq_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmware
CWE ID-CWE-416
Use After Free
CVE-2024-33059
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 3.85%
||
7 Day CHG~0.00%
Published-06 Jan, 2025 | 10:33
Updated-10 Jan, 2025 | 16:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Computer Vision

Memory corruption while processing frame command IOCTL calls.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sg8275psg8275p_firmwarewcd9380_firmwarewcd9385_firmwaresnapdragon_8_gen_2_mobilewcd9395fastconnect_7800wsa8845hwsa8840wcd9390_firmwareqcs8550_firmwareqcs8550wcd9385snapdragon_8_gen_2_mobile_firmwarewcd9380wcd9390sm8550pwcd9395_firmwarewsa8845fastconnect_6900_firmwareqcm8550_firmwaresnapdragon_8\+_gen_2_mobilewsa8845_firmwarefastconnect_6900wsa8845h_firmwarefastconnect_7800_firmwareqcm8550wsa8840_firmwaresnapdragon_8\+_gen_2_mobile_firmwaresnapdragon_8_gen_3_mobilesnapdragon_8_gen_3_mobile_firmwaresm8550p_firmwareSnapdragon
CWE ID-CWE-416
Use After Free
CVE-2024-33053
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 5.12%
||
7 Day CHG~0.00%
Published-02 Dec, 2024 | 10:18
Updated-12 Dec, 2024 | 15:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Video

Memory corruption when multiple threads try to unregister the CVP buffer at the same time.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wsa8830qca8337_firmwaresa6150p_firmwarewcd9380_firmwaresa8145p_firmwareqcs610qca8337sd865_5gfastconnect_6800snapdragon_870_5g_mobile_platform_firmwaresnapdragon_865_5g_mobile_platformsa8530p_firmwarewsa8835wcn3950_firmwaresa8540p_firmwarewcd9380sa8150p_firmwarevideo_collaboration_vc3_platformqcs410wcd9370sxr2130qca6426video_collaboration_vc3_platform_firmwarec-v2x_9150_firmwarewcn3980sa8530pwcd9385_firmwareqam8295pwcn3950fastconnect_6200sa9000pwcn3660bwsa8815snapdragon_865\+_5g_mobile_platformqam8295p_firmwaresnapdragon_xr2_5g_platform_firmwareqca6426_firmwarewcn3660b_firmwaresa9000p_firmwaresnapdragon_x55_5g_modem-rf_systemfastconnect_6200_firmwareqca6574au_firmwaresdx55_firmwarewcn3680b_firmwarewcd9375_firmwarewcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresm7250p_firmwareqca6391qca6436_firmwaresa8295psa6155p_firmwaresnapdragon_865\+_5g_mobile_platform_firmwaresnapdragon_870_5g_mobile_platformsnapdragon_690_5g_mobile_platform_firmwaresnapdragon_xr2_5g_platformfastconnect_6900fastconnect_6900_firmwarevideo_collaboration_vc1_platform_firmwaresnapdragon_765g_5g_mobile_platformwcn3988_firmwareqca6574auqcn9074sa6145p_firmwaresa8155p_firmwarec-v2x_9150sa8195pwsa8810_firmwarewcd9341_firmwarewsa8810snapdragon_765g_5g_mobile_platform_firmwareqca6436sa6155psa8540pqcs610_firmwaresnapdragon_765_5g_mobile_platform_firmwaresnapdragon_690_5g_mobile_platformqsm8250sa6145pwcn3680bwcd9385sxr2130_firmwarewcd9341qca6696_firmwaresa8145pqca6696snapdragon_750g_5g_mobile_platformqca6391_firmwarewcd9375wcd9370_firmwaresa8150psa6150psdx55snapdragon_768g_5g_mobile_platformsa8155pwsa8830_firmwaresnapdragon_768g_5g_mobile_platform_firmwaresd865_5g_firmwaresnapdragon_765_5g_mobile_platformwcn3988wsa8815_firmwarewsa8835_firmwarevideo_collaboration_vc1_platformsm7250psa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwareqcn9074_firmwarefastconnect_6800_firmwareqcs410_firmwaresa8295p_firmwaresnapdragon_750g_5g_mobile_platform_firmwareqsm8250_firmwareSnapdragonqualcomm_video_collaboration_vc1_platform_firmwaresa6155p_firmwareqca8337_firmwarewcd9380_firmwaresa6150p_firmwaresnapdragon_690_5g_mobile_platform_firmwaresa8145p_firmwarewsa8835_firmwarefastconnect_6900_firmwaresa8530p_firmwarewcn3988_firmwaresa6145p_firmwaresa8155p_firmwarewcn3950_firmwaresa8540p_firmwarewsa8815_firmwarewsa8810_firmwaresa8150p_firmwarewcd9341_firmwareqcs610_firmwaresxr2130_firmwarec-v2x_9150_firmwareqca6696_firmwarequalcomm_video_collaboration_vc3_platform_firmwareqca6391_firmwarewcd9385_firmwarewcd9370_firmwarewcn3680b_firmwarewsa8830_firmwareqam8295p_firmwaresd865_5g_firmwaresm7250p_firmwareqca6426_firmwaresnapdragon_xr2_5g_platform_firmwaresa9000p_firmwarewcn3660b_firmwarefastconnect_6200_firmwareqca6574au_firmwaresa8195p_firmwaresdx55_firmwaresnapdragon_865_5g_mobile_platform_firmwarewcd9375_firmwareqcn9074_firmwarefastconnect_6800_firmwareqcs410_firmwaresa8295p_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcn3980_firmwareqca6436_firmwaresnapdragon_750g_5g_mobile_platform_firmwareqsm8250_firmware
CWE ID-CWE-416
Use After Free
CVE-2023-43544
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 5.60%
||
7 Day CHG~0.00%
Published-03 Jun, 2024 | 10:05
Updated-27 Jan, 2025 | 19:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Audio

Memory corruption when IPC callback handle is used after it has been released during register callback by another thread.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6584au_firmwarewsa8835wsa8835_firmwarewcn3988_firmwareqca8337_firmwaresa9000pqfw7124_firmwaresnapdragon_w5\+_gen_1_wearablewsa8830qcc710qca6698aqqca8081_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqca6584auqcn6224_firmwareqfw7114_firmwareqca8081sa8770p_firmwaresnapdragon_w5\+_gen_1_wearable_firmwaresw5100_firmwaresnapdragon_x75_5g_modem-rfqcn6224qcn6274_firmwareqfw7114fastconnect_7800qca6698aq_firmwaresa9000p_firmwareqam8255par8035fastconnect_7800_firmwaresw5100p_firmwaresa8255p_firmwaresnapdragon_auto_5g_modem-rf_gen_2sw5100pwcd9340sa8775pqca8337wcn3980_firmwareqcc710_firmwarear8035_firmwareqcn6274qfw7124wcn3980qam8255p_firmwarewcd9340_firmwaresa8255psa8775p_firmwarewcn3988qam8775psa8770pwsa8830_firmwaresw5100qam8775p_firmwaresnapdragon_x75_5g_modem-rf_firmwareSnapdragonqam8255p_firmwareqca8337_firmwaresa8770p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqam8775p_firmwareqca6584au_firmwareqcn6274_firmwaresa8775p_firmwareqfw7114_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewcd9340_firmwarewcn3988_firmwareqcc710_firmwareqcn6224_firmwarewsa8830_firmwaresa9000p_firmwarewsa8835_firmwarefastconnect_7800_firmwaresw5100_firmwareqca8081_firmwarewcn3980_firmwaresa8255p_firmwareqfw7124_firmwaresw5100p_firmwarear8035_firmwareqca6698aq_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmware
CWE ID-CWE-416
Use After Free
CVE-2023-43543
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 5.60%
||
7 Day CHG~0.00%
Published-03 Jun, 2024 | 10:05
Updated-27 Jan, 2025 | 19:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Audio

Memory corruption in Audio during a playback or a recording due to race condition between allocation and deallocation of graph object.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6584au_firmwarewsa8835wsa8835_firmwarewcn3988_firmwaresa9000psnapdragon_w5\+_gen_1_wearablewsa8830qca6698aqsnapdragon_auto_5g_modem-rf_gen_2_firmwareqca6584ausa8770p_firmwaresnapdragon_w5\+_gen_1_wearable_firmwaresw5100_firmwareqca6698aq_firmwaresa9000p_firmwareqam8255psw5100p_firmwaresa8255p_firmwaresnapdragon_auto_5g_modem-rf_gen_2sw5100psa8775pwcn3980_firmwarewcn3980qam8255p_firmwaresa8255psa8775p_firmwarewcn3988qam8775psa8770pwsa8830_firmwaresw5100qam8775p_firmwareSnapdragonqam8255p_firmwaresa8770p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqam8775p_firmwareqca6584au_firmwaresa8775p_firmwarewcn3988_firmwarewsa8830_firmwaresa9000p_firmwarewsa8835_firmwaresw5100_firmwarewcn3980_firmwaresa8255p_firmwaresw5100p_firmwareqca6698aq_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmware
CWE ID-CWE-416
Use After Free
CVE-2023-43521
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 4.55%
||
7 Day CHG~0.00%
Published-06 May, 2024 | 14:32
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in HLOS

Memory corruption when multiple listeners are being registered with the same file descriptor.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sw5100pqcs410_firmwaresa6150p_firmwaresd865_5gqcs610_firmwaresxr2130_firmwaresrv1mqca8081_firmwarewcd9370ar8035_firmwareqca6696wcd9340_firmwarewcd9341_firmwareqcc710_firmwareqca6426wcn3610qcn9074wsa8815_firmwaresnapdragon_wear_4100\+_firmwaresa8195p_firmwareqca8337_firmwareqca8337qca6426_firmwareqca6574au_firmwaresnapdragon_x72_5g_modem-rfqam8295pwcd9341qca6574ausa8620p_firmwarewcn3950wsa8810_firmwaresnapdragon_870_5g_mobile_firmwaresa9000p_firmwaresrv1hsnapdragon_auto_5g_modem-rf_gen_2_firmwarewcn3660b_firmwarefastconnect_6800_firmwaresa8295p_firmwaresnapdragon_870_5g_mobilevideo_collaboration_vc1_platform_firmwaresa8770pc-v2x_9150qca6584auqcn6274_firmwareqcc710snapdragon_xr2_5g_firmwaresw5100_firmwarefastconnect_6800qfw7114_firmwaresnapdragon_wear_4100\+fastconnect_7800_firmwarefastconnect_6900snapdragon_w5\+_gen_1_wearable_firmwarevideo_collaboration_vc1_platformsnapdragon_865_5g_mobile_firmwaresa7255pqfw7114fastconnect_6900_firmwareqam8255p_firmwarewcd9380sa6145p_firmwareqam8255psnapdragon_xr2_5gsnapdragon_8_gen_1_mobile_firmwaresa8150psa6155pwsa8810qam8650psa9000psrv1h_firmwaresw5100video_collaboration_vc3_platformc-v2x_9150_firmwaresa6155p_firmwareqam8295p_firmwaresrv1m_firmwaresnapdragon_x55_5g_modem-rfqfw7124_firmwareqca6698aq_firmwareqca6436_firmwaresnapdragon_8_gen_1_mobilesnapdragon_x55_5g_modem-rf_firmwarewcn3610_firmwaresa8255psnapdragon_865\+_5g_mobilewcd9370_firmwaresa7255p_firmwaresnapdragon_x72_5g_modem-rf_firmwarewcn3660bsxr2130qca6174asa8195pwcd9340qamsrv1msnapdragon_auto_5g_modem-rf_gen_2qca6174a_firmwareqam8650p_firmwarewcn3988qca6584au_firmwarewcn3980_firmwareqcn6274qca6436qfw7124sa8775psnapdragon_w5\+_gen_1_wearablewsa8835qca6391_firmwaresw5100p_firmwaresa8775p_firmwareqamsrv1hqca6696_firmwarewcd9380_firmwaresa6150pqcs410sa8155p_firmwareqca8081wsa8815sa8155pwsa8830qam8775psa6145psnapdragon_x75_5g_modem-rfqcn9074_firmwaresa8620psa8255p_firmwarear8035qamsrv1m_firmwaresa8650p_firmwaresnapdragon_865_5g_mobileqca6391qcn6224snapdragon_865\+_5g_mobile_firmwareqca6698aqwcn3950_firmwaresa8770p_firmwaresa8295pfastconnect_7800sa8145p_firmwaresa8650pqam8775p_firmwaresd865_5g_firmwarewcn3680bsa8150p_firmwarewcn3988_firmwareqamsrv1h_firmwarevideo_collaboration_vc3_platform_firmwaresa8145psnapdragon_x75_5g_modem-rf_firmwarewsa8835_firmwarewcn3980wsa8830_firmwarewcn3680b_firmwareqcn6224_firmwareqcs610Snapdragonqam8255p_firmwarequalcomm_video_collaboration_vc1_platform_firmwareqca8337_firmwarewcd9380_firmwaresa6150p_firmwaresa8145p_firmwareqcn6224_firmwarewcn3950_firmwaresa8150p_firmwaresnapdragon_x72_5g_modem-rf_system_firmwareqca6584au_firmwarec-v2x_9150_firmwareqfw7114_firmwarequalcomm_video_collaboration_vc3_platform_firmwareqamsrv1h_firmwarewcd9340_firmwareqam8295p_firmwaresnapdragon_xr2_5g_platform_firmwareqca6426_firmwarewcn3660b_firmwaresa9000p_firmwarewcn3680b_firmwareqca6574au_firmwareqca8081_firmwarewcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcn3610_firmwareqca6436_firmwaresa8620p_firmwaresa6155p_firmwareqcn6274_firmwaresa8775p_firmwaresa8650p_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900_firmwaresrv1h_firmwarewcn3988_firmwaresa6145p_firmwaresa8155p_firmwaresa7255p_firmwarewsa8810_firmwarewcd9341_firmwarefastconnect_7800_firmwaresa8255p_firmwaresw5100p_firmwareqcs610_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareqca6698aq_firmwareqamsrv1m_firmwaresrv1m_firmwareqca6174a_firmwareqam8650p_firmwaresa8770p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqam8775p_firmwaresxr2130_firmwareqca6696_firmwareqca6391_firmwarewcd9370_firmwareqcc710_firmwarewsa8830_firmwaresd865_5g_firmwarewsa8815_firmwarewsa8835_firmwaresa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwaresw5100_firmwareqcn9074_firmwarefastconnect_6800_firmwareqcs410_firmwaresa8295p_firmwareqfw7124_firmwarear8035_firmware
CWE ID-CWE-416
Use After Free
CVE-2023-28577
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 5.78%
||
7 Day CHG~0.00%
Published-08 Aug, 2023 | 09:15
Updated-02 Aug, 2024 | 13:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple Dmabuf Kernel Address UAF Vulnerability

In the function call related to CAM_REQ_MGR_RELEASE_BUF there is no check if the buffer is being used. So when a function called cam_mem_get_cpu_buf to get the kernel va to use, another thread can call CAM_REQ_MGR_RELEASE_BUF to unmap the kernel va which cause UAF of the kernel address.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800snapdragon_865_5gwcd9380_firmwarewsa8830qcs610sw5100psd865_5gfastconnect_6900fastconnect_6800fastconnect_6900_firmwaresnapdragon_8_gen_1_firmwarewcn3988_firmwareqcn9074snapdragon_870_5gwsa8835wcn3950_firmwaresnapdragon_8_gen_1wsa8810_firmwarewcd9380wcd9341_firmwarefastconnect_7800_firmwaresw5100wsa8810qca6436qcs410snapdragon_865\+_5gsnapdragon_x55_5gqcs610_firmwaresw5100p_firmwaresxr2130wcd9370snapdragon_865\+_5g_firmwarewcn3680bqca6426sxr2130_firmwarewcd9341wcn3980qca6391_firmwarewcn3950snapdragon_xr2_5g_firmwarewcd9370_firmwarewcn3660bwsa8815snapdragon_870_5g_firmwarewsa8830_firmwaresd865_5g_firmwareqca6426_firmwarewcn3660b_firmwarewcn3988wsa8815_firmwaresnapdragon_x55_5g_firmwarewcn3680b_firmwarewsa8835_firmwaresw5100_firmwareqcn9074_firmwarefastconnect_6800_firmwareqcs410_firmwaresnapdragon_865_5g_firmwareqca6391wcn3980_firmwareqca6436_firmwaresnapdragon_xr2_5gSnapdragonwcd9380_firmwaresxr2130_firmwareqca6391_firmwarefastconnect_6900_firmwarewcd9370_firmwareqca6436_firmwarewcn3988_firmwarewsa8830_firmwaresd865_5g_firmwaresnapdragon_xr2_5g_platform_firmwarewcn3950_firmwareqca6426_firmwarewcn3660b_firmwarewsa8810_firmwarewsa8815_firmwarewcd9341_firmwarefastconnect_7800_firmwareqcs610_firmwarewsa8835_firmwarewcn3680b_firmwaresnapdragon_865_5g_mobile_platform_firmwaresw5100_firmwareqcn9074_firmwarefastconnect_6800_firmwaresw5100p_firmwareqcs410_firmwaresnapdragon_8_gen_1_mobile_platform_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcn3980_firmware
CWE ID-CWE-416
Use After Free
CVE-2023-22383
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 11.08%
||
7 Day CHG~0.00%
Published-05 Dec, 2023 | 03:03
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Camera

Memory Corruption in camera while installing a fd for a particular DMA buffer.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sw5100pqcs410_firmwaresa6150p_firmwaresd865_5gsnapdragon_865_5g_mobile_platform_firmwareqcs8155_firmwarec-v2x_9150_firmwaresa6155p_firmwareqam8295p_firmwaresd855qcs610_firmwaresxr2130_firmwarewcd9370wsa8830_firmwareqca6696snapdragon_870_5g_mobile_platform_firmwareqca6436_firmwarewcd9341_firmwaresnapdragon_wear_4100\+_platform_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwarewcn3610_firmwareqca6426snapdragon_855\+\/860_mobile_platform_firmwarefastconnect_6700wcn3610qca6420snapdragon_865\+_5g_mobile_platform_firmwareqcn9074qca6430wsa8815_firmwaresa8195p_firmwarewcd9370_firmwareqca8337_firmwaresdx55_firmwareqca8337qca6426_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcn3660bsxr2130qca6574au_firmwaresa8195pqam8295pwcd9341qca6574ausnapdragon_855_mobile_platformwcn3950wsa8810_firmwaresnapdragon_xr2_5g_platformsnapdragon_855_mobile_platform_firmwareqca6420_firmwareaqt1000_firmwarewcn3988qcs6490_firmwaresd855_firmwarewcn3980_firmwarewcn3660b_firmwareqca6436wsa8835qca6391_firmwareqca6430_firmwaresnapdragon_870_5g_mobile_platformsw5100p_firmwarefastconnect_6800_firmwaresa8295p_firmwareqca6696_firmwaresnapdragon_865_5g_mobile_platformwcd9380_firmwaresa6150pqcs410sa8155p_firmwarewsa8815wcn3680b_firmwarevideo_collaboration_vc1_platform_firmwaresa8155pwsa8830c-v2x_9150sa6145pqcn9074_firmwaresw5100_firmwaresdx55qsm8250_firmwarefastconnect_6800fastconnect_6900qca6391video_collaboration_vc1_platformwcn3950_firmwaresnapdragon_x55_5g_modem-rf_systemfastconnect_6900_firmwaresa8295pwcd9380sa6145p_firmwarefastconnect_6200wcn3680bsa8145p_firmwaresnapdragon_xr2_5g_platform_firmwaresd865_5g_firmwaresa8150pqcs8155sa8150p_firmwaresnapdragon_855\+\/860_mobile_platformsnapdragon_w5\+_gen_1_wearable_platformwcn3988_firmwaresa6155pfastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwaresa8145psnapdragon_wear_4100\+_platformwsa8835_firmwarewsa8810qcs6490wcn3980snapdragon_865\+_5g_mobile_platformqsm8250fastconnect_6200_firmwaresw5100video_collaboration_vc3_platformaqt1000qcs610Snapdragon
CWE ID-CWE-416
Use After Free
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-22668
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 11.08%
||
7 Day CHG~0.00%
Published-05 Dec, 2023 | 03:03
Updated-02 Aug, 2024 | 10:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Audio

Memory Corruption in Audio while invoking IOCTLs calls from the user-space.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_855\+\/860_mobile_platform_firmwareqam8255p_firmwarewsa8830qca8337_firmwarewcd9380_firmwaresw5100pqca8337sd865_5gqfw7124fastconnect_6800snapdragon_w5\+_gen_1_wearable_platformqam8775psnapdragon_870_5g_mobile_platform_firmwarear8035_firmwaresnapdragon_865_5g_mobile_platformqualcomm_215_mobile_platformqualcomm_205_mobile_platformqcn6224_firmwarewsa8835snapdragon_212_mobile_platformqcn6274wcd9380qca6420_firmwaresnapdragon_wear_4100\+_platform_firmwaresnapdragon_210_processorsnapdragon_855\+\/860_mobile_platformsxr2130snapdragon_wear_4100\+_platformqca6426qca6584au_firmwareqca6430_firmwarewcn3980qfw7114_firmwarefastconnect_6200sa9000pwcd9340_firmwaresd855wsa8815snapdragon_865\+_5g_mobile_platformsnapdragon_xr2_5g_platform_firmwareqca6426_firmwaresa9000p_firmwaresnapdragon_x55_5g_modem-rf_systemsa8775pfastconnect_6200_firmwaresnapdragon_212_mobile_platform_firmwareqca8081_firmwarewcn3980_firmwareqfw7114snapdragon_x55_5g_modem-rf_system_firmwareqca6391wcn3610_firmwareqca6420qca6436_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwarefastconnect_7800aqt1000_firmwareqca6584ausnapdragon_865\+_5g_mobile_platform_firmwaresnapdragon_870_5g_mobile_platformqcn6274_firmwaresnapdragon_xr2_5g_platformsa8775p_firmwareqca6698aqfastconnect_6900snapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900_firmwarewcn3988_firmwareqca6430wcd9340wsa8810_firmwareqcn6224wcd9341_firmwarefastconnect_7800_firmwaresw5100wsa8810qca6436sa8255p_firmwaresnapdragon_x75_5g_modem-rf_systemsw5100p_firmwareqca8081qca6698aq_firmwaresnapdragon_auto_5g_modem-rf_gen_2qualcomm_215_mobile_platform_firmwarequalcomm_205_mobile_platform_firmwaresa8770p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqam8775p_firmwaresa8255psxr2130_firmwarewcd9341qcc710qca6391_firmwarear8035snapdragon_855_mobile_platform_firmwareaqt1000snapdragon_210_processor_firmwaresnapdragon_855_mobile_platformqcc710_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3988wsa8815_firmwarewsa8835_firmwaresnapdragon_865_5g_mobile_platform_firmwaresw5100_firmwarefastconnect_6800_firmwareqfw7124_firmwareqam8255psa8770pwcn3610Snapdragon
CWE ID-CWE-416
Use After Free
CVE-2024-23370
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.57%
||
7 Day CHG~0.00%
Published-07 Oct, 2024 | 12:58
Updated-16 Oct, 2024 | 20:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Automotive Multimedia

Memory corruption when a process invokes IOCTL calls from user-space to create a HAB virtual channel and another process invokes IOCTL calls to destroy the same.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwareqca6584auwsa8830qca9367_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqca6584au_firmwaresw5100psnapdragon_auto_5g_modem-rf_gen_2wcn3980qca9377qca6698aqqca9367wcn3988_firmwarewsa8830_firmwarewsa8835wcn3988wsa8835_firmwaresw5100sw5100_firmwarewcn3980_firmwaresw5100p_firmwareqca6698aq_firmwareSnapdragonwcn3988_firmwareqca9377_firmwarewsa8830_firmwareqca9367_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqca6584au_firmwarewsa8835_firmwaresw5100_firmwarewcn3980_firmwaresw5100p_firmwareqca6698aq_firmware
CWE ID-CWE-416
Use After Free
CVE-2022-33225
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 7.59%
||
7 Day CHG~0.00%
Published-09 Feb, 2023 | 06:58
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use after free in Trusted Application Environment

Memory corruption due to use after free in trusted application environment.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6564au_firmwarewcd9380_firmwaresdm429wmsm8996au_firmwaresd429sdxr2_5gsd865_5gwcn6851_firmwareqca6564ausdx55m_firmwaremdm9628_firmwareqca6574ausd205sd429_firmwaremsm8996ausd205_firmwareqca6564a_firmwaresdm429w_firmwarewcd9340wsa8810_firmwarequalcomm215_firmwarewcd9380wsa8810sd870qca6390_firmwareqca6436qualcomm215wcn6851sd210_firmwareqca6574aqca6426apq8096ausd870_firmwareqca6391_firmwaresdxr2_5g_firmwareqca6390mdm9628wcd9340_firmwarewcn3660bwsa8815wcn6850apq8096au_firmwaresd210sd865_5g_firmwarewcn3620_firmwareqca6426_firmwarewcn3660b_firmwarewcn6850_firmwareqca6574a_firmwarewcn3620qca6574au_firmwarewsa8815_firmwarewcn3610_firmwareqca6564aqca6391sdx55mqca6436_firmwarewcn3610Snapdragonqca6564au_firmwarewcd9380_firmwaremsm8996au_firmwaresd870_firmwareqca6391_firmwaresdxr2_5g_firmwarewcn6851_firmwaresdx55m_firmwaremdm9628_firmwarewcd9340_firmwareapq8096au_firmwaresd429_firmwaresd205_firmwaresdm429w_firmwareqca6564a_firmwaresd865_5g_firmwarewcn3620_firmwareqca6426_firmwarewsa8810_firmwarequalcomm215_firmwarewcn3660b_firmwarewcn6850_firmwareqca6574a_firmwarewsa8815_firmwareqca6574au_firmwareqca6390_firmwarewcn3610_firmwaresd210_firmwareqca6436_firmware
CWE ID-CWE-416
Use After Free
CVE-2022-33298
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.04%
||
7 Day CHG~0.00%
Published-04 Apr, 2023 | 04:46
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use after free in Modem

Memory corruption due to use after free in Modem while modem initialization.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wsa8830sa6150p_firmwaresa8145p_firmwarewcn3950_firmwaresa8150p_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwaresd730_firmwarewcd9370snapdragon_835_mobile_platform_firmwareqca6564qca6426wcn685x-1wcn3990_firmwaresm4375wcn3998sm8250-abwcd9385_firmwarewcn3950wcd9326_firmwaresm6375_firmwarewcn3660bsm7150-acqca6320_firmwaresnapdragon_x55_5g_modem-rf_systemqca6574au_firmwaresdx55_firmwarewcn3680b_firmwareqca6595auwcn3998_firmwarewcd9375_firmwarewcn3610_firmwareqca6420qca6436_firmwaresm4350-acsnapdragon_w5\+_gen_1_wearable_platform_firmwareqca6564au_firmwaresa6155p_firmwareqca6310sm8250_firmwaresm8250-acwcn3988_firmwareqca6430sa6145p_firmwaresm6250wcd9340sa8195psxr1120sdm710_firmwarewsa8810_firmwaresm4375_firmwaresw5100qca6436wcd9326wcd9335sa6155pwcn685x-1_firmwarewcd9385sm8150_firmwaresxr2130_firmwarewcd9341qca6696_firmwaresm7150-abqca6390sm4350_firmwarewcd9375aqt1000sa8150psm6250_firmwaresm6150_firmwaresm8250-ac_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwaresm8150wcn3988wsa8815_firmwarewsa8835_firmwaresa8195p_firmwaresxr1120_firmwarewcn3610sm6375wcd9380_firmwarewcn3990sw5100psd865_5gsnapdragon_w5\+_gen_1_wearable_platformqca6564ausm8150-acsm6150wsa8835snapdragon_835_mobile_platformwcd9380snapdragon_wear_4100\+_platform_firmwaresxr2130qca6574asnapdragon_wear_4100\+_platformwcn685x-5_firmwaresm7150-aa_firmwareqca6310_firmwareqca6430_firmwarewcd9335_firmwarewcn3980sm7150-ac_firmwarewcd9340_firmwaresd855sm6150-ac_firmwarewsa8815qca6320snapdragon_xr2_5g_platform_firmwareqca6426_firmwarewcn3660b_firmwareqca6574a_firmwaresd835wcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresd730qca6391sm8250-ab_firmwaresnapdragon_x50_5g_modem-rf_system_firmwaresm7150-aasm7125aqt1000_firmwaresnapdragon_xr2_5g_platformsnapdragon_xr1_platformsm7150-ab_firmwarewcn685x-5qca6574ausa8155p_firmwaresdm710wcd9341_firmwarewsa8810sw5100p_firmwaresm8150-ac_firmwaresa6145pwcn3680bsd835_firmwareqca6564_firmwaresa8145pqca6696qca6391_firmwaresm4350wcd9370_firmwaresm6150-acsm4350-ac_firmwaresm7125_firmwaresa6150psdx55snapdragon_x50_5g_modem-rf_systemsa8155psm8250sw5100_firmwaresnapdragon_xr1_platform_firmwareSnapdragonwcd9380_firmwaresa6150p_firmwaresa8145p_firmwarewcn3950_firmwaresa8150p_firmwareqca6420_firmwareqca6595au_firmwaresd730_firmwaresnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_835_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwarewcn3990_firmwareqca6310_firmwareqca6430_firmwarewcd9335_firmwarewcd9385_firmwarewcd9326_firmwarewcd9340_firmwaresnapdragon_xr2_5g_platform_firmwareqca6426_firmwarewcn3660b_firmwareqca6320_firmwarefastconnect_6200_firmwarewcn3680b_firmwareqca6574a_firmwareqca6574au_firmwaresdx55_firmwaresnapdragon_695_5g_mobile_platform_firmwarewcd9375_firmwarewcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcn3610_firmwareqca6436_firmwaresnapdragon_x50_5g_modem-rf_system_firmwareaqt1000_firmwareqca6564au_firmwaresa6155p_firmwarefastconnect_6900_firmwarewcn3988_firmwaresa6145p_firmwaresa8155p_firmwarewsa8810_firmwarewcd9341_firmwaresw5100p_firmwaresd835_firmwareqca6564_firmwaresxr2130_firmwareqca6696_firmwareqca6391_firmwaresnapdragon_710_mobile_platform_firmwaresnapdragon_855_mobile_platform_firmwarewcd9370_firmwaresm6250_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewsa8815_firmwarewsa8835_firmwaresa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwaresw5100_firmwarefastconnect_6800_firmwaresxr1120_firmwaresnapdragon_720g_mobile_platform_firmwaresnapdragon_xr1_platform_firmwaresnapdragon_675_mobile_platform_firmware
CWE ID-CWE-416
Use After Free
CVE-2022-33263
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 7.59%
||
7 Day CHG~0.00%
Published-06 Jun, 2023 | 07:38
Updated-07 Jan, 2025 | 19:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use after free in Core

Memory corruption due to use after free in Core when multiple DCI clients register and deregister.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwareqam8255p_firmwarewcn3991wsa8830wcd9380_firmwaresw5100psnapdragon_w5\+_gen_1_wearable_platformwcn785x-5sm8350-ac_firmwaresm8150-acwsa8835wcn3950_firmwaresd_8_gen1_5gwcd9380sm4450_firmwareqca6420_firmwareqca6595au_firmwaresnapdragon_wear_4100\+_platform_firmwaresm8350wcd9370snapdragon_wear_4100\+_platformwcn685x-5_firmwarewcn685x-1sm8450wcn6750qca6430_firmwarewcn3998wcn3980wcd9385_firmwarewcn3950sd_8_gen1_5g_firmwarewcn3660bsd855wsa8815sm4450wcn3660b_firmwareqca6574au_firmwarewcn3680b_firmwareqca6595auwcn3998_firmwarewcn785x-5_firmwarewcn3980_firmwarewcn3610_firmwareqca6420snapdragon_w5\+_gen_1_wearable_platform_firmwaresm8475_firmwareaqt1000_firmwarewcn6740_firmwaresa6155p_firmwareqcs8155wsa8832_firmwareqca6698aqsm8350_firmwarewcn685x-5wcn3988_firmwareqca6430qca6797aq_firmwarewcn785x-1_firmwareqca6574ausa8155p_firmwaresa8195pwsa8810_firmwarewcd9341_firmwaresm8450_firmwaresw5100wsa8810wsa8832sa8255p_firmwaresa6155psw5100p_firmwaresm8150-ac_firmwareqca6698aq_firmwarewcn3680bsm8350-acwcn685x-1_firmwarewcd9385sm8150_firmwaresa8255pwcd9341wcn6740qca6797aqwcd9370_firmwareaqt1000sa8155pwsa8830_firmwaresd855_firmwaresm8150wcn785x-1wcn3988wsa8815_firmwarewsa8835_firmwaresa8195p_firmwareqcs8155_firmwaresw5100_firmwaresm8475wcn6750_firmwareqam8255pwcn3610Snapdragon
CWE ID-CWE-416
Use After Free
CVE-2022-33245
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.35%
||
7 Day CHG~0.00%
Published-07 Mar, 2023 | 04:43
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use after free in WLAN

Memory corruption in WLAN due to use after free

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewsa8830sa6150p_firmwaresa8145p_firmwareqcs610csrb31024wcd9360_firmwaremdm9650csra6620wcn3950_firmwaresa8150p_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwaresa6155sd690_5gwcd9370csra6620_firmwarecsra6640_firmwareqca6564wcn3990_firmwaresa415mwcn3998qcn7605wcd9385_firmwarewcn3950wcn3660bsa8155qca6320_firmwareqca6574au_firmwaresdx55_firmwareqca6595ausa6155_firmwarewcd9375_firmwarewcn3998_firmwaresm7250p_firmwareqca6420wcd9360qca6564au_firmwaresa6155p_firmwareqca6310sa515m_firmwaresd429sa8155_firmwaresa415m_firmwareqcs405qca6430wcn3988_firmwareqcn9074sa6145p_firmwaresd429_firmwarewcd9340sa8195pwsa8810_firmwaresd765gsd765_firmwarewcn6851wcd9335sa6155pwcd9385wcd9341qca6696_firmwaresd750gwcd9375sd750g_firmwareapq8064auaqt1000sa8150pwsa8830_firmwaresd855_firmwarewcn3620_firmwarewcn3988wcn6850_firmwarewsa8815_firmwarewcn3620wsa8835_firmwaresa8195p_firmwareqcn7606_firmwareqca6564awcn3991wcd9380_firmwarewcn3990sdm429wmsm8996au_firmwareqca6564auwsa8835qca6574msm8996ausdm429w_firmwarewcd9380qcs410qca6574asd690_5g_firmwareqca6310_firmwareqca6430_firmwarewcd9335_firmwarewcn3980sa515mqca6574_firmwarewcd9340_firmwaresd855wsa8815wcn6850qca6320mdm9650_firmwareqca6175asd765wcn3660b_firmwareqca6574a_firmwaresd768g_firmwaresd835wcn3980_firmwareaqt1000_firmwareapq8064au_firmwarear8031_firmwarecsrb31024_firmwarewcn6851_firmwareqca6574ausa8155p_firmwareqca6564a_firmwarewcd9341_firmwarewsa8810qcn7605_firmwareqcs610_firmwaresa6145psd835_firmwareqca6564_firmwaresd768gapq8096auar8031qcs405_firmwaresa8145pqca6696wcd9370_firmwaresa6150psdx55apq8096au_firmwarecsra6640sa8155psm7250pqcn9074_firmwareqcs410_firmwareqca6175a_firmwareqcn7606Snapdragonwcn3991_firmwarewcd9380_firmwaresa6150p_firmwaresa8145p_firmwaremsm8996au_firmwarewcd9360_firmwaresdm429w_firmwarewcn3950_firmwaresa8150p_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwarecsra6620_firmwaresd690_5g_firmwarecsra6640_firmwarewcn3990_firmwareqca6310_firmwareqca6430_firmwarewcd9335_firmwarewcd9385_firmwareqca6574_firmwarewcd9340_firmwaremdm9650_firmwarewcn3660b_firmwareqca6320_firmwareqca6574a_firmwareqca6574au_firmwaresd768g_firmwaresdx55_firmwarewcd9375_firmwaresa6155_firmwarewcn3980_firmwarewcn3998_firmwaresm7250p_firmwareaqt1000_firmwareqca6564au_firmwaresa6155p_firmwaresa515m_firmwarear8031_firmwareapq8064au_firmwarecsrb31024_firmwarewcn6851_firmwaresa8155_firmwaresa415m_firmwarewcn3988_firmwaresa6145p_firmwaresa8155p_firmwaresd429_firmwareqca6564a_firmwarewsa8810_firmwarewcd9341_firmwaresd765_firmwareqcn7605_firmwareqcs610_firmwaresd835_firmwareqca6564_firmwareqca6696_firmwareqcs405_firmwaresd750g_firmwarewcd9370_firmwareapq8096au_firmwarewsa8830_firmwaresd855_firmwarewcn3620_firmwarewsa8815_firmwarewcn6850_firmwarewsa8835_firmwaresa8195p_firmwareqcn9074_firmwareqcs410_firmwareqcn7606_firmwareqca6175a_firmware
CWE ID-CWE-416
Use After Free
CVE-2020-11148
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 11.00%
||
7 Day CHG~0.00%
Published-21 Jan, 2021 | 09:41
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use after free issue in HIDL while using callback to post event in Rx thread when internal mutex is not acquired and meantime close is triggered and callback instance is deleted in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qfs2580qpm5870qfe2550wsa8830pm660qln5030qbt1500qdm5579pmi632qpa5581qdm2307qfs2530qpa8802pm6125qat3519qpa5373qpm4621qet6100sdr660gpmm855aupm8150aqtc800hqdm5670qpa8686msm8917pm7150lqpa8821pm7150asmb1396wcd9370pm8350qdm5671qca6426qat3518sd632qpm5641wcn3998wcn3950qat5516wtr2955wcn3660bqdm5620qfe4320qfe4308pm8350bhpm3003asa8155qdm5652sd6905gqat5533qca6595auqpm5679qbt2000qpm8870wcn3615sm7350pm6150aqpm6670qdm2305qpm8820sdr735gpm8937qpm4641pm8150bpm855qsm7250sd429pm8250smb1398qdm4643qfe2101smb1360pmx55qat3522pmr735aqca6421qdm3301sa8195ppm8953qat5515qpm5677sd765gqat3514qca6436sdr660sa6155pwcd9326wcn6851qpa6560sdr865smb1358wcd9341wcd9385pm439pmi8952qca6431smr545qln5020sd750gqdm3302qpm4630qca6390wcd9375qpa8673sa8150ppm6350pmm8195auqdm2310qdm5621qfe3340qln4642sda429wqdm5650wcn3988wtr3925pmi8937wcn3620pmk7350smb1390apq8017smr546pm6150lsd8885gwcn3610qet6110qln5040qpm8895qpm6585qtc410sqpm5670wcn3991wcn3990smb1355qln4650qpa8801sdm429wwgr7640qat5568qet5100qca6595pmk8350qpm8830sdxr25gpm6150pm8350bqat5522wsa8835pm7250bpm8150cpmr735bqfs2630qpa8842wcd9380qualcomm215qpa4360smb1381qca6574aqpa4361sdr735pm7250smb1395pm660lpm8350cqpa8803smr525smr526qpm4640pmk8003wcn3980pmr525qdm2301pm7350cqpm4650qsw8573qtm525qcs605sd855wsa8815wcn6850sd665qfe4305sd765smb1394wcn3680pm640pqfe4309qat3555pm8009smb1351qca6391sdx55mqpa5461qfe4373fcpm8008msm8953qsw8574qfe2520pm640aqfs2608pm855lpm8916qtc801sqdm4650sd8655gqfe4302qca6574auqpm5621qpm6582qsw6310qfe4303qpm6621wsa8810pm670pm8150lqdm2308qat3550qdm5677wcn6856qdm5679wcn3680bpm215qdm2302sdxr1sdr8250sd768gwcn6740qca6696qfe4301wtr2965qpm5875qet5100mpm640lpmk8002apq8053qpa2625sd675pm8350bhssdx55sd439qet4101qat3516pm670lsm7250pqpm5658pm855bqpa5580Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
CWE ID-CWE-416
Use After Free
CVE-2022-25677
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 7.22%
||
7 Day CHG~0.00%
Published-13 Dec, 2022 | 00:00
Updated-22 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory corruption in diag due to use after free while processing dci packet in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380_firmwareqcn9072_firmwaremsm8996auqca6310qca6595au_firmwareqcn9000qualcomm215_firmwaresd429_firmwaresd730ipq6028qcn9070qcn5122qsm8250_firmwareqca6564auqca6426_firmwarewcn3660bsd720gipq8078asd205_firmwaremsm8996au_firmwareqca9889_firmwareqcn5124wsa8815ipq9008wcn3680bqca6430wcn3620_firmwaresd855ipq9008_firmwarewcd9340sdx55_firmwaresdxr2_5g_firmwareqcn5022_firmwaremdm9650qca8072qca6574asd865_5g_firmwaresdm429w_firmwaresd835_firmwareqcn5024ipq4019_firmwareqca9994qca6335sd_675qcn5024_firmwareqca6595qca6430_firmwareqca8081sd870ipq6018mdm9150ipq5018_firmwareipq9574qca6390_firmwareqcn9024_firmwareipq4028_firmwareipq8072aipq8070aipq8070a_firmwareqca9880_firmwaresd870_firmwaresm6250qcs8155ipq8078_firmwareipq4019qca6595auwcd9370wcn3980qcn5152qca9992qcn9022sd720g_firmwareipq8065_firmwareqca9985_firmwaremdm9150_firmwareqca9888_firmwaresdx55mwcn6850_firmwareqcn9274wsa8810_firmwarewsa8815_firmwarewcn3991_firmwareipq8078ipq8076aqca6436ipq8071aqca4024sa8155pwsa8810aqt1000_firmwareqcn9012ipq8076wcd9335_firmwareqcn5154_firmwarear9380_firmwareqca6391qcn9024qcn5052_firmwarewcn3998_firmwarewcn6851wcd9370_firmwaresd675qca6420_firmwareipq8074aqcn6023_firmwaresd210_firmwareipq4028qca9886_firmwareqca7500_firmwareipq8174ipq8064_firmwareqcn6122sdm429wipq8070qcs610qualcomm215qca6391_firmwaresd205qcn9012_firmwaresa8155p_firmwaresa6145pwcn3610wcd9375ipq8076_firmwareqca9980_firmwaresd865_5gwcn3990_firmwarewcn3950_firmwarewcn3988ipq8071a_firmwareqca9980qca6310_firmwareqcs8155_firmwareqca6436_firmwareqcn5021_firmwarewcd9341_firmwareipq8074a_firmwareqca9886ipq6000_firmwareqcn6102ipq4018wcd9340_firmwaresd_675_firmwareqca6564a_firmwareqcn5021sd855_firmwareqcn5054_firmwaremdm9650_firmwareqca9889sdx50mqcn6024_firmwaresdx55ipq5018wcn3610_firmwareqca9990wcn3660b_firmwareqca7500sa6145p_firmwareipq5028_firmwareqca6390sda429w_firmwaresdx50m_firmwareipq5010_firmwaresa6155pqca4024_firmwarewcn6850csr8811wcn3950ipq6018_firmwareqca6320_firmwareqcn9100_firmwareqcn5122_firmwareqcn6024wcd9335ipq8078a_firmwaresd835wcn3680b_firmwareqca6595_firmwareipq6010qca6574au_firmwareipq4029_firmwareqca6564_firmwareqcs610_firmwareqcn9074qcn9274_firmwareqcn5054wcd9380qcn6102_firmwareqcn5052sd730_firmwareipq8064wcd9375_firmwareipq8070_firmwareqca9880qcn6132_firmwareaqt1000qcn5152_firmwareqcn6100_firmwareqca9985qcn6112qca8072_firmwareqsm8250qca6420qca9898_firmwareqcn5124_firmwaresa515msd845_firmwaresa515m_firmwareqcn5164_firmwareqca9994_firmwarewcn3990sd429ipq6028_firmwareqcn6023qca8081_firmwareqca9984ipq8068wcn3998csr8811_firmwareqca8337_firmwareqca9898qca8075_firmwareqcn5164qcn6122_firmwareqca9990_firmwareipq8068_firmwareipq8072a_firmwaresd678qca6574auqcn6112_firmwareipq4029ipq9574_firmwareapq8096auqcs410_firmwareqcn9000_firmwaresd210ipq8173_firmwareipq8065qcn9070_firmwarepmp8074qca8075pmp8074_firmwaresd678_firmwareipq6010_firmwareqca9984_firmwarewcn3991ipq8076a_firmwarear9380qca6564asd675_firmwareqca6574a_firmwareqca9888sda429wqca6320ipq8174_firmwareqca8337sm6250_firmwareqcn6100sdxr2_5gqcn6132wcd9341wcn3980_firmwarewcn6851_firmwareipq4018_firmwaresa6155p_firmwareqcn9074_firmwareqca9992_firmwareqcn5154apq8096au_firmwareipq8173qcn9072qca6564au_firmwareqca6426qca6335_firmwaresdx55m_firmwareqcn9100qcn5022ipq6000wcn3620qca6564ipq5010wcn3988_firmwareqcn9022_firmwareipq5028sd845qcs410Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-416
Use After Free
CVE-2022-25666
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 11.86%
||
7 Day CHG~0.00%
Published-19 Oct, 2022 | 00:00
Updated-09 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory corruption due to use after free in service while trying to access maps by different threads in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9340_firmwaresd210_firmwaresw5100pqcn6024wcd9385_firmwarewcn3988_firmwareqcs610qam8295p_firmwaresd210qcn5124qcn5024qsm8250_firmwareipq8072a_firmwareapq8096au_firmwareipq5028sd_8_gen1_5g_firmwareipq8068wcd9385wcn7850_firmwareipq5028_firmwaresdx55m_firmwarewcd9340sd845ipq8074a_firmwaremdm9150_firmwareqca9886qcn6122qca9980sw5100p_firmwarewcn7850sdx55msdm429wwcn6851_firmwaresa8155ipq4028_firmwareqca6574_firmwareqca6595auipq8071a_firmwareqcs8155wcn3680bsa8150pwcn3660bqca8337_firmwareqca9994_firmwareipq6010wcn7851_firmwarewsa8835pmp8074wcn3990_firmwareipq8071asdm429w_firmwareqca6320_firmwaresa8195psa6150pqcn5122_firmwareipq8076_firmwareipq8174_firmwaresd865_5gipq8064ipq5018qca6574asd429_firmwareqca6310_firmwaresdxr2_5gwcn3990wsa8810_firmwarewcd9335_firmwarewcn3998_firmwareqca7500_firmwareipq6010_firmwarewsa8815qca6436_firmwaresd888_5gsa6155psa8155psdx55qca6335qca6564aar9380qca6564a_firmwareqcn9074wcn3660b_firmwareqca6391_firmwareipq8072aqca9889_firmwareqca6696_firmwarewcn6855qcn5154_firmwareipq5010_firmwareipq8173_firmwareqcn5021_firmwaresd845_firmwareqca9888_firmwarecsr8811qca9984sd205sm8475qca4024_firmwareqca8081aqt1000_firmwarewcn3620qcn5164_firmwarewcn7851qcn6024_firmwaresa8155_firmwareqca8075qcn6122_firmwareqcn5024_firmwaresa8145p_firmwareipq4029wcd9380_firmwareipq5010qca4024ipq8070_firmwareqcn6023_firmwareqcn9022_firmwaremsm8996au_firmwareqca9889wcd9370sa6155apq8096auipq4019qca6574auqcn9070sa6145pqcc5100_firmwarewsa8815_firmwareipq8078aqcn9000_firmwareqcn5054wcn3950_firmwaresdxr2_5g_firmwareipq8174sd870sw5100qcn5124_firmwareqcn9070_firmwareqca8081_firmwareqca6426_firmwaresa8150p_firmwaresd870_firmwarewcn3950sa6155_firmwarewcd9380qca9886_firmwaremdm9150ipq4029_firmwareqcs610_firmwareipq6018qcn9024_firmwareqcn9100qca6420_firmwareqca9888sa515m_firmwareqcn9022qcn5022_firmwarepmp8074_firmwarewcd9341qca9880_firmwareqca7500mdm9650_firmwareqcn5021qca9992qca6426qca6335_firmwareipq8078wsa8835_firmwareqca6390sd205_firmwarewcn3980qca6696wcn6856_firmwareqca9898qcn9000qca9980_firmwareqsm8250ipq8070mdm9650qca9990qcn9072sa6150p_firmwarewcn3620_firmwareqcn5052_firmwareqca9994qcc5100sa8295pqca6420qca8337qcn5122ipq8078a_firmwareipq8076a_firmwareipq8070a_firmwareipq8065qcn5154ipq8076aipq8076qca9992_firmwareqca6430qualcomm215_firmwarewsa8810sd865_5g_firmwarecsr8811_firmwarewcd9341_firmwarewcn6850ipq4018ipq5018_firmwareqca6574a_firmwareqca6595au_firmwareipq8173sda429wqca9898_firmwaresa8295p_firmwareqca6390_firmwareqcn5152_firmwareqca6564au_firmwaresw5100_firmwareqca9985qca6574wcn3610wcn3610_firmwareqcn5054_firmwarewcn3998wcd9335ipq8068_firmwareqca9880qca6430_firmwareqca6436aqt1000qca8072_firmwareqcn6023ipq6028sa515msd855_firmwaresd855wcn6856qcn9024qcs410_firmwareqcn5164ipq4028qam8295pqcn9012wcn6855_firmwareipq6018_firmwaresd429qcn9012_firmwaresd835_firmwareipq8074aqca9985_firmwareqcs410qca6391ipq4019_firmwareqcs8155_firmwareqcn5052sd835sa6155p_firmwareqca9984_firmwareqca8075_firmwaresa8195p_firmwareqca6574au_firmwarewcd9370_firmwaresa8155p_firmwareqcn5152sd888_5g_firmwareqca6310qcn9074_firmwaresda429w_firmwarewsa8830qca6564qcn5022msm8996auwcn3980_firmwareipq8065_firmwareipq6028_firmwareqca6320qca8072wcn6850_firmwareqca6564_firmwareqcn9072_firmwarewcn6851qca9990_firmwareipq8078_firmwarear9380_firmwareqca6564auqcn9100_firmwarewsa8830_firmwarewcn3680b_firmwarewcn3988sdx55_firmwarequalcomm215ipq8070asa8145pipq8064_firmwareqcn6132_firmwareipq4018_firmwareqcn6132sa6145p_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-416
Use After Free
CVE-2020-11147
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 14.37%
||
7 Day CHG~0.00%
Published-22 Feb, 2021 | 06:25
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use after free issue in audio modules while removing and freeing objects during list iteration due to incorrect usage of macro in Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qfs2580qpm5679_firmwareqpm5620_firmwareqdm5579qdm2307qfs2608_firmwareqfs2530qpm8870_firmwareqpa8802qpm6585_firmwarepm6125qat3519qbt2000_firmwareqat5522_firmwarewcn3950_firmwarepm8150aqtc800hqdm5670qpa5581_firmwarepm7150lqpa8821smr546_firmwaresd_675_firmwareqdm5671qpm4650_firmwareqat3518pm456_firmwareqpa5580_firmwaresdr425_firmwarewcn3998smr526_firmwarewcn3950sd720gwgr7640_firmwareqpm5670_firmwaresd710_firmwaresd460_firmwareqdm5652qpa4360_firmwareqpm8870wcd9375_firmwarewcn3998_firmwareqpm5679qbt2000pm855pqca6420pm6150aqpm6670_firmwarepmx50_firmwaresdr735gpm660_firmwarepm8150bqdm3301_firmwareqsm7250sd662_firmwareqca6430qat3522pmr735asd765grsw8577_firmwareqdm2308_firmwaresdr660wcn6851qpa6560qfs2630_firmwaresdr675_firmwaresdr865qdm5620_firmwarewcd9341sm7350_firmwaresmr545qdm4643_firmwareqln5020qet4100_firmwaresd750gqdm3302qpm5657pm6350qdm5621qtc800sqpm5875_firmwareqat3514_firmwarewsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwareqdm5650wcn3988wtr3925sd660_firmwaresdr052smb1390qat5516_firmwarepm6150lpm855l_firmwareqet4100qpa8686_firmwareqpm6585wcn3991wcd9380_firmwaresmb1355qln4650qpa8801sdr735g_firmwarepm8350bhs_firmwarewgr7640qat5568qet5100qdm5671_firmwareqpa8801_firmwarepm8150l_firmwareqat5533_firmwaresdx55m_firmwarewcn6856_firmwareqpa8673_firmwarepm6150qet4101_firmwaresmb1354_firmwaresd670_firmwarepm7250bqln4642_firmwareqfs2630qpa8842sdr052_firmwarewcd9380smb1355_firmwarepm7250b_firmwaresmb1351_firmwarepmk8350_firmwaresmb1381pm855p_firmwaresd690_5g_firmwaresdx50m_firmwaresdr735pm7250smb1395pm660lqpa8803smr526qca6430_firmwarepmk8003qtc801s_firmwarewcd9335_firmwareqat3522_firmwarewcn3980pm7350c_firmwarewsa8815wcn6850qdm5621_firmwaresmb1394pm8350_firmwarepm8009wcn3980_firmwaresd730sdr051_firmwarepm660l_firmwaresdx55mpm6250_firmwarewcn6740_firmwarepm8008pm8350b_firmwareqtm525_firmwareqat3518_firmwareqpm5621_firmwarepm855lwcn6851_firmwarersw8577qdm5670_firmwareqpa6560_firmwareqpa8802_firmwarepm7150a_firmwarepm8150b_firmwareqpm5621sd670smr545_firmwarepm8009_firmwareqdm2310_firmwareqfs2580_firmwarepm8150lqdm5677pm855_firmwarepm660a_firmwarepm855b_firmwarewtr2965qca6391_firmwarewcd9370_firmwareqln4650_firmwareqat3516_firmwareqpm5875sdx55qet5100msd675pm8350bhsqet4101qat3555_firmwareqat3516qpa8803_firmwareqpm5658pm855bqpm5658_firmwareqpm5870wcn3991_firmwareqdm5652_firmwarewsa8830sdr051pm660qet6110_firmwareqdm5579_firmwareqln5030pm6125_firmwareqbt1500qpa5581pmi632qpa2625_firmwarepm456pm8350bh_firmwarepmr735b_firmwareqbt1500_firmwareqet5100_firmwareqpm5870_firmwareqpm4621qet6100_firmwareqet6100sd765g_firmwareqpa8686qca6420_firmwaresmb1394_firmwareqca6390_firmwaresd690_5gsmb1396pm7150asd730_firmwarewcd9370sd675_firmwarepm8350qpa5461_firmwaresdr425pm8350c_firmwarepmr525_firmwarewcn3990_firmwareqpm5641pmi632_firmwarewcd9385_firmwareqdm5650_firmwareqpa4340_firmwarewcd9326_firmwareqat5516pm7250_firmwareqdm5620sd662qpa8821_firmwarepm8350bhpmk8002_firmwarepm3003aqdm4650_firmwaresdx55_firmwareqat5533sm7250p_firmwaresm7350qsm7250_firmwareqpm6670smb1354pm7150l_firmwareqpm8820qpm4641qat5515_firmwareqln5020_firmwarepm855pm8250smb1398qdm4643qfs2530_firmwarewcn3988_firmwarepmx55qpm4641_firmwaresdr675pm8150c_firmwareqpa8842_firmwareqdm3301sdr735_firmwareqat3519_firmwaresm6250wsa8810_firmwareqpm5677qat5515sd765_firmwareqat3514wcd9326wcd9335qdm5677_firmwarepm6350_firmwarepm8004_firmwaresdr8150_firmwarewcd9385qtc800h_firmwarepmk7350_firmwareqpm5620qat3550_firmwareqln5040_firmwareqpm4630qca6390wcd9375sd750g_firmwareaqt1000qpa8673sm6250_firmwareqdm2310qln5030_firmwareqln4642qpm5677_firmwarewsa8815_firmwaresd888_5g_firmwaresmr525_firmwarewtr3925_firmwarepmk7350smb1396_firmwareqpm8820_firmwarewcn6850_firmwarewsa8835_firmwareqpm6621_firmwaresmr546qet6110qln5040qpm8895qpm5670wcn3990sd_675pmx55_firmwaresd865_5gpmk8350smb1398_firmwareqdm3302_firmwarepm8350bqat5522qdm2307_firmwarewsa8835pm8150cpmr735bqpm5657_firmwaresd888_5gqpa4360pmk8003_firmwaresdr660_firmwareqpm4640_firmwaresmb1390_firmwareqdm5679_firmwarepm8350csmr525qpm4640pm6150l_firmwarepmr525pm7350cpm8150a_firmwareqet5100m_firmwareqpm4650qtm525sd855pm6150a_firmwarepm6150_firmwaresd765qpm4630_firmwaresd768g_firmwaresdr865_firmwareqat3555pm8250_firmwaresd460qca6391smb1351qpa5461aqt1000_firmwareqpm8895_firmwarewtr2965_firmwarepm660aqpa4340sdx50msdr8150qfs2608qtc801ssmb1395_firmwareqdm4650qpm5641_firmwaresd710pm8008_firmwarewcd9341_firmwareqpm6621wsa8810pmr735a_firmwareqat5568_firmwareqdm2308pmx50qat3550wcn6856qdm5679sd768gpm3003a_firmwarewcn6740qtc800s_firmwaresmb1381_firmwarepm8004pmk8002qpa2625sm7250psd720g_firmwareqpm4621_firmwarepm6250qpa5580Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-416
Use After Free
CVE-2021-35120
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.10% / 28.10%
||
7 Day CHG~0.00%
Published-14 Jun, 2022 | 09:40
Updated-04 Aug, 2024 | 00:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper handling between export and release functions on the same handle from client can lead to use after free in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwaremdm9150_firmwarewsa8830qcs610qcs2290_firmwareqca8337sdx65csra6620qcs4290wcn3950_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqcs2290qca6390_firmwaresa6155sd690_5gwcd9370csra6620_firmwareqcs605_firmwarecsra6640_firmwareqcs6125_firmwareqca6426wcn3990_firmwareqrb5165n_firmwarewcn3998wcd9385_firmwaresdxr2_5g_firmwarewcn3950sm4125wcd9326_firmwarewcn3615_firmwaresd_8_gen1_5g_firmwarewcn3660bsd662sd460_firmwaresa8155wcn7850qca6574au_firmwaresdx55_firmwarewcn3680b_firmwareqca6595ausa6155_firmwarewcd9375_firmwarewcn3615sm7250p_firmwarewcn3998_firmwarewcn3999_firmwareqca6420qca6436_firmwareapq8053_firmwareqrb5165nsm7450_firmwaresd680_firmwaresa6155p_firmwarewcn3999sa515m_firmwareqcs6490qrb5165_firmwareqrb5165m_firmwaresd429sdxr2_5gqcs6125wcn7851sa8155_firmwaresd662_firmwareqcs405qca6430wcn3988_firmwaresd429_firmwarewsa8810_firmwarequalcomm215_firmwaresd765gsd765_firmwareqca6436sd680wcd9326sa6155pwcd9335wcn6851qcs603_firmwarewcn7851_firmwareqcs4290_firmwarewcd9385wcd9341qcs6490_firmwaresd750gsd870_firmwareqca6390ar8035sd750g_firmwareaqt1000wcd9375wcn3910_firmwaremsm8953_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3620_firmwareqcm6490sd888_5g_firmwarewcn3988wcn3620wcn6850_firmwarewcn7850_firmwarewsa8815_firmwaresm7450wsa8835_firmwaresm8475wcn6750_firmwareqcm6125_firmwareqcm2290_firmwarewcn3991qca8337_firmwarewcd9380_firmwarewcn3990sdm429wsd780gsd865_5gsdx55m_firmwarewcn6856_firmwarewsa8835qca6574sdm429w_firmwarewcd9380sd888_5gqualcomm215qcs410qca6574asd690_5g_firmwarewcn6855_firmwareqca6430_firmwarewcd9335_firmwarewcn3980wcn6750sa515mqca6574_firmwareqcs605sd855sm4125_firmwarewcn6850wsa8815wcn3910sd765qca6426_firmwarewcn3660b_firmwarewcn3680qca6574a_firmwaresd768g_firmwareqrb5165mwcn3980_firmwaresd460qca6391sdx55msm8475_firmwareaqt1000_firmwarewcn6740_firmwaremsm8953sdx65_firmwarear8031_firmwareqcm4290qcm6490_firmwarewcn3680_firmwarewsa8832_firmwareqrb5165sd480_firmwareqcs603wcn6851_firmwareqca6574ausa8155p_firmwarewcd9341_firmwareqcm6125qcm4290_firmwaresd480sd870wcn6855wsa8810wsa8832qcs610_firmwaremdm9150wcn6856wcn3680bsd768gar8031qcs405_firmwarewcn6740qca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55apq8053sa8155pcsra6640sm7250pqcs410_firmwaresm8475p_firmwarear8035_firmwareqcm2290sm8475pSnapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-416
Use After Free
CVE-2021-1963
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 14.37%
||
7 Day CHG~0.00%
Published-09 Sep, 2021 | 07:36
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible use-after-free due to lack of validation for the rule count in filter table in IPA driver in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055qca9377_firmwaremdm9150_firmwarewcn3991_firmwaresd678sa6150p_firmwaresm7250sa8145p_firmwareqcs610wsa8830fsm10056qca8337sm7250_firmwareqca6431_firmwaremdm9650csra6620fsm10055_firmwareqcs4290wcn3950_firmwaresa8150p_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwaresa6155sd690_5gsd730_firmwarewcd9370csra6620_firmwaresd_675_firmwaresd675_firmwarecsra6640_firmwareqcs6125_firmwareqca6426qca6584au_firmwarewcn3990_firmwareqca9377wcn3998sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcn3950sd720gwcn3615_firmwarewcn3660bsd662sd460_firmwaresa8155qca6574au_firmwaresdx55_firmwareqca6595ausa6155_firmwaresdx12_firmwarewcd9375_firmwaremsm8909wwcn3615apq8009w_firmwareqca6420qca6436_firmwarewcn3610_firmwarewcn3998_firmwareqca6564au_firmwareqca6584ausa6155p_firmwaresd778gwcn3999qrb5165_firmwaresdxr2_5gqcs6125sa8155_firmwaresd662_firmwareqcs405qca6430wcn3988_firmwaresa6145p_firmwaresd205qca6421sd778g_firmwaresm6250wcd9340sa8195pwsa8810_firmwarequalcomm215_firmwaresd765gsd765_firmwarefsm10056_firmwareqca6436wcn6851wcd9335sa6155pqca6174a_firmwareqcs4290_firmwarewcd9385wcd9341qca6431qca6696_firmwaresd750gsd870_firmwarear8035qca6390sd_8cxaqt1000sa8150psd750g_firmwaresm6250_firmwarewcd9375wsa8830_firmwaresda429wsd210sd855_firmwaresd865_5g_firmwarewcn3620_firmwarewcn3988sd888_5g_firmwarewcn6850_firmwarewcn3620wsa8815_firmwarewsa8835_firmwaresa8195p_firmwareqca6564awcn6750_firmwarewcn3610qcm6125_firmwarewcn3991qca8337_firmwaresda429w_firmwarewcd9380_firmwarewcn3990sd_675msm8996au_firmwaresd780gsd865_5gqca6595qca6564ausdx55m_firmwarewcn6856_firmwaremsm8909w_firmwareqca6574msm8996auwsa8835sd665_firmwarewcd9380sd888_5gwcn3999_firmwarequalcomm215qcs410qca6574asd690_5g_firmwaresdx50m_firmwareqca6174asm7325qca6430_firmwarewcd9335_firmwarewcn3980wcn6750qca6574_firmwarewcd9340_firmwaresd855wsa8815wcn6850sd665mdm9650_firmwaresd_8c_firmwaresd765qca6426_firmwarewcn3660b_firmwareqca6574a_firmwaresd768g_firmwarewcn3980_firmwaresd460qca6391sd730sdx55mqca6421_firmwareaqt1000_firmwarewcn6740_firmwaresd678_firmwarear8031_firmwareqcm4290sdx50mqrb5165sd480_firmwarewcn6851_firmwareqca6574ausa8155p_firmwaresd205_firmwareqca6564a_firmwareapq8009wwcd9341_firmwareqcm6125qcm4290_firmwaresd480sd870wsa8810sd210_firmwareqcs610_firmwaremdm9150wcn6856qsm8250sd_8csa6145psd768gapq8096auar8031qca6595_firmwareqcs405_firmwaresa8145pwcn6740qca6696qca6391_firmwaresd780g_firmwarewcd9370_firmwaresa6150psdx55apq8096au_firmwarecsra6640sa8155psd675sd720g_firmwaresdx12qcs410_firmwarear8035_firmwareqsm8250_firmwaresm7325_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-416
Use After Free
CVE-2024-33040
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 2.62%
||
7 Day CHG~0.00%
Published-02 Dec, 2024 | 10:18
Updated-12 Dec, 2024 | 15:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Camera Driver

Memory corruption while invoking redundant release command to release one buffer from user space as race condition can occur in kernel space between buffer release and buffer access.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800qam8255p_firmwaresnapdragon_8_gen_1_mobile_platformsnapdragon_865\+_5g_mobile_platform_firmwarewcd9380_firmwaresnapdragon_870_5g_mobile_platformwsa8830qca6678aq_firmwaresnapdragon_xr2_5g_platformsw5100pqca6678aqsd865_5gfastconnect_6900fastconnect_6800qca6391fastconnect_6900_firmwaresnapdragon_w5\+_gen_1_wearable_platformsnapdragon_870_5g_mobile_platform_firmwaresnapdragon_865_5g_mobile_platformwcn3988_firmwarewsa8835wsa8810_firmwarewcd9380fastconnect_7800_firmwaresw5100qca6595au_firmwarewsa8810qca6436sa8255p_firmwaresw5100p_firmwaresnapdragon_8_gen_1_mobile_platform_firmwaresxr2130wcn3680bqca6426sa8255psxr2130_firmwarewcn3980qca6391_firmwarewcn3660bwsa8815snapdragon_865\+_5g_mobile_platformwsa8830_firmwaresd865_5g_firmwaresnapdragon_xr2_5g_platform_firmwareqca6426_firmwarewcn3660b_firmwarewcn3988snapdragon_x55_5g_modem-rf_systemwsa8815_firmwarewcn3680b_firmwarewsa8835_firmwaresnapdragon_865_5g_mobile_platform_firmwareqca6595ausw5100_firmwarefastconnect_6800_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcn3980_firmwareqam8255pqca6436_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwareSnapdragonqam8255p_firmwarewcd9380_firmwaresxr2130_firmwareqca6678aq_firmwareqca6391_firmwarefastconnect_6900_firmwarewcn3988_firmwarewsa8830_firmwaresd865_5g_firmwaresnapdragon_xr2_5g_platform_firmwareqca6426_firmwarewcn3660b_firmwarewsa8815_firmwarewsa8810_firmwarewsa8835_firmwarewcn3680b_firmwarefastconnect_7800_firmwaresnapdragon_865_5g_mobile_platform_firmwareqca6595au_firmwaresw5100_firmwarefastconnect_6800_firmwaresa8255p_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresw5100p_firmwarewcn3980_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareqca6436_firmware
CWE ID-CWE-416
Use After Free
CVE-2024-33033
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 5.14%
||
7 Day CHG~0.00%
Published-04 Nov, 2024 | 10:04
Updated-08 Nov, 2024 | 04:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in ComputerVision

Memory corruption while processing IOCTL calls to unmap the buffers.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800wsa8830wcd9380_firmwaresm7550qcm8550_firmwarewcd9378_firmwarewcn6650_firmwarewsa8840_firmwarewsa8832_firmwarefastconnect_6900sg8275p_firmwareqcm8550fastconnect_6900_firmwareqcs8550_firmwarewcn6650sg8275_firmwarewcn7880_firmwaresm7525wsa8840wsa8835snapdragon_8\+_gen_2_mobile_platform_firmwarewcd9380wcn6755_firmwaresnapdragon_8\+_gen_2_mobile_platformfastconnect_7800_firmwarewsa8845hwsa8832wcn6755wcd9395_firmwarewcd9370sm8550psm7525_firmwaresnapdragon_8_gen_2_mobile_platform_firmwarewcd9385sg8275psnapdragon_8_gen_2_mobile_platformwcd9395wcd9371wcd9371_firmwarewcd9385_firmwarewsa8845qcs8550wcd9375wcd9370_firmwaresm8550p_firmwarewcd9390wcd9390_firmwarewsa8830_firmwarewsa8845_firmwaresm7550_firmwarewsa8835_firmwaresg8275wsa8845h_firmwarewcd9375_firmwarewcd9378wcn7880Snapdragonsm7525_firmwarewcd9380_firmwareqcm8550_firmwarewcd9378_firmwarewcn6650_firmwarewsa8832_firmwarewsa8840_firmwarewcd9371_firmwaresg8275p_firmwarewcd9385_firmwarefastconnect_6900_firmwareqcs8550_firmwarewcd9370_firmwaresm8550p_firmwaresg8275_firmwarewcd9390_firmwarewcn7880_firmwarewsa8830_firmwarewsa8845_firmwaresm7550_firmwarewsa8835_firmwarefastconnect_7800_firmwarewcn6755_firmwarewcd9375_firmwarewsa8845h_firmwarewcd9395_firmwaresnapdragon_8_gen_2_mobile_platform_firmware
CWE ID-CWE-416
Use After Free
CVE-2021-35092
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 8.66%
||
7 Day CHG~0.00%
Published-14 Jun, 2022 | 09:51
Updated-04 Aug, 2024 | 00:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Processing DCB/AVB algorithm with an invalid queue index from IOCTL request could lead to arbitrary address modification in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarewcn3991_firmwaremdm9150_firmwarewsa8830qcs610qca8337wcd9360_firmwaremdm9650sdx65csra6620wcn3950_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwaresd690_5gwcd9370csra6620_firmwareqcs605_firmwarecsra6640_firmwarewcn3990_firmwareqrb5165n_firmwareqca9377wcn3998wcd9385_firmwarewcn3950wcd9326_firmwarewcn3615_firmwaresd_8_gen1_5g_firmwarewcn3660bsd662sd460_firmwarewcn7850qca6574au_firmwaresdx55_firmwarewcn3680b_firmwareqca6595auqca8081_firmwaresdx12_firmwarewcd9375_firmwaresm7250p_firmwarewcn3615wcn3998_firmwareqca6420apq8053_firmwarewcd9360qrb5165nsd680_firmwaresd778gwcn7851qrb5165_firmwareqrb5165m_firmwaresd662_firmwareqcs405qca6430wcn3988_firmwaresd778g_firmwarewsa8810_firmwarequalcomm215_firmwaresd765gsd765_firmwaresd680wcd9326wcd9335wcn6851qca8081wcn7851_firmwareqca6174a_firmwarewcd9385wcd9341qca6696_firmwaresd750gsd870_firmwarear8035qca6390sd750g_firmwareaqt1000wcd9375msm8953_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3988sd888_5g_firmwarewcn6850_firmwarewcn7850_firmwarewsa8815_firmwarewsa8835_firmwaresm8475wcn6750_firmwarewcn3991qca8337_firmwarewcd9380_firmwarewcn3990sd780gsd865_5gsdx55m_firmwarewcn6856_firmwarewsa8835wcd9380sd888_5gqualcomm215qcs410qca6574asd690_5g_firmwarewcn6855_firmwareqca6174asm7325pqca6430_firmwarewcd9335_firmwarewcn3980wcn6750qcs605sd855wsa8815sm7325p_firmwarewcn6850mdm9650_firmwaresd765wcn3660b_firmwarewcn3680qca6574a_firmwaresd695sd768g_firmwareqrb5165mwcn3980_firmwaresd460qca6391sdx55maqt1000_firmwarewcn6740_firmwaremsm8953sdx65_firmwarear8031_firmwarewcn3680_firmwareqrb5165sd480_firmwarewcn6851_firmwareqca6574auwcd9341_firmwaresd480sd870wsa8810wcn6855qcs610_firmwaremdm9150wcn6856wcn3680bsd695_firmwaresd768gapq8096auar8031qcs405_firmwarewcn6740qca6696qca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55apq8053apq8096au_firmwarecsra6640sm7250psdx12qcs410_firmwarear8035_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music
CWE ID-CWE-20
Improper Input Validation
CVE-2021-30349
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-8.2||HIGH
EPSS-0.11% / 29.42%
||
7 Day CHG~0.00%
Published-14 Jun, 2022 | 10:11
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control sequence for AC database after memory allocation can lead to possible memory corruption in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055qca9377_firmwaresd_8cx_gen3_firmwaresa6150p_firmwareqcs610qca8337wcd9360_firmwareqca4024_firmwarewcn3950_firmwaresa8150p_firmwareqcs2290qca6595au_firmwaresa6155csra6620_firmwareqcs605_firmwarecsra6640_firmwareqcs6125_firmwaresa415mwcn3998sd_8cx_gen2_firmwareqcn6024_firmwarewcn3950sm6375_firmwarewcn3660bsd460_firmwareqca6574au_firmwarewcd9375_firmwarewcn3998_firmwareqca8081_firmwaresa6155_firmwareqca6420wcd9360sd680_firmwarewcn3999sd_8cx_gen2qrb5165_firmwareqrb5165m_firmwaresa4155p_firmwareqcs6125sa8155_firmwareipq6010qca4004_firmwaresd662_firmwareqcs405qca6430wcd9306_firmwaresd765gsw5100fsm10056_firmwareqca6436sd680wcn6851sa6155pqcs603_firmwareqca6696_firmwaresd750gsd870_firmwarewcn3910_firmwaresxr2150p_firmwaresa8150pqca4004wsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3988sa8195p_firmwareqcn5121qcn5022_firmwarewcn6750_firmwarewcn3610sm6375wcn3991qca8337_firmwaresda429w_firmwarewcd9380_firmwaresdm429wsw5100pqca6564ausdx55m_firmwarewcn6856_firmwareqca6574csr8811_firmwarewcd9380qcs410sd690_5g_firmwaresdx24_firmwareqca8072_firmwareqca6430_firmwareqcn5052_firmwareqcn9012_firmwareipq6018_firmwareqcs605wcn6850wcn3910qca6426_firmwarewcn3660b_firmwareqca9984ipq6028qcn9024sdx55mar8031_firmwareqrb5165wcn6851_firmwareqcs603qca6564a_firmwareqcn9024_firmwaresdx57mqcm4290_firmwaresd480sd870qcn5121_firmwarewcn6855sw5100p_firmwareqcs610_firmwareqsm8250ipq6018sa6145psdxr1ar8031qcs405_firmwaresa8145pmdm9205_firmwareqca6391_firmwaresa4150p_firmwareqca4024wcd9370_firmwaresdx55qcn5021_firmwaresa8155pcsra6640sa4155psxr2150par8035_firmwareqcm2290qsm8250_firmwarewcn3991_firmwaremdm9150_firmwarewsa8830qcn9070sa8145p_firmwareqcs2290_firmwarefsm10056csrb31024csra6620fsm10055_firmwareqcn9072qcs4290sd765g_firmwareqca6420_firmwareqca6390_firmwareipq6000sd690_5gwcd9370qcn5152_firmwareqca6564qca6426qrb5165n_firmwareqcn9000_firmwareqca9984_firmwareqca9377wcd9385_firmwaresdxr2_5g_firmwaresd662qcn9011_firmwaresa8155wcn3680b_firmwareqcn5122_firmwaresdx55_firmwareqca6595auqcn6023_firmwarewcn3999_firmwaresm7250p_firmwarewcn3610_firmwareqca6436_firmwareqrb5165nqca6564au_firmwaresd778gsa6155p_firmwarewcd9306sa515m_firmwareqcs6490sd429sdxr2_5gqcn5052sa415m_firmwarewcn3988_firmwareqcn9074sa6145p_firmwaresd429_firmwaresd778g_firmwaresa8195psd765_firmwareqca8081qcn6023qca6174a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwaresd_8cx_gen3ar8035csr8811qca6390aqt1000sd750g_firmwarewcd9375sda429wwcn3620_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewcn3620wsa8835_firmwareqcx315qca6564asa4150pqcm6125_firmwareqca8072qcm2290_firmwareqcn9000sd865_5gsdx24qcn9012wsa8835qcx315_firmwaresdm429w_firmwaresd665_firmwaresd888_5gqca8075_firmwareqca6574aipq6005_firmwarewcn6855_firmwareqca6174asm7325pwcn6750mdm9205sa515mqca6574_firmwaresd855sm7325p_firmwaresd665sdx57m_firmwaresd765qca6574a_firmwareqcn5021qcn5152sd768g_firmwareqrb5165msd460qca6391sdxr1_firmwareipq6005aqt1000_firmwareqcm4290csrb31024_firmwareqcm6490_firmwareqcn9070_firmwaresd480_firmwareipq6028_firmwareqcn9011qca6574ausa8155p_firmwareqcn5122qcm6125mdm9150wcn6856qcn5022wcn3680bqca6564_firmwareipq6010_firmwaresd768gqca6696sa6150pqca8075qcn9022_firmwareqcn6024qcn9022qcn9072_firmwaresm7250pipq6000_firmwaresw5100_firmwareqcn9074_firmwareqcs410_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CVE-2021-30325
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 13.69%
||
7 Day CHG~0.00%
Published-11 Feb, 2022 | 10:40
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible out of bound access of DCI resources due to lack of validation process and resource allocation in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresa6150p_firmwareqcs610ipq4028_firmwareqcn5550qca8337ar9380ipq8173_firmwareqcn5124qca4024_firmwarewcn3950_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqca6595au_firmwaresa6155qcn5064csra6620_firmwareqcs605_firmwarecsra6640_firmwarewcn3998wcn3950qcn6024_firmwareipq8076amdm9206_firmwarewcn3660bsd460_firmwareqca6428qca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwareqca8081_firmwarewcn3998_firmwaresa6155_firmwareqca6438_firmwareqca9986ipq8070_firmwareqca9367_firmwareipq8065ipq8078a_firmwarewcn3999qrb5165_firmwareipq5028qca7500ipq8072_firmwareipq4029_firmwareqrb5165m_firmwaresa8155_firmwareipq6010sd662_firmwareipq8068qcs405wcd9340qcn6132sd765gqualcomm215_firmwareqca6436wcn6851sa6155pqcs603_firmwareqca9888_firmwareqcn6122wcd9341ipq8068_firmwareqca6696_firmwaresd870_firmwareqca9988_firmwareqcn5154_firmwaresa8150pqca9992_firmwaresd865_5g_firmwarewcn3988qca6438sa8195p_firmwareqcn5121qcn5022_firmwareqca9898ipq4028wcn3610qca6428_firmwareipq5018_firmwareqca9985_firmwarewcn3991ipq4018_firmwareqca8337_firmwaresda429w_firmwarewcd9380_firmwareipq8072aqca7500_firmwareqca9980_firmwarewcd9330ipq8076a_firmwareipq8078qca6564ausdx55m_firmwareipq8173qcn5164qca9558qca6574csr8811_firmwarewcd9380qualcomm215qcn5054_firmwareqcs410qcn5024ipq4019_firmwareqca8072_firmwareqca9985qcn9012_firmwarewcd9335_firmwareqcn5052_firmwarewcn3980ipq6018_firmwareqcs605wcd9340_firmwarewsa8815wcn6850pmp8074_firmwareqca9986_firmwareqca6426_firmwarewcn3660b_firmwareqca9984ipq6028ipq8064qcn9024pmp8074wcn3980_firmwareqcn5550_firmwarewcd9330_firmwaresdx55mipq8064_firmwareqcn5064_firmwarear8031_firmwareipq8078_firmwareqcn5054qrb5165wcn6851_firmwareqcs603ipq8070qcn5502qca9994qca9980qcn9024_firmwareipq8174_firmwareqca6564a_firmwareqca9880sd870qcn5121_firmwaresd210_firmwareqcs610_firmwaresa6145pipq6018qca9886_firmwarear8031apq8096auqcs405_firmwaresa8145pqca6391_firmwareqca4024wcd9370_firmwaresdx55qcn5021_firmwaresa8155pcsra6640qca9531_firmwarear8035_firmwareqcn5024_firmwarewcn3991_firmwaremdm9150_firmwareqcn9070sa8145p_firmwareqca9563_firmwarecsra6620qcn9072qca9880_firmwareqca9992sd765g_firmwareqca6390_firmwareipq6000wcd9370ipq8072qcn5152_firmwareqca6564qca6426wcn3990_firmwareqrb5165n_firmwareqcn9000_firmwareqca9984_firmwareqca9377ipq5018wcd9385_firmwaresdxr2_5g_firmwareqca9563ipq8074asd662qcn5124_firmwaresa8155qcn5122_firmwaresdx55_firmwareqca6595auqcn6023_firmwarewcn3999_firmwaresm7250p_firmwarewcn3610_firmwareqca6436_firmwareqrb5165nipq5010qca6564au_firmwaresa6155p_firmwaresm6225ipq8174qca9990sdxr2_5gqcn5052qca9367wcn3988_firmwareqcn9074sd205sa6145p_firmwaresa8195pwsa8810_firmwaresd765_firmwarewcd9335qca8081qcn6023ipq8071aipq8071a_firmwarewcd9385qca6390qca9898_firmwarewcd9375ar8035csr8811ipq4019qcn9100_firmwaresda429wsd210wcn3620_firmwareipq5010_firmwareipq8074a_firmwarewsa8815_firmwarewcn6850_firmwarewcn3620qca6564aqca9988qca8072wcn3990qcn9000sd865_5gar9380_firmwareqcn9012qca9558_firmwareqcn6122_firmwareipq8065_firmwaresd665_firmwareqcn5154qca8075_firmwareipq4018qca6574aipq6005_firmwaremdm9206qca9889qcn6132_firmwareqca9888ipq8074qca9994_firmwareipq8070a_firmwareipq8076_firmwareqca6574_firmwareqca9886qcn5502_firmwaresd665ipq8076sd765qca6574a_firmwareqcn5021qcn5152sd768g_firmwareqrb5165msd460qca6391ipq6005qcn9100qcn9070_firmwareipq6028_firmwareipq8072a_firmwaresm6225_firmwareqca9531ipq8074_firmwareqca6574auqca9889_firmwaresa8155p_firmwareqcn5122sd205_firmwarewcd9341_firmwarewsa8810mdm9150qcn5022qca6564_firmwaresd768gipq6010_firmwareqca6696sa6150pqca8075qcn9022_firmwareapq8096au_firmwareqcn6024qcn9022qca9990_firmwareipq8070aqcn9072_firmwaresm7250pipq6000_firmwareipq8071_firmwareqcn9074_firmwareqcs410_firmwareipq4029Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2021-30265
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 17.07%
||
7 Day CHG~0.00%
Published-12 Nov, 2021 | 06:15
Updated-03 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible memory corruption due to improper validation of memory address while processing user-space IOCTL for clearing Filter and Route statistics in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055wcn3991_firmwaremdm9150_firmwarewsa8830sd678sa6150p_firmwaresm7250sa8145p_firmwareqcs610fsm10056qca8337sm7250_firmwaresdx65csra6620fsm10055_firmwarewcn3950_firmwaresa8150p_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwaresa6155sd690_5gsd730_firmwarewcd9370csra6620_firmwareqcs605_firmwaresd_675_firmwaresd675_firmwarecsra6640_firmwareqcs6125_firmwareqca6426qca6584au_firmwarewcn3990_firmwareqrb5165n_firmwarewcn3998wcd9385_firmwaresdxr2_5g_firmwarewcn3950wcd9326_firmwarewcn3615_firmwarewcn3660bsd662sd460_firmwaresa8155qca6574au_firmwaresdx55_firmwarewcn3680b_firmwareqca6595auqca8081_firmwaresa6155_firmwarewcd9375_firmwarewcn3615wcn3998_firmwarewcn3610_firmwareqca6420qca6436_firmwareapq8053_firmwareqrb5165nqca6584ausa6155p_firmwarewcn3999qrb5165_firmwaresdxr2_5gqcs6125sa8155_firmwaresd662_firmwareqcs405qca6430wcn3988_firmwaresa6145p_firmwaresd205wcd9340sa8195pwsa8810_firmwarequalcomm215_firmwaresd765gsd765_firmwarefsm10056_firmwareqca6436wcd9326wcd9335sa6155pwcn6851qca8081qcs603_firmwarewcd9385wcd9341qca6696_firmwaresd870_firmwarear8035qca6390wcd9375aqt1000sa8150pmsm8953_firmwarewsa8830_firmwaresda429wsd210sd855_firmwaresd865_5g_firmwarewcn3620_firmwarewcn3988wcn6850_firmwarewsa8815_firmwarewcn3620wsa8835_firmwaresa8195p_firmwarewcn3610qcm6125_firmwarewcn3991qca8337_firmwaresda429w_firmwarewcd9380_firmwarewcn3990sd_675sd865_5gqca6595sdx55m_firmwarewcn6856_firmwarewsa8835qca6574sd665_firmwarewcd9380wcn3999_firmwarequalcomm215qcs410qca6574asd690_5g_firmwarewcn6855_firmwareqca6430_firmwarewcd9335_firmwarewcn3980qca6574_firmwareqcs605wcd9340_firmwaresd855wsa8815wcn6850sd665sd765qca6426_firmwarewcn3660b_firmwarewcn3680qca6574a_firmwaresd768g_firmwarewcn3980_firmwaresd460qca6391sd730sdx55maqt1000_firmwaremsm8953sdx65_firmwaresd678_firmwarear8031_firmwarewcn3680_firmwareqrb5165wcn6851_firmwareqcs603qca6574ausa8155p_firmwaresd205_firmwarewcd9341_firmwareqcm6125wsa8810sd870wcn6855sd210_firmwareqcs610_firmwaremdm9150wcn6856sa6145pwcn3680bsd768gar8031qca6595_firmwareqcs405_firmwaresa8145pqca6696qca6391_firmwarewcd9370_firmwaresa6150psdx55apq8053sa8155pcsra6640sd675qcs410_firmwarear8035_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-30298
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 10.90%
||
7 Day CHG~0.00%
Published-03 Jan, 2022 | 07:26
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible out of bound access due to improper validation of item size and DIAG memory pools data while switching between USB and PCIE interface in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055wcn3991_firmwaremdm9150_firmwarewsa8830wcn3991qca8337_firmwaresda429w_firmwarewcd9380_firmwareqcs610qcn9000ipq8072afsm10056qca8337ipq8076a_firmwaresd865_5gsdx55m_firmwarecsra6620fsm10055_firmwarewsa8835wcn3950_firmwaresd665_firmwarewcd9380sd765g_firmwareqca6595au_firmwareqca6390_firmwarequalcomm215qcs410wcd9370csra6620_firmwarecsra6640_firmwareqrb5165n_firmwareqcn9000_firmwarewcd9335_firmwarewcn3980wcn3998wcd9385_firmwarewcn3950ipq8076awcd9340_firmwarewcn3660bwsa8815wcn6850sd665ipq8074asd662sd460_firmwaresd765wcn3660b_firmwareqca6574au_firmwaresdx55_firmwaresd768g_firmwareqca6595auwcd9375_firmwarewcn3998_firmwarewcn3999_firmwaresm7250p_firmwarewcn3980_firmwarewcn3610_firmwaresd460qca6391sdx55mqrb5165nwcn3999ar8031_firmwareqrb5165_firmwareqrb5165wcn6851_firmwaresd662_firmwareipq8072a_firmwareqcs405wcn3988_firmwareqca6574auqcn9074sd205sa8155p_firmwaresd205_firmwarewcd9340wsa8810_firmwarequalcomm215_firmwaresd765gwcd9341_firmwarewsa8810sd765_firmwarefsm10056_firmwaresd870wcn6851wcd9335sd210_firmwareqcs610_firmwaremdm9150wcd9385wcd9341sd768gar8031qca6696_firmwareqcs405_firmwaresd870_firmwareqca6696qca6391_firmwarear8035qca6390wcd9375wcd9370_firmwaresdx55sa8155pwsa8830_firmwaresda429wsd210csra6640sd865_5g_firmwarewcn3620_firmwareipq8074a_firmwarewcn3988wcn6850_firmwarewcn3620wsa8815_firmwarewsa8835_firmwaresm7250pqcn9074_firmwareqcs410_firmwarear8035_firmwarewcn3610Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-30299
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 7.08%
||
7 Day CHG~0.00%
Published-22 Nov, 2024 | 09:09
Updated-25 Nov, 2024 | 19:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in Audio

Possible out of bound access in audio module due to lack of validation of user provided input.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwaremdm9150_firmwarewsa8830sa6150p_firmwaresa8145p_firmwareqcs610qcs2290_firmwareqca8337csra6620qcs4290wcn3950_firmwaresd765g_firmwaresa8150p_firmwareqcs2290qca6390_firmwarewcd9370csra6620_firmwareqcs605_firmwarecsra6640_firmwareqcs6125_firmwareqca6564qca6426wcn3990_firmwareqrb5165n_firmwarewcn3998wcd9385_firmwaresdxr2_5g_firmwarewcn3950wcn3660bsm6375_firmwareqca6574au_firmwaresdx55_firmwarewcd9375_firmwarewcn3998_firmwaresm7250p_firmwarewcn3610_firmwareqca6436_firmwareqrb5165nqca6564au_firmwaresa6155p_firmwaresm6225qcs6490qrb5165m_firmwaresdxr2_5gqrb5165_firmwareqcs6125wcn3988_firmwareqcs405sd205sa6145p_firmwarewcd9340sa8195pwsa8810_firmwaresd765gsd765_firmwareqca6436wcn6851wcd9335sa6155pqcs603_firmwareqcs4290_firmwarewcd9385wcd9341qca6696_firmwareqcs6490_firmwaresd870_firmwarewcn3910_firmwarewcd9375qca6390ar8035sa8150pwsa8830_firmwaresda429wsd210wcn3620_firmwaresd865_5g_firmwarewsa8815_firmwarewcn6850_firmwarewsa8835_firmwarewcn3988wcn3620sd888_5g_firmwaresa8195p_firmwareqcm6490wcn6750_firmwareqca6564awcn3610qcm6125_firmwareqcm2290_firmwaresm6375wcn3991wcd9380_firmwaresda429w_firmwareqca8337_firmwarewcn3990sd780gsd865_5gqca6564ausdx55m_firmwarewcn6856_firmwarewsa8835wcd9380sd888_5gqcs410qca6574awcn6855_firmwarewcn6750wcn3980wcd9335_firmwareqcs605wcd9340_firmwarewsa8815wcn6850wcn3910sd765qca6426_firmwarewcn3660b_firmwareqca6574a_firmwaresd768g_firmwareqrb5165mwcn3980_firmwareqca6391sdx55mwcn6740_firmwareqcm4290qcm6490_firmwarear8031_firmwareqrb5165wcn6851_firmwaresd480_firmwareqcs603sm6225_firmwareqca6574ausa8155p_firmwaresd205_firmwareqca6564a_firmwarewcd9341_firmwareqcm6125wsa8810sd870sd480wcn6855qcm4290_firmwaresd210_firmwareqcs610_firmwaremdm9150wcn6856sa6145pqca6564_firmwaresd768gar8031apq8096auqcs405_firmwaresa8145pwcn6740qca6696qca6391_firmwarewcd9370_firmwaresd780g_firmwaresdx55sa6150psa8155pcsra6640apq8096au_firmwaresm7250pqcs410_firmwarear8035_firmwareqcm2290Snapdragonqcm2290_firmwarewcn3991_firmwaremdm9150_firmwareqca8337_firmwaresda429w_firmwaresa6150p_firmwarewcd9380_firmwaresa8145p_firmwareqcs2290_firmwaresdx55m_firmwarewcn6856_firmwarewcn3950_firmwaresa8150p_firmwaresd765g_firmwareqca6390_firmwarecsra6620_firmwareqcs605_firmwarewcn6855_firmwarecsra6640_firmwareqcs6125_firmwarewcn3990_firmwareqrb5165n_firmwarewcd9335_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcd9340_firmwaresm6375_firmwareqca6426_firmwarewcn3660b_firmwareqca6574a_firmwareqca6574au_firmwaresdx55_firmwaresd768g_firmwarewcd9375_firmwarewcn3998_firmwarewcn3980_firmwaresm7250p_firmwarewcn3610_firmwareqca6436_firmwarewcn6740_firmwareqca6564au_firmwaresa6155p_firmwarear8031_firmwareqrb5165_firmwareqrb5165m_firmwareqcm6490_firmwaresd480_firmwarewcn6851_firmwaresm6225_firmwarewcn3988_firmwaresa6145p_firmwaresa8155p_firmwaresd205_firmwareqca6564a_firmwarewsa8810_firmwarewcd9341_firmwareqcm4290_firmwaresd765_firmwaresd210_firmwareqcs603_firmwareqcs610_firmwareqcs4290_firmwareqca6564_firmwareqca6696_firmwareqcs6490_firmwareqcs405_firmwaresd870_firmwareqca6391_firmwarewcn3910_firmwaresd780g_firmwarewcd9370_firmwareapq8096au_firmwarewsa8830_firmwaresd865_5g_firmwarewcn3620_firmwarewsa8815_firmwaresd888_5g_firmwarewcn6850_firmwarewsa8835_firmwaresa8195p_firmwareqcs410_firmwarewcn6750_firmwarear8035_firmwareqcm6125_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2024-33030
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.07%
||
7 Day CHG~0.00%
Published-04 Nov, 2024 | 10:04
Updated-08 Nov, 2024 | 04:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy without Checking Size of Input (`Classic Buffer Overflow`) in Performance

Memory corruption while parsing IPC frequency table parameters for LPLH that has size greater than expected size.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800qca9377_firmwaresnapdragon_8_gen_1_mobile_platformqca6584auwcd9380_firmwarewsa8830qca9367_firmwareqca8337_firmwaresnapdragon_x72_5g_modem-rf_systemqcn6274_firmwareqca8337qca6698aqsnapdragon_x75_5g_modem-rf_system_firmwareqfw7124qca9367fastconnect_6900_firmwarefastconnect_6900qcn6224_firmwarewsa8835wcd9340wcd9380qcn6274qcn6224fastconnect_7800_firmwaresnapdragon_x72_5g_modem-rf_system_firmwaresnapdragon_x75_5g_modem-rf_systemsnapdragon_8_gen_1_mobile_platform_firmwareqca8081snapdragon_auto_5g_modem-rf_gen_2qca6698aq_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqcc710qca6584au_firmwareqca9377qfw7114_firmwarear8035wcd9340_firmwareqcc710_firmwarewsa8830_firmwarewsa8835_firmwareqca8081_firmwareqfw7124_firmwareqfw7114ar8035_firmwareSnapdragonqca9377_firmwareqca8337_firmwareqca9367_firmwarewcd9380_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqca6584au_firmwareqcn6274_firmwareqfw7114_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900_firmwarewcd9340_firmwareqcc710_firmwareqcn6224_firmwarewsa8830_firmwarewsa8835_firmwarefastconnect_7800_firmwaresnapdragon_x72_5g_modem-rf_system_firmwareqca8081_firmwareqfw7124_firmwaresnapdragon_8_gen_1_mobile_platform_firmwarear8035_firmwareqca6698aq_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-33031
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 7.24%
||
7 Day CHG-0.00%
Published-04 Nov, 2024 | 10:04
Updated-16 Nov, 2024 | 04:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in RIL

Memory corruption while processing the update SIM PB records request.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800qca8337_firmwaresnapdragon_x72_5g_modem-rf_systemqcn6274_firmwaresdm429wqca8337snapdragon_x75_5g_modem-rf_system_firmwareqfw7124qcn6224_firmwaresdm429w_firmwarewcd9340qcn6274qcn6224fastconnect_7800_firmwaresnapdragon_x72_5g_modem-rf_system_firmwaresnapdragon_x75_5g_modem-rf_systemqca8081qcc710qfw7114_firmwarear8035wcd9340_firmwarewcn3660bqcc710_firmwarewcn3620_firmwarewcn3660b_firmwarewcn3620snapdragon_429_mobile_platform_firmwareqca8081_firmwareqfw7124_firmwareqfw7114snapdragon_429_mobile_platformar8035_firmwareSnapdragonqca8337_firmwareqcn6274_firmwareqfw7114_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewcd9340_firmwareqcc710_firmwareqcn6224_firmwarewcn3620_firmwaresdm429w_firmwarewcn3660b_firmwaresnapdragon_429_mobile_platform_firmwarefastconnect_7800_firmwareqca8081_firmwaresnapdragon_x72_5g_modem-rf_system_firmwareqfw7124_firmwarear8035_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2024-33039
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 5.12%
||
7 Day CHG~0.00%
Published-02 Dec, 2024 | 10:18
Updated-11 Dec, 2024 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Untrusted Pointer Dereference in Audio

Memory corruption when PAL client calls PAL service APIs by passing a random value as handle and the handle is not validated by the service.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qam8255p_firmwaresa8620p_firmwarewsa8830sw5100psa8775p_firmwaresa8650p_firmwareqam8650psnapdragon_w5\+_gen_1_wearable_platformsrv1h_firmwareqam8775pqamsrv1mwcn3988_firmwaresrv1hwsa8835sa7775p_firmwaresa7255p_firmwaresw5100sa8620psa8255p_firmwaresw5100p_firmwareqamsrv1m_firmwaresrv1m_firmwaresa7775pqam8650p_firmwaresa8770p_firmwareqam8775p_firmwaresa8255pwcn3980qamsrv1hsa8650pqamsrv1h_firmwaresa9000pwsa8830_firmwarewcn3988sa9000p_firmwaresa8775pwsa8835_firmwaresrv1msa7255psw5100_firmwarewcn3980_firmwareqam8255psa8770psnapdragon_w5\+_gen_1_wearable_platform_firmwareSnapdragonqam8255p_firmwaresa8620p_firmwareqamsrv1m_firmwareqam8650p_firmwaresa8770p_firmwareqam8775p_firmwaresa8775p_firmwaresa8650p_firmwaresrv1h_firmwareqamsrv1h_firmwarewcn3988_firmwarewsa8830_firmwaresa7775p_firmwaresa7255p_firmwaresa9000p_firmwarewsa8835_firmwaresw5100_firmwarewcn3980_firmwaresa8255p_firmwaresw5100p_firmwaresrv1m_firmware
CWE ID-CWE-822
Untrusted Pointer Dereference
CVE-2024-33036
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 2.29%
||
7 Day CHG~0.00%
Published-02 Dec, 2024 | 10:18
Updated-11 Dec, 2024 | 16:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use of Out-of-range Pointer Offset in Camera Driver

Memory corruption while parsing sensor packets in camera driver, user-space variable is used while allocating memory in kernel and parsing which can lead to huge allocation or invalid memory access.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_8_gen_1_mobile_platformwsa8830qca8337_firmwaresa6150p_firmwarewcd9380_firmwaresa8145p_firmwareqcs610sw5100pqca8337sd865_5gfastconnect_6800snapdragon_w5\+_gen_1_wearable_platformsnapdragon_870_5g_mobile_platform_firmwaresnapdragon_865_5g_mobile_platformsa8530p_firmwarewsa8835wcn3950_firmwaresa8540p_firmwarewcd9380sa8150p_firmwarevideo_collaboration_vc3_platformqcs410wcd9370sxr2130qca6426video_collaboration_vc3_platform_firmwarec-v2x_9150_firmwarewcn3980sa8530pqam8295pwcn3950sa9000pwcn3660bwsa8815snapdragon_865\+_5g_mobile_platformqam8295p_firmwaresnapdragon_xr2_5g_platform_firmwareqca6426_firmwarewcn3660b_firmwaresa9000p_firmwaresnapdragon_x55_5g_modem-rf_systemqca6574au_firmwaresdx55_firmwarewcn3680b_firmwarewcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwareqca6391qca6436_firmwaresa8295psnapdragon_w5\+_gen_1_wearable_platform_firmwarefastconnect_7800sa6155p_firmwaresnapdragon_865\+_5g_mobile_platform_firmwaresnapdragon_870_5g_mobile_platformsnapdragon_xr2_5g_platformfastconnect_6900fastconnect_6900_firmwarevideo_collaboration_vc1_platform_firmwarewcn3988_firmwareqca6574auqcn9074sa6145p_firmwaresa8155p_firmwarec-v2x_9150sa8195pwsa8810_firmwarewcd9341_firmwarefastconnect_7800_firmwaresw5100wsa8810qca6436sa6155psa8540psw5100p_firmwareqcs610_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareqsm8250sa6145pwcn3680bsxr2130_firmwarewcd9341qca6696_firmwaresa8145pqca6696qca6391_firmwarewcd9370_firmwaresa8150psa6150psdx55sa8155pwsa8830_firmwaresd865_5g_firmwarewcn3988wsa8815_firmwarewsa8835_firmwarevideo_collaboration_vc1_platformsa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwaresw5100_firmwareqcn9074_firmwarefastconnect_6800_firmwareqcs410_firmwaresa8295p_firmwareqsm8250_firmwareSnapdragonqualcomm_video_collaboration_vc1_platform_firmwaresa6155p_firmwareqca8337_firmwarewcd9380_firmwaresa6150p_firmwaresa8145p_firmwarefastconnect_6900_firmwaresa8530p_firmwarewcn3988_firmwaresa6145p_firmwaresa8155p_firmwarewcn3950_firmwaresa8540p_firmwarewsa8810_firmwaresa8150p_firmwarefastconnect_7800_firmwarewcd9341_firmwaresw5100p_firmwareqcs610_firmwaresnapdragon_8_gen_1_mobile_platform_firmwaresxr2130_firmwarec-v2x_9150_firmwareqca6696_firmwarequalcomm_video_collaboration_vc3_platform_firmwareqca6391_firmwarewcd9370_firmwarewcn3680b_firmwarewsa8830_firmwareqam8295p_firmwaresd865_5g_firmwaresnapdragon_xr2_5g_platform_firmwareqca6426_firmwarewcn3660b_firmwaresa9000p_firmwarewsa8815_firmwarewsa8835_firmwareqca6574au_firmwaresa8195p_firmwaresdx55_firmwaresnapdragon_865_5g_mobile_platform_firmwaresw5100_firmwareqcn9074_firmwarefastconnect_6800_firmwareqcs410_firmwaresa8295p_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcn3980_firmwareqca6436_firmwareqsm8250_firmware
CWE ID-CWE-823
Use of Out-of-range Pointer Offset
CVE-2024-23379
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.57%
||
7 Day CHG~0.00%
Published-07 Oct, 2024 | 12:58
Updated-16 Oct, 2024 | 19:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Double Free in DSP Services

Memory corruption while unmapping the fastrpc map when two threads can free the same map in concurrent scenario.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qam8255p_firmwaresnapdragon_8_gen_1_mobile_platformwsa8830wcd9380_firmwarewcn3990qam8650psnapdragon_835_mobile_pc_platformqam8775pqamsrv1mwsa8835wcd9380qca6584au_firmwarewcn3990_firmwareqca6310_firmwarewcd9335_firmwareqamsrv1hsa8650psa9000pqamsrv1h_firmwarewcd9340_firmwarewsa8815qca6320sa9000p_firmwaresa8775pqca6320_firmwaresnapdragon_835_mobile_pc_platform_firmwaresd835sa7255pfastconnect_7800sa8620p_firmwareqca6584auqca6310sa8775p_firmwaresa8650p_firmwareqca6698aqfastconnect_6900srv1h_firmwarefastconnect_6900_firmwaresrv1hsa7775p_firmwarewcd9340sa7255p_firmwarewsa8810_firmwarewcd9341_firmwarefastconnect_7800_firmwarewsa8810sa8620pwcd9335sa8255p_firmwaresnapdragon_8_gen_1_mobile_platform_firmwaresrv1m_firmwaresnapdragon_auto_5g_modem-rf_gen_2sa7775pqca6698aq_firmwaresd835_firmwareqamsrv1m_firmwareqam8650p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwarewcd9341sa8770p_firmwaresa8255pqam8775p_firmwarewsa8830_firmwarewsa8815_firmwarewsa8835_firmwaresrv1mqam8255psa8770pSnapdragonqam8255p_firmwaresa8620p_firmwarewcd9380_firmwaresa8775p_firmwaresa8650p_firmwarefastconnect_6900_firmwaresrv1h_firmwaresa7775p_firmwaresa7255p_firmwarewsa8810_firmwarewcd9341_firmwarefastconnect_7800_firmwaresa8255p_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareqca6698aq_firmwareqamsrv1m_firmwaresrv1m_firmwaresd835_firmwareqam8650p_firmwaresa8770p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqam8775p_firmwareqca6584au_firmwarewcn3990_firmwareqca6310_firmwarewcd9335_firmwareqamsrv1h_firmwarewcd9340_firmwarewsa8830_firmwarewsa8815_firmwaresa9000p_firmwareqca6320_firmwarewsa8835_firmwaresnapdragon_835_mobile_pc_platform_firmware
CWE ID-CWE-415
Double Free
CVE-2024-23378
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.57%
||
7 Day CHG~0.00%
Published-07 Oct, 2024 | 12:58
Updated-16 Oct, 2024 | 20:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Audio

Memory corruption while invoking IOCTL calls for MSM module from the user space during audio playback and record.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qam8255p_firmwaresa8620p_firmwareqca6584ausa8775p_firmwaresa8650p_firmwareqca6698aqqam8650psrv1h_firmwareqam8775pqamsrv1msrv1hsa7775p_firmwaresa7255p_firmwaresa8620psa8255p_firmwaresnapdragon_auto_5g_modem-rf_gen_2srv1m_firmwaresa7775pqca6698aq_firmwareqamsrv1m_firmwareqam8650p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresa8770p_firmwaresa8255pqca6584au_firmwareqam8775p_firmwareqamsrv1hsa8650psa9000pqamsrv1h_firmwaresa9000p_firmwaresa8775psrv1msa7255pqam8255psa8770pSnapdragonqam8255p_firmwaresa8620p_firmwareqamsrv1m_firmwareqam8650p_firmwaresa8770p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqam8775p_firmwareqca6584au_firmwaresa8775p_firmwaresa8650p_firmwaresrv1h_firmwareqamsrv1h_firmwaresa7775p_firmwaresa7255p_firmwaresa9000p_firmwaresa8255p_firmwareqca6698aq_firmwaresrv1m_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-23386
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 7.24%
||
7 Day CHG-0.00%
Published-04 Nov, 2024 | 10:04
Updated-16 Nov, 2024 | 04:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in Video

memory corruption when WiFi display APIs are invoked with large random inputs.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800snapdragon_8_gen_1_mobile_platformwsa8830wcd9380_firmwaresdm429wfastconnect_6900snapdragon_429_mobile_platformfastconnect_6900_firmwarewcn3660bwsa8830_firmwarewsa8835wcn3620_firmwaresdm429w_firmwarewcn3660b_firmwarewsa8835_firmwarewcn3620wcd9380snapdragon_429_mobile_platform_firmwarefastconnect_7800_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareSnapdragonwsa8830_firmwarewcd9380_firmwarewcn3620_firmwaresdm429w_firmwarewcn3660b_firmwarewsa8835_firmwaresnapdragon_429_mobile_platform_firmwarefastconnect_7800_firmwarefastconnect_6900_firmwaresnapdragon_8_gen_1_mobile_platform_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2024-23374
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.57%
||
7 Day CHG~0.00%
Published-07 Oct, 2024 | 12:58
Updated-16 Oct, 2024 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack-based Buffer Overflow in Power Management IC

Memory corruption is possible when an attempt is made from userspace or console to write some haptics effects pattern to the haptics debugfs file.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800qca9377_firmwaresnapdragon_8_gen_1_mobile_platformsa6155p_firmwarewsa8830wcd9380_firmwaresa6150p_firmwareqca9367_firmwaresa8145p_firmwareqca6584ausw5100pqca6698aqsnapdragon_w5\+_gen_1_wearable_platformqca9367fastconnect_6900fastconnect_6900_firmwarewcn3988_firmwareqca6574ausa8155p_firmwarewsa8835sa6145p_firmwaresa8195pwcd9380sa8150p_firmwarefastconnect_7800_firmwaresw5100sa6155psw5100p_firmwaresnapdragon_8_gen_1_mobile_platform_firmwaresnapdragon_auto_5g_modem-rf_gen_2qca6698aq_firmwaresa6145pqca6174a_firmwareqca6174asnapdragon_auto_5g_modem-rf_gen_2_firmwareqca6584au_firmwareqca6696_firmwarewcn3980qca9377sa8145pqca6696sa8150psa6150psa8155pwsa8830_firmwarewcn3988wsa8835_firmwareqca6574au_firmwaresa8195p_firmwaresw5100_firmwarewcn3980_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwareSnapdragonqca9377_firmwareqca6174a_firmwaresa6155p_firmwareqca9367_firmwarewcd9380_firmwaresa6150p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresa8145p_firmwareqca6584au_firmwareqca6696_firmwarefastconnect_6900_firmwarewcn3988_firmwarewsa8830_firmwaresa6145p_firmwaresa8155p_firmwarewsa8835_firmwaresa8150p_firmwarefastconnect_7800_firmwareqca6574au_firmwaresa8195p_firmwaresw5100_firmwarewcn3980_firmwaresw5100p_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareqca6698aq_firmware
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-23377
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.07%
||
7 Day CHG~0.00%
Published-04 Nov, 2024 | 10:04
Updated-08 Nov, 2024 | 04:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use of Out-of-range Pointer Offset in ComputerVision

Memory corruption while invoking IOCTL command from user-space, when a user modifies the original packet size of the command after system properties have been already sent to the EVA driver.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wsa8830sm7550wcd9380_firmwaressg2125psxr2230p_firmwarewcd9378_firmwaresg8275p_firmwareqcm8550qcs7230_firmwaresm7525wsa8840wsa8835sxr1230p_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwaresd_8_gen1_5gwcd9380wcn6755_firmwarewcd9370ssg2125p_firmwaressg2115pwcn7880sxr1230psg8275psnapdragon_8_gen_2_mobile_platformwcd9371_firmwarewcd9385_firmwarewsa8845sd_8_gen1_5g_firmwaresxr2230pwsa8845_firmwaresm7550_firmwareqcs8250wsa8845h_firmwarewcd9375_firmwareqca6391fastconnect_7800qcm8550_firmwarewcn6650_firmwarewsa8840_firmwarewsa8832_firmwarefastconnect_6900video_collaboration_vc5_platformfastconnect_6900_firmwareqcs8550_firmwarewcn6650sg8275_firmwarewcn7880_firmwareqcs8250_firmwaresnapdragon_8\+_gen_2_mobile_platformfastconnect_7800_firmwarewsa8845hwcn6755wcd9395_firmwaresnapdragon_ar2_gen_1_platform_firmwarewsa8832qcs7230sm8550psnapdragon_ar2_gen_1_platformsm7525_firmwaresxr2250pwcd9385wcd9371wcd9395qca6391_firmwareqcs8550wcd9375wcd9370_firmwaresm8550p_firmwarewcd9390wcd9390_firmwarewsa8830_firmwarewsa8835_firmwaresg8275video_collaboration_vc5_platform_firmwaressg2115p_firmwarewcd9378sxr2250p_firmwaresnapdragon_8_gen_2_mobile_platform_firmwareSnapdragonwcd9380_firmwareqcm8550_firmwaresxr2230p_firmwarewcd9378_firmwarewcn6650_firmwarewsa8832_firmwarewsa8840_firmwaresg8275p_firmwarefastconnect_6900_firmwareqcs8550_firmwareqcs7230_firmwaresg8275_firmwarewcn7880_firmwaresxr1230p_firmwareqcs8250_firmwarefastconnect_7800_firmwarewcn6755_firmwaresnapdragon_ar2_gen_1_platform_firmwarewcd9395_firmwaressg2125p_firmwaresm7525_firmwarewcd9371_firmwareqca6391_firmwarewcd9385_firmwarewcd9370_firmwaresm8550p_firmwaresd_8_gen1_5g_firmwarequalcomm_video_collaboration_vc5_platform_firmwarewcd9390_firmwarewsa8830_firmwarewsa8845_firmwaresm7550_firmwarewsa8835_firmwaressg2115p_firmwarewcd9375_firmwarewsa8845h_firmwaresxr2250p_firmwaresnapdragon_8_gen_2_mobile_platform_firmware
CWE ID-CWE-823
Use of Out-of-range Pointer Offset
CVE-2024-23375
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.57%
||
7 Day CHG~0.00%
Published-07 Oct, 2024 | 12:58
Updated-16 Oct, 2024 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in RIL

Memory corruption during the network scan request.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3680bsa6155p_firmwarewsa8830sw5100pwcn3980sa4155p_firmwaresnapdragon_w5\+_gen_1_wearable_platformsa4150p_firmwarewcn3660bwcn3988_firmwaresa8155pwsa8830_firmwaresa8155p_firmwarewsa8835sa8195pwcn3988wcn3660b_firmwarewsa8835_firmwarewcn3680b_firmwaresa8195p_firmwaresw5100sw5100_firmwarewcn3980_firmwaresa6155psw5100p_firmwaresa4155psa4150psnapdragon_w5\+_gen_1_wearable_platform_firmwareSnapdragonwcn3988_firmwarewsa8830_firmwaresa8155p_firmwaresa6155p_firmwarewcn3660b_firmwarewsa8835_firmwarewcn3680b_firmwaresa8195p_firmwaresa4155p_firmwaresw5100_firmwarewcn3980_firmwaresa4150p_firmwaresw5100p_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-1931
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 4.11%
||
7 Day CHG~0.00%
Published-13 Jul, 2021 | 05:30
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible buffer overflow due to improper validation of buffer length while processing fast boot commands in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055qca9377_firmwarewcn3991_firmwarewsa8830sd678sa6150p_firmwaresm6250p_firmwaresa8145p_firmwareqcs610qcs2290_firmwarefsm10056qca8337qca6431_firmwarecsrb31024sd_636csra6620fsm10055_firmwareqcs4290wcn3950_firmwaresa8150p_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqcs2290qca6390_firmwaresa6155qca6335sd690_5gsd730_firmwarewcd9370csra6620_firmwareqcs605_firmwaresd_675_firmwaresd675_firmwarecsra6640_firmwareqca6564qcs6125_firmwareqca6426qca6584au_firmwarewcn3990_firmwareqca9377sa415mwcn3998sd_8cx_firmwarewcd9371_firmwaresdxr2_5g_firmwarewcd9385_firmwaresm4125sd720gwcd9326_firmwarewcn3950sd662sd710_firmwaresd460_firmwaresa8155qca6320_firmwaresm7315_firmwareqca6574au_firmwaresdx55_firmwareqca6595ausa6155_firmwarewcd9375_firmwarewcn3998_firmwaresm7250p_firmwarewcn3999_firmwareqca6420qca6436_firmwareqca6564au_firmwareqca6584ausa6155p_firmwareqca6310sd778gwcn3999sdxr2_5gqcs6125sa8155_firmwaresd662_firmwaresdm630sa415m_firmwareqcs405qca6430wcn3988_firmwaresa6145p_firmwareqca6421sd778g_firmwaresm6250wcd9340sa8195psdm830_firmwarewsa8810_firmwaresd765gsd765_firmwarefsm10056_firmwareqca6436wcd9326wcd9335sa6155pwcn6851qcs603_firmwareqca6174a_firmwareqcs4290_firmwarewcd9385wcd9341qca6431qca6696_firmwarewcd9371sd750gsd870_firmwarear8035qca6390sd_8cxaqt1000sa8150psd750g_firmwaresm6250_firmwarewcd9375wcn3910_firmwarewsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwarewcn3988sd888_5g_firmwarewcn6850_firmwaresd660_firmwarewsa8815_firmwarewsa8835_firmwaresa8195p_firmwareqca6564awcn6750_firmwareqcm6125_firmwareqcm2290_firmwarewcn3991qca8337_firmwarewcd9380_firmwarewcn3990sd_675sd780gsd865_5gqca6564ausdx24sdx55m_firmwarewcn6856_firmwaresd888sd670_firmwareqca6574wsa8835sd665_firmwarewcd9380sd888_5gsm6250pqcs410qca6574asd690_5g_firmwaresdx50m_firmwareqca6174asm7325psdx24_firmwareqca6310_firmwareqca6430_firmwarewcd9335_firmwarewcn3980wcn6750qca6335_firmwareqca6574_firmwareqcs605wcd9340_firmwaresd855sm4125_firmwaresm7325p_firmwaresd665wcn3910qca6320wcn6850wsa8815sd_8c_firmwaresd765qca6426_firmwareqca6574a_firmwaresd768g_firmwaresd835wcn3980_firmwaresm7315sd460qca6391sd730sdx55msdxr1_firmwareqca6421_firmwareaqt1000_firmwarewcn6740_firmwaresd678_firmwarear8031_firmwarecsrb31024_firmwareqcm4290sdx50msd480_firmwareqcs603wcn6851_firmwareqca6574ausa8155p_firmwaresd710sd_636_firmwaresd670qca6564a_firmwarewcd9341_firmwareqcm6125qcm4290_firmwaresd480sd870wsa8810qcs610_firmwarewcn6856sd_8csa6145psd835_firmwareqca6564_firmwaresdxr1sd768gar8031qcs405_firmwaresa8145pwcn6740qca6696sdm630_firmwareqca6391_firmwaresd845_firmwaresd780g_firmwarewcd9370_firmwaresa6150psd888_firmwaresdx55sa8155pcsra6640sd675sd845sm7250psdm830sd720g_firmwareqcs410_firmwarear8035_firmwareqcm2290Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-1962
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 18.52%
||
7 Day CHG~0.00%
Published-09 Sep, 2021 | 07:36
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer Overflow while processing IOCTL for getting peripheral endpoint information there is no proper validation for input maximum endpoint pair and its size in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055wcn3991_firmwaremdm9150_firmwaresd678qca9561sa6150p_firmwaresa8145p_firmwareqcs610fsm10056ar9380qca9563_firmwareqca9561_firmwarefsm10055_firmwareqca9880_firmwareqca9992wcn3950_firmwaresa8150p_firmwareqca6420_firmwareqca6595au_firmwareipq8069_firmwaresa6155sd730_firmwarewcd9370qcs605_firmwaresd_675_firmwaresd675_firmwareqca6584au_firmwarewcn3990_firmwareqca9984_firmwarewcn3998wcn3950wcd9326_firmwaresd720gwcn3615_firmwareqca9563wcn3660bqca9982sa8155qca6574au_firmwaresdx55_firmwareqca6595ausa6155_firmwarewcd9375_firmwarewcn3615wcn3998_firmwarewcn3610_firmwareqca6420qca6584ausa6155p_firmwareipq8065qca9990sa8155_firmwareipq8068wcn3988_firmwareqca6430sa6145p_firmwaresd205sm6250wcd9340sa8195pwsa8810_firmwarequalcomm215_firmwarefsm10056_firmwarewcd9326wcd9335sa6155pqca9982_firmwareqca9888_firmwarewcd9341ipq8068_firmwareqca6696_firmwareqca9898_firmwarewcd9375aqt1000sa8150psm6250_firmwaresda429wsd210qca9992_firmwaresd855_firmwarewcn3620_firmwarewcn3988wsa8815_firmwarewcn3620sa8195p_firmwareqca9898wcn3610qca9882wcn3991sda429w_firmwarewcd9380_firmwarewcn3990sd_675qca9980_firmwareqca6595ar9380_firmwaresdx55m_firmwareqca9558qca9558_firmwareqca9896_firmwareipq8065_firmwareqca6574sd665_firmwarewcd9380qualcomm215qcs410qca6574asdx50m_firmwareqca9889qca9888qca6430_firmwareqca9994_firmwarewcd9335_firmwarewcn3980qca6574_firmwareqca9886qcs605sd855wcd9340_firmwarewsa8815sd665qca9887wcn3660b_firmwarewcn3680qca6574a_firmwareqca9984ipq8064ipq8069wcn3980_firmwaresd730qca6391sdx55mipq8064_firmwareaqt1000_firmwaresd678_firmwarewcn3680_firmwaresdx50mqca9882_firmwareqca9994qca9887_firmwareqca9531qca6574auqca9889_firmwaresa8155p_firmwareqca9980sd205_firmwareqca9880wcd9341_firmwarewsa8810sd210_firmwareqcs610_firmwaremdm9150sa6145pqca9886_firmwareqca6595_firmwaresa8145pqca6696qca6391_firmwarewcd9370_firmwaresa6150psdx55sa8155psd675qca9990_firmwareqca9531_firmwaresd720g_firmwareqcs410_firmwareqca9896Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-1958
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 9.84%
||
7 Day CHG~0.00%
Published-09 Sep, 2021 | 07:35
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition in fastrpc kernel driver for dynamic process creation can lead to use after free scenario in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Mobile, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewcn3991sda429w_firmwarewcd9380_firmwaresa6150p_firmwarewsa8830sa8145p_firmwaresd780gqca6595wcn6856_firmwarewsa8835wcd9380sa8150p_firmwaresd888_5gqca6595au_firmwarewcd9370qca6574awcn6855_firmwaresm7325wcn3980wcn6750wcd9385_firmwarewcn3660bwcn6850wcn3660b_firmwaresa8155qca6574a_firmwareqca6574au_firmwareqca6595auwcd9375_firmwarewcn3980_firmwarewcn3610_firmwarewcn6740_firmwaresd778gsa6155p_firmwaresd480_firmwaresa8155_firmwarewcn6851_firmwarewcn3988_firmwareqca6574ausa6145p_firmwaresa8155p_firmwaresd778g_firmwaresa8195pwcd9341_firmwaresd480wcn6855wcn6851sa6155pwcn6856sa6145pwcd9385wcd9341qca6696_firmwareqca6595_firmwaresa8145pwcn6740qca6696wcd9375sd780g_firmwarewcd9370_firmwaresa8150psa6150psa8155pwsa8830_firmwaresda429wwcn3620_firmwarewcn3988sd888_5g_firmwarewsa8835_firmwarewcn3620wcn6850_firmwaresa8195p_firmwarewcn6750_firmwarewcn3610sm7325_firmwareSnapdragon Auto, Snapdragon Connectivity, Snapdragon Mobile, Snapdragon Wearables
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2023-43545
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 5.92%
||
7 Day CHG~0.00%
Published-03 Jun, 2024 | 10:05
Updated-27 Jan, 2025 | 19:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow or Wraparound in WLAN HOST

Memory corruption when more scan frequency list or channels are sent from the user space.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6584au_firmwareqca6554aqcc2076_firmwareqca8337_firmwarewcd9335_firmwareqfw7124_firmwareqca6696_firmwareqcc710qca8081_firmwareqcc2073_firmwareqca6595au_firmwareqca6584auqcn6224_firmwareqfw7114_firmwareqca8081snapdragon_660_mobileqca6554a_firmwarewcn3990qca6564ausd660qcn6224snapdragon_x75_5g_modem-rfqcn6274_firmwareqfw7114fastconnect_7800wcn3990_firmwarear8035fastconnect_7800_firmwareqca6564au_firmwareqcc2073sd660_firmwarewcd9341_firmwarewcd9340qca6595_firmwareqca8337wcn3980_firmwareqcc710_firmwarear8035_firmwareqcn6274qfw7124qca6574aqca6595qca6574a_firmwareqcc2076wcd9341wcn3980qca6574auqca6574wcd9340_firmwarewcd9335qca6574_firmwareqca6696qca6595ausnapdragon_660_mobile_firmwareqca6574au_firmwaresnapdragon_x75_5g_modem-rf_firmwareSnapdragonqca6564au_firmwareqca8337_firmwareqca6584au_firmwareqcn6274_firmwarewcn3990_firmwareqca6696_firmwareqca6595_firmwarewcd9335_firmwareqfw7114_firmwareqcc2076_firmwareqca6554a_firmwaresnapdragon_x75_5g_modem-rf_system_firmwareqcc2073_firmwareqca6574_firmwarewcd9340_firmwareqcc710_firmwareqcn6224_firmwaresnapdragon_660_mobile_platform_firmwareqca6574a_firmwaresd660_firmwarewcd9341_firmwarefastconnect_7800_firmwareqca6574au_firmwareqca6595au_firmwareqca8081_firmwarewcn3980_firmwareqfw7124_firmwarear8035_firmware
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2023-43525
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.95%
||
7 Day CHG~0.00%
Published-06 May, 2024 | 14:32
Updated-15 Jan, 2025 | 16:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Audio

Memory corruption while copying the sound model data from user to kernel buffer during sound model register.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-Snapdragonqam8255p_firmwaresa8620p_firmwaresa6155p_firmwareqca8337_firmwaresa6150p_firmwaresa8145p_firmwareqcn6274_firmwaresa8775p_firmwaresa8650p_firmwaresrv1h_firmwareqcn6224_firmwaresa6145p_firmwaresa8155p_firmwaresa7255p_firmwaresa8150p_firmwarefastconnect_7800_firmwaresa8255p_firmwareqca6698aq_firmwareqamsrv1m_firmwaresrv1m_firmwareqam8650p_firmwaresa8770p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqam8775p_firmwareqca6584au_firmwareqca6696_firmwareqfw7114_firmwareqamsrv1h_firmwarewcd9340_firmwareqcc710_firmwareqam8295p_firmwaresa9000p_firmwareqca6574au_firmwaresa8195p_firmwareqca8081_firmwareqfw7124_firmwaresa8295p_firmwarear8035_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 8
  • 9
  • Next
Details not found