Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-23386

Summary
Assigner-qualcomm
Assigner Org ID-2cfc7d3e-20d3-47ac-8db7-1b7285aff15f
Published At-04 Nov, 2024 | 10:04
Updated At-16 Nov, 2024 | 04:55
Rejected At-
Credits

Improper Input Validation in Video

memory corruption when WiFi display APIs are invoked with large random inputs.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:qualcomm
Assigner Org ID:2cfc7d3e-20d3-47ac-8db7-1b7285aff15f
Published At:04 Nov, 2024 | 10:04
Updated At:16 Nov, 2024 | 04:55
Rejected At:
â–¼CVE Numbering Authority (CNA)
Improper Input Validation in Video

memory corruption when WiFi display APIs are invoked with large random inputs.

Affected Products
Vendor
Qualcomm Technologies, Inc.Qualcomm, Inc.
Product
Snapdragon
Platforms
  • Snapdragon Mobile
  • Snapdragon Wearables
Default Status
unaffected
Versions
Affected
  • FastConnect 6900
  • FastConnect 7800
  • SDM429W
  • Snapdragon 429 Mobile Platform
  • Snapdragon 8 Gen 1 Mobile Platform
  • WCD9380
  • WCN3620
  • WCN3660B
  • WSA8830
  • WSA8835
Problem Types
TypeCWE IDDescription
CWECWE-20CWE-20 Improper Input Validation
Type: CWE
CWE ID: CWE-20
Description: CWE-20 Improper Input Validation
Metrics
VersionBase scoreBase severityVector
3.16.7MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 6.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html
N/A
Hyperlink: https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html
Resource: N/A
â–¼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Vendor
Qualcomm Technologies, Inc.qualcomm
Product
fastconnect_6900_firmware
CPEs
  • cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through * (custom)
Vendor
Qualcomm Technologies, Inc.qualcomm
Product
fastconnect_7800_firmware
CPEs
  • cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through * (custom)
Vendor
Qualcomm Technologies, Inc.qualcomm
Product
sdm429w_firmware
CPEs
  • cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through * (custom)
Vendor
Qualcomm Technologies, Inc.qualcomm
Product
snapdragon_429_mobile_platform_firmware
CPEs
  • cpe:2.3:o:qualcomm:snapdragon_429_mobile_platform_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through * (custom)
Vendor
Qualcomm Technologies, Inc.qualcomm
Product
snapdragon_8_gen_1_mobile_platform_firmware
CPEs
  • cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through * (custom)
Vendor
Qualcomm Technologies, Inc.qualcomm
Product
wcd9380_firmware
CPEs
  • cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through * (custom)
Vendor
Qualcomm Technologies, Inc.qualcomm
Product
wcn3620_firmware
CPEs
  • cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through * (custom)
Vendor
Qualcomm Technologies, Inc.qualcomm
Product
wcn3660b_firmware
CPEs
  • cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through * (custom)
Vendor
Qualcomm Technologies, Inc.qualcomm
Product
wsa8830_firmware
CPEs
  • cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through * (custom)
Vendor
Qualcomm Technologies, Inc.qualcomm
Product
wsa8835_firmware
CPEs
  • cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 through * (custom)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:product-security@qualcomm.com
Published At:04 Nov, 2024 | 10:15
Updated At:07 Nov, 2024 | 19:54

memory corruption when WiFi display APIs are invoked with large random inputs.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.7MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 6.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Qualcomm Technologies, Inc.
qualcomm
>>wsa8835_firmware>>-
cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wsa8835>>-
cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wsa8830_firmware>>-
cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wsa8830>>-
cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcn3660b_firmware>>-
cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcn3660b>>-
cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcn3620_firmware>>-
cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcn3620>>-
cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcd9380_firmware>>-
cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcd9380>>-
cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>snapdragon_8_gen_1_mobile_platform_firmware>>-
cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>snapdragon_8_gen_1_mobile_platform>>-
cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>snapdragon_429_mobile_platform_firmware>>-
cpe:2.3:o:qualcomm:snapdragon_429_mobile_platform_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>snapdragon_429_mobile_platform>>-
cpe:2.3:h:qualcomm:snapdragon_429_mobile_platform:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sdm429w_firmware>>-
cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sdm429w>>-
cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_7800_firmware>>-
cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_7800>>-
cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_6900_firmware>>-
cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_6900>>-
cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE-20Secondaryproduct-security@qualcomm.com
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-20
Type: Secondary
Source: product-security@qualcomm.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.htmlproduct-security@qualcomm.com
Patch
Vendor Advisory
Hyperlink: https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html
Source: product-security@qualcomm.com
Resource:
Patch
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

510Records found

CVE-2021-30266
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 15.06%
||
7 Day CHG~0.00%
Published-12 Nov, 2021 | 06:16
Updated-03 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible use after free due to improper memory validation when initializing new interface via Interface add command in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresm7250sa6150p_firmwareqcs610ipq4028_firmwareqcn5550qca8337ar9380ipq8173_firmwareqca9561_firmwaresdx65qcn5124qca4024_firmwarewcn3950_firmwareipq8078asa8150p_firmwareqca6595au_firmwaresa6155qca6335qcn5064csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareqcs6125_firmwareqca9987_firmwaresa415mwcn3998wcn3950qcn6024_firmwareipq8076amdm9206_firmwaresm6375_firmwarewcn3660bsd460_firmwarewcn7850qca6428qca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwareqca8081_firmwarewcn3998_firmwaresa6155_firmwareqca6420apq8053_firmwareqca6438_firmwareqca9986ipq8070_firmwareqca9367_firmwareipq8065ipq8078a_firmwarewcn3999qrb5165_firmwareqca7500ipq8072_firmwareipq4029_firmwareqcs6125sa8155_firmwareipq6010sd662_firmwareipq8068qcs405qca6430sd765gqualcomm215_firmwareqca6436wcn6851sa6155pqcs603_firmwarewcn7851_firmwareqca9888_firmwarewcd9341ipq8068_firmwareqca6696_firmwaresd870_firmwareqca9988_firmwareqcn5154_firmwaresa8150pwsa8830_firmwareqca9992_firmwaresd865_5g_firmwaresd855_firmwarewcn3988qca6438wcn7850_firmwaresa8195p_firmwareqcn5121qcn5022_firmwarewcn6750_firmwareqca9898ipq4028wcn3610qca6428_firmwareipq5018_firmwaresm6375qca9985_firmwarewcn3991ipq4018_firmwareqca8337_firmwarewcd9380_firmwareipq8072aqca7500_firmwareqca9980_firmwarewcd9330msm8996au_firmwareipq8076a_firmwareipq8078qca6564ausdx55m_firmwareipq8173wcn6856_firmwareqcn5164qca9558qca6574csr8811_firmwarewcd9380qualcomm215qcn5054_firmwareqcs410qcn5024sd690_5g_firmwareipq4019_firmwareqca9985qcn9012_firmwareqca6430_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980qca6335_firmwareipq6018_firmwareqcs605wsa8815wcn6850qca6320mdm9650_firmwareqca9986_firmwareqca6426_firmwarewcn3660b_firmwarewcn3680qca9984ipq6028ipq8064qcn9024wcn3980_firmwaresd730qcn5550_firmwarewcd9330_firmwaresdx55mipq8064_firmwarewcn6740_firmwaremsm8953qcn5064_firmwaresd678_firmwarear8031_firmwarewcn3680_firmwareipq8078_firmwareqcn5054qrb5165wcn6851_firmwareqcs603ipq8070qca9896qcn5502qca9994qca9887_firmwareqca9980qcn9024_firmwareipq8174_firmwareqca6564a_firmwareqca9880qcm4290_firmwaresd480sd870wcn6855qcn5121_firmwaresd210_firmwareqcs610_firmwaresa6145pipq6018qca9886_firmwarear8031apq8096auqca6595_firmwareqcs405_firmwaresa8145pqca6391_firmwareqca4024wcd9370_firmwaresd780g_firmwaresdx55apq8053qcn5021_firmwarecsra6640sa8155psd675qca9531_firmwarear8035_firmwareqcn5024_firmwarewcn3991_firmwareqcn5500wsa8830sd678qca9561qcn9070sa8145p_firmwaresm7250_firmwarecsrb31024qca9563_firmwaremdm9650csra6620qca9987qcn9072qca9880_firmwareqca9992qcs4290sd765g_firmwareqca6420_firmwareipq8069_firmwareapq8009_firmwareqca6390_firmwaresd690_5gipq6000sd730_firmwarewcd9370sd675_firmwareipq8072qcn5152_firmwareqca6426qca6584au_firmwarewcn3990_firmwareqrb5165n_firmwareqcn9000_firmwareqca9984_firmwareqca9377sm8450ipq5018wcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwarewcn3615_firmwareqca9563ipq8074asd662qcn5124_firmwareqca9982sa8155qca6320_firmwarewcn3680b_firmwareqcn5122_firmwaresdx55_firmwarewcn3615qcn6023_firmwareqca6595auwcn3999_firmwarewcn3610_firmwareqca6436_firmwareqrb5165nipq5010qca6564au_firmwareqca6584ausd778gsa6155p_firmwareqca6310ipq8174wcn7851qca9990qcs6490sdxr2_5gqcn5052qca9367sa415m_firmwarewcn3988_firmwareqcn9074sd205sa6145p_firmwaresd778g_firmwaresa8195pwsa8810_firmwareqca6694sm8450_firmwaresd765_firmwarewcd9326wcd9335qca8081qca9982_firmwareqcn6023ipq8071aipq8071a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwareqca6390qca9898_firmwarewcd9375aqt1000ar8035csr8811ipq4019qca6694_firmwaremsm8953_firmwareqcn9100_firmwaresd210ipq5010_firmwareipq8074a_firmwaresd888_5g_firmwarewsa8815_firmwareqcm6490wcn6850_firmwarewsa8835_firmwareqca6564aqca9988qcm6125_firmwareqca9882wcn3990qcn9000sd_675sd780gsd865_5gqca6595ar9380_firmwaresm8450p_firmwareqcn9012qca9558_firmwareqca9896_firmwarewsa8835ipq8065_firmwaremsm8996ausd665_firmwaresd888_5gqcn5154qca8075_firmwareipq4018qca6574aipq6005_firmwaremdm9206wcn6855_firmwareqca9889qca9888qca6310_firmwaresm7325ipq8074qca9994_firmwarewcn6750ipq8070a_firmwareipq8076_firmwareqca6574_firmwareqca9886qcn5502_firmwaresd855sd665ipq8076sd765qca9887qca6574a_firmwareqcn5021ipq8069qcn5152sd768g_firmwareapq8009sd460qca6391ipq6005aqt1000_firmwareqcn9100sdx65_firmwareqcm4290csrb31024_firmwareqcm6490_firmwareqca9882_firmwareqcn9070_firmwaresd480_firmwareipq6028_firmwareipq8072a_firmwareqca9531ipq8074_firmwareqca6574auqca9889_firmwaresa8155p_firmwareqcn5122sd205_firmwarewcd9341_firmwareqcm6125wsa8810sm8450pqcn5500_firmwarewcn6856qcn5022wcn3680bsd768gipq6010_firmwarewcn6740qca6696sa6150pqca8075qcn9022_firmwareapq8096au_firmwareqcn6024qcn9022qca9990_firmwareipq8070aqcn9072_firmwareipq6000_firmwareipq8071_firmwareqcn9074_firmwareqcs410_firmwareipq4029sm7325_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-416
Use After Free
CVE-2021-30324
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 14.51%
||
7 Day CHG~0.00%
Published-11 Feb, 2022 | 10:40
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible out of bound write due to lack of boundary check for the maximum size of buffer when sending a DCI packet to remote process in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa6150p_firmwareqcs610ipq4028_firmwareqcn5550qca8337ar9380ipq8173_firmwareqcn5124qca4024_firmwarewcn3950_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqca6595au_firmwaresa6155qcn5064csra6620_firmwareqcs605_firmwarecsra6640_firmwarewcn3998wcn3950ipq8076aqcn6024_firmwarewcn3660bsd460_firmwareqca6428qca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwareqca8081_firmwaresa6155_firmwarewcn3998_firmwareqca6438_firmwareipq8070_firmwareipq8065ipq8078a_firmwarewcn3999qrb5165_firmwareipq5028qca7500ipq4029_firmwareipq8072_firmwareqrb5165m_firmwaresa8155_firmwareipq6010sd662_firmwareipq8068qcs405wcd9340qcn6132qualcomm215_firmwaresd765gqca6436wcn6851sa6155pqcs603_firmwareqca9888_firmwareqcn6122ipq8068_firmwarewcd9341qca6696_firmwaresd750gsd870_firmwareqcn5154_firmwaresa8150pwsa8830_firmwareqca9992_firmwaresd865_5g_firmwarewcn3988qca6438sa8195p_firmwareqca9898qcn5022_firmwareipq4028wcn3610qca6428_firmwareipq5018_firmwareqca9985_firmwarewcn3991ipq4018_firmwareqca8337_firmwaresda429w_firmwarewcd9380_firmwareipq8072aqca7500_firmwareqca9980_firmwareipq8076a_firmwareipq8078qca6564ausdx55m_firmwareipq8173qcn5164qca6574csr8811_firmwarewcd9380qcn5054_firmwarequalcomm215qcs410ipq4019_firmwareqcn5024sd690_5g_firmwareqca8072_firmwareqca9985qcn9012_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980ipq6018_firmwareqcs605wcd9340_firmwarewsa8815wcn6850pmp8074_firmwareqca6426_firmwarewcn3660b_firmwareqca9984ipq6028ipq8064qcn9024pmp8074wcn3980_firmwareqcn5550_firmwaresdx55mipq8064_firmwareqcn5064_firmwarear8031_firmwareipq8078_firmwareqcn5054qrb5165wcn6851_firmwareqcs603ipq8070qca9994qca9980qca6564a_firmwareipq8174_firmwareqcn9024_firmwareqca9880sd870sd210_firmwareqcs610_firmwareipq6018sa6145pqca9886_firmwareapq8096auar8031qcs405_firmwaresa8145pqca6391_firmwareqca4024wcd9370_firmwaresdx55qcn5021_firmwaresa8155pcsra6640ar8035_firmwareqcn5024_firmwarewcn3991_firmwaremdm9150_firmwarewsa8830qcn9070sa8145p_firmwarecsra6620qcn9072qca9880_firmwareqca9992sd765g_firmwareqca6390_firmwareipq6000sd690_5gwcd9370ipq8072qcn5152_firmwareqca6564qca6426wcn3990_firmwareqrb5165n_firmwareqcn9000_firmwareqca9984_firmwareipq5018wcd9385_firmwaresdxr2_5g_firmwareipq8074asd662qcn5124_firmwaresa8155qcn5122_firmwaresdx55_firmwareqca6595auqcn6023_firmwarewcn3999_firmwaresm7250p_firmwarewcn3610_firmwareqca6436_firmwareqrb5165nipq5010qca6564au_firmwaresa6155p_firmwaresm6225ipq8174qca9990sdxr2_5gqcn5052wcn3988_firmwareqcn9074sa6145p_firmwaresd205sa8195pwsa8810_firmwaresd765_firmwarewcd9335qca8081ipq8071aqcn6023ipq8071a_firmwarewcd9385ar8035csr8811qca6390qca9898_firmwareipq4019sd750g_firmwarewcd9375qcn9100_firmwaresda429wsd210wcn3620_firmwareipq5010_firmwareipq8074a_firmwarewcn6850_firmwarewsa8815_firmwarewcn3620wsa8835_firmwareqca6564aqca8072wcn3990qcn9000sd865_5gar9380_firmwareqcn9012qcn6122_firmwareipq8065_firmwarewsa8835sd665_firmwareqcn5154qca8075_firmwareipq4018qca6574aqca9889qcn6132_firmwareipq8074qca9888qca9994_firmwareipq8070a_firmwareipq8076_firmwareqca6574_firmwareqca9886sd665ipq8076sd765qca6574a_firmwareqcn5021qcn5152sd768g_firmwareqrb5165msd460qca6391qcn9100qcn9070_firmwareipq6028_firmwareipq8072a_firmwaresm6225_firmwareipq8074_firmwareqca6574auqca9889_firmwaresa8155p_firmwareqcn5122sd205_firmwarewcd9341_firmwarewsa8810mdm9150qcn5022qca6564_firmwareipq6010_firmwaresd768gqca6696sa6150pqca8075qcn9022_firmwareapq8096au_firmwareqcn6024qcn9022qca9990_firmwareipq8070aqcn9072_firmwaresm7250pipq6000_firmwareipq8071_firmwareqcn9074_firmwareqcs410_firmwareipq4029Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-30325
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 14.51%
||
7 Day CHG~0.00%
Published-11 Feb, 2022 | 10:40
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible out of bound access of DCI resources due to lack of validation process and resource allocation in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresa6150p_firmwareqcs610ipq4028_firmwareqcn5550qca8337ar9380ipq8173_firmwareqcn5124qca4024_firmwarewcn3950_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqca6595au_firmwaresa6155qcn5064csra6620_firmwareqcs605_firmwarecsra6640_firmwarewcn3998wcn3950qcn6024_firmwareipq8076amdm9206_firmwarewcn3660bsd460_firmwareqca6428qca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwareqca8081_firmwarewcn3998_firmwaresa6155_firmwareqca6438_firmwareqca9986ipq8070_firmwareqca9367_firmwareipq8065ipq8078a_firmwarewcn3999qrb5165_firmwareipq5028qca7500ipq8072_firmwareipq4029_firmwareqrb5165m_firmwaresa8155_firmwareipq6010sd662_firmwareipq8068qcs405wcd9340qcn6132sd765gqualcomm215_firmwareqca6436wcn6851sa6155pqcs603_firmwareqca9888_firmwareqcn6122wcd9341ipq8068_firmwareqca6696_firmwaresd870_firmwareqca9988_firmwareqcn5154_firmwaresa8150pqca9992_firmwaresd865_5g_firmwarewcn3988qca6438sa8195p_firmwareqcn5121qcn5022_firmwareqca9898ipq4028wcn3610qca6428_firmwareipq5018_firmwareqca9985_firmwarewcn3991ipq4018_firmwareqca8337_firmwaresda429w_firmwarewcd9380_firmwareipq8072aqca7500_firmwareqca9980_firmwarewcd9330ipq8076a_firmwareipq8078qca6564ausdx55m_firmwareipq8173qcn5164qca9558qca6574csr8811_firmwarewcd9380qualcomm215qcn5054_firmwareqcs410qcn5024ipq4019_firmwareqca8072_firmwareqca9985qcn9012_firmwarewcd9335_firmwareqcn5052_firmwarewcn3980ipq6018_firmwareqcs605wcd9340_firmwarewsa8815wcn6850pmp8074_firmwareqca9986_firmwareqca6426_firmwarewcn3660b_firmwareqca9984ipq6028ipq8064qcn9024pmp8074wcn3980_firmwareqcn5550_firmwarewcd9330_firmwaresdx55mipq8064_firmwareqcn5064_firmwarear8031_firmwareipq8078_firmwareqcn5054qrb5165wcn6851_firmwareqcs603ipq8070qcn5502qca9994qca9980qcn9024_firmwareipq8174_firmwareqca6564a_firmwareqca9880sd870qcn5121_firmwaresd210_firmwareqcs610_firmwaresa6145pipq6018qca9886_firmwarear8031apq8096auqcs405_firmwaresa8145pqca6391_firmwareqca4024wcd9370_firmwaresdx55qcn5021_firmwaresa8155pcsra6640qca9531_firmwarear8035_firmwareqcn5024_firmwarewcn3991_firmwaremdm9150_firmwareqcn9070sa8145p_firmwareqca9563_firmwarecsra6620qcn9072qca9880_firmwareqca9992sd765g_firmwareqca6390_firmwareipq6000wcd9370ipq8072qcn5152_firmwareqca6564qca6426wcn3990_firmwareqrb5165n_firmwareqcn9000_firmwareqca9984_firmwareqca9377ipq5018wcd9385_firmwaresdxr2_5g_firmwareqca9563ipq8074asd662qcn5124_firmwaresa8155qcn5122_firmwaresdx55_firmwareqca6595auqcn6023_firmwarewcn3999_firmwaresm7250p_firmwarewcn3610_firmwareqca6436_firmwareqrb5165nipq5010qca6564au_firmwaresa6155p_firmwaresm6225ipq8174qca9990sdxr2_5gqcn5052qca9367wcn3988_firmwareqcn9074sd205sa6145p_firmwaresa8195pwsa8810_firmwaresd765_firmwarewcd9335qca8081qcn6023ipq8071aipq8071a_firmwarewcd9385qca6390qca9898_firmwarewcd9375ar8035csr8811ipq4019qcn9100_firmwaresda429wsd210wcn3620_firmwareipq5010_firmwareipq8074a_firmwarewsa8815_firmwarewcn6850_firmwarewcn3620qca6564aqca9988qca8072wcn3990qcn9000sd865_5gar9380_firmwareqcn9012qca9558_firmwareqcn6122_firmwareipq8065_firmwaresd665_firmwareqcn5154qca8075_firmwareipq4018qca6574aipq6005_firmwaremdm9206qca9889qcn6132_firmwareqca9888ipq8074qca9994_firmwareipq8070a_firmwareipq8076_firmwareqca6574_firmwareqca9886qcn5502_firmwaresd665ipq8076sd765qca6574a_firmwareqcn5021qcn5152sd768g_firmwareqrb5165msd460qca6391ipq6005qcn9100qcn9070_firmwareipq6028_firmwareipq8072a_firmwaresm6225_firmwareqca9531ipq8074_firmwareqca6574auqca9889_firmwaresa8155p_firmwareqcn5122sd205_firmwarewcd9341_firmwarewsa8810mdm9150qcn5022qca6564_firmwaresd768gipq6010_firmwareqca6696sa6150pqca8075qcn9022_firmwareapq8096au_firmwareqcn6024qcn9022qca9990_firmwareipq8070aqcn9072_firmwaresm7250pipq6000_firmwareipq8071_firmwareqcn9074_firmwareqcs410_firmwareipq4029Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2021-30313
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 11.26%
||
7 Day CHG~0.00%
Published-13 Jan, 2022 | 11:40
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use after free condition can occur in wired connectivity due to a race condition while creating and deleting folders in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresa6150p_firmwareqcs610ipq4028_firmwareqcn5550qca8337ar9380ipq8173_firmwaresdx65qcn5124qca4024_firmwarewcn3950_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqcs2290qca6595au_firmwaresa6155qcn5064csra6620_firmwareqcs605_firmwarecsra6640_firmwareqca9987_firmwarewcn3998wcn3950qcn6024_firmwareipq8076asd_8_gen1_5g_firmwaresm6375_firmwarewcn3660bsd460_firmwaresm7315_firmwareqca6428qca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwareqca8081_firmwarewcn3998_firmwaresa6155_firmwaresdx12_firmwareqca6438_firmwareqca9986ipq8070_firmwareipq8065ipq8078a_firmwarewcn3999qrb5165_firmwareipq5028qca7500ipq8072_firmwareipq4029_firmwaresa8155_firmwareipq6010sd662_firmwareipq8068qcs405wcd9340sd765gqualcomm215_firmwareqca6436wcn6851sa6155pqcs603_firmwareqca9888_firmwareqcn6122wcd9341ipq8068_firmwareqca6696_firmwaresd870_firmwareqca9988_firmwareqcn5154_firmwarewcn3910_firmwaresa8150pwsa8830_firmwareqca9992_firmwaresd865_5g_firmwarewcn3988qca6438sa8195p_firmwaresm8475qcn5022_firmwarewcn6750_firmwareqca9898ipq4028wcn3610qca6428_firmwareipq5018_firmwaresm6375qca9985_firmwarewcn3991ipq4018_firmwareqca8337_firmwaresda429w_firmwarewcd9380_firmwareipq8072aqca7500_firmwareqca9980_firmwareipq8076a_firmwareipq8078qca6564ausdx55m_firmwareipq8173wcn6856_firmwareqcn5164qca9558qca6574csr8811_firmwarewcd9380qualcomm215qcn5054_firmwareqcs410qcn5024ipq4019_firmwareqca8072_firmwareqca9985qcn9012_firmwarewcd9335_firmwareqcn5052_firmwarewcn3980ipq6018_firmwareqcs605wcd9340_firmwarewsa8815wcn6850pmp8074_firmwarewcn3910qca6320qca9986_firmwareqca6426_firmwarewcn3660b_firmwareqca9984ipq6028ipq8064qcn9024pmp8074wcn3980_firmwareqcn5550_firmwaresdx55mipq8064_firmwarewcn6740_firmwareqcn5064_firmwarear8031_firmwareipq8078_firmwareqcn5054qrb5165wcn6851_firmwareqcs603ipq8070qcn5502qca9994qca9980qcn9024_firmwareipq8174_firmwareqca6564a_firmwareqca9880qcm4290_firmwaresd480sd870wcn6855sd210_firmwareqcs610_firmwareqsm8250sa6145pipq6018qca9886_firmwarear8031apq8096auqcs405_firmwaresa8145pqca6391_firmwareqca4024wcd9370_firmwaresd780g_firmwaresdx55sd888_firmwareqcn5021_firmwaresa8155pcsra6640qca9531_firmwarear8035_firmwareqcm2290qsm8250_firmwareqcn5024_firmwarewcn3991_firmwaremdm9150_firmwarewsa8830qcn9070sa8145p_firmwareqcs2290_firmwareqca9563_firmwarecsra6620qca9987qcn9072qca9880_firmwareqca9992qcs4290sd765g_firmwareipq8069_firmwareqca6390_firmwareipq6000wcd9370ipq8072qcn5152_firmwareqca6426wcn3990_firmwareqrb5165n_firmwareqcn9000_firmwareqca9984_firmwareqca9377ipq5018wcd9385_firmwaresdxr2_5g_firmwareqca9563ipq8074asd662qcn5124_firmwaresa8155qca6320_firmwareqcn5122_firmwaresdx55_firmwareqca6595auqcn6023_firmwarewcn3999_firmwaresm7250p_firmwarewcn3610_firmwareqca6436_firmwareqrb5165nipq5010qca6564au_firmwaresd778gsa6155p_firmwaresm6225ipq8174qca9990qcs6490sdxr2_5gqcn5052wcn3988_firmwareqcn9074sd205sa6145p_firmwaresd778g_firmwaresa8195pwsa8810_firmwaresd765_firmwarewcd9335qca8081qcn6023ipq8071aqca6174a_firmwareipq8071a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwareqca6390qca9898_firmwarewcd9375ar8035csr8811ipq4019qcn9100_firmwaresda429wsd210wcn3620_firmwareipq5010_firmwareipq8074a_firmwaresd888_5g_firmwarewsa8815_firmwareqcm6490wcn6850_firmwarewsa8835_firmwarewcn3620qca6564aqca9988qca8072qcm2290_firmwarewcn3990qcn9000sd780gsd865_5gar9380_firmwareqcn9012sd888qca9558_firmwareqcn6122_firmwareipq8065_firmwarewsa8835sd665_firmwaresd888_5gqcn5154qca8075_firmwareipq4018qca6574awcn6855_firmwareqca9889qca6174asm7325pqca9888ipq8074qca9994_firmwarewcn6750ipq8070a_firmwareipq8076_firmwareqca6574_firmwareqca9886qcn5502_firmwaresm7325p_firmwaresd665ipq8076sd765qca6574a_firmwareqcn5021ipq8069qcn5152sd768g_firmwaresm7315sd460qca6391qcn9100sdx65_firmwareqcm4290qcm6490_firmwareqcn9070_firmwaresd480_firmwareipq6028_firmwareipq8072a_firmwaresm6225_firmwareqca9531ipq8074_firmwareqca6574auqca9889_firmwaresa8155p_firmwareqcn5122sd205_firmwarewcd9341_firmwarewsa8810mdm9150wcn6856qcn5022sd768gipq6010_firmwarewcn6740qca6696sa6150pqca8075qcn9022_firmwareapq8096au_firmwareqcn6024qcn9022qca9990_firmwareipq8070aqcn9072_firmwaresm7250pipq6000_firmwaresdx12ipq8071_firmwareqcs410_firmwareqcn9074_firmwareipq4029Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-416
Use After Free
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2017-9711
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 4.96%
||
7 Day CHG~0.00%
Published-22 Nov, 2024 | 09:09
Updated-25 Nov, 2024 | 19:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Permissions, Privileges, and Access Controls in Data

Certain unprivileged processes are able to perform IOCTL calls.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-mdm9640_firmwaresd_820asd_617_firmwaresd_415sd_616sd_425sd_430_firmwaremdm9607_firmwaresd_615mdm9650sd_650_firmwaresd_625sd_615_firmwaremsm8909w_firmwaremdm9607sd_210sd_820_firmwaresd_650sd_820sd_450_firmwaresd_845_firmwaresd_617sd_820a_firmwaremdm9206sd_652sd_425_firmwaresd_212_firmwaresd_625_firmwaresd_450sd_845mdm9206_firmwaresd_430sd_810sd_835_firmwaremdm9650_firmwaresd_835sd_205sd_210_firmwaresd_415_firmwaresd_652_firmwaremsm8909wsd_810_firmwaresd_616_firmwaresd_205_firmwaresd_212mdm9640Snapdragonsd_425_firmwaremsm8909w_firmwaresd_820_firmwaremdm9650_firmwaremdm9640_firmwaresd_430_firmwaresd_625_firmwaresd_820a_firmwaresd_835_firmwaresd_450_firmwaresd_845_firmwaresd_810_firmwaremdm9206_firmwaremdm9607_firmwaresd_617_firmware
CWE ID-CWE-264
Not Available
CVE-2024-49848
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 9.60%
||
7 Day CHG~0.00%
Published-07 Apr, 2025 | 10:15
Updated-26 Feb, 2026 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in DSP Service

Memory corruption while processing multiple IOCTL calls from HLOS to DSP.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qdu1010_firmwareqca6698aq_firmwarewsa8845qfw7114srv1h_firmwarefastconnect_6200_firmwareqca8081snapdragon_ar1_gen_1_platform_\"luna1\"_firmwarewsa8830_firmwarewsa8840sxr1230psnapdragon_auto_5g_modem-rf_gen_2qam8295pqcn6274_firmwaresnapdragon_4_gen_1_mobile_platformqcs8550_firmwareqca6574aqdu1010qam8295p_firmwaresa8775pqru1062_firmwaresm8635p_firmwaresw5100p_firmwaresm6650qcn9012qcm4325qcn9012_firmwaresm8750psnapdragon_8\+_gen_2_mobile_platformqcm4325_firmwaresnapdragon_685_4g_mobile_platform_\(sm6225-ad\)sa7255pssg2115p_firmwaresnapdragon_ar1_gen_1_platformqdu1210sm7675p_firmwarefastconnect_7800_firmwaresnapdragon_8_gen_3_mobile_platformqcs6125sm8735_firmwaresnapdragon_w5\+_gen_1_wearable_platformsnapdragon_ar2_gen_1_platform_firmwaresa8195p_firmwareqca6574auwcn7860sg8275p_firmwareqam8620psm8750p_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"sa8155p_firmwaressg2115psa7255p_firmwaresxr2230pfastconnect_7800sm8550psa7775p_firmwarevideo_collaboration_vc1_platform_firmwaresa8255psnapdragon_4_gen_1_mobile_platform_firmwareqca6574snapdragon_8_gen_2_mobile_platformqca6574au_firmwaresnapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmwarewcn3990qcm6125_firmwareqcn6274qca6584au_firmwarewcn6755fastconnect_6900wcd9335_firmwaresa8295psa9000p_firmwarewsa8832qam8775pqdu1110qdx1011_firmwarewcd9341_firmwarewcn6650sa8620p_firmwaressg2125p_firmwaresnapdragon_x72_5g_modem-rf_system_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareqdu1000_firmwareqca6678aq_firmwaresa8195psnapdragon_8\+_gen_1_mobile_platform_firmwarewcn7880fastconnect_6700wsa8832_firmwareqfw7114_firmwarewcn7861sg4150pwcn3950qcc710wsa8835_firmwaresa8255p_firmwaresm4635_firmwarewsa8830wcn6450_firmwaresrv1m_firmwaresa6155psnapdragon_x35_5g_modem-rf_systemwcn3950_firmwarewcd9380qam8775p_firmwarewcn3980wcn6650_firmwaresd_8_gen1_5g_firmwareqam8620p_firmwaresnapdragon_662_mobile_platform_firmwarewcd9378qca6391_firmwarewcd9340_firmwaresnapdragon_480_5g_mobile_platform_firmwarewcn3988_firmwarewcn7880_firmwarewsa8810sxr2250p_firmwaresnapdragon_695_5g_mobile_platform_firmwareqcs6125_firmwareqcm8550qamsrv1hqca8337snapdragon_8\+_gen_1_mobile_platformsa8770p_firmwareqca6574a_firmwareqca6696_firmwaresw5100_firmwarewcd9380_firmwareqep8111_firmwarewcn7860_firmwaresa8295p_firmwarear8035_firmwareqmp1000_firmwaresnapdragon_680_4g_mobile_platform_firmwareqca6688aqqca6595au_firmwareqca6797aqsnapdragon_460_mobile_platformqca6174asxr2230p_firmwareqcm4490snapdragon_x35_5g_modem-rf_system_firmwareqca6698aqqamsrv1mqcs8250snapdragon_695_5g_mobile_platformsa8650p_firmwaresrv1lwcd9378_firmwaresm6650_firmwareqca8081_firmwareqcc710_firmwarewcd9335qca6584auwsa8845hwsa8840_firmwarefastconnect_6200sm7635qcm4490_firmwareqru1032wsa8815_firmwareqca6595snapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmwareqdx1010_firmwarewcn7861_firmwarewcd9390snapdragon_8\+_gen_2_mobile_platform_firmwarewsa8835qru1052snapdragon_8_gen_3_mobile_platform_firmwarewcn3988wcd9390_firmwaresnapdragon_ar1_gen_1_platform_firmwaresm8650qsm8550p_firmwareqam8255p_firmwareqca6678aqvision_intelligence_400_platform_firmwareqca6688aq_firmwarewcd9375sm4635qcs4490_firmwaresm8635qam8650p_firmwaresrv1l_firmwarewcn7881_firmwaresm8635psw5100snapdragon_x72_5g_modem-rf_systemqcn6224sa8775p_firmwareqamsrv1m_firmwarewcd9385_firmwarefastconnect_6700_firmwarevideo_collaboration_vc5_platformqcs7230snapdragon_w5\+_gen_1_wearable_platform_firmwaresnapdragon_4_gen_2_mobile_platformar8035sm8650q_firmwaresnapdragon_8_gen_1_mobile_platformqdx1011sm7675_firmwarevision_intelligence_400_platformsm7635_firmwarewcd9395_firmwareqru1032_firmwaresnapdragon_480_5g_mobile_platformsa8650pssg2125pqcs8250_firmwareqcs7230_firmwaresw5100psa6155p_firmwareqep8111snapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)talynplusqca6574_firmwareqamsrv1h_firmwareqcm8550_firmwareqam8650pvideo_collaboration_vc1_platformsnapdragon_ar2_gen_1_platformqdu1210_firmwareqfw7124_firmwareqca6696sa8770pqmp1000qca6595_firmwarewcn7881snapdragon_460_mobile_platform_firmwarewsa8810_firmwaresnapdragon_4_gen_2_mobile_platform_firmwarewcd9370wsa8845_firmwarewcn6755_firmwareqdx1010sd_8_gen1_5gsnapdragon_x75_5g_modem-rf_system_firmwaresnapdragon_x75_5g_modem-rf_systemsm7675sa8155pqru1062qdu1000wcn7750_firmwareqca6595ausxr2250pwcn3990_firmwaresa8620psxr1230p_firmwarewcn6450sm8750_firmwareqdu1110_firmwaresa9000pwcn7750wcn3980_firmwaresm8735video_collaboration_vc5_platform_firmwareqcs4490qru1052_firmwareqca6391wsa8815qam8255pwcd9370_firmwareqfw7124qcn9011_firmwareqcs8550wcd9341wcd9340wcd9395qcm6125qcn6224_firmwareqca6797aq_firmwaresm8635_firmwaresnapdragon_662_mobile_platformwcd9375_firmwareqcn9011sg4150p_firmwaresm7675pqca6174a_firmwaresa7775psg8275psrv1htalynplus_firmwarefastconnect_6900_firmwarewcd9385snapdragon_auto_5g_modem-rf_gen_2_firmwaresm8750snapdragon_8_gen_2_mobile_platform_firmwareqca8337_firmwaresrv1mwsa8845h_firmwaresnapdragon_680_4g_mobile_platformSnapdragon
CWE ID-CWE-416
Use After Free
CVE-2024-49829
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 19.34%
||
7 Day CHG~0.00%
Published-06 May, 2025 | 08:32
Updated-26 Feb, 2026 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Camera

Memory corruption can occur during context user dumps due to inadequate checks on buffer length.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380_firmwaresnapdragon_429_mobile_firmwarefastconnect_7800_firmwarewcn3620_firmwarewsa8835wcn3620sdm429w_firmwarewsa8830wsa8830_firmwarewsa8835_firmwarewcd9380snapdragon_8_gen_1_mobile_firmwaresnapdragon_429_mobilefastconnect_6900sdm429wfastconnect_6900_firmwaresnapdragon_8_gen_1_mobilewcn3660b_firmwarefastconnect_7800wcn3660bSnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-35118
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 10.74%
||
7 Day CHG~0.00%
Published-14 Jun, 2022 | 09:40
Updated-04 Aug, 2024 | 00:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An out-of-bounds write can occur due to an incorrect input check in the camera driver in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwaremdm9150_firmwarewsa8830qcs610qcs2290_firmwareqca8337sdx65csra6620qcs4290wcn3950_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqcs2290qca6390_firmwaresa6155sd690_5gwcd9370csra6620_firmwareqcs605_firmwarecsra6640_firmwareqcs6125_firmwareqca6426wcn3990_firmwareqrb5165n_firmwarewcn3998wcd9385_firmwaresdxr2_5g_firmwarewcn3950sm4125wcd9326_firmwarewcn3615_firmwaresd_8_gen1_5g_firmwarewcn3660bsd662sd460_firmwaresa8155wcn7850qca6574au_firmwaresdx55_firmwarewcn3680b_firmwareqca6595ausa6155_firmwarewcd9375_firmwarewcn3615sm7250p_firmwarewcn3998_firmwarewcn3999_firmwareqca6420qca6436_firmwareapq8053_firmwareqrb5165nsm7450_firmwaresd680_firmwaresa6155p_firmwarewcn3999sa515m_firmwareqcs6490qrb5165_firmwareqrb5165m_firmwaresd429sdxr2_5gqcs6125wcn7851sa8155_firmwaresd662_firmwareqcs405qca6430wcn3988_firmwaresd429_firmwarewsa8810_firmwarequalcomm215_firmwaresd765gsd765_firmwareqca6436sd680wcd9326sa6155pwcd9335wcn6851qcs603_firmwarewcn7851_firmwareqcs4290_firmwarewcd9385wcd9341qcs6490_firmwaresd750gsd870_firmwareqca6390ar8035sd750g_firmwareaqt1000wcd9375wcn3910_firmwaremsm8953_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3620_firmwareqcm6490sd888_5g_firmwarewcn3988wcn3620wcn6850_firmwarewcn7850_firmwarewsa8815_firmwaresm7450wsa8835_firmwaresm8475wcn6750_firmwareqcm6125_firmwareqcm2290_firmwarewcn3991qca8337_firmwarewcd9380_firmwarewcn3990sdm429wsd780gsd865_5gsdx55m_firmwarewcn6856_firmwarewsa8835qca6574sdm429w_firmwarewcd9380sd888_5gqualcomm215qcs410qca6574asd690_5g_firmwarewcn6855_firmwareqca6430_firmwarewcd9335_firmwarewcn3980wcn6750sa515mqca6574_firmwareqcs605sd855sm4125_firmwarewcn6850wsa8815wcn3910sd765qca6426_firmwarewcn3660b_firmwarewcn3680qca6574a_firmwaresd768g_firmwareqrb5165mwcn3980_firmwaresd460qca6391sdx55msm8475_firmwareaqt1000_firmwarewcn6740_firmwaremsm8953sdx65_firmwarear8031_firmwareqcm4290qcm6490_firmwarewcn3680_firmwarewsa8832_firmwareqrb5165sd480_firmwareqcs603wcn6851_firmwareqca6574ausa8155p_firmwarewcd9341_firmwareqcm6125qcm4290_firmwaresd480sd870wcn6855wsa8810wsa8832qcs610_firmwaremdm9150wcn6856wcn3680bsd768gar8031qcs405_firmwarewcn6740qca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55apq8053sa8155pcsra6640sm7250pqcs410_firmwaresm8475p_firmwarear8035_firmwareqcm2290sm8475pSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-33036
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.08% / 23.90%
||
7 Day CHG~0.00%
Published-02 Dec, 2024 | 10:18
Updated-11 Dec, 2024 | 16:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use of Out-of-range Pointer Offset in Camera Driver

Memory corruption while parsing sensor packets in camera driver, user-space variable is used while allocating memory in kernel and parsing which can lead to huge allocation or invalid memory access.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_8_gen_1_mobile_platformwsa8830qca8337_firmwaresa6150p_firmwarewcd9380_firmwaresa8145p_firmwareqcs610sw5100pqca8337sd865_5gfastconnect_6800snapdragon_w5\+_gen_1_wearable_platformsnapdragon_870_5g_mobile_platform_firmwaresnapdragon_865_5g_mobile_platformsa8530p_firmwarewsa8835wcn3950_firmwaresa8540p_firmwarewcd9380sa8150p_firmwarevideo_collaboration_vc3_platformqcs410wcd9370sxr2130qca6426video_collaboration_vc3_platform_firmwarec-v2x_9150_firmwarewcn3980sa8530pqam8295pwcn3950sa9000pwcn3660bwsa8815snapdragon_865\+_5g_mobile_platformqam8295p_firmwaresnapdragon_xr2_5g_platform_firmwareqca6426_firmwarewcn3660b_firmwaresa9000p_firmwaresnapdragon_x55_5g_modem-rf_systemqca6574au_firmwaresdx55_firmwarewcn3680b_firmwarewcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwareqca6391qca6436_firmwaresa8295psnapdragon_w5\+_gen_1_wearable_platform_firmwarefastconnect_7800sa6155p_firmwaresnapdragon_865\+_5g_mobile_platform_firmwaresnapdragon_870_5g_mobile_platformsnapdragon_xr2_5g_platformfastconnect_6900fastconnect_6900_firmwarevideo_collaboration_vc1_platform_firmwarewcn3988_firmwareqca6574auqcn9074sa6145p_firmwaresa8155p_firmwarec-v2x_9150sa8195pwsa8810_firmwarewcd9341_firmwarefastconnect_7800_firmwaresw5100wsa8810qca6436sa6155psa8540psw5100p_firmwareqcs610_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareqsm8250sa6145pwcn3680bsxr2130_firmwarewcd9341qca6696_firmwaresa8145pqca6696qca6391_firmwarewcd9370_firmwaresa8150psa6150psdx55sa8155pwsa8830_firmwaresd865_5g_firmwarewcn3988wsa8815_firmwarewsa8835_firmwarevideo_collaboration_vc1_platformsa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwaresw5100_firmwareqcn9074_firmwarefastconnect_6800_firmwareqcs410_firmwaresa8295p_firmwareqsm8250_firmwareSnapdragonqualcomm_video_collaboration_vc1_platform_firmwaresa6155p_firmwareqca8337_firmwarewcd9380_firmwaresa6150p_firmwaresa8145p_firmwarefastconnect_6900_firmwaresa8530p_firmwarewcn3988_firmwaresa6145p_firmwaresa8155p_firmwarewcn3950_firmwaresa8540p_firmwarewsa8810_firmwaresa8150p_firmwarefastconnect_7800_firmwarewcd9341_firmwaresw5100p_firmwareqcs610_firmwaresnapdragon_8_gen_1_mobile_platform_firmwaresxr2130_firmwarec-v2x_9150_firmwareqca6696_firmwarequalcomm_video_collaboration_vc3_platform_firmwareqca6391_firmwarewcd9370_firmwarewcn3680b_firmwarewsa8830_firmwareqam8295p_firmwaresd865_5g_firmwaresnapdragon_xr2_5g_platform_firmwareqca6426_firmwarewcn3660b_firmwaresa9000p_firmwarewsa8815_firmwarewsa8835_firmwareqca6574au_firmwaresa8195p_firmwaresdx55_firmwaresnapdragon_865_5g_mobile_platform_firmwaresw5100_firmwareqcn9074_firmwarefastconnect_6800_firmwareqcs410_firmwaresa8295p_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcn3980_firmwareqca6436_firmwareqsm8250_firmware
CWE ID-CWE-823
Use of Out-of-range Pointer Offset
CVE-2021-30349
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-8.2||HIGH
EPSS-0.03% / 10.52%
||
7 Day CHG~0.00%
Published-14 Jun, 2022 | 10:11
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control sequence for AC database after memory allocation can lead to possible memory corruption in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055qca9377_firmwaresd_8cx_gen3_firmwaresa6150p_firmwareqcs610qca8337wcd9360_firmwareqca4024_firmwarewcn3950_firmwaresa8150p_firmwareqcs2290qca6595au_firmwaresa6155csra6620_firmwareqcs605_firmwarecsra6640_firmwareqcs6125_firmwaresa415mwcn3998sd_8cx_gen2_firmwareqcn6024_firmwarewcn3950sm6375_firmwarewcn3660bsd460_firmwareqca6574au_firmwarewcd9375_firmwarewcn3998_firmwareqca8081_firmwaresa6155_firmwareqca6420wcd9360sd680_firmwarewcn3999sd_8cx_gen2qrb5165_firmwareqrb5165m_firmwaresa4155p_firmwareqcs6125sa8155_firmwareipq6010qca4004_firmwaresd662_firmwareqcs405qca6430wcd9306_firmwaresd765gsw5100fsm10056_firmwareqca6436sd680wcn6851sa6155pqcs603_firmwareqca6696_firmwaresd750gsd870_firmwarewcn3910_firmwaresxr2150p_firmwaresa8150pqca4004wsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3988sa8195p_firmwareqcn5121qcn5022_firmwarewcn6750_firmwarewcn3610sm6375wcn3991qca8337_firmwaresda429w_firmwarewcd9380_firmwaresdm429wsw5100pqca6564ausdx55m_firmwarewcn6856_firmwareqca6574csr8811_firmwarewcd9380qcs410sd690_5g_firmwaresdx24_firmwareqca8072_firmwareqca6430_firmwareqcn5052_firmwareqcn9012_firmwareipq6018_firmwareqcs605wcn6850wcn3910qca6426_firmwarewcn3660b_firmwareqca9984ipq6028qcn9024sdx55mar8031_firmwareqrb5165wcn6851_firmwareqcs603qca6564a_firmwareqcn9024_firmwaresdx57mqcm4290_firmwaresd480sd870qcn5121_firmwarewcn6855sw5100p_firmwareqcs610_firmwareqsm8250ipq6018sa6145psdxr1ar8031qcs405_firmwaresa8145pmdm9205_firmwareqca6391_firmwaresa4150p_firmwareqca4024wcd9370_firmwaresdx55qcn5021_firmwaresa8155pcsra6640sa4155psxr2150par8035_firmwareqcm2290qsm8250_firmwarewcn3991_firmwaremdm9150_firmwarewsa8830qcn9070sa8145p_firmwareqcs2290_firmwarefsm10056csrb31024csra6620fsm10055_firmwareqcn9072qcs4290sd765g_firmwareqca6420_firmwareqca6390_firmwareipq6000sd690_5gwcd9370qcn5152_firmwareqca6564qca6426qrb5165n_firmwareqcn9000_firmwareqca9984_firmwareqca9377wcd9385_firmwaresdxr2_5g_firmwaresd662qcn9011_firmwaresa8155wcn3680b_firmwareqcn5122_firmwaresdx55_firmwareqca6595auqcn6023_firmwarewcn3999_firmwaresm7250p_firmwarewcn3610_firmwareqca6436_firmwareqrb5165nqca6564au_firmwaresd778gsa6155p_firmwarewcd9306sa515m_firmwareqcs6490sd429sdxr2_5gqcn5052sa415m_firmwarewcn3988_firmwareqcn9074sa6145p_firmwaresd429_firmwaresd778g_firmwaresa8195psd765_firmwareqca8081qcn6023qca6174a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwaresd_8cx_gen3ar8035csr8811qca6390aqt1000sd750g_firmwarewcd9375sda429wwcn3620_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewcn3620wsa8835_firmwareqcx315qca6564asa4150pqcm6125_firmwareqca8072qcm2290_firmwareqcn9000sd865_5gsdx24qcn9012wsa8835qcx315_firmwaresdm429w_firmwaresd665_firmwaresd888_5gqca8075_firmwareqca6574aipq6005_firmwarewcn6855_firmwareqca6174asm7325pwcn6750mdm9205sa515mqca6574_firmwaresd855sm7325p_firmwaresd665sdx57m_firmwaresd765qca6574a_firmwareqcn5021qcn5152sd768g_firmwareqrb5165msd460qca6391sdxr1_firmwareipq6005aqt1000_firmwareqcm4290csrb31024_firmwareqcm6490_firmwareqcn9070_firmwaresd480_firmwareipq6028_firmwareqcn9011qca6574ausa8155p_firmwareqcn5122qcm6125mdm9150wcn6856qcn5022wcn3680bqca6564_firmwareipq6010_firmwaresd768gqca6696sa6150pqca8075qcn9022_firmwareqcn6024qcn9022qcn9072_firmwaresm7250pipq6000_firmwaresw5100_firmwareqcn9074_firmwareqcs410_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CVE-2021-30265
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 17.21%
||
7 Day CHG~0.00%
Published-12 Nov, 2021 | 06:15
Updated-03 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible memory corruption due to improper validation of memory address while processing user-space IOCTL for clearing Filter and Route statistics in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055wcn3991_firmwaremdm9150_firmwarewsa8830sd678sa6150p_firmwaresm7250sa8145p_firmwareqcs610fsm10056qca8337sm7250_firmwaresdx65csra6620fsm10055_firmwarewcn3950_firmwaresa8150p_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwaresa6155sd690_5gsd730_firmwarewcd9370csra6620_firmwareqcs605_firmwaresd_675_firmwaresd675_firmwarecsra6640_firmwareqcs6125_firmwareqca6426qca6584au_firmwarewcn3990_firmwareqrb5165n_firmwarewcn3998wcd9385_firmwaresdxr2_5g_firmwarewcn3950wcd9326_firmwarewcn3615_firmwarewcn3660bsd662sd460_firmwaresa8155qca6574au_firmwaresdx55_firmwarewcn3680b_firmwareqca6595auqca8081_firmwaresa6155_firmwarewcd9375_firmwarewcn3615wcn3998_firmwarewcn3610_firmwareqca6420qca6436_firmwareapq8053_firmwareqrb5165nqca6584ausa6155p_firmwarewcn3999qrb5165_firmwaresdxr2_5gqcs6125sa8155_firmwaresd662_firmwareqcs405qca6430wcn3988_firmwaresa6145p_firmwaresd205wcd9340sa8195pwsa8810_firmwarequalcomm215_firmwaresd765gsd765_firmwarefsm10056_firmwareqca6436wcd9326wcd9335sa6155pwcn6851qca8081qcs603_firmwarewcd9385wcd9341qca6696_firmwaresd870_firmwarear8035qca6390wcd9375aqt1000sa8150pmsm8953_firmwarewsa8830_firmwaresda429wsd210sd855_firmwaresd865_5g_firmwarewcn3620_firmwarewcn3988wcn6850_firmwarewsa8815_firmwarewcn3620wsa8835_firmwaresa8195p_firmwarewcn3610qcm6125_firmwarewcn3991qca8337_firmwaresda429w_firmwarewcd9380_firmwarewcn3990sd_675sd865_5gqca6595sdx55m_firmwarewcn6856_firmwarewsa8835qca6574sd665_firmwarewcd9380wcn3999_firmwarequalcomm215qcs410qca6574asd690_5g_firmwarewcn6855_firmwareqca6430_firmwarewcd9335_firmwarewcn3980qca6574_firmwareqcs605wcd9340_firmwaresd855wsa8815wcn6850sd665sd765qca6426_firmwarewcn3660b_firmwarewcn3680qca6574a_firmwaresd768g_firmwarewcn3980_firmwaresd460qca6391sd730sdx55maqt1000_firmwaremsm8953sdx65_firmwaresd678_firmwarear8031_firmwarewcn3680_firmwareqrb5165wcn6851_firmwareqcs603qca6574ausa8155p_firmwaresd205_firmwarewcd9341_firmwareqcm6125wsa8810sd870wcn6855sd210_firmwareqcs610_firmwaremdm9150wcn6856sa6145pwcn3680bsd768gar8031qca6595_firmwareqcs405_firmwaresa8145pqca6696qca6391_firmwarewcd9370_firmwaresa6150psdx55apq8053sa8155pcsra6640sd675qcs410_firmwarear8035_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-30298
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 12.17%
||
7 Day CHG~0.00%
Published-03 Jan, 2022 | 07:26
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible out of bound access due to improper validation of item size and DIAG memory pools data while switching between USB and PCIE interface in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055wcn3991_firmwaremdm9150_firmwarewsa8830wcn3991qca8337_firmwaresda429w_firmwarewcd9380_firmwareqcs610qcn9000ipq8072afsm10056qca8337ipq8076a_firmwaresd865_5gsdx55m_firmwarecsra6620fsm10055_firmwarewsa8835wcn3950_firmwaresd665_firmwarewcd9380sd765g_firmwareqca6595au_firmwareqca6390_firmwarequalcomm215qcs410wcd9370csra6620_firmwarecsra6640_firmwareqrb5165n_firmwareqcn9000_firmwarewcd9335_firmwarewcn3980wcn3998wcd9385_firmwarewcn3950ipq8076awcd9340_firmwarewcn3660bwsa8815wcn6850sd665ipq8074asd662sd460_firmwaresd765wcn3660b_firmwareqca6574au_firmwaresdx55_firmwaresd768g_firmwareqca6595auwcd9375_firmwarewcn3998_firmwarewcn3999_firmwaresm7250p_firmwarewcn3980_firmwarewcn3610_firmwaresd460qca6391sdx55mqrb5165nwcn3999ar8031_firmwareqrb5165_firmwareqrb5165wcn6851_firmwaresd662_firmwareipq8072a_firmwareqcs405wcn3988_firmwareqca6574auqcn9074sd205sa8155p_firmwaresd205_firmwarewcd9340wsa8810_firmwarequalcomm215_firmwaresd765gwcd9341_firmwarewsa8810sd765_firmwarefsm10056_firmwaresd870wcn6851wcd9335sd210_firmwareqcs610_firmwaremdm9150wcd9385wcd9341sd768gar8031qca6696_firmwareqcs405_firmwaresd870_firmwareqca6696qca6391_firmwarear8035qca6390wcd9375wcd9370_firmwaresdx55sa8155pwsa8830_firmwaresda429wsd210csra6640sd865_5g_firmwarewcn3620_firmwareipq8074a_firmwarewcn3988wcn6850_firmwarewcn3620wsa8815_firmwarewsa8835_firmwaresm7250pqcn9074_firmwareqcs410_firmwarear8035_firmwarewcn3610Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-30264
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 15.06%
||
7 Day CHG~0.00%
Published-12 Nov, 2021 | 06:15
Updated-03 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible use after free due improper validation of reference from call back to internal store table in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarefsm10055sm7250sa6150p_firmwareqcs610ipq4028_firmwareqcn5550qca8337ar9380ipq8173_firmwareqca9561_firmwaresdx65qcn5124qca4024_firmwarewcn3950_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqca6595au_firmwaresa6155qcn5064csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareqcs6125_firmwarewcn3998wcn3950qcn6024_firmwareipq8076amdm9206_firmwaresm6375_firmwarewcn3660bsd460_firmwareqca6428qca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwareqca8081_firmwarewcn3998_firmwaresa6155_firmwareqca6420apq8053_firmwareqca6438_firmwareipq8070_firmwareqca9367_firmwareipq8065ipq8078a_firmwareqrb5165_firmwareipq5028qca7500ipq8072_firmwareipq4029_firmwareqcs6125sa8155_firmwareipq6010sd662_firmwareipq8068qcs405qca6430sd765gfsm10056_firmwarewcn6851sa6155pqcs603_firmwareqca9888_firmwareqcn6122wcd9341ipq8068_firmwareqca6696_firmwaresd870_firmwareqcn5154_firmwaresa8150pwsa8830_firmwareqca9992_firmwaresd865_5g_firmwaresd855_firmwarewcn3988qca6438sa8195p_firmwareqcn5121qcn5022_firmwarewcn6750_firmwareqca9898ipq4028wcn3610qca6428_firmwareipq5018_firmwaresm6375qca9985_firmwarewcn3991ipq4018_firmwareqca8337_firmwaresda429w_firmwarewcd9380_firmwareipq8072aqca7500_firmwareqca9980_firmwarewcd9330msm8996au_firmwareipq8076a_firmwareipq8078qca6564ausdx55m_firmwareipq8173wcn6856_firmwareqcn5164qca9558qca6574csr8811_firmwarewcd9380qcn5054_firmwareqcs410qcn5024sd690_5g_firmwareipq4019_firmwareqca8072_firmwareqca9985qcn9012_firmwareqca6430_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980ipq6018_firmwareqcs605wsa8815wcn6850pmp8074_firmwareqca6426_firmwarewcn3660b_firmwareqca9984ipq6028ipq8064qcn9024pmp8074wcn3980_firmwaresd730qcn5550_firmwarewcd9330_firmwaresdx55mipq8064_firmwarewcn6740_firmwaremsm8953qcn5064_firmwaresd678_firmwarear8031_firmwareipq8078_firmwareqcn5054qrb5165wcn6851_firmwareqcs603ipq8070qca9896qcn5502qca9994qca9887_firmwareqca9980qcn9024_firmwareipq8174_firmwareqca6564a_firmwareqca9880sd480sd870wcn6855qcn5121_firmwaresd210_firmwareqcs610_firmwaresa6145pipq6018qca9886_firmwarear8031apq8096auqca6595_firmwareqcs405_firmwaresa8145pqca6391_firmwareqca4024wcd9370_firmwaresd780g_firmwaresdx55apq8053qcn5021_firmwarecsra6640sa8155psd675qca9531_firmwarear8035_firmwareqcn5024_firmwarewcn3991_firmwaremdm9150_firmwareqcn5500wsa8830qca9561sd678qcn9070sa8145p_firmwarefsm10056sm7250_firmwareqca9563_firmwarecsra6620fsm10055_firmwareqcn9072qca9880_firmwareqca9992sd765g_firmwareqca6420_firmwareqca6390_firmwareapq8009_firmwaresd690_5gipq6000sd730_firmwarewcd9370sd675_firmwareipq8072qcn5152_firmwareqca6426qca6584au_firmwarewcn3990_firmwareqrb5165n_firmwareqcn9000_firmwareqca9984_firmwareqca9377sm8450ipq5018wcd9385_firmwarewcd9326_firmwarewcn3615_firmwareqca9563ipq8074asd662qcn5124_firmwareqca9982sa8155wcn3680b_firmwareqcn5122_firmwaresdx55_firmwarewcn3615qcn6023_firmwareqca6595auwcn3610_firmwareqrb5165nipq5010qca6564au_firmwareqca6584ausd778gsa6155p_firmwareipq8174qca9990qcs6490qcn5052qca9367wcn3988_firmwareqcn9074sd205sa6145p_firmwaresd778g_firmwaresa8195pwsa8810_firmwareqca6694sm8450_firmwaresd765_firmwarewcd9326wcd9335qca8081qca9982_firmwareqcn6023ipq8071aipq8071a_firmwarewcd9385qcs6490_firmwareqca6390qca9898_firmwarewcd9375aqt1000ar8035csr8811ipq4019qca6694_firmwaremsm8953_firmwareqcn9100_firmwaresda429wsd210wcn3620_firmwareipq5010_firmwareipq8074a_firmwaresd888_5g_firmwarewsa8815_firmwareqcm6490wcn6850_firmwarewsa8835_firmwarewcn3620qca6564aqcm6125_firmwareqca9882qca8072wcn3990qcn9000sd_675sd780gsd865_5gqca6595ar9380_firmwaresm8450p_firmwareqcn9012qca9558_firmwareqca9896_firmwareqcn6122_firmwareipq8065_firmwarewsa8835msm8996ausd665_firmwaresd888_5gqcn5154qca8075_firmwareipq4018qca6574aipq6005_firmwaremdm9206wcn6855_firmwareqca9889qca9888ipq8074sm7325qca9994_firmwarewcn6750ipq8070a_firmwareipq8076_firmwareqca6574_firmwareqca9886qcn5502_firmwaresd855sd665ipq8076sd765qca9887qca6574a_firmwareqcn5021qcn5152sd768g_firmwareapq8009sd460qca6391ipq6005aqt1000_firmwareqcn9100sdx65_firmwareqcm6490_firmwareqca9882_firmwareqcn9070_firmwaresd480_firmwareipq6028_firmwareipq8072a_firmwareqca9531ipq8074_firmwareqca6574auqca9889_firmwaresa8155p_firmwareqcn5122sd205_firmwarewcd9341_firmwareqcm6125wsa8810sm8450pqcn5500_firmwaremdm9150wcn6856qcn5022wcn3680bsd768gipq6010_firmwarewcn6740qca6696sa6150pqca8075qcn9022_firmwareapq8096au_firmwareqcn6024qcn9022qca9990_firmwareipq8070aqcn9072_firmwareipq6000_firmwareipq8071_firmwareqcn9074_firmwareqcs410_firmwareipq4029sm7325_firmwareSnapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-416
Use After Free
CVE-2021-30263
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 12.17%
||
7 Day CHG~0.00%
Published-12 Nov, 2021 | 06:15
Updated-03 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible race condition can occur due to lack of synchronization mechanism when On-Device Logging node open twice concurrently in Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-aqt1000_firmwareqca8337_firmwarewcn3999ar8031_firmwareqca8337qcs6125sdx55m_firmwarecsra6620qca6430qcs405wcd9340wcn3950_firmwarewsa8810_firmwarewcd9341_firmwareqcm6125qca6420_firmwarewsa8810wcd9335wcd9370csra6620_firmwaresd_8ccsra6640_firmwareqcs6125_firmwarewcd9341ar8031qca6430_firmwareqcs405_firmwarewcd9335_firmwarewcn3980wcn3998sd_8cx_firmwareqca6391_firmwarewcn3950ar8035sd_8cxaqt1000wcd9340_firmwarewcd9370_firmwaresd855sdx55wsa8815csra6640sd855_firmwaresd_8c_firmwarewsa8815_firmwaresdx55_firmwarewcn3999_firmwarewcn3998_firmwarewcn3980_firmwareqca6391sdx55mqca6420ar8035_firmwareqcm6125_firmwareSnapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music
CWE ID-CWE-416
Use After Free
CVE-2024-45568
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 19.34%
||
7 Day CHG~0.00%
Published-06 May, 2025 | 08:32
Updated-26 Feb, 2026 | 18:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in Camera Driver

Memory corruption due to improper bounds check while command handling in camera-kernel driver.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380_firmwaresnapdragon_429_mobile_firmwarefastconnect_7800_firmwarewcn3620_firmwarewcd9385wsa8835sxr2230p_firmwarewcn3660bwcd9385_firmwaresxr2230pwcn3620sdm429w_firmwarewsa8830wsa8830_firmwarewsa8835_firmwaresxr2250p_firmwarewcd9380snapdragon_429_mobilefastconnect_6900sdm429wfastconnect_6900_firmwarewsa8832_firmwarewsa8832wcn3660b_firmwarefastconnect_7800sxr2250pSnapdragon
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-1962
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 18.48%
||
7 Day CHG~0.00%
Published-09 Sep, 2021 | 07:36
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer Overflow while processing IOCTL for getting peripheral endpoint information there is no proper validation for input maximum endpoint pair and its size in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055wcn3991_firmwaremdm9150_firmwaresd678qca9561sa6150p_firmwaresa8145p_firmwareqcs610fsm10056ar9380qca9563_firmwareqca9561_firmwarefsm10055_firmwareqca9880_firmwareqca9992wcn3950_firmwaresa8150p_firmwareqca6420_firmwareqca6595au_firmwareipq8069_firmwaresa6155sd730_firmwarewcd9370qcs605_firmwaresd_675_firmwaresd675_firmwareqca6584au_firmwarewcn3990_firmwareqca9984_firmwarewcn3998wcn3950wcd9326_firmwaresd720gwcn3615_firmwareqca9563wcn3660bqca9982sa8155qca6574au_firmwaresdx55_firmwareqca6595ausa6155_firmwarewcd9375_firmwarewcn3615wcn3998_firmwarewcn3610_firmwareqca6420qca6584ausa6155p_firmwareipq8065qca9990sa8155_firmwareipq8068wcn3988_firmwareqca6430sa6145p_firmwaresd205sm6250wcd9340sa8195pwsa8810_firmwarequalcomm215_firmwarefsm10056_firmwarewcd9326wcd9335sa6155pqca9982_firmwareqca9888_firmwarewcd9341ipq8068_firmwareqca6696_firmwareqca9898_firmwarewcd9375aqt1000sa8150psm6250_firmwaresda429wsd210qca9992_firmwaresd855_firmwarewcn3620_firmwarewcn3988wsa8815_firmwarewcn3620sa8195p_firmwareqca9898wcn3610qca9882wcn3991sda429w_firmwarewcd9380_firmwarewcn3990sd_675qca9980_firmwareqca6595ar9380_firmwaresdx55m_firmwareqca9558qca9558_firmwareqca9896_firmwareipq8065_firmwareqca6574sd665_firmwarewcd9380qualcomm215qcs410qca6574asdx50m_firmwareqca9889qca9888qca6430_firmwareqca9994_firmwarewcd9335_firmwarewcn3980qca6574_firmwareqca9886qcs605sd855wcd9340_firmwarewsa8815sd665qca9887wcn3660b_firmwarewcn3680qca6574a_firmwareqca9984ipq8064ipq8069wcn3980_firmwaresd730qca6391sdx55mipq8064_firmwareaqt1000_firmwaresd678_firmwarewcn3680_firmwaresdx50mqca9882_firmwareqca9994qca9887_firmwareqca9531qca6574auqca9889_firmwaresa8155p_firmwareqca9980sd205_firmwareqca9880wcd9341_firmwarewsa8810sd210_firmwareqcs610_firmwaremdm9150sa6145pqca9886_firmwareqca6595_firmwaresa8145pqca6696qca6391_firmwarewcd9370_firmwaresa6150psdx55sa8155psd675qca9990_firmwareqca9531_firmwaresd720g_firmwareqcs410_firmwareqca9896Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-1958
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 11.26%
||
7 Day CHG~0.00%
Published-09 Sep, 2021 | 07:35
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition in fastrpc kernel driver for dynamic process creation can lead to use after free scenario in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Mobile, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewcn3991sda429w_firmwarewcd9380_firmwaresa6150p_firmwarewsa8830sa8145p_firmwaresd780gqca6595wcn6856_firmwarewsa8835wcd9380sa8150p_firmwaresd888_5gqca6595au_firmwarewcd9370qca6574awcn6855_firmwaresm7325wcn3980wcn6750wcd9385_firmwarewcn3660bwcn6850wcn3660b_firmwaresa8155qca6574a_firmwareqca6574au_firmwareqca6595auwcd9375_firmwarewcn3980_firmwarewcn3610_firmwarewcn6740_firmwaresd778gsa6155p_firmwaresd480_firmwaresa8155_firmwarewcn6851_firmwarewcn3988_firmwareqca6574ausa6145p_firmwaresa8155p_firmwaresd778g_firmwaresa8195pwcd9341_firmwaresd480wcn6855wcn6851sa6155pwcn6856sa6145pwcd9385wcd9341qca6696_firmwareqca6595_firmwaresa8145pwcn6740qca6696wcd9375sd780g_firmwarewcd9370_firmwaresa8150psa6150psa8155pwsa8830_firmwaresda429wwcn3620_firmwarewcn3988sd888_5g_firmwarewsa8835_firmwarewcn3620wcn6850_firmwaresa8195p_firmwarewcn6750_firmwarewcn3610sm7325_firmwareSnapdragon Auto, Snapdragon Connectivity, Snapdragon Mobile, Snapdragon Wearables
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2021-1931
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 4.57%
||
7 Day CHG~0.00%
Published-13 Jul, 2021 | 05:30
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible buffer overflow due to improper validation of buffer length while processing fast boot commands in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055qca9377_firmwarewcn3991_firmwarewsa8830sd678sa6150p_firmwaresm6250p_firmwaresa8145p_firmwareqcs610qcs2290_firmwarefsm10056qca8337qca6431_firmwarecsrb31024sd_636csra6620fsm10055_firmwareqcs4290wcn3950_firmwaresa8150p_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqcs2290qca6390_firmwaresa6155qca6335sd690_5gsd730_firmwarewcd9370csra6620_firmwareqcs605_firmwaresd_675_firmwaresd675_firmwarecsra6640_firmwareqca6564qcs6125_firmwareqca6426qca6584au_firmwarewcn3990_firmwareqca9377sa415mwcn3998sd_8cx_firmwarewcd9371_firmwaresdxr2_5g_firmwarewcd9385_firmwaresm4125sd720gwcd9326_firmwarewcn3950sd662sd710_firmwaresd460_firmwaresa8155qca6320_firmwaresm7315_firmwareqca6574au_firmwaresdx55_firmwareqca6595ausa6155_firmwarewcd9375_firmwarewcn3998_firmwaresm7250p_firmwarewcn3999_firmwareqca6420qca6436_firmwareqca6564au_firmwareqca6584ausa6155p_firmwareqca6310sd778gwcn3999sdxr2_5gqcs6125sa8155_firmwaresd662_firmwaresdm630sa415m_firmwareqcs405qca6430wcn3988_firmwaresa6145p_firmwareqca6421sd778g_firmwaresm6250wcd9340sa8195psdm830_firmwarewsa8810_firmwaresd765gsd765_firmwarefsm10056_firmwareqca6436wcd9326wcd9335sa6155pwcn6851qcs603_firmwareqca6174a_firmwareqcs4290_firmwarewcd9385wcd9341qca6431qca6696_firmwarewcd9371sd750gsd870_firmwarear8035qca6390sd_8cxaqt1000sa8150psd750g_firmwaresm6250_firmwarewcd9375wcn3910_firmwarewsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwarewcn3988sd888_5g_firmwarewcn6850_firmwaresd660_firmwarewsa8815_firmwarewsa8835_firmwaresa8195p_firmwareqca6564awcn6750_firmwareqcm6125_firmwareqcm2290_firmwarewcn3991qca8337_firmwarewcd9380_firmwarewcn3990sd_675sd780gsd865_5gqca6564ausdx24sdx55m_firmwarewcn6856_firmwaresd888sd670_firmwareqca6574wsa8835sd665_firmwarewcd9380sd888_5gsm6250pqcs410qca6574asd690_5g_firmwaresdx50m_firmwareqca6174asm7325psdx24_firmwareqca6310_firmwareqca6430_firmwarewcd9335_firmwarewcn3980wcn6750qca6335_firmwareqca6574_firmwareqcs605wcd9340_firmwaresd855sm4125_firmwaresm7325p_firmwaresd665wcn3910qca6320wcn6850wsa8815sd_8c_firmwaresd765qca6426_firmwareqca6574a_firmwaresd768g_firmwaresd835wcn3980_firmwaresm7315sd460qca6391sd730sdx55msdxr1_firmwareqca6421_firmwareaqt1000_firmwarewcn6740_firmwaresd678_firmwarear8031_firmwarecsrb31024_firmwareqcm4290sdx50msd480_firmwareqcs603wcn6851_firmwareqca6574ausa8155p_firmwaresd710sd_636_firmwaresd670qca6564a_firmwarewcd9341_firmwareqcm6125qcm4290_firmwaresd480sd870wsa8810qcs610_firmwarewcn6856sd_8csa6145psd835_firmwareqca6564_firmwaresdxr1sd768gar8031qcs405_firmwaresa8145pwcn6740qca6696sdm630_firmwareqca6391_firmwaresd845_firmwaresd780g_firmwarewcd9370_firmwaresa6150psd888_firmwaresdx55sa8155pcsra6640sd675sd845sm7250psdm830sd720g_firmwareqcs410_firmwarear8035_firmwareqcm2290Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-1961
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-1.93% / 83.58%
||
7 Day CHG~0.00%
Published-09 Sep, 2021 | 07:36
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible buffer overflow due to lack of offset length check while updating the buffer value in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055qca9377_firmwaremdm9150_firmwarewcn3991_firmwaresm7250mdm9640_firmwaresa6150p_firmwaresa8145p_firmwareqcs610wsa8830fsm10056qca8337sm7250_firmwareqca6431_firmwaremdm9650csra6620fsm10055_firmwarewcn3950_firmwaresa8150p_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwareapq8009_firmwaresa6155sd690_5gwcd9370csra6620_firmwareqcs605_firmwarecsra6640_firmwareqcs6125_firmwareqca6426qca6584au_firmwarewcn3990_firmwareqca9377wcn3998sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcn3950wcd9326_firmwarewcn3615_firmwaremdm9206_firmwarewcn3660bsd662sd460_firmwaresa8155qca6574au_firmwaresdx55_firmwarewcn3680b_firmwareqca6595ausa6155_firmwaresdx12_firmwarewcd9375_firmwarewcn3615wcn3998_firmwarewcn3610_firmwareqca6420qca6436_firmwareapq8053_firmwareqca6564au_firmwareqca6584ausa6155p_firmwareqca9367_firmwaresd778gwcn3999qrb5165_firmwaresdxr2_5gqca9367qcs6125sa8155_firmwaresd662_firmwareqcs405qca6430wcn3988_firmwaresa6145p_firmwaresd205qca6421sd778g_firmwarewcd9340sa8195pwsa8810_firmwarequalcomm215_firmwaresd765gsd765_firmwarefsm10056_firmwareqca6436wcd9326wcd9335sa6155pwcn6851qca6174a_firmwarewcd9385wcd9341qca6431qca6696_firmwaresd750gsd870_firmwarear8035qca6390sd_8cxaqt1000sa8150psd750g_firmwarewcd9375msm8953_firmwarewsa8830_firmwaresda429wsd210sd855_firmwaresd865_5g_firmwarewcn3620_firmwarewcn3988sd888_5g_firmwarewcn6850_firmwarewcn3620wsa8815_firmwarewsa8835_firmwaresa8195p_firmwareqca6564awcn6750_firmwarewcn3610qcm6125_firmwaremdm9640wcn3991qca8337_firmwaresda429w_firmwarewcd9380_firmwarewcn3990wcd9330msm8996au_firmwaresd780gsd865_5gqca6595qca6564ausdx55m_firmwarewcn6856_firmwarewsa8835qca6574msm8996ausd665_firmwarewcd9380sd888_5gwcn3999_firmwarequalcomm215qcs410qca6574asd690_5g_firmwaremdm9206wcn6855_firmwareqca6174asm7325qca6430_firmwarewcd9335_firmwarewcn3980wcn6750qca6574_firmwareqcs605wcd9340_firmwaresd855wsa8815wcn6850sd665mdm9650_firmwaresd_8c_firmwaresd765qca6426_firmwarewcn3660b_firmwarewcn3680qca6574a_firmwaresd768g_firmwarewcn3980_firmwareapq8009qca6391sd460sdx55mwcd9330_firmwareqca6421_firmwareaqt1000_firmwarewcn6740_firmwaremsm8953ar8031_firmwarewcn3680_firmwareqrb5165sd480_firmwarewcn6851_firmwareqca6574ausa8155p_firmwaresd205_firmwareqca6564a_firmwarewcd9341_firmwareqcm6125sd480sd870wsa8810wcn6855sd210_firmwareqcs610_firmwaremdm9150wcn6856qsm8250sd_8csa6145pwcn3680bsd768gapq8096auar8031qca6595_firmwareqcs405_firmwaresa8145pwcn6740qca6696qca6391_firmwaresd780g_firmwarewcd9370_firmwaresa6150psdx55apq8053apq8096au_firmwarecsra6640sa8155psdx12qcs410_firmwarear8035_firmwareqsm8250_firmwaresm7325_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-47334
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 5.78%
||
7 Day CHG~0.00%
Published-06 Jan, 2026 | 22:48
Updated-27 Jan, 2026 | 22:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in Camera Driver

Memory corruption while processing shared command buffer packet between camera userspace and kernel.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_695_5g_mobile_platform_firmwarewcd9375_firmwarewcd9371_firmwareqcm5430wcn3988_firmwaresa7255p_firmwareqca6595au_firmwareqam8255pqcm2290wcn7860_firmwarewcn7861qcs7230qcs4490_firmwaresnapdragon_8_gen_2_mobile_platform_firmwaresm7635psa8650p_firmwareqam8775p_firmwaresm7325p_firmwareqcs410_firmwareqrb5165m_firmwarewcn3980wsa8845_firmwaresmart_audio_400_platformsnapdragon_8\+_gen_1_mobile_platformqca6391_firmwaresmart_audio_400_platform_firmwarevideo_collaboration_vc3_platform_firmwaresnapdragon_778g_5g_mobile_platformrobotics_rb5_platform_firmwareqamsrv1msm6225psnapdragon_ar1_gen_1_platform_\"luna1\"_firmwaresm8635psxr2250p_firmwaresm8635_firmwaresnapdragon_680_4g_mobile_platformwcn7881_firmwaresa9000psnapdragon_480_5g_mobile_platformqca6595ausm8650qsnapdragon_7\+_gen_2_mobile_platformsm6650psm8750p_firmwaresd_8_gen1_5g_firmwarewcn7860qcs5430ssg2115psxr2330pqcs9100sw5100p_firmwareqcm8550snapdragon_6_gen_1_mobile_platformsnapdragon_888_5g_mobile_platform_firmwarewcn7881snapdragon_7c\+_gen_3_computeqcs9100_firmwaresm6650p_firmwaresnapdragon_8\+_gen_1_mobile_platform_firmwareqcm8550_firmwareqca6698auwcd9335snapdragon_8\+_gen_2_mobile_platformwsa8810ssg2125pwsa8845hssg2125p_firmwareqcm4490_firmwaresnapdragon_7\+_gen_2_mobile_platform_firmwarewcn3950sm7635p_firmwarefastconnect_6700_firmwarevideo_collaboration_vc5_platform_firmwarefastconnect_6900_firmwareqcn9012snapdragon_460_mobile_platformqcm6490_firmwareqca6678aq_firmwaresm7435_firmwaresg8275_firmwaresnapdragon_w5\+_gen_1_wearable_platformsnapdragon_7_gen_1_mobile_platform_firmwaresw5100_firmwaresrv1hrobotics_rb2_platformqcs2290sw5100pwcn6650_firmwaresm7550psnapdragon_680_4g_mobile_platform_firmwaresnapdragon_695_5g_mobile_platformsm8750pwcn6740sm7675_firmwaresnapdragon_778g_5g_mobile_platform_firmwarewcd9370flight_rb5_5g_platformvideo_collaboration_vc1_platformqcs8250_firmwaresm8475p_firmwarewsa8840sa7255psm7550_firmwaresm7435snapdragon_4_gen_1_mobile_platformsnapdragon_6_gen_1_mobile_platform_firmwarewsa8830wcd9371qmp1000snapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmwaresnapdragon_ar2_gen_1_platformsa8770p_firmwaresm6475qcs6490qca6678aqsnapdragon_662_mobile_platformsa9000p_firmwareqmp1000_firmwaresnapdragon_4_gen_1_mobile_platform_firmwarewsa8815_firmwarewsa8835sa8620psm7325pwcd9380_firmwarewcn3988snapdragon_460_mobile_platform_firmwarevideo_collaboration_vc5_platformwcn3910_firmwarevideo_collaboration_vc3_platformqcs6490_firmwarewsa8815sm7550snapdragon_w5\+_gen_1_wearable_platform_firmwaresd_8_gen1_5gsa8620p_firmwaresm6475_firmwarewcn3910sm4635wcd9378sxr2350p_firmwaresa8770psnapdragon_662_mobile_platform_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwarewcn7861_firmwarecsra6640_firmwaresm8735_firmwaresnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmwaresm8650q_firmwareqrb5165nsw5100snapdragon_8_gen_3_mobile_platformsg8275pwcd9375snapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)snapdragon_4_gen_2_mobile_platform_firmwaresg4150psnapdragon_7c\+_gen_3_compute_firmwaresm8635p_firmwaresm6650_firmwarewcn7880sg8275qcs4490snapdragon_8_gen_1_mobile_platformsnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)qca6698au_firmwareqamsrv1h_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewcn7750qcn9011qcs8550_firmwarewcd9395_firmwareqcs2290_firmwaresm8750sm4635_firmwareqam8255p_firmwaresnapdragon_7_gen_1_mobile_platformwsa8810_firmwareqcn9012_firmwaresrv1h_firmwaresxr1230probotics_rb2_platform_firmwaresnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)_firmwareqcs610qrb5165msnapdragon_ar1_gen_1_platform_firmwaresa7775pqca6698aq_firmwaressg2115p_firmwaresnapdragon_685_4g_mobile_platform_\(sm6225-ad\)snapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)wsa8835_firmwareqcm5430_firmwareqca6797aq_firmwaresa8775psg4150p_firmwaresxr2330p_firmwaresrv1mfastconnect_6200_firmwareqam8650pqcn9011_firmwareqam8650p_firmwareqcm4490wcn6755_firmwaresxr1230p_firmwarecsra6620qam8775psm7635_firmwarewcn3950_firmwarewcn7750_firmwareqcm2290_firmwaresm6650robotics_rb5_platformsxr2250pflight_rb5_5g_platform_firmwaresa8650psxr2230p_firmwaresrv1m_firmwarewcn6740_firmwarewcn6650qca6797aqsnapdragon_782g_mobile_platform_\(sm7325-af\)_firmwarefastconnect_6200sm8735sxr2350psm7635sm8635wcn3980_firmwareqcs8550snapdragon_4_gen_2_mobile_platformfastconnect_6900wsa8832video_collaboration_vc1_platform_firmwaresa8775p_firmwaresnapdragon_888_5g_mobile_platformwcd9390fastconnect_7800wcn6755snapdragon_480_5g_mobile_platform_firmwarewsa8832_firmwareqamsrv1hqca6698aqsnapdragon_782g_mobile_platform_\(sm7325-af\)qca6391sa8255psm8750_firmwareqcs410snapdragon_8_gen_1_mobile_platform_firmwaresm7675pwcd9385qcs5430_firmwareqcs610_firmwaresnapdragon_ar2_gen_1_platform_firmwareqrb5165n_firmwarefastconnect_7800_firmwaresm8475psnapdragon_ar1_gen_1_platformwsa8830_firmwaresm8550p_firmwareqamsrv1m_firmwarewcd9335_firmwarewsa8840_firmwaresm8550pwcn7880_firmwarewcd9385_firmwaresxr2230pqca6595csra6620_firmwareqca6595_firmwaresm7675qcm6490sg8275p_firmwaresm7675p_firmwarewcd9378_firmwareqcs615_firmwarewcd9370_firmwareqcs8250wsa8845wsa8845h_firmwaresm6225p_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"snapdragon_8_gen_2_mobile_platformqcs615qcs7230_firmwarewcd9395wcd9380sa7775p_firmwaresa8255p_firmwaresnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmwarefastconnect_6700wcd9390_firmwaresm7550p_firmwarecsra6640Snapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-47335
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 5.78%
||
7 Day CHG~0.00%
Published-06 Jan, 2026 | 22:48
Updated-27 Jan, 2026 | 21:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in Camera Driver

Memory corruption while parsing clock configuration data for a specific hardware type.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9375_firmwaresm8735_firmwarewcn6650qcm5430qcm6490_firmwaresm8650q_firmwaresnapdragon_8_gen_3_mobile_platformsm8735wcd9375wcn7860_firmwarewcn6650_firmwaresm7635wcn7861sm8635sm7635psm8635p_firmwarefastconnect_6900sm8750psm6650_firmwarewcn7880wsa8832sm7675_firmwarewcd9370wcn6755wcd9390fastconnect_7800wsa8832_firmwarewsa8845_firmwareqca6698aqvideo_collaboration_vc3_platform_firmwarewsa8840sm8750_firmwaresm8635psnapdragon_8_gen_3_mobile_platform_firmwarewcn7750sm8635_firmwarewsa8830wcn7881_firmwarewcd9395_firmwaresm7675pqmp1000sm8750wcd9385qcs5430_firmwarefastconnect_7800_firmwareqcs6490wsa8830_firmwareqmp1000_firmwaresm6650psm8750p_firmwarewsa8840_firmwarewsa8835wcn7860qcs5430wcn7880_firmwarewcd9385_firmwareqcs9100qca6698aq_firmwarewsa8835_firmwareqcm5430_firmwarewcn7881wcd9380_firmwareqcs9100_firmwaresm6650p_firmwarevideo_collaboration_vc3_platformsm7675qcm6490sm7675p_firmwareqcs6490_firmwarewcd9378_firmwareqcs615_firmwarewcd9370_firmwarewcn6755_firmwarewsa8845wsa8845hwsa8845h_firmwareqcs615wcd9378wcd9395sm7635_firmwarewcn7750_firmwarewcd9380sm6650sm7635p_firmwarefastconnect_6700_firmwarefastconnect_6700wcd9390_firmwarewcn7861_firmwarefastconnect_6900_firmwaresm8650qSnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-1966
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 18.48%
||
7 Day CHG~0.00%
Published-20 Oct, 2021 | 06:31
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible buffer overflow due to lack of length check of source and destination buffer before copying in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055wcn3991_firmwarewsa8830sm7250sa6150p_firmwaresa8145p_firmwareqcs610fsm10056qca8337sm7250_firmwarecsra6620fsm10055_firmwarewcn3950_firmwaresa8150p_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwaresa6155sd690_5gwcd9370csra6620_firmwarecsra6640_firmwareqcs6125_firmwarewcn3998sd_8cx_firmwarewcd9385_firmwarewcn3950sa8155qca6574au_firmwaresdx55_firmwareqca6595ausa6155_firmwarewcd9375_firmwarewcn3998_firmwarewcn3999_firmwareqca6420sa6155p_firmwarewcn3999qcs6125sa8155_firmwareqcs405qca6430wcn3988_firmwaresa6145p_firmwarewcd9340sa8195pwsa8810_firmwaresd765gsd765_firmwarefsm10056_firmwarewcn6851wcd9335sa6155pwcd9385wcd9341qca6696_firmwaresd750gsd870_firmwareqca6390ar8035sd_8cxaqt1000sa8150psd750g_firmwarewcd9375wsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3988wcn6850_firmwarewsa8815_firmwarewsa8835_firmwaresa8195p_firmwareqcm6125_firmwarewcn3991qca8337_firmwarewcd9380_firmwaresd865_5gqca6595sdx55m_firmwarewsa8835qca6574sd665_firmwarewcd9380qcs410qca6574asd690_5g_firmwareqca6430_firmwarewcd9335_firmwarewcn3980qca6574_firmwarewcd9340_firmwaresd855wsa8815wcn6850sd665sd_8c_firmwaresd765qca6574a_firmwaresd768g_firmwarewcn3980_firmwareqca6391sdx55maqt1000_firmwarear8031_firmwarewcn6851_firmwareqca6574ausa8155p_firmwarewcd9341_firmwareqcm6125wsa8810sd870qcs610_firmwaresd_8csa6145psd768gar8031qca6595_firmwareqcs405_firmwaresa8145pqca6696qca6391_firmwarewcd9370_firmwaresa6150psdx55sa8155pcsra6640qcs410_firmwarear8035_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-1963
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 15.06%
||
7 Day CHG~0.00%
Published-09 Sep, 2021 | 07:36
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible use-after-free due to lack of validation for the rule count in filter table in IPA driver in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055qca9377_firmwaremdm9150_firmwarewcn3991_firmwaresd678sa6150p_firmwaresm7250sa8145p_firmwareqcs610wsa8830fsm10056qca8337sm7250_firmwareqca6431_firmwaremdm9650csra6620fsm10055_firmwareqcs4290wcn3950_firmwaresa8150p_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwaresa6155sd690_5gsd730_firmwarewcd9370csra6620_firmwaresd_675_firmwaresd675_firmwarecsra6640_firmwareqcs6125_firmwareqca6426qca6584au_firmwarewcn3990_firmwareqca9377wcn3998sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcn3950sd720gwcn3615_firmwarewcn3660bsd662sd460_firmwaresa8155qca6574au_firmwaresdx55_firmwareqca6595ausa6155_firmwaresdx12_firmwarewcd9375_firmwaremsm8909wwcn3615apq8009w_firmwareqca6420qca6436_firmwarewcn3610_firmwarewcn3998_firmwareqca6564au_firmwareqca6584ausa6155p_firmwaresd778gwcn3999qrb5165_firmwaresdxr2_5gqcs6125sa8155_firmwaresd662_firmwareqcs405qca6430wcn3988_firmwaresa6145p_firmwaresd205qca6421sd778g_firmwaresm6250wcd9340sa8195pwsa8810_firmwarequalcomm215_firmwaresd765gsd765_firmwarefsm10056_firmwareqca6436wcn6851wcd9335sa6155pqca6174a_firmwareqcs4290_firmwarewcd9385wcd9341qca6431qca6696_firmwaresd750gsd870_firmwarear8035qca6390sd_8cxaqt1000sa8150psd750g_firmwaresm6250_firmwarewcd9375wsa8830_firmwaresda429wsd210sd855_firmwaresd865_5g_firmwarewcn3620_firmwarewcn3988sd888_5g_firmwarewcn6850_firmwarewcn3620wsa8815_firmwarewsa8835_firmwaresa8195p_firmwareqca6564awcn6750_firmwarewcn3610qcm6125_firmwarewcn3991qca8337_firmwaresda429w_firmwarewcd9380_firmwarewcn3990sd_675msm8996au_firmwaresd780gsd865_5gqca6595qca6564ausdx55m_firmwarewcn6856_firmwaremsm8909w_firmwareqca6574msm8996auwsa8835sd665_firmwarewcd9380sd888_5gwcn3999_firmwarequalcomm215qcs410qca6574asd690_5g_firmwaresdx50m_firmwareqca6174asm7325qca6430_firmwarewcd9335_firmwarewcn3980wcn6750qca6574_firmwarewcd9340_firmwaresd855wsa8815wcn6850sd665mdm9650_firmwaresd_8c_firmwaresd765qca6426_firmwarewcn3660b_firmwareqca6574a_firmwaresd768g_firmwarewcn3980_firmwaresd460qca6391sd730sdx55mqca6421_firmwareaqt1000_firmwarewcn6740_firmwaresd678_firmwarear8031_firmwareqcm4290sdx50mqrb5165sd480_firmwarewcn6851_firmwareqca6574ausa8155p_firmwaresd205_firmwareqca6564a_firmwareapq8009wwcd9341_firmwareqcm6125qcm4290_firmwaresd480sd870wsa8810sd210_firmwareqcs610_firmwaremdm9150wcn6856qsm8250sd_8csa6145psd768gapq8096auar8031qca6595_firmwareqcs405_firmwaresa8145pwcn6740qca6696qca6391_firmwaresd780g_firmwarewcd9370_firmwaresa6150psdx55apq8096au_firmwarecsra6640sa8155psd675sd720g_firmwaresdx12qcs410_firmwarear8035_firmwareqsm8250_firmwaresm7325_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-416
Use After Free
CVE-2025-47337
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 5.78%
||
7 Day CHG~0.00%
Published-06 Jan, 2026 | 22:48
Updated-27 Jan, 2026 | 21:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Camera Driver

Memory corruption while accessing a synchronization object during concurrent operations.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9375_firmwaresm8735_firmwarewcd9371_firmwareqcm5430sm8650q_firmwaresnapdragon_8_gen_3_mobile_platformsg8275pwcd9375wcn7860_firmwarewcn7861snapdragon_8_gen_2_mobile_platform_firmwaresm7635psm8635p_firmwaresm6650_firmwarewcn7880sg8275wsa8845_firmwareqca6391_firmwarevideo_collaboration_vc3_platform_firmwareqca6698au_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"_firmwaresm8635psnapdragon_8_gen_3_mobile_platform_firmwarewcn7750qcn9011sm8635_firmwareqcs8550_firmwarewcd9395_firmwarewcn7881_firmwaresm8750qcn9012_firmwaresm6650psm8750p_firmwaresnapdragon_ar1_gen_1_platform_firmwarewcn7860qcs5430sxr2330pqcs9100qca6698aq_firmwareqcm8550wsa8835_firmwareqcm5430_firmwarewcn7881qca6797aq_firmwareqcs9100_firmwaresm6650p_firmwaresxr2330p_firmwareqcm8550_firmwareqca6698auqcn9011_firmwaresnapdragon_8\+_gen_2_mobile_platformwcn6755_firmwarewsa8845hsm7635_firmwarewcn7750_firmwaresm6650sm7635p_firmwarefastconnect_6700_firmwarefastconnect_6900_firmwareqcn9012wcn6650qcm6490_firmwareqca6797aqsg8275_firmwaresm8735sxr2350pwcn6650_firmwaresm7635sm7550psm8635qcs8550fastconnect_6900sm8750pwsa8832sm7675_firmwarewcd9370wcn6755wcd9390fastconnect_7800wsa8832_firmwareqca6698aqqca6391wsa8840sm8750_firmwaresm7550_firmwarewsa8830sm7675pqmp1000wcd9371wcd9385qcs5430_firmwarefastconnect_7800_firmwareqcs6490snapdragon_ar1_gen_1_platformwsa8830_firmwaresm8550p_firmwareqmp1000_firmwarewsa8840_firmwarewsa8835sm8550pwcn7880_firmwarewcd9385_firmwarewcd9380_firmwarevideo_collaboration_vc3_platformsm7675qcm6490sg8275p_firmwaresm7675p_firmwareqcs6490_firmwarewcd9378_firmwaresm7550qcs615_firmwarewcd9370_firmwarewsa8845wsa8845h_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"snapdragon_8_gen_2_mobile_platformqcs615wcd9378wcd9395sxr2350p_firmwarewcd9380fastconnect_6700wcd9390_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwarewcn7861_firmwaresm7550p_firmwaresm8650qSnapdragon
CWE ID-CWE-416
Use After Free
CVE-2020-25859
Matching Score-8
Assigner-JFrog
ShareView Details
Matching Score-8
Assigner-JFrog
CVSS Score-6.7||MEDIUM
EPSS-0.08% / 23.51%
||
7 Day CHG~0.00%
Published-15 Oct, 2020 | 15:12
Updated-04 Aug, 2024 | 15:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The QCMAP_CLI utility in the Qualcomm QCMAP software suite prior to versions released in October 2020 uses a system() call without validating the input, while handling a SetGatewayUrl() request. A local attacker with shell access can pass shell metacharacters and run arbitrary commands. If QCMAP_CLI can be run via sudo or setuid, this also allows elevating privileges to root. This version of QCMAP is used in many kinds of networking devices, primarily mobile hotspots and LTE routers.

Action-Not Available
Vendor-n/aQualcomm Technologies, Inc.
Product-qcmapQualcomm QCMAP
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-11149
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 10.84%
||
7 Day CHG~0.00%
Published-21 Jan, 2021 | 09:41
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of bound access due to usage of an out-of-range pointer offset in the camera driver. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qpm5579qfs2580qca8337qdm5579qdm2307qfs2530qpa8802qln1030pm6125qat3519pm8150aqtc800hqdm5670pm7150lqpa8821qdm5671pmc1000hqat3518sd8cwcn3998wcn3950qpa5460wcn3660bqca4020qdm5652sd6905gqpm8870qpm5679qbt2000pm855pqca6420pm6150asdx20msdr735gwcn3999pm8150bqsm7250qcs405qca6430qat3522pmr735awcd9340sd765gqca6436sdr660wcn6851sa6155pqpa6560sdr865wcd9341pmi8952smr545qca6431qln5020sd750gsmb1350qdm3302pm6350qdm5621qtc800sqdm5650wcn3988wtr3925smb1390pm6150lsd8885gqet4100wcn3610qpm6585qtc410swcn3991smb1355qln4650qpa8801sdm429wwgr7640qat5568qet5100qca6564ausdxr25gpm6150pm7250bqca6574qfs2630qpa8842pmm8996auwcd9380qualcomm215smb1381sdr735pm7250smb1395pm660lwtr4905qpa8803smr526wtr5975wcn3980pmk8003qdm2301qsw8573qcs605wsa8815wcn6850qpm6375smb1394wcn3680pm8009sdx55mpm670apm8008qsw8574pmi8998pme605pm855lqcs603sd8655gqpm5621qpm6582pm670pm8150lqdm5677pm8005sa6145ppm215qdm2302pmm6155ausdxr1apq8096auar8031qpm5577wtr2965pm8150qpm5875sdx55qet5100mapq8053sa8155pcsra6640pm8350bhssd675qet4101qat3516pm670lqpm5658qca9379pm855bsmb2351qpm5870pm8909wsa8830pm660qln5030qpm6325qbt1500pmi632qpa5581mdm9650csra6620qpm4621qcs4290qet6100pmm855ausdr660gqpa8686smb1396pm7150awcd9370pm8350qca6564sdr425qca6426qca9377qpm5641qpm5541qat5516qdm5620sd662pm8350bhpm3003asa8155qat5533qca6595auwcn3615sm7350qpm6670smb1354qca6584auqdm2305qpm8820qpm4641pm855sd429pm8250smb1398qdm4643pmx55sd205qca6421qdm3301pm8953qat5515qpm5677qat3514wcd9326wcd9335wcd9385pmm8155auqpm4630ar8035qca6390wcd9375aqt1000qpa8673qdm2310qln4642sda429wsd210pm8998pmk7350wcn3620qca6564asmr546pmx24qet6110qln5040qpm8895qpm5670wcn3990qtm527pmk8350sdx24qpm8830pm8350bqat5522wsa8835pm8150cpmr735bqpa4360pm855aqca6574aqpa4361qca6174apm8350csmr525qpm4640wcn6750pmr525pm7350cqpm4650qtm525sd855sd8cxsd665sd765pm640ppmx20qat3555sd460qca6391smb1351qpa5461qcm4290pm640asdr8150qfs2608sdx20pm8916qtc801sqdm4650pmd9655qca6574auqsw6310qpm6621wsa8810qdm2308pmw3100qat3550wcn6856qdm5679wcn3680bsdr8250sd768gwcn6740qca6696pm8004pm640lpmk8002qpa2625sm7250psdm830smb1357qpa5580Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2021-35121
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 10.74%
||
7 Day CHG~0.00%
Published-14 Jun, 2022 | 09:40
Updated-04 Aug, 2024 | 00:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An array index is improperly used to lock and unlock a mutex which can lead to a Use After Free condition In the Synx driver in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcm2290_firmwarewcn3991_firmwarewcn3991wsa8830wcd9380_firmwareqcs2290_firmwaresd865_5gsdx55m_firmwarewsa8835qcs4290wcn3950_firmwarewcd9380sd765g_firmwareqcs2290qca6390_firmwaresd690_5gwcd9370sd690_5g_firmwareqca6426qrb5165n_firmwarewcn3998wcd9385_firmwaresdxr2_5g_firmwarewcn3950wcd9326_firmwarewcn3615_firmwarewsa8815wcn6850sd662wcn3910sd460_firmwaresd765qca6426_firmwarewcn3680b_firmwaresd768g_firmwarewcd9375_firmwarewcn3615wcn3998_firmwareqrb5165msm7250p_firmwaresd460qca6391sdx55mapq8053_firmwareqca6436_firmwareqrb5165nsd680_firmwaremsm8953qcm4290qrb5165_firmwareqrb5165m_firmwaresdxr2_5gqrb5165wcn6851_firmwaresd662_firmwarewcn3988_firmwarewsa8810_firmwaresd765gqcm4290_firmwaresd765_firmwaresd870qca6436sd680wcd9326wcn6851wsa8810wcn3680bqcs4290_firmwarewcd9385sd768gsd750gsd870_firmwareqca6391_firmwareqca6390wcd9375sd750g_firmwarewcn3910_firmwarewcd9370_firmwaremsm8953_firmwareapq8053wsa8830_firmwaresd865_5g_firmwarewcn3988wcn6850_firmwarewsa8815_firmwarewsa8835_firmwaresm7250pqcm2290Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2021-35098
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 12.89%
||
7 Day CHG~0.00%
Published-14 Jun, 2022 | 09:51
Updated-04 Aug, 2024 | 00:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper validation of session id in PCM routing process can lead to memory corruption in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarewcn3991_firmwaremdm9150_firmwarewsa8830mdm9640_firmwareqcs610mdm9650csra6620qcs4290wcn3950_firmwaresd765g_firmwareqca6420_firmwareqca6390_firmwaresd690_5gwcd9370csra6620_firmwareqcs605_firmwarecsra6640_firmwareqcs6125_firmwareqca6426wcn3990_firmwareqrb5165n_firmwareqca9377wcn3998wcd9385_firmwaresdxr2_5g_firmwarewcn3950wcd9326_firmwarewcn3615_firmwarewcn3660bsd662sd460_firmwareqca6574au_firmwaresdx55_firmwarewcn3680b_firmwarewcd9375_firmwaresdx12_firmwarewcn3615wcn3998_firmwaresm7250p_firmwareqca6420qca6436_firmwareapq8053_firmwareqrb5165nsd680_firmwaresd778gsa515m_firmwaresd429qrb5165_firmwareqrb5165m_firmwaresdxr2_5gqcs6125sd662_firmwareqcs405qca6430wcn3988_firmwaresd429_firmwaresd778g_firmwarewsa8810_firmwarequalcomm215_firmwaresd765gsd765_firmwareqca6436sd680wcd9326wcd9335wcn6851qcs603_firmwareqca6174a_firmwareqcs4290_firmwarewcd9385wcd9341sd750gsd870_firmwareqca6390wcd9375sd750g_firmwareaqt1000msm8953_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3620_firmwarewcn3988sd888_5g_firmwarewcn6850_firmwarewcn3620wsa8815_firmwarewsa8835_firmwarewcn6750_firmwareqcm6125_firmwaremdm9640wcn3991wcd9380_firmwarewcn3990sdm429wsd780gsd865_5gsdx55m_firmwarewcn6856_firmwarewsa8835sdm429w_firmwarewcd9380sd888_5gqualcomm215qcs410qca6574asd690_5g_firmwarewcn6855_firmwareqca6174asm7325pqca6430_firmwarewcd9335_firmwarewcn3980wcn6750sa515mqcs605sd855wsa8815sm7325p_firmwarewcn6850mdm9650_firmwaresd765qca6426_firmwarewcn3660b_firmwarewcn3680qca6574a_firmwaresd695sd768g_firmwareqrb5165mwcn3980_firmwaresd460qca6391sdx55maqt1000_firmwarewcn6740_firmwaremsm8953ar8031_firmwareqcm4290wcn3680_firmwareqrb5165sd480_firmwareqcs603wcn6851_firmwareqca6574auwcd9341_firmwareqcm6125qcm4290_firmwaresd480sd870wcn6855wsa8810qcs610_firmwaremdm9150wcn6856wcn3680bsd695_firmwaresd768gapq8096auar8031qcs405_firmwarewcn6740qca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55apq8053apq8096au_firmwarecsra6640sm7250psdx12qcs410_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2020-11198
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 6.05%
||
7 Day CHG~0.00%
Published-22 Feb, 2021 | 06:25
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Key material used for TZ diag buffer encryption and other data related to log buffer is not wiped securely due to improper usage of memset in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qfs2580qca9377_firmwareqpm5679_firmwaresm6250p_firmwareqca8337qfs2530qpm8870_firmwareqln1030qpa8688pm6125qat5522_firmwarewcn3950_firmwarepm8150aqdm5670qca6595au_firmwareqpm5541_firmwareqpa5581_firmwaresa6155pm7150lqpa8821pm8998_firmwarewtr5975_firmwarepm456_firmwareqpa5580_firmwaresa415mwcn3998wcd9371_firmwarewcn3950sm4125sd720gqsw8573_firmwareqsw8574_firmwaresd460_firmwaresmb2351_firmwareqpa4360_firmwareqca8081_firmwarewcn3998_firmwarepm855pqca6420pm6150apm660_firmwarepm8150bsa8155_firmwareqca6430qat3522pmr735awcd9340sd765gsdr660sdr865qdm5620_firmwareqca6696_firmwareqln5020wcd9371pmm855au_firmwaresm4350_firmwaresa8150ppm6350qdm5621qtc800ssd865_5g_firmwaresd712pm640p_firmwareqcn5121qcn5022_firmwarewcn6750_firmwareqat5516_firmwarepm6150lpm855l_firmwareqtc410swcn3991qpa8801pm8150l_firmwareqat5533_firmwaresdx55m_firmwareqpa8673_firmwarepm6150smb1354_firmwaresd670_firmwareqca6574qpa8842csr8811_firmwaresdr052_firmwarewcd9380qln4640qcs410qpm5579_firmwaresmb1380_firmwaresmb1381pm855p_firmwaresd690_5g_firmwarepm7250qpa8803sdx24_firmwareqdm2301ipq6018_firmwarewcd9340_firmwarewsa8815wcn6850qdm5621_firmwareqdm2301_firmwareqpm6375ipq6028wcn3980_firmwaresd730pm660l_firmwarepm6250_firmwarepm8008qtm525_firmwarepme605_firmwarepme605qpm5621_firmwareqln1021aq_firmwareqcs603qpa6560_firmwareqpa8802_firmwareqln4640_firmwareqpm5621qpm6582sd670pm8009_firmwareqfs2580_firmwareqcm4290_firmwarepm8150lpmi8998_firmwareqcs610_firmwaresa6145ppm4250ar8031qpm5577wtr2965qca6391_firmwarepm8150qca4024wcd9370_firmwareqat3516_firmwaresdx55qcn5021_firmwarecsra6640qat3555_firmwareqpa8803_firmwarepm855bsmb2351qln1031qsm8250_firmwarewsa8830pm660qet6110_firmwareqpm6325pm6125_firmwareqbt1500qpa5581csrb31024pmx24_firmwarefsm10055_firmwareqbt1500_firmwareqcs4290qet6100pmm855auqca6420_firmwaresd690_5gsmb1396pm7150asd675_firmwareqca6564qpa4361_firmwareqca6426wcn3990_firmwareqca9984_firmwareqca9377wcd9385_firmwareqdm5650_firmwaresdxr2_5g_firmwarewcd9326_firmwarepm7250_firmwaresdr845_firmwareqdm5620qln1021aqsmb1380pmk8002_firmwareqsw6310_firmwaresa8155qln1031_firmwareqcn5122_firmwarepmm6155au_firmwareqat5533sdx55_firmwaresm7250p_firmwareqsm7250_firmwarepm7150l_firmwareqca6584auqat5515_firmwarepm855qpm8830_firmwarepm8250qcn5052qfs2530_firmwaresa415m_firmwarepmx55wcn3988_firmwareqcn9074pm8150c_firmwareqca6421qdm3301qpa8842_firmwareqat3519_firmwaresa8195psdr735_firmwareqpm5677qat5515wcd9326wcd9335pm6350_firmwarepm8004_firmwaresdr8150_firmwareqcs4290_firmwareqtc800h_firmwareqpm5620qca6390wcd9375sd750g_firmwareaqt1000sm6250_firmwarepmm8195auqln4642qpm5677_firmwarewsa8815_firmwarewtr3925_firmwaresmr525_firmwarepm8998qpm8820_firmwareqln1020_firmwarepm670a_firmwarepmx55_firmwaresd865_5gqca6595pm8150_firmwareqpm8830qat5522pm8150cpmr735bsd665_firmwareqpa4360pmk8003_firmwareqca8075_firmwareqpa4361ipq6005_firmwareqpm5577_firmwareqdm5679_firmwaresmr525qca6310_firmwarepm6150l_firmwarepmr525pm8150a_firmwareqca6574_firmwareqln1036aq_firmwaresd665pm6150a_firmwarepm6150_firmwareqca6175asd765qca6574a_firmwareqat3555sd850_firmwaresd8c_firmwarewtr2965_firmwarepm670_firmwarecsrb31024_firmwareqln1036aqqtc801sipq6028_firmwaresd710qcn5122pm8008_firmwarepmr735a_firmwarepmx50qcn5022qca6564_firmwaresdr8250sd768gqln1030_firmwarepm8004pm640lpmk8002qca8075sd845ipq6000_firmwareqcs410_firmwareqca6175a_firmwareqpa5580qpm5579fsm10055sa6150p_firmwareqcs610qpm5620_firmwareqdm2307qca6431_firmwareqpa8802qpm6585_firmwareqat3519qbt2000_firmwareqca4024_firmwarepm855a_firmwareqtc800hsa8150p_firmwareqcs2290sdr8250_firmwareqca6335csra6620_firmwareqcs605_firmwareqln1020qdm5671csra6640_firmwarepmc1000hqpm4650_firmwareqat3518sd8csdr425_firmwaresmr526_firmwarepm640a_firmwarewgr7640_firmwareqdm2305_firmwareqpm5670_firmwaresd710_firmwareqdm5652qca6574au_firmwareqpm8870wcd9375_firmwareqpm5679qbt2000sa6155_firmwarepmx50_firmwareqpa8675_firmwaresdr735gwcn3999qdm3301_firmwareqsm7250ipq6010sd662_firmwareqcs405qdm2308_firmwarefsm10056_firmwareqca6436wcn6851sa6155pqcs603_firmwareqpa6560sdr675_firmwarewcd9341qca6431qet4100_firmwaresd750gwcn3910_firmwareqpm5657wsa8830_firmwaresd855_firmwareqdm5650wcn3988wtr3925sdr052sa8195p_firmwaresmb1390qet4100qpa8686_firmwareqpm6585qca8337_firmwarewcd9380_firmwaresmb1355qln4650sdr735g_firmwarewgr7640qet5100qdm5671_firmwareqpa8801_firmwareqca6564auqtm527_firmwarepm8005_firmwareqet4101_firmwarepm7250bqln4642_firmwaresmb1355_firmwarepm7250b_firmwarepmd9655_firmwaresmb1351_firmwareqet4200aq_firmwaresdx50m_firmwaresdr735smb1395pm660lsmr526qca8072_firmwarewtr5975qca6430_firmwarepmk8003qcn5052_firmwareqtc801s_firmwareqat3522_firmwarewcd9335_firmwarewcn3980qca6335_firmwareqsw8573qcs605sd7cwcn3910qca6426_firmwareqca9984pm8009qpa8675sdr051_firmwaresdx55mpm670aqca6421_firmwareqat3518_firmwareqsw8574pmi8998ar8031_firmwarepm855lwcn6851_firmwareqdm5670_firmwarepm7150a_firmwarepm8150b_firmwarepmc1000h_firmwareqca6564a_firmwareqdm2310_firmwarepm4250_firmwareqcn5121_firmwarepm670qdm5677pm8005qsm8250ipq6018pm855_firmwareqdm2302pmm6155ausdxr1pm855b_firmwareqca6595_firmwareqcs405_firmwareqpm6582_firmwareqpm6375_firmwarepm640l_firmwareqln4650_firmwareqet5100msa8155psd675qet4101qat3516pm670lqpm5658ar8035_firmwareqcm2290qpm5658_firmwarewcn3991_firmwareqdm5652_firmwarepmm8155au_firmwaresdr051qln5030qcs2290_firmwarepm4125fsm10056pmi632qpa2625_firmwarepm456sd7c_firmwarepmr735b_firmwarecsra6620qet5100_firmwareqet6100_firmwarepm670l_firmwaresdr660gsd765g_firmwareqpa8686qca6390_firmwareipq6000sd730_firmwarewcd9370qcn5152_firmwaresdr425pmr525_firmwareqca6584au_firmwareqcn9000_firmwarepmi632_firmwareqpm5541qat5516sd662qpa8821_firmwaresdr660g_firmwarepm3003aqca6595auwcn3999_firmwareqca6436_firmwaresmb1354qca6564au_firmwareqdm2305sa6155p_firmwareqca6310qpm8820qpm2630qln5020_firmwaresdxr2_5gsa6145p_firmwaresdr675sm6250sd712_firmwarewsa8810_firmwaresd765_firmwareqdm5677_firmwareqca8081qet4200aqqca6174a_firmwarewcd9385qpm6325_firmwareqdm2302_firmwareqat3550_firmwarepmm8155auqln5040_firmwarepm4125_firmwarear8035csr8811qpa8673qdm2310qln5030_firmwaresmb1396_firmwarewcn6850_firmwarewsa8835_firmwareqca6564apmx24qet6110qln5040qca8072qcm2290_firmwareqpm8895sdr845qpm5670wcn3990qcn9000qtm527sdx24qdm2307_firmwarewsa8835qpm5657_firmwaresm6250ppm855asdr660_firmwareqca6574asmb1390_firmwareqca6174awcn6750qet5100m_firmwareqpm4650qtm525wtr6955sd855sm4125_firmwaresd8cxwtr6955_firmwarepm640pqcn5021qcn5152sd768g_firmwaresdr865_firmwarepm8250_firmwaresd460qca6391sd8cx_firmwaresdxr1_firmwaresmb1351ipq6005aqt1000_firmwareqpm8895_firmwareqcm4290sdx50mpm640asdr8150smb1395_firmwarepmd9655qca6574ausa8155p_firmwareqsw6310wcd9341_firmwarewsa8810qtc410s_firmwareqpm2630_firmwareqdm2308qat3550qdm5679ipq6010_firmwarepm3003a_firmwareqca6696qtc800s_firmwaresm4350sd845_firmwaresmb1381_firmwareqpa2625sa6150pqpa8688_firmwarepmm8195au_firmwaresm7250psd720g_firmwareqcn9074_firmwaresd850pm6250Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-212
Improper Removal of Sensitive Information Before Storage or Transfer
CVE-2023-21655
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 5.83%
||
7 Day CHG~0.00%
Published-05 Sep, 2023 | 06:23
Updated-02 Aug, 2024 | 09:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow or Wraparound in Display

Memory corruption in Audio while validating and mapping metadata.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa6155p_firmwaresda429w_firmwarewcd9380_firmwaresa6150p_firmwarewsa8830sa8145p_firmwaresw5100pwcn7851wcn6851_firmwareqcc5100wcn6856_firmwarewcn3988_firmwareqca6574ausa6145p_firmwaresa8155p_firmwarewsa8835sa8195psd_8_gen1_5gwcd9380sa8150p_firmwaresd888_5gsw5100wcn6855wcn6851sa6155psw5100p_firmwarewcn7851_firmwarewcn6856sa6145pwcn3680bwcn6855_firmwarewcd9385qca6696_firmwarewcn3980sa8145pqca6696qca6391_firmwarewcd9385_firmwaresa8150psd_8_gen1_5g_firmwaresa6150pwcn3660bwcn6850sa8155pwsa8830_firmwaresda429wwcn3988sd888_5g_firmwarewcn3660b_firmwarewcn6850_firmwarewcn7850_firmwareqca6574au_firmwaresa8195p_firmwarewcn3680b_firmwarewcn7850sw5100_firmwarewsa8835_firmwarewcn3980_firmwareqca6391wcn3610_firmwarewcn3610qcc5100_firmwareSnapdragonwcn6855_firmwaresa6155p_firmwaresda429w_firmwarewcd9380_firmwaresa6150p_firmwaresa8145p_firmwareqca6696_firmwareqca6391_firmwarewcd9385_firmwarewcn6851_firmwarewcn6856_firmwaresd_8_gen1_5g_firmwarewcn3988_firmwarewsa8830_firmwaresa6145p_firmwaresa8155p_firmwaresd888_5g_firmwarewcn3660b_firmwarewcn6850_firmwarewcn7850_firmwaresa8150p_firmwareqca6574au_firmwaresa8195p_firmwarewcn3680b_firmwarewsa8835_firmwaresw5100_firmwarewcn3980_firmwaresw5100p_firmwarewcn3610_firmwarewcn7851_firmwareqcc5100_firmware
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2024-33055
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.07% / 20.27%
||
7 Day CHG~0.00%
Published-06 Jan, 2025 | 10:33
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Computer Vision

Memory corruption while invoking IOCTL calls to unmap the DMA buffers.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcm8550_firmwaresa6150p_firmwarewsa8845_firmwaresxr2250p_firmwarewsa8832sa6155p_firmwarewsa8840qam8295p_firmwareqcs8550_firmwareqca6696snapdragon_8_gen_2_mobile_firmwarewcd9385wcd9395_firmwaresxr1230p_firmwarewcd9390_firmwaresnapdragon_8_gen_2_mobilesg8275pwsa8832_firmwaresa8195p_firmwarewcd9395ssg2125psg8275p_firmwaresnapdragon_8\+_gen_2_mobileqca6574au_firmwaresa8195pqam8295pqca6574auwcd9390wsa8845h_firmwaresm8550p_firmwaresxr2250pqcm8550qcs6490_firmwarewsa8835wsa8840_firmwaresxr2230p_firmwaresa8295p_firmwareqca6696_firmwarewsa8845hwcd9380_firmwaresa6150psa8155p_firmwaresa8155psd_8_gen1_5gwsa8830snapdragon_ar2_gen_1_firmwaresm8550psa6145pssg2115psnapdragon_8_gen_3_mobile_firmwaresd_8_gen1_5g_firmwarefastconnect_7800_firmwarefastconnect_6900ssg2125p_firmwarewcd9385_firmwarefastconnect_6900_firmwaresa8295pwcd9380sa6145p_firmwareqcs8550sxr2230pfastconnect_7800sa8145p_firmwaresa8150psnapdragon_8\+_gen_2_mobile_firmwaresa8150p_firmwarewsa8845snapdragon_ar2_gen_1sa6155pvideo_collaboration_vc3_platform_firmwaresa8145pwsa8835_firmwaresxr1230pssg2115p_firmwareqcs6490snapdragon_8_gen_3_mobilewsa8830_firmwarevideo_collaboration_vc3_platformSnapdragon
CWE ID-CWE-416
Use After Free
CVE-2024-33041
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 15.04%
||
7 Day CHG~0.00%
Published-06 Jan, 2025 | 10:33
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use of Out-of-range Pointer Offset in Computer Vision

Memory corruption when input parameter validation for number of fences is missing for fence frame IOCTL calls,

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcm8550_firmwaresa6150p_firmwarewsa8845_firmwarewsa8832sa6155p_firmwarewsa8840qam8295p_firmwareqcs8550_firmwareqca6696snapdragon_8_gen_2_mobile_firmwarewcd9385wcd9395_firmwaresxr1230p_firmwarewcd9390_firmwaresnapdragon_8_gen_2_mobilesg8275pwsa8832_firmwaresa8195p_firmwarewcd9395ssg2125psg8275p_firmwaresnapdragon_8\+_gen_2_mobileqca6574au_firmwaresa8195pqam8295pqca6574auwcd9390wsa8845h_firmwaresm8550p_firmwareqcm8550qcs6490_firmwarewsa8835wsa8840_firmwaresa8295p_firmwareqca6696_firmwarewsa8845hwcd9380_firmwaresa6150psa8155p_firmwaresa8155pwsa8830sm8550psa6145pssg2115psnapdragon_8_gen_3_mobile_firmwarefastconnect_7800_firmwarefastconnect_6900ssg2125p_firmwarewcd9385_firmwarefastconnect_6900_firmwaresa8295pqcs8550sa6145p_firmwarewcd9380fastconnect_7800sa8145p_firmwaresa8150psnapdragon_8\+_gen_2_mobile_firmwaresa8150p_firmwarewsa8845sa6155pvideo_collaboration_vc3_platform_firmwaresa8145pwsa8835_firmwaressg2115p_firmwaresxr1230pqcs6490snapdragon_8_gen_3_mobilewsa8830_firmwarevideo_collaboration_vc3_platformSnapdragon
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-823
Use of Out-of-range Pointer Offset
CVE-2024-33059
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.07% / 20.27%
||
7 Day CHG~0.00%
Published-06 Jan, 2025 | 10:33
Updated-10 Jan, 2025 | 16:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Computer Vision

Memory corruption while processing frame command IOCTL calls.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sg8275psg8275p_firmwarewcd9380_firmwarewcd9385_firmwaresnapdragon_8_gen_2_mobilewcd9395fastconnect_7800wsa8845hwsa8840wcd9390_firmwareqcs8550_firmwareqcs8550wcd9385snapdragon_8_gen_2_mobile_firmwarewcd9380wcd9390sm8550pwcd9395_firmwarewsa8845fastconnect_6900_firmwareqcm8550_firmwaresnapdragon_8\+_gen_2_mobilewsa8845_firmwarefastconnect_6900wsa8845h_firmwarefastconnect_7800_firmwareqcm8550wsa8840_firmwaresnapdragon_8\+_gen_2_mobile_firmwaresnapdragon_8_gen_3_mobilesnapdragon_8_gen_3_mobile_firmwaresm8550p_firmwareSnapdragon
CWE ID-CWE-416
Use After Free
CVE-2024-33039
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.07% / 21.82%
||
7 Day CHG~0.00%
Published-02 Dec, 2024 | 10:18
Updated-11 Dec, 2024 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Untrusted Pointer Dereference in Audio

Memory corruption when PAL client calls PAL service APIs by passing a random value as handle and the handle is not validated by the service.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qam8255p_firmwaresa8620p_firmwarewsa8830sw5100psa8775p_firmwaresa8650p_firmwareqam8650psnapdragon_w5\+_gen_1_wearable_platformsrv1h_firmwareqam8775pqamsrv1mwcn3988_firmwaresrv1hwsa8835sa7775p_firmwaresa7255p_firmwaresw5100sa8620psa8255p_firmwaresw5100p_firmwareqamsrv1m_firmwaresrv1m_firmwaresa7775pqam8650p_firmwaresa8770p_firmwareqam8775p_firmwaresa8255pwcn3980qamsrv1hsa8650pqamsrv1h_firmwaresa9000pwsa8830_firmwarewcn3988sa9000p_firmwaresa8775pwsa8835_firmwaresrv1msa7255psw5100_firmwarewcn3980_firmwareqam8255psa8770psnapdragon_w5\+_gen_1_wearable_platform_firmwareSnapdragonqam8255p_firmwaresa8620p_firmwareqamsrv1m_firmwareqam8650p_firmwaresa8770p_firmwareqam8775p_firmwaresa8775p_firmwaresa8650p_firmwaresrv1h_firmwareqamsrv1h_firmwarewcn3988_firmwarewsa8830_firmwaresa7775p_firmwaresa7255p_firmwaresa9000p_firmwarewsa8835_firmwaresw5100_firmwarewcn3980_firmwaresa8255p_firmwaresw5100p_firmwaresrv1m_firmware
CWE ID-CWE-822
Untrusted Pointer Dereference
CVE-2024-33032
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.15% / 34.92%
||
7 Day CHG~0.00%
Published-04 Nov, 2024 | 10:04
Updated-08 Nov, 2024 | 04:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Validation of Array Index in Camera_Linux

Memory corruption when the user application modifies the same shared memory asynchronously when kernel is accessing it.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_8_gen_1_mobile_platformtalynplus_firmwarewsa8830sa6150p_firmwaresa8145p_firmwareqcs610qca8337snapdragon_870_5g_mobile_platform_firmwaresnapdragon_865_5g_mobile_platformwcn3950_firmwaresa8150p_firmwarevideo_collaboration_vc3_platformwcd9370qca6426sa8530pwcd9385_firmwareqam8295pwcn3950talynplusfastconnect_6200wcn3660bqam8295p_firmwaresa9000p_firmwaresnapdragon_x55_5g_modem-rf_systemwcn3680b_firmwaresdx55_firmwaresnapdragon_4_gen_2_mobile_platformqca6574au_firmwarewcd9375_firmwaresm7250p_firmwarewcn3610_firmwareqca6436_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwaresa6155p_firmwaresnapdragon_870_5g_mobile_platformwcn3988_firmwaresnapdragon_765g_5g_mobile_platformqcn9074sa6145p_firmwarec-v2x_9150snapdragon_8\+_gen_1_mobile_platformfastconnect_6700_firmwaresa8195pwsa8810_firmwaresw5100qca6436sa6155psnapdragon_765_5g_mobile_platform_firmwaresnapdragon_690_5g_mobile_platformwcd9385wcd9341sxr2130_firmwareqca6696_firmwarewcd9375sa8150pwsa8830_firmwaresnapdragon_768g_5g_mobile_platform_firmwaresd865_5g_firmwarewsa8815_firmwarewcn3988wsa8835_firmwaresa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwarefastconnect_6800_firmwaresa8295p_firmwaresnapdragon_750g_5g_mobile_platform_firmwarewcn3610wcd9380_firmwareqca8337_firmwaresw5100psd865_5gsnapdragon_w5\+_gen_1_wearable_platformfastconnect_6800sa8530p_firmwarewsa8835sa8540p_firmwarewcd9380snapdragon_wear_4100\+_platform_firmwarefastconnect_6700qcs410sxr2130snapdragon_4_gen_2_mobile_platform_firmwaresnapdragon_wear_4100\+_platformvideo_collaboration_vc3_platform_firmwarec-v2x_9150_firmwarewcn3980sa9000pwsa8815snapdragon_865\+_5g_mobile_platformsnapdragon_xr2_5g_platform_firmwareqca6426_firmwarewcn3660b_firmwarefastconnect_6200_firmwarewcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwareqca6391sa8295pfastconnect_7800snapdragon_865\+_5g_mobile_platform_firmwaresnapdragon_690_5g_mobile_platform_firmwaresnapdragon_xr2_5g_platformqcs4490_firmwarewsa8832_firmwarefastconnect_6900fastconnect_6900_firmwarevideo_collaboration_vc1_platform_firmwareqca6574ausa8155p_firmwarewcd9341_firmwarefastconnect_7800_firmwarewsa8810wsa8832snapdragon_765g_5g_mobile_platform_firmwaresw5100p_firmwaresa8540psnapdragon_8_gen_1_mobile_platform_firmwareqcs610_firmwareqsm8250sa6145pwcn3680bqcs4490sa8145psnapdragon_750g_5g_mobile_platformqca6696qca6391_firmwarewcd9370_firmwaresdx55sa6150psnapdragon_768g_5g_mobile_platformsa8155psnapdragon_765_5g_mobile_platformvideo_collaboration_vc1_platformsm7250psnapdragon_8\+_gen_1_mobile_platform_firmwaresw5100_firmwareqcn9074_firmwareqcs410_firmwareqsm8250_firmwareSnapdragonqualcomm_video_collaboration_vc1_platform_firmwaresa6155p_firmwareqca8337_firmwaretalynplus_firmwaresa6150p_firmwaresnapdragon_690_5g_mobile_platform_firmwaresa8145p_firmwarewcd9380_firmwareqcs4490_firmwarewsa8832_firmwarewsa8835_firmwarefastconnect_6900_firmwaresa8530p_firmwarewcn3988_firmwaresa6145p_firmwaresa8155p_firmwarefastconnect_6700_firmwarewcn3950_firmwaresa8540p_firmwarewsa8815_firmwarewsa8810_firmwaresa8150p_firmwarefastconnect_7800_firmwarewcd9341_firmwaresw5100p_firmwareqcs610_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaresnapdragon_8_gen_1_mobile_platform_firmwaresxr2130_firmwarec-v2x_9150_firmwareqca6696_firmwarequalcomm_video_collaboration_vc3_platform_firmwareqca6391_firmwarewcd9385_firmwarewcd9370_firmwarewcn3680b_firmwarewsa8830_firmwareqam8295p_firmwaresd865_5g_firmwaresm7250p_firmwareqca6426_firmwaresnapdragon_xr2_5g_platform_firmwaresa9000p_firmwarewcn3660b_firmwarefastconnect_6200_firmwareqca6574au_firmwaresa8195p_firmwaresdx55_firmwaresnapdragon_865_5g_mobile_platform_firmwaresw5100_firmwareqcn9074_firmwarefastconnect_6800_firmwareqcs410_firmwaresa8295p_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcd9375_firmwarewcn3610_firmwareqca6436_firmwarewcn3980_firmwaresnapdragon_750g_5g_mobile_platform_firmwareqsm8250_firmware
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2024-33029
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.14% / 34.01%
||
7 Day CHG~0.00%
Published-04 Nov, 2024 | 10:04
Updated-08 Nov, 2024 | 04:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in DSP Services

Memory corruption while handling the PDR in driver for getting the remote heap maps.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6584ausnapdragon_auto_5g_modem-rf_gen_2_firmwareqca6584au_firmwaresnapdragon_auto_5g_modem-rf_gen_2qca6698aqqca6698aq_firmwareSnapdragonqca6584au_firmwareqca6698aq_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmware
CWE ID-CWE-416
Use After Free
CVE-2024-33030
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.17% / 37.68%
||
7 Day CHG~0.00%
Published-04 Nov, 2024 | 10:04
Updated-08 Nov, 2024 | 04:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy without Checking Size of Input (`Classic Buffer Overflow`) in Performance

Memory corruption while parsing IPC frequency table parameters for LPLH that has size greater than expected size.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800qca9377_firmwaresnapdragon_8_gen_1_mobile_platformqca6584auwcd9380_firmwarewsa8830qca9367_firmwareqca8337_firmwaresnapdragon_x72_5g_modem-rf_systemqcn6274_firmwareqca8337qca6698aqsnapdragon_x75_5g_modem-rf_system_firmwareqfw7124qca9367fastconnect_6900_firmwarefastconnect_6900qcn6224_firmwarewsa8835wcd9340wcd9380qcn6274qcn6224fastconnect_7800_firmwaresnapdragon_x72_5g_modem-rf_system_firmwaresnapdragon_x75_5g_modem-rf_systemsnapdragon_8_gen_1_mobile_platform_firmwareqca8081snapdragon_auto_5g_modem-rf_gen_2qca6698aq_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqcc710qca6584au_firmwareqca9377qfw7114_firmwarear8035wcd9340_firmwareqcc710_firmwarewsa8830_firmwarewsa8835_firmwareqca8081_firmwareqfw7124_firmwareqfw7114ar8035_firmwareSnapdragonqca9377_firmwareqca8337_firmwareqca9367_firmwarewcd9380_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqca6584au_firmwareqcn6274_firmwareqfw7114_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900_firmwarewcd9340_firmwareqcc710_firmwareqcn6224_firmwarewsa8830_firmwarewsa8835_firmwarefastconnect_7800_firmwaresnapdragon_x72_5g_modem-rf_system_firmwareqca8081_firmwareqfw7124_firmwaresnapdragon_8_gen_1_mobile_platform_firmwarear8035_firmwareqca6698aq_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-33033
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.13% / 32.26%
||
7 Day CHG~0.00%
Published-04 Nov, 2024 | 10:04
Updated-08 Nov, 2024 | 04:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in ComputerVision

Memory corruption while processing IOCTL calls to unmap the buffers.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800wsa8830wcd9380_firmwaresm7550qcm8550_firmwarewcd9378_firmwarewcn6650_firmwarewsa8840_firmwarewsa8832_firmwarefastconnect_6900sg8275p_firmwareqcm8550fastconnect_6900_firmwareqcs8550_firmwarewcn6650sg8275_firmwarewcn7880_firmwaresm7525wsa8840wsa8835snapdragon_8\+_gen_2_mobile_platform_firmwarewcd9380wcn6755_firmwaresnapdragon_8\+_gen_2_mobile_platformfastconnect_7800_firmwarewsa8845hwsa8832wcn6755wcd9395_firmwarewcd9370sm8550psm7525_firmwaresnapdragon_8_gen_2_mobile_platform_firmwarewcd9385sg8275psnapdragon_8_gen_2_mobile_platformwcd9395wcd9371wcd9371_firmwarewcd9385_firmwarewsa8845qcs8550wcd9375wcd9370_firmwaresm8550p_firmwarewcd9390wcd9390_firmwarewsa8830_firmwarewsa8845_firmwaresm7550_firmwarewsa8835_firmwaresg8275wsa8845h_firmwarewcd9375_firmwarewcd9378wcn7880Snapdragonsm7525_firmwarewcd9380_firmwareqcm8550_firmwarewcd9378_firmwarewcn6650_firmwarewsa8832_firmwarewsa8840_firmwarewcd9371_firmwaresg8275p_firmwarewcd9385_firmwarefastconnect_6900_firmwareqcs8550_firmwarewcd9370_firmwaresm8550p_firmwaresg8275_firmwarewcd9390_firmwarewcn7880_firmwarewsa8830_firmwarewsa8845_firmwaresm7550_firmwarewsa8835_firmwarefastconnect_7800_firmwarewcn6755_firmwarewcd9375_firmwarewsa8845h_firmwarewcd9395_firmwaresnapdragon_8_gen_2_mobile_platform_firmware
CWE ID-CWE-416
Use After Free
CVE-2024-33053
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 19.60%
||
7 Day CHG~0.00%
Published-02 Dec, 2024 | 10:18
Updated-12 Dec, 2024 | 15:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Video

Memory corruption when multiple threads try to unregister the CVP buffer at the same time.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wsa8830qca8337_firmwaresa6150p_firmwarewcd9380_firmwaresa8145p_firmwareqcs610qca8337sd865_5gfastconnect_6800snapdragon_870_5g_mobile_platform_firmwaresnapdragon_865_5g_mobile_platformsa8530p_firmwarewsa8835wcn3950_firmwaresa8540p_firmwarewcd9380sa8150p_firmwarevideo_collaboration_vc3_platformqcs410wcd9370sxr2130qca6426video_collaboration_vc3_platform_firmwarec-v2x_9150_firmwarewcn3980sa8530pwcd9385_firmwareqam8295pwcn3950fastconnect_6200sa9000pwcn3660bwsa8815snapdragon_865\+_5g_mobile_platformqam8295p_firmwaresnapdragon_xr2_5g_platform_firmwareqca6426_firmwarewcn3660b_firmwaresa9000p_firmwaresnapdragon_x55_5g_modem-rf_systemfastconnect_6200_firmwareqca6574au_firmwaresdx55_firmwarewcn3680b_firmwarewcd9375_firmwarewcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresm7250p_firmwareqca6391qca6436_firmwaresa8295psa6155p_firmwaresnapdragon_865\+_5g_mobile_platform_firmwaresnapdragon_870_5g_mobile_platformsnapdragon_690_5g_mobile_platform_firmwaresnapdragon_xr2_5g_platformfastconnect_6900fastconnect_6900_firmwarevideo_collaboration_vc1_platform_firmwaresnapdragon_765g_5g_mobile_platformwcn3988_firmwareqca6574auqcn9074sa6145p_firmwaresa8155p_firmwarec-v2x_9150sa8195pwsa8810_firmwarewcd9341_firmwarewsa8810snapdragon_765g_5g_mobile_platform_firmwareqca6436sa6155psa8540pqcs610_firmwaresnapdragon_765_5g_mobile_platform_firmwaresnapdragon_690_5g_mobile_platformqsm8250sa6145pwcn3680bwcd9385sxr2130_firmwarewcd9341qca6696_firmwaresa8145pqca6696snapdragon_750g_5g_mobile_platformqca6391_firmwarewcd9375wcd9370_firmwaresa8150psa6150psdx55snapdragon_768g_5g_mobile_platformsa8155pwsa8830_firmwaresnapdragon_768g_5g_mobile_platform_firmwaresd865_5g_firmwaresnapdragon_765_5g_mobile_platformwcn3988wsa8815_firmwarewsa8835_firmwarevideo_collaboration_vc1_platformsm7250psa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwareqcn9074_firmwarefastconnect_6800_firmwareqcs410_firmwaresa8295p_firmwaresnapdragon_750g_5g_mobile_platform_firmwareqsm8250_firmwareSnapdragonqualcomm_video_collaboration_vc1_platform_firmwaresa6155p_firmwareqca8337_firmwarewcd9380_firmwaresa6150p_firmwaresnapdragon_690_5g_mobile_platform_firmwaresa8145p_firmwarewsa8835_firmwarefastconnect_6900_firmwaresa8530p_firmwarewcn3988_firmwaresa6145p_firmwaresa8155p_firmwarewcn3950_firmwaresa8540p_firmwarewsa8815_firmwarewsa8810_firmwaresa8150p_firmwarewcd9341_firmwareqcs610_firmwaresxr2130_firmwarec-v2x_9150_firmwareqca6696_firmwarequalcomm_video_collaboration_vc3_platform_firmwareqca6391_firmwarewcd9385_firmwarewcd9370_firmwarewcn3680b_firmwarewsa8830_firmwareqam8295p_firmwaresd865_5g_firmwaresm7250p_firmwareqca6426_firmwaresnapdragon_xr2_5g_platform_firmwaresa9000p_firmwarewcn3660b_firmwarefastconnect_6200_firmwareqca6574au_firmwaresa8195p_firmwaresdx55_firmwaresnapdragon_865_5g_mobile_platform_firmwarewcd9375_firmwareqcn9074_firmwarefastconnect_6800_firmwareqcs410_firmwaresa8295p_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcn3980_firmwareqca6436_firmwaresnapdragon_750g_5g_mobile_platform_firmwareqsm8250_firmware
CWE ID-CWE-416
Use After Free
CVE-2025-47336
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 5.78%
||
7 Day CHG~0.00%
Published-06 Jan, 2026 | 22:48
Updated-27 Jan, 2026 | 21:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Camera Driver

Memory corruption while performing sensor register read operations.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800_firmwaresm8735_firmwarewsa8830_firmwarewsa8840_firmwareqmp1000_firmwaresm8750p_firmwarewsa8835wcn7860wcn7880_firmwaresm8735wcn7860_firmwarewsa8835_firmwarewcn7861wcn7881sm8750pwcn7880wsa8832fastconnect_7800wsa8832_firmwarewcd9378_firmwarewsa8845_firmwarewsa8845wsa8845h_firmwarewsa8845hwsa8840wcd9395wcd9378wcn7750sm8750_firmwarewcn7750_firmwarewsa8830wcd9395_firmwarewcn7881_firmwareqmp1000sm8750wcn7861_firmwareSnapdragon
CWE ID-CWE-416
Use After Free
CVE-2025-47332
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 3.63%
||
7 Day CHG~0.00%
Published-06 Jan, 2026 | 22:48
Updated-28 Jan, 2026 | 15:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Camera Driver

Memory corruption while processing a config call from userspace.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sm6650psnapdragon_8\+_gen_1_mobile_platform_firmwareqca6797aq_firmwaresnapdragon_4_gen_2_mobile_platform_firmwarewsa8832wcd9390wcn7860_firmwarefastconnect_6900_firmwareqmp1000ssg2115pwcn3950wcd9385sxr1230p_firmwarewsa8835_firmwarewsa8845sm8550p_firmwarewcn7750_firmwarewcd9378_firmwarewcd9378sm8735_firmwaresm6650sxr2350psnapdragon_4_gen_2_mobile_platformsnapdragon_7_gen_1_mobile_platform_firmwarewsa8845h_firmwareqcm4490_firmwaresnapdragon_7_gen_1_mobile_platformsm8635p_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"sxr2330pwcd9380_firmwaressg2115p_firmwaresnapdragon_ar1_gen_1_platform_firmwaresm7675p_firmwaresg8275_firmwaresm7675_firmwarewcn6740snapdragon_ar2_gen_1_platform_firmwarewcn6740_firmwarewcd9395wsa8832_firmwaresnapdragon_8\+_gen_2_mobile_platformqcs4490_firmwarewcd9375_firmwaresm8750p_firmwarewcd9390_firmwarefastconnect_6200_firmwaresnapdragon_8_gen_2_mobile_platformsxr1230psm7435fastconnect_7800sm7675wsa8810_firmwaresm8475p_firmwaresxr2250p_firmwaresg8275p_firmwarewcd9370_firmwarewcn7861sm7675psm8750pqmp1000_firmwarefastconnect_7800_firmwareqca6698au_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"_firmwaresm6650_firmwaresxr2230pwcn7860snapdragon_6_gen_1_mobile_platformwcd9380sm7635ssg2125p_firmwaresnapdragon_8_gen_3_mobile_platformwcd9395_firmwaresm8550psnapdragon_8\+_gen_1_mobile_platformfastconnect_6200sm7550p_firmwarewcn7880snapdragon_8_gen_2_mobile_platform_firmwaresg8275pwcd9370wsa8830_firmwarewcn3988sm7550psm7635_firmwarewcn7750wsa8815_firmwarewsa8830qcs8550_firmwaresxr2330p_firmwarewcd9371_firmwaresm8475psnapdragon_ar1_gen_1_platformwsa8845hqca6698auwcn6650_firmwaressg2125psm7550snapdragon_7\+_gen_2_mobile_platformsm7635p_firmwarewcn7881qcm4490wcd9385_firmwarewcn6650wcn7881_firmwareqcs4490wcn6755_firmwarewcn6755qcm8550fastconnect_6700wsa8815qca6797aqfastconnect_6700_firmwaresm8635_firmwaresg8275snapdragon_8_gen_3_mobile_platform_firmwaresm8635pwcn7861_firmwaresnapdragon_6_gen_1_mobile_platform_firmwaresm7550_firmwareqcm8550_firmwaresm6650p_firmwaresxr2230p_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwaresxr2350p_firmwarewsa8835qcs8550sxr2250pwcd9375sm8635sm7635pwcn3950_firmwarewsa8840wsa8840_firmwaresnapdragon_7\+_gen_2_mobile_platform_firmwaresm8750_firmwarewsa8845_firmwarefastconnect_6900sm7435_firmwaresm8750wcn7880_firmwarewcn3988_firmwaresm8650qsnapdragon_ar2_gen_1_platformsm8735wsa8810wcd9371sm8650q_firmwareSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-23376
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 18.94%
||
7 Day CHG~0.00%
Published-07 Oct, 2024 | 12:58
Updated-16 Oct, 2024 | 20:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in ComputerVision

Memory corruption while sending the persist buffer command packet from the user-space to the kernel space through the IOCTL call.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800snapdragon_8_gen_1_mobile_platformsa6155p_firmwarewsa8830wcd9380_firmwaresa6150p_firmwaresa8145p_firmwaresw5100psnapdragon_w5\+_gen_1_wearable_platformfastconnect_6900fastconnect_6900_firmwarewcn3988_firmwareqca6574ausa8155p_firmwarewsa8835sa6145p_firmwaresa8195pwcd9380sa8150p_firmwarefastconnect_7800_firmwaresw5100sa6155psw5100p_firmwaresnapdragon_8_gen_1_mobile_platform_firmwaresa6145pqca6174a_firmwareqca6174aqca6696_firmwarewcn3980sa8145pqca6696sa8150psa6150psa8155pwsa8830_firmwarewcn3988wsa8835_firmwareqca6574au_firmwaresa8195p_firmwaresw5100_firmwarewcn3980_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwareSnapdragonqca6174a_firmwaresa6155p_firmwarewcd9380_firmwaresa6150p_firmwaresa8145p_firmwareqca6696_firmwarefastconnect_6900_firmwarewcn3988_firmwarewsa8830_firmwaresa6145p_firmwaresa8155p_firmwarewsa8835_firmwaresa8150p_firmwarefastconnect_7800_firmwareqca6574au_firmwaresa8195p_firmwaresw5100_firmwarewcn3980_firmwaresw5100p_firmwaresnapdragon_8_gen_1_mobile_platform_firmware
CWE ID-CWE-416
Use After Free
CVE-2024-23370
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 18.94%
||
7 Day CHG~0.00%
Published-07 Oct, 2024 | 12:58
Updated-16 Oct, 2024 | 20:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Automotive Multimedia

Memory corruption when a process invokes IOCTL calls from user-space to create a HAB virtual channel and another process invokes IOCTL calls to destroy the same.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwareqca6584auwsa8830qca9367_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqca6584au_firmwaresw5100psnapdragon_auto_5g_modem-rf_gen_2wcn3980qca9377qca6698aqqca9367wcn3988_firmwarewsa8830_firmwarewsa8835wcn3988wsa8835_firmwaresw5100sw5100_firmwarewcn3980_firmwaresw5100p_firmwareqca6698aq_firmwareSnapdragonwcn3988_firmwareqca9377_firmwarewsa8830_firmwareqca9367_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqca6584au_firmwarewsa8835_firmwaresw5100_firmwarewcn3980_firmwaresw5100p_firmwareqca6698aq_firmware
CWE ID-CWE-416
Use After Free
CVE-2024-23377
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.14% / 34.01%
||
7 Day CHG~0.00%
Published-04 Nov, 2024 | 10:04
Updated-08 Nov, 2024 | 04:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use of Out-of-range Pointer Offset in ComputerVision

Memory corruption while invoking IOCTL command from user-space, when a user modifies the original packet size of the command after system properties have been already sent to the EVA driver.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wsa8830sm7550wcd9380_firmwaressg2125psxr2230p_firmwarewcd9378_firmwaresg8275p_firmwareqcm8550qcs7230_firmwaresm7525wsa8840wsa8835sxr1230p_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwaresd_8_gen1_5gwcd9380wcn6755_firmwarewcd9370ssg2125p_firmwaressg2115pwcn7880sxr1230psg8275psnapdragon_8_gen_2_mobile_platformwcd9371_firmwarewcd9385_firmwarewsa8845sd_8_gen1_5g_firmwaresxr2230pwsa8845_firmwaresm7550_firmwareqcs8250wsa8845h_firmwarewcd9375_firmwareqca6391fastconnect_7800qcm8550_firmwarewcn6650_firmwarewsa8840_firmwarewsa8832_firmwarefastconnect_6900video_collaboration_vc5_platformfastconnect_6900_firmwareqcs8550_firmwarewcn6650sg8275_firmwarewcn7880_firmwareqcs8250_firmwaresnapdragon_8\+_gen_2_mobile_platformfastconnect_7800_firmwarewsa8845hwcn6755wcd9395_firmwaresnapdragon_ar2_gen_1_platform_firmwarewsa8832qcs7230sm8550psnapdragon_ar2_gen_1_platformsm7525_firmwaresxr2250pwcd9385wcd9371wcd9395qca6391_firmwareqcs8550wcd9375wcd9370_firmwaresm8550p_firmwarewcd9390wcd9390_firmwarewsa8830_firmwarewsa8835_firmwaresg8275video_collaboration_vc5_platform_firmwaressg2115p_firmwarewcd9378sxr2250p_firmwaresnapdragon_8_gen_2_mobile_platform_firmwareSnapdragonwcd9380_firmwareqcm8550_firmwaresxr2230p_firmwarewcd9378_firmwarewcn6650_firmwarewsa8832_firmwarewsa8840_firmwaresg8275p_firmwarefastconnect_6900_firmwareqcs8550_firmwareqcs7230_firmwaresg8275_firmwarewcn7880_firmwaresxr1230p_firmwareqcs8250_firmwarefastconnect_7800_firmwarewcn6755_firmwaresnapdragon_ar2_gen_1_platform_firmwarewcd9395_firmwaressg2125p_firmwaresm7525_firmwarewcd9371_firmwareqca6391_firmwarewcd9385_firmwarewcd9370_firmwaresm8550p_firmwaresd_8_gen1_5g_firmwarequalcomm_video_collaboration_vc5_platform_firmwarewcd9390_firmwarewsa8830_firmwarewsa8845_firmwaresm7550_firmwarewsa8835_firmwaressg2115p_firmwarewcd9375_firmwarewsa8845h_firmwaresxr2250p_firmwaresnapdragon_8_gen_2_mobile_platform_firmware
CWE ID-CWE-823
Use of Out-of-range Pointer Offset
CVE-2024-23378
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 18.94%
||
7 Day CHG~0.00%
Published-07 Oct, 2024 | 12:58
Updated-16 Oct, 2024 | 20:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Audio

Memory corruption while invoking IOCTL calls for MSM module from the user space during audio playback and record.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qam8255p_firmwaresa8620p_firmwareqca6584ausa8775p_firmwaresa8650p_firmwareqca6698aqqam8650psrv1h_firmwareqam8775pqamsrv1msrv1hsa7775p_firmwaresa7255p_firmwaresa8620psa8255p_firmwaresnapdragon_auto_5g_modem-rf_gen_2srv1m_firmwaresa7775pqca6698aq_firmwareqamsrv1m_firmwareqam8650p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresa8770p_firmwaresa8255pqca6584au_firmwareqam8775p_firmwareqamsrv1hsa8650psa9000pqamsrv1h_firmwaresa9000p_firmwaresa8775psrv1msa7255pqam8255psa8770pSnapdragonqam8255p_firmwaresa8620p_firmwareqamsrv1m_firmwareqam8650p_firmwaresa8770p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqam8775p_firmwareqca6584au_firmwaresa8775p_firmwaresa8650p_firmwaresrv1h_firmwareqamsrv1h_firmwaresa7775p_firmwaresa7255p_firmwaresa9000p_firmwaresa8255p_firmwareqca6698aq_firmwaresrv1m_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-23375
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 18.94%
||
7 Day CHG~0.00%
Published-07 Oct, 2024 | 12:58
Updated-16 Oct, 2024 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in RIL

Memory corruption during the network scan request.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3680bsa6155p_firmwarewsa8830sw5100pwcn3980sa4155p_firmwaresnapdragon_w5\+_gen_1_wearable_platformsa4150p_firmwarewcn3660bwcn3988_firmwaresa8155pwsa8830_firmwaresa8155p_firmwarewsa8835sa8195pwcn3988wcn3660b_firmwarewsa8835_firmwarewcn3680b_firmwaresa8195p_firmwaresw5100sw5100_firmwarewcn3980_firmwaresa6155psw5100p_firmwaresa4155psa4150psnapdragon_w5\+_gen_1_wearable_platform_firmwareSnapdragonwcn3988_firmwarewsa8830_firmwaresa8155p_firmwaresa6155p_firmwarewcn3660b_firmwarewsa8835_firmwarewcn3680b_firmwaresa8195p_firmwaresa4155p_firmwaresw5100_firmwarewcn3980_firmwaresa4150p_firmwaresw5100p_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-23374
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 18.94%
||
7 Day CHG~0.00%
Published-07 Oct, 2024 | 12:58
Updated-16 Oct, 2024 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack-based Buffer Overflow in Power Management IC

Memory corruption is possible when an attempt is made from userspace or console to write some haptics effects pattern to the haptics debugfs file.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800qca9377_firmwaresnapdragon_8_gen_1_mobile_platformsa6155p_firmwarewsa8830wcd9380_firmwaresa6150p_firmwareqca9367_firmwaresa8145p_firmwareqca6584ausw5100pqca6698aqsnapdragon_w5\+_gen_1_wearable_platformqca9367fastconnect_6900fastconnect_6900_firmwarewcn3988_firmwareqca6574ausa8155p_firmwarewsa8835sa6145p_firmwaresa8195pwcd9380sa8150p_firmwarefastconnect_7800_firmwaresw5100sa6155psw5100p_firmwaresnapdragon_8_gen_1_mobile_platform_firmwaresnapdragon_auto_5g_modem-rf_gen_2qca6698aq_firmwaresa6145pqca6174a_firmwareqca6174asnapdragon_auto_5g_modem-rf_gen_2_firmwareqca6584au_firmwareqca6696_firmwarewcn3980qca9377sa8145pqca6696sa8150psa6150psa8155pwsa8830_firmwarewcn3988wsa8835_firmwareqca6574au_firmwaresa8195p_firmwaresw5100_firmwarewcn3980_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwareSnapdragonqca9377_firmwareqca6174a_firmwaresa6155p_firmwareqca9367_firmwarewcd9380_firmwaresa6150p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresa8145p_firmwareqca6584au_firmwareqca6696_firmwarefastconnect_6900_firmwarewcn3988_firmwarewsa8830_firmwaresa6145p_firmwaresa8155p_firmwarewsa8835_firmwaresa8150p_firmwarefastconnect_7800_firmwareqca6574au_firmwaresa8195p_firmwaresw5100_firmwarewcn3980_firmwaresw5100p_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareqca6698aq_firmware
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-23379
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 18.94%
||
7 Day CHG~0.00%
Published-07 Oct, 2024 | 12:58
Updated-16 Oct, 2024 | 19:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Double Free in DSP Services

Memory corruption while unmapping the fastrpc map when two threads can free the same map in concurrent scenario.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qam8255p_firmwaresnapdragon_8_gen_1_mobile_platformwsa8830wcd9380_firmwarewcn3990qam8650psnapdragon_835_mobile_pc_platformqam8775pqamsrv1mwsa8835wcd9380qca6584au_firmwarewcn3990_firmwareqca6310_firmwarewcd9335_firmwareqamsrv1hsa8650psa9000pqamsrv1h_firmwarewcd9340_firmwarewsa8815qca6320sa9000p_firmwaresa8775pqca6320_firmwaresnapdragon_835_mobile_pc_platform_firmwaresd835sa7255pfastconnect_7800sa8620p_firmwareqca6584auqca6310sa8775p_firmwaresa8650p_firmwareqca6698aqfastconnect_6900srv1h_firmwarefastconnect_6900_firmwaresrv1hsa7775p_firmwarewcd9340sa7255p_firmwarewsa8810_firmwarewcd9341_firmwarefastconnect_7800_firmwarewsa8810sa8620pwcd9335sa8255p_firmwaresnapdragon_8_gen_1_mobile_platform_firmwaresrv1m_firmwaresnapdragon_auto_5g_modem-rf_gen_2sa7775pqca6698aq_firmwaresd835_firmwareqamsrv1m_firmwareqam8650p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwarewcd9341sa8770p_firmwaresa8255pqam8775p_firmwarewsa8830_firmwarewsa8815_firmwarewsa8835_firmwaresrv1mqam8255psa8770pSnapdragonqam8255p_firmwaresa8620p_firmwarewcd9380_firmwaresa8775p_firmwaresa8650p_firmwarefastconnect_6900_firmwaresrv1h_firmwaresa7775p_firmwaresa7255p_firmwarewsa8810_firmwarewcd9341_firmwarefastconnect_7800_firmwaresa8255p_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareqca6698aq_firmwareqamsrv1m_firmwaresrv1m_firmwaresd835_firmwareqam8650p_firmwaresa8770p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqam8775p_firmwareqca6584au_firmwarewcn3990_firmwareqca6310_firmwarewcd9335_firmwareqamsrv1h_firmwarewcd9340_firmwarewsa8830_firmwarewsa8815_firmwaresa9000p_firmwareqca6320_firmwarewsa8835_firmwaresnapdragon_835_mobile_pc_platform_firmware
CWE ID-CWE-415
Double Free
CVE-2022-40524
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 5.63%
||
7 Day CHG~0.00%
Published-05 Sep, 2023 | 06:23
Updated-03 Aug, 2024 | 12:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer over-read in Modem

Memory corruption due to buffer over-read in Modem while processing SetNativeHandle RTP service.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380_firmwarewsa8830sa6150p_firmwaresa8145p_firmwaresw5100psd865_5gqcc5100sdx55m_firmwarewsa8835wcd9380sa8150p_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwareqca6426qca6430_firmwarewcn3980wcn3998sdxr2_5g_firmwaresd855wcn3660bwcn6850wsa8815qca6426_firmwarewcn3660b_firmwareqca6574au_firmwarewcn3680b_firmwareqca6595auwcn3998_firmwarewcn3980_firmwareqca6391sdx55mqca6420qca6436_firmwareqcc5100_firmwareaqt1000_firmwaresa6155p_firmwaresdxr2_5gwcn6851_firmwarewcn3988_firmwareqca6430qca6574ausa6145p_firmwaresa8155p_firmwaresa8195pwsa8810_firmwarewcd9341_firmwaresw5100sd870wsa8810qca6436wcn6851sa6155psw5100p_firmwaresa6145pwcn3680bwcd9341qca6696_firmwaresa8145psd870_firmwareqca6696qca6391_firmwareqca6390aqt1000sa8150psa6150psa8155pwsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3988wcn6850_firmwarewsa8815_firmwarewsa8835_firmwaresa8195p_firmwaresw5100_firmwareSnapdragon
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-43525
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 12.18%
||
7 Day CHG-0.00%
Published-06 May, 2024 | 14:32
Updated-16 Dec, 2025 | 18:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Audio

Memory corruption while copying the sound model data from user to kernel buffer during sound model register.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-Snapdragonsa8255p_firmwaresa8770p_firmwareqam8650p_firmwaresa8775p_firmwarear8035_firmwaresrv1h_firmwaresa9000p_firmwareqca6698aq_firmwaresa8150p_firmwareqfw7114_firmwareqam8255p_firmwareqcn6274_firmwareqca8081_firmwaresa8650p_firmwareqamsrv1m_firmwareqam8295p_firmwaresa6150p_firmwareqam8775p_firmwareqamsrv1h_firmwarefastconnect_7800_firmwareqcn6224_firmwaresa8195p_firmwareqcc710_firmwaresa6155p_firmwaresa6145p_firmwaresrv1m_firmwareqca6574au_firmwaresa8620p_firmwaresa8295p_firmwaresa8145p_firmwareqca6584au_firmwareqfw7124_firmwaresa7255p_firmwareqca6696_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqca8337_firmwaresa8155p_firmwarewcd9340_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 10
  • 11
  • Next
Details not found