Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-38420

Summary
Assigner-qualcomm
Assigner Org ID-2cfc7d3e-20d3-47ac-8db7-1b7285aff15f
Published At-03 Feb, 2025 | 16:51
Updated At-03 Feb, 2025 | 17:36
Rejected At-
Credits

Improper Input Validation in Hypervisor

Memory corruption while configuring a Hypervisor based input virtual device.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:qualcomm
Assigner Org ID:2cfc7d3e-20d3-47ac-8db7-1b7285aff15f
Published At:03 Feb, 2025 | 16:51
Updated At:03 Feb, 2025 | 17:36
Rejected At:
▼CVE Numbering Authority (CNA)
Improper Input Validation in Hypervisor

Memory corruption while configuring a Hypervisor based input virtual device.

Affected Products
Vendor
Qualcomm Technologies, Inc.Qualcomm, Inc.
Product
Snapdragon
Platforms
  • Snapdragon Auto
  • Snapdragon Compute
  • Snapdragon Consumer IOT
  • Snapdragon Industrial IOT
  • Snapdragon MDM
  • Snapdragon Mobile
  • Snapdragon Technology
Default Status
unaffected
Versions
Affected
  • AQT1000
  • AR8035
  • FastConnect 6200
  • FastConnect 6700
  • FastConnect 6800
  • FastConnect 6900
  • FastConnect 7800
  • QAM8255P
  • QAM8295P
  • QAM8620P
  • QAM8650P
  • QAM8775P
  • QAMSRV1H
  • QAMSRV1M
  • QCA6174A
  • QCA6310
  • QCA6335
  • QCA6391
  • QCA6420
  • QCA6421
  • QCA6426
  • QCA6430
  • QCA6431
  • QCA6436
  • QCA6564A
  • QCA6564AU
  • QCA6574
  • QCA6574A
  • QCA6574AU
  • QCA6584AU
  • QCA6595
  • QCA6595AU
  • QCA6678AQ
  • QCA6696
  • QCA6698AQ
  • QCA6797AQ
  • QCA8081
  • QCA8337
  • QCA9377
  • QCC710
  • QCM5430
  • QCM6490
  • QCM8550
  • QCN6224
  • QCN6274
  • QCN9274
  • QCS5430
  • QCS6490
  • QCS8550
  • QCS9100
  • QDU1000
  • QDU1010
  • QDU1110
  • QDU1210
  • QDX1010
  • QDX1011
  • QEP8111
  • QFW7114
  • QFW7124
  • QRU1032
  • QRU1052
  • QRU1062
  • QSM8350
  • Qualcomm Video Collaboration VC3 Platform
  • Robotics RB3 Platform
  • SA6145P
  • SA6155
  • SA6155P
  • SA7255P
  • SA7775P
  • SA8150P
  • SA8155
  • SA8155P
  • SA8255P
  • SA8295P
  • SA8540P
  • SA8620P
  • SA8650P
  • SA8770P
  • SA8775P
  • SA9000P
  • SC8380XP
  • SD 675
  • SD 8 Gen1 5G
  • SD 8CX
  • SD670
  • SD675
  • SD855
  • SD865 5G
  • SDX55
  • SDX57M
  • SDX80M
  • SM7250P
  • Snapdragon 670 Mobile Platform
  • Snapdragon 675 Mobile Platform
  • Snapdragon 678 Mobile Platform (SM6150-AC)
  • Snapdragon 765 5G Mobile Platform (SM7250-AA)
  • Snapdragon 765G 5G Mobile Platform (SM7250-AB)
  • Snapdragon 768G 5G Mobile Platform (SM7250-AC)
  • Snapdragon 8 Gen 1 Mobile Platform
  • Snapdragon 8 Gen 3 Mobile Platform
  • Snapdragon 845 Mobile Platform
  • Snapdragon 850 Mobile Compute Platform
  • Snapdragon 855 Mobile Platform
  • Snapdragon 855+/860 Mobile Platform (SM8150-AC)
  • Snapdragon 865 5G Mobile Platform
  • Snapdragon 865+ 5G Mobile Platform (SM8250-AB)
  • Snapdragon 870 5G Mobile Platform (SM8250-AC)
  • Snapdragon 888 5G Mobile Platform
  • Snapdragon 888+ 5G Mobile Platform (SM8350-AC)
  • Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite"
  • Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite"
  • Snapdragon 8cx Compute Platform (SC8180X-AA, AB)
  • Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro"
  • Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro"
  • Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB)
  • Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB)
  • Snapdragon AR1 Gen 1 Platform
  • Snapdragon AR1 Gen 1 Platform "Luna1"
  • Snapdragon AR2 Gen 1 Platform
  • Snapdragon Auto 5G Modem-RF Gen 2
  • Snapdragon X24 LTE Modem
  • Snapdragon X35 5G Modem-RF System
  • Snapdragon X50 5G Modem-RF System
  • Snapdragon X55 5G Modem-RF System
  • Snapdragon X62 5G Modem-RF System
  • Snapdragon X65 5G Modem-RF System
  • Snapdragon X72 5G Modem-RF System
  • Snapdragon X75 5G Modem-RF System
  • Snapdragon XR2 5G Platform
  • SRV1H
  • SRV1L
  • SRV1M
  • SSG2115P
  • SSG2125P
  • SXR1230P
  • SXR2130
  • SXR2330P
  • Vision Intelligence 300 Platform
  • Vision Intelligence 400 Platform
  • WCD9326
  • WCD9340
  • WCD9341
  • WCD9370
  • WCD9375
  • WCD9380
  • WCD9385
  • WCD9390
  • WCD9395
  • WCN3950
  • WCN3980
  • WCN3990
  • WSA8810
  • WSA8815
  • WSA8830
  • WSA8832
  • WSA8835
  • WSA8840
  • WSA8845
  • WSA8845H
Problem Types
TypeCWE IDDescription
CWECWE-20CWE-20 Improper Input Validation
Type: CWE
CWE ID: CWE-20
Description: CWE-20 Improper Input Validation
Metrics
VersionBase scoreBase severityVector
3.18.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Version: 3.1
Base score: 8.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://docs.qualcomm.com/product/publicresources/securitybulletin/february-2025-bulletin.html
N/A
Hyperlink: https://docs.qualcomm.com/product/publicresources/securitybulletin/february-2025-bulletin.html
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:product-security@qualcomm.com
Published At:03 Feb, 2025 | 17:15
Updated At:05 Feb, 2025 | 13:56

Memory corruption while configuring a Hypervisor based input virtual device.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.18.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 8.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Qualcomm Technologies, Inc.
qualcomm
>>aqt1000_firmware>>-
cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>aqt1000>>-
cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>ar8035_firmware>>-
cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>ar8035>>-
cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_6200_firmware>>-
cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_6200>>-
cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_6700_firmware>>-
cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_6700>>-
cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_6800_firmware>>-
cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_6800>>-
cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_6900_firmware>>-
cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_6900>>-
cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_7800_firmware>>-
cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_7800>>-
cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qam8255p_firmware>>-
cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qam8255p>>-
cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qam8295p_firmware>>-
cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qam8295p>>-
cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qam8620p_firmware>>-
cpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qam8620p>>-
cpe:2.3:h:qualcomm:qam8620p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qam8650p_firmware>>-
cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qam8650p>>-
cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qam8775p_firmware>>-
cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qam8775p>>-
cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qamsrv1h_firmware>>-
cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qamsrv1h>>-
cpe:2.3:h:qualcomm:qamsrv1h:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qamsrv1m_firmware>>-
cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qamsrv1m>>-
cpe:2.3:h:qualcomm:qamsrv1m:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6174a_firmware>>-
cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6174a>>-
cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6310_firmware>>-
cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6310>>-
cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6335_firmware>>-
cpe:2.3:o:qualcomm:qca6335_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6335>>-
cpe:2.3:h:qualcomm:qca6335:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6391_firmware>>-
cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6391>>-
cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6420_firmware>>-
cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6420>>-
cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6421_firmware>>-
cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6421>>-
cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6426_firmware>>-
cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6426>>-
cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6430_firmware>>-
cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6430>>-
cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6431_firmware>>-
cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6431>>-
cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6436_firmware>>-
cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6436>>-
cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6564a_firmware>>-
cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6564a>>-
cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-20Secondaryproduct-security@qualcomm.com
CWE-787Primarynvd@nist.gov
CWE ID: CWE-20
Type: Secondary
Source: product-security@qualcomm.com
CWE ID: CWE-787
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://docs.qualcomm.com/product/publicresources/securitybulletin/february-2025-bulletin.htmlproduct-security@qualcomm.com
Vendor Advisory
Hyperlink: https://docs.qualcomm.com/product/publicresources/securitybulletin/february-2025-bulletin.html
Source: product-security@qualcomm.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

2340Records found

CVE-2019-10595
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.09% / 27.23%
||
7 Day CHG~0.00%
Published-18 Dec, 2019 | 05:25
Updated-04 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible buffer overwrite in message handler due to lack of validation of tid value calculated from packets received from firmware in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8053, APQ8064, APQ8096AU, IPQ4019, IPQ8064, MDM9206, MDM9207C, MDM9607, MDM9615, MDM9640, MDM9650, MSM8909, MSM8909W, MSM8939, MSM8996AU, QCA4531, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCA9558, QCA9880, QCA9886, QCA9980, SDA660, SDM630, SDM636, SDM660, SDX20, SDX24

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwareqca4531_firmwaremdm9640_firmwaresdm636_firmwareapq8064qca9980_firmwaremsm8996au_firmwaresdx20sdm660sdx24sdm630mdm9607_firmwaremdm9650qca9558qca9558_firmwareqca6574aumdm9607msm8996auqca9880_firmwareqca9980qca9880msm8939_firmwareapq8009_firmwareipq4019_firmwaremdm9207c_firmwaremdm9206mdm9207cqca6174a_firmwareqca6174aqca9379_firmwareqca9886_firmwaremsm8909sdx24_firmwareapq8096ausdm636sdm660_firmwareqca9377qca4531sdm630_firmwaresda660_firmwaremdm9615mdm9206_firmwaremsm8939ipq4019qca9886apq8053apq8096au_firmwaremdm9615_firmwaremdm9650_firmwaresdx20_firmwareipq8064qca6574au_firmwaresda660apq8064_firmwareapq8009qca9379msm8909_firmwareapq8053_firmwareipq8064_firmwaremdm9640Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-20
Improper Input Validation
CVE-2019-10501
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.10% / 28.42%
||
7 Day CHG~0.00%
Published-30 Sep, 2019 | 15:40
Updated-04 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible use after free issue due to improper input validation in volume listener library in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd_850mdm9150_firmwaresd_632sd_820asd_675msm8996au_firmwaresd_439sd_670_firmwaresd_429sdx24sdm439mdm9650sd_636msm8909w_firmwaremsm8996ausd_820sd_450_firmwaresd_845_firmwaresd_820a_firmwareqcs605_firmwaresd_675_firmwaremdm9206sd_425_firmwaresd_665sdx24_firmwaresd_625_firmwaresd_450sd_845mdm9206_firmwareqcs605sd_632_firmwaresd_835_firmwaremdm9650_firmwaresd_835sda660sd_210_firmwaremsm8909wsd_665_firmwaresd_205_firmwaresd_212sd_427_firmwaresd_712sd_855sd_730_firmwarequalcomm_215sdx20sd_425sdm660sd_430_firmwaremdm9607_firmwaresd_435sd_710_firmwaresdm630qcs405sd_625sd_820_firmwaresd_210mdm9607sd_636_firmwaresd_439_firmwarequalcomm_215_firmwaremdm9150sd_429_firmwaresd_730sd_212_firmwaresd_850_firmwaresdm439_firmwareqcs405_firmwaresd_712_firmwaresdm630_firmwaresda660_firmwaresd_430sd_427sd_670sd_435_firmwaresdx20_firmwaresd_710sd_205sdm660_firmwaresd_855_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-416
Use After Free
CWE ID-CWE-20
Improper Input Validation
CVE-2019-10527
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.42%
||
7 Day CHG~0.00%
Published-08 Sep, 2020 | 09:31
Updated-04 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

u'SMEM partition can be manipulated in case of any compromise on HLOS, thus resulting in access to memory outside of SMEM address range which could lead to memory corruption' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, Bitra, IPQ6018, IPQ8074, Kamorta, MDM9150, MDM9205, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA4531, QCA6574AU, QCA8081, QCM2150, QCN7605, QCN7606, QCS404, QCS405, QCS605, QCS610, QM215, Rennell, SA415M, SA515M, SA6155P, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-mdm9150_firmwaremdm9640_firmwareqcs610sdm450_firmwaresdm632qcs404_firmwaremdm9650apq8009_firmwaremsm8917sdm670qcs605_firmwaresda845_firmwaresa415mqca4531bitraapq8098qcn7605mdm9206_firmwarebitra_firmwaremsm8905_firmwareqca6574au_firmwaresda660sdx55_firmwareqca8081_firmwaresxr1130msm8909wapq8053_firmwaresda845sa6155p_firmwaresdm450sdm636_firmwaresa515m_firmwareapq8098_firmwaremsm8998_firmwaresdm630mdm9607_firmwaresm8250_firmwaresa415m_firmwareqcs405qm215sc7180_firmwareapq8017_firmwaresdm710_firmwaresa6155pqca8081msm8937msm8905sm8150_firmwaremsm8909sxr2130_firmwarerennellsc7180msm8953_firmwaresaipan_firmwaresm6150_firmwaremsm8917_firmwaremsm8998sm8150sdx20_firmwaresdm850kamortaapq8017msm8996saipanqcn7606_firmwaremdm9640kamorta_firmwareqca4531_firmwareqcm2150_firmwaresdm429wmsm8996au_firmwaresdm632_firmwaresdm845sdx24sdm439sdm429msm8940_firmwaresm7150_firmwaresm6150msm8909w_firmwaremsm8996ausdm429w_firmwaresm7150sxr2130sc8180xmdm9206sdm670_firmwareqcs404sdx24_firmwareipq8074sdm636ipq6018_firmwaremdm9205sa515mqcs605msm8937_firmwaremdm9650_firmwaresdm429_firmwaresxr1130_firmwareapq8009msm8909_firmwarenicobarsdm850_firmwaremsm8920msm8953sdx20qcm2150msm8920_firmwaresdm660sc8180x_firmwareipq8074_firmwareqca6574ausdm710mdm9607qcn7605_firmwareqcs610_firmwaremdm9150mdm9207c_firmwaremsm8996_firmwareipq6018mdm9207capq8096ausdm439_firmwareqcs405_firmwaresdm630_firmwaremdm9205_firmwaresda660_firmwarerennell_firmwareqm215_firmwaresdx55msm8940apq8053apq8096au_firmwaresm8250nicobar_firmwaresdm660_firmwareqcn7606sdm845_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-129
Improper Validation of Array Index
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-10506
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.82%
||
7 Day CHG~0.00%
Published-30 Sep, 2019 | 15:40
Updated-04 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

While processing QCA_NL80211_VENDOR_SUBCMD_AVOID_FREQUENCY vendor command, driver does not validate the data obtained from the user space which could be invalid and thus leads to an undesired behaviour in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in MDM9206, MDM9607, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCS605, SD 600, SD 625, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDM630, SDM660, SDX24

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd_712qca9377_firmwaresd_850sd_855sd_730_firmwaresd_820asd_675msm8996au_firmwaresd_670_firmwaresdm660sdx24sdm630mdm9607_firmwaresd_710_firmwaresd_636sd_625qca6574ausd_820_firmwaremdm9607msm8996ausd_636_firmwaresd_820sd_845_firmwaresd_820a_firmwareqcs605_firmwaresd_675_firmwaremdm9206qca6174a_firmwareqca6174aqca9379_firmwaresd_665sd_730sd_850_firmwaresd_625_firmwaresdx24_firmwareqca9377sd_712_firmwaresdm630_firmwaresd_845mdm9206_firmwareqcs605sd_670sd_835_firmwaresd_710sd_600_firmwaresd_835qca6574au_firmwaresd_600qca9379sd_665_firmwaresdm660_firmwaresd_855_firmwareSnapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-20
Improper Input Validation
CVE-2019-10569
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 8.43%
||
7 Day CHG~0.00%
Published-05 Mar, 2020 | 08:56
Updated-04 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack buffer overflow due to instance id is misplaced inside definition of hardware accelerated effects in makefile in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Mobile in APQ8053, APQ8098, MDM9607, MDM9640, MSM8998, QCS605, SC8180X, SDM439, SDM630, SDM636, SDM660, SDM845, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-mdm9640_firmwaresdm636_firmwaresdm845_firmwareapq8098_firmwaresdm845msm8998_firmwaresdm660sdx24sdm630sdm439mdm9607_firmwaresc8180x_firmwaresm7150_firmwaresm6150mdm9607sm7150sc8180xqcs605_firmwaresm8150_firmwaresdx24_firmwaresdm439_firmwaresdm636sdm630_firmwareapq8098qcs605sdx55apq8053sm6150_firmwaremsm8998sm8150sxr1130_firmwaresdx55_firmwaresxr1130apq8053_firmwaresdm660_firmwaremdm9640Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Mobile
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-24854
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.65%
||
7 Day CHG~0.00%
Published-04 Jul, 2023 | 04:46
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack-based Buffer Overflow in WLAN HOST

Memory Corruption in WLAN HOST while parsing QMI WLAN Firmware response message.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sw5100pimmersive_home_214qcs410_firmwaresd865_5gsa6150p_firmwareipq9574qcn9000_firmwareqca6595qcs610_firmwaresnapdragon_8\+_gen_1wcd9335wcd9370qca8081_firmwareqcn9001qca8072qca6696wcd9340_firmwarewcd9341_firmwareqcn6024qcn9003_firmwarewcn6740_firmwarefastconnect_6700ipq6018_firmwaresnapdragon_695_5gsa4150psnapdragon_888_5gwsa8832_firmwareqca8337snapdragon_4_gen_2_firmwareqca6574au_firmwareqam8295pwcd9341qca6574auwsa8810_firmwarecsra6640snapdragon_690_5gsnapdragon_778g\+_5g_firmwaresnapdragon_865\+_5gsnapdragon_765_5gqcn5122wcn3660b_firmwareqca6554afastconnect_6800_firmwaresnapdragon_865\+_5g_firmwaresd835_firmwareqcn6024_firmwaresnapdragon_x65_5gvideo_collaboration_vc1_platform_firmwaresa4155psnapdragon_888\+_5g_firmwareqcn9000ssg2115psnapdragon_xr2_5g_firmwareqsm8350_firmwareqcn5054snapdragon_765g_5g_firmwaresnapdragon_660_firmwaresnapdragon_4_gen_2fastconnect_6900video_collaboration_vc1_platformqcn5052wcd9385_firmwareipq9574_firmwareqca6310qam8255p_firmwaresnapdragon_778g_5gipq8074a_firmwareqcs4490snapdragon_662_firmwaresa6155pqca6564au_firmwarewsa8810qca8075qam8650pqca6595ausm7315_firmwaresnapdragon_865_5g_firmwarewcd9326_firmwaresa6155p_firmwaresd835snapdragon_835qcn9012qcs4490_firmwarewcn3910_firmwaresm4125_firmwaresnapdragon_680_4gwcn3910wcd9370_firmwaresnapdragon_480\+_5g_firmwaresnapdragon_765_5g_firmwarewcn3660bqca6574aqca6174asnapdragon_695_5g_firmwaresa8195psnapdragon_750g_5g_firmwarewcd9340qcm2290qcm6490215snapdragon_x55_5g_firmwarewcn3988qcn5122_firmwareqcn9274qcn9024qca6574sxr2230p_firmwareqcn9011snapdragon_439_firmwaresmart_audio_400qcn9024_firmwaresa6150pwcd9326qcs410qcm2290_firmwaresa8155p_firmwaresa8155pqca8072_firmwarewsa8830snapdragon_870_5g_firmwaresa6145psnapdragon_x65_5g_firmwareipq8174immersive_home_318_firmwaresa8255p_firmwaresnapdragon_888\+_5gipq8174_firmwarear8035qrb5165m_firmwareimmersive_home_216_firmwareqcm4325immersive_home_316snapdragon_782gqca6698aqwcn3950_firmwaressg2125p_firmwareqrb5165nfastconnect_6200wcn3680bsm7325p_firmwaresa8145p_firmwaresa8150p_firmwaresnapdragon_835_firmwarefastconnect_6700_firmwaresnapdragon_768g_5gvideo_collaboration_vc3_platform_firmwarewcn3990snapdragon_778g_5g_firmwaresnapdragon_780g_5gqcn9002qcs6490snapdragon_778g\+_5gfastconnect_6200_firmwarewsa8830_firmwaresd660_firmwaresnapdragon_7c\+_gen_3wsa8832immersive_home_216ar8035_firmwareqcn5022_firmwareqrb5165msnapdragon_680_4g_firmwareqca6320sa4150p_firmwareqca4024_firmwaresd888_firmwaresnapdragon_439qca6564ausnapdragon_460snapdragon_x12wsa8815_firmwaresnapdragon_865_5gsa8195p_firmwareqca8337_firmwareqcm4290qcn5054_firmwaresnapdragon_480_5g_firmwaresnapdragon_4_gen_1_firmwaresnapdragon_685_4gsnapdragon_xr2\+_gen_1qca9377_firmwareqcm6490_firmwaresnapdragon_w5\+_gen_1sm7250p_firmwaresm4125qcm4490_firmwarewcn3950flight_rb5_5gsnapdragon_690_5g_firmwareqca6797aq_firmwaresa8295p_firmwaresmart_audio_400_firmwaresnapdragon_460_firmwaresa4155p_firmwareipq5010_firmwaresnapdragon_auto_5g_firmwaresm7250psnapdragon_768g_5g_firmwareipq6018qca6584ausd888qca6320_firmwareqcn9011_firmwaresw5100_firmwarewcn6740qca6310_firmwarefastconnect_6800qca4024snapdragon_662qca6595_firmwarefastconnect_7800_firmwareimmersive_home_214_firmwareqcn9001_firmwarefastconnect_6900_firmwarerobotics_rb5_firmwarewcd9380sa6145p_firmwareqam8255psxr2230psnapdragon_xr2_5gsa8150pqcn9003215_firmwareqca8075_firmwaresnapdragon_888_5g_firmwaresnapdragon_765g_5gqcn5052_firmwaresxr1230psw5100video_collaboration_vc3_platformqam8295p_firmwaresnapdragon_8_gen_1_firmwarewcn3990_firmwaresm7315snapdragon_750g_5gqca6698aq_firmwareqcs2290wcd9385qsm8350qcs2290_firmwaresnapdragon_xr2\+_gen_1_firmwarewcn3615snapdragon_8_gen_1sa8255pqcs4290sxr1230p_firmwareqcn5024snapdragon_782g_firmwaresnapdragon_x55_5gwcn3615_firmwareflight_rb5_5g_firmwaressg2125pqca6554a_firmwareqcm4490snapdragon_4_gen_1snapdragon_870_5gcsra6640_firmwarerobotics_rb5snapdragon_480\+_5gqca6174a_firmwaresnapdragon_685_4g_firmwaresm7325pqam8650p_firmwareqcs6490_firmwaresnapdragon_480_5gwcd9335_firmwarewcn3980_firmwareqrb5165n_firmwareqca6584au_firmwareqcn5152_firmwarewsa8835qca6595au_firmwareqca6391_firmwaresw5100p_firmwaresnapdragon_x12_firmwareqca6696_firmwareqcs4290_firmwarewcd9380_firmwareqca6574_firmwarecsra6620qca8081sd660wsa8815sg4150psd_8_gen1_5gqam8775pqca9377snapdragon_ar2_gen_1_firmwaresnapdragon_auto_5gqca6797aqqcn5152qcm4325_firmwaresnapdragon_660qca6574a_firmwareqcm4290_firmwareipq8074asnapdragon_8\+_gen_1_firmwareqcn5024_firmwarewcd9375_firmwareqcn9002_firmwaresd_8_gen1_5g_firmwaresnapdragon_7c\+_gen_3_firmwareqca6391immersive_home_318ipq5010qcn9274_firmwaresnapdragon_w5\+_gen_1_firmwareqcn9012_firmwaresg4150p_firmwaresnapdragon_780g_5g_firmwarecsra6620_firmwaresa8295pfastconnect_7800qam8775p_firmwaresd865_5g_firmwarewcd9375snapdragon_ar2_gen_1wcn3988_firmwareimmersive_home_316_firmwaresa8145pwsa8835_firmwaressg2115p_firmwareqcn5022wcn3980wcn3680b_firmwareqcs610Snapdragon
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-40516
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-4.31% / 88.44%
||
7 Day CHG~0.00%
Published-06 Jan, 2023 | 05:02
Updated-09 Apr, 2025 | 14:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack-based buffer overflow in Core

Memory corruption in Core due to stack-based buffer overflow.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresd_8cx_gen3_firmwaresa6150p_firmwaresm6250p_firmwareqcs610qca8337qca6431_firmwarewcd9360_firmwaresdx65qca4024_firmwarewcn3950_firmwaresa8150p_firmwareqcs2290qca6595au_firmwaresa6155qca6335csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwaresa415mwcn3998wcd9371_firmwareqam8295pwcn3950qcn6024_firmwaresd720gsm4125sd_8cx_gen2_firmwareqca8386_firmwaresd_8_gen1_5g_firmwareqca8084_firmwareqsm8350_firmwaresd710_firmwareqsm8350sd460_firmwaresm7315_firmwarewcn7850qca6574au_firmwarewcd9375_firmwareqca8081_firmwarewcn3998_firmwaresa6155_firmwareqca6420wcd9360sd680_firmwarewcn3999sd_8cx_gen2qrb5165_firmwareqrb5165m_firmwaresa4155p_firmwaresa8155_firmwareqca4004_firmwareipq6010sd662_firmwareqcs405qca6430wcd9306_firmwarewcd9340sd765gsw5100fsm10056_firmwaresd680qca6436wcn6851sa6155pqcs603_firmwarewcn7851_firmwarewcd9341qca6431qca6696_firmwarewcd9371sd870_firmwaresd750gipq9008_firmwarewcn3910_firmwaresxr2150p_firmwaresd_8cxsa8150pqca4004wsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwaresd712wcn3988sd660_firmwarewcn7850_firmwaresa8195p_firmwareqcn5121sm8475qcn5022_firmwareqcn7606_firmwarewcn6750_firmwaresa8295p_firmwarewcn3991qca8337_firmwarewcd9380_firmwaresw5100pqca8084qca6564ausdx55m_firmwarewcn6856_firmwareipq9008sd670_firmwareqca6574csr8811_firmwarewcd9380qcs410sd690_5g_firmwaresdx50m_firmwaresdx24_firmwareqca8072_firmwareqcn9012_firmwareqca6430_firmwareqcn9274_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980qca6335_firmwareipq6018_firmwareqcs605wcd9340_firmwarewsa8815wcn6850sd7cwcn3910qca6320qca6426_firmwareqca9984ipq6028sd835qcn9024ipq9574_firmwarewcn3980_firmwaresd730sdx55mqcc5100_firmwaresa8295pqca6421_firmwarewcn6740_firmwaresd678_firmwarear8031_firmwareqrb5165wcn6851_firmwareqcs603sd670qcn9024_firmwareqca6564a_firmwareqcm4290_firmwaresd870wcn6855qcn5121_firmwaresw5100p_firmwaresa8540pqcs610_firmwareqsm8250sa6145pipq6018sdxr1ar8031qca6595_firmwareqcs405_firmwaresa8145pmdm9205_firmwareqca6391_firmwaresa4150p_firmwareqca4024wcd9370_firmwaresd780g_firmwaresdx55sd888_firmwareqcn5021_firmwaresa8155pcsra6640sd675qcs8155_firmwaresa4155psxr2150par8035_firmwareqsm8250_firmwareqcn7606qcm2290wcn3991_firmwaremdm9150_firmwarewsa8830sd678qcn9070sa8145p_firmwareqcs2290_firmwarefsm10056sd7c_firmwarecsrb31024csra6620qca8082qcn9072qca8386qcs4290sd765g_firmwareqca6420_firmwareqca6390_firmwaresd690_5gipq6000sd730_firmwarewcd9370sd675_firmwareqcn5152_firmwareqca6564qca6426wcn3990_firmwareqrb5165n_firmwareqcn9000_firmwareqca9984_firmwareqca9377sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwaresd662qam8295p_firmwareqcn9011_firmwaresa8155qca8082_firmwareqca6320_firmwaresa9000p_firmwareqcn5122_firmwaresdx55_firmwareqca6595auqcn6023_firmwarewcn3999_firmwaresm7250p_firmwareqca6436_firmwareqrb5165nwcd9306sd778gqca6564au_firmwaresa6155p_firmwareqca6310qcn9274qcs8155wcn7851sa515m_firmwareqcs6490sdxr2_5gqcn5052sa415m_firmwarewcn3988_firmwareqcn9074sa6145p_firmwareqca6421qca8085sd778g_firmwaresm6250sa8195psd712_firmwarewsa8810_firmwaresd765_firmwarewcd9326wcd9335qca8081qcn6023qca6174a_firmwareqcs4290_firmwarewcd9385qca8085_firmwareqcs6490_firmwaresd_8cx_gen3qca6390wcd9375sd750g_firmwareaqt1000ar8035csr8811sm6250_firmwarewsa8815_firmwaresd888_5g_firmwareqcm6490wcn6850_firmwarewsa8835_firmwareqcx315qca6564asa4150pqca8072qcm2290_firmwarewcn3990qcn9000sd_675sd780gsd865_5gqca6595qcc5100sdx24qcn9012sd888wsa8835qcx315_firmwaresa8540p_firmwaresd888_5gsm6250pqca8075_firmwaresc8180xqca6574aipq6005_firmwarewcn6855_firmwareqca6174asm7325pqca6310_firmwarewcn6750mdm9205sa9000pqca6574_firmwaresa515msd855sm4125_firmwaresm7325p_firmwaresd765qca6574a_firmwareqcn5021qcn5152sd768g_firmwareqrb5165msd850_firmwaresm7315sd460qca6391sdxr1_firmwareipq6005aqt1000_firmwaresdx65_firmwareqcm4290csrb31024_firmwareqcm6490_firmwaresdx50mqcn9070_firmwareipq6028_firmwareqcn9011sc8180x_firmwareqca6574ausd710sa8155p_firmwareqcn5122ipq9574wcd9341_firmwarewsa8810mdm9150wcn6856qcn5022sd835_firmwareqca6564_firmwaresd768gipq6010_firmwarewcn6740qca6696sd845_firmwaresa6150pqca8075qcn9022_firmwareqcn6024qcn9022sd845qcn9072_firmwaresm7250pipq6000_firmwaresd720g_firmwaresw5100_firmwareqcn9074_firmwareqcs410_firmwaresd850Snapdragon
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-45542
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 5.87%
||
7 Day CHG~0.00%
Published-06 Jan, 2025 | 10:33
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack-based Buffer Overflow in WLAN Windows Host

Memory corruption when IOCTL call is invoked from user-space to write board data to WLAN driver.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wsa8845_firmwareqcc2076_firmwarewsa8840wcd9370sc8180xp-aaab_firmwarewcd9340_firmwarewcd9385sc8380xpwcd9341_firmwareqca1064qcn7606snapdragon_7c_compute_platform_firmwareqcn7605_firmwaresnapdragon_7c\+_gen_3_compute_firmwareqcc2073_firmwarefastconnect_6700qca1064_firmwareqca6420sc8180xp-adsc8280xp-abbbsnapdragon_7c_gen_2_compute_platform_firmwareqca6430wsa8815_firmwarewcd9370_firmwaresc8180xp-ad_firmwareqcn7605qcc2076qcm6490_firmwaresc8180xp-aaabqcn7606_firmwareqca6595auwcd9340wcd9341qcm6490wsa8810_firmwarewsa8845h_firmwareqca2062qca6420_firmwareaqt1000_firmwareqcs6490_firmwaresc8180xp-acafqca2064_firmwaresnapdragon_7c\+_gen_3_computewsa8835qca6595au_firmwareqca6391_firmwarewsa8840_firmwareqca2066_firmwareqca6430_firmwarefastconnect_6800_firmwareqcs5430wsa8845hwcd9380_firmwareqcm5430sm6250_firmwaresc8180x-ad_firmwareqcm5430_firmwaresc8180x-acafwsa8815wsa8830sc8180x\+sdx55_firmwareqca2062_firmwareqcc2073sc8380xp_firmwareqca2065fastconnect_6800qca1062fastconnect_7800_firmwarefastconnect_6900wcd9375_firmwareqca6391qcs5430_firmwaresc8180x\+sdx55snapdragon_7c_gen_2_compute_platformwcd9385_firmwaresm6250fastconnect_6900_firmwarewcd9380qca1062_firmwarefastconnect_6200sc8280xp-abbb_firmwarefastconnect_7800sc8180x-acaf_firmwarewcd9375snapdragon_7c_compute_platformwsa8845fastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwareqca2064sc8180x-adsc8180x-aaabwsa8810sc8180x-aaab_firmwarewsa8835_firmwareqca2066qcs6490sc8180xp-acaf_firmwarefastconnect_6200_firmwareqca2065_firmwarewsa8830_firmwarevideo_collaboration_vc3_platformaqt1000Snapdragon
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-45579
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 5.34%
||
7 Day CHG~0.00%
Published-06 May, 2025 | 08:32
Updated-09 May, 2025 | 19:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in Camera Driver

Memory corruption may occur when invoking IOCTL calls from userspace to the camera kernel driver to dump request information, due to a missing memory requirement check.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380_firmwaresnapdragon_429_mobile_firmwarefastconnect_7800_firmwarewcn3620_firmwarewsa8835wcn3620sdm429w_firmwarewsa8830wsa8830_firmwarewsa8835_firmwarewcd9380snapdragon_8_gen_1_mobile_firmwaresnapdragon_429_mobilefastconnect_6900sdm429wfastconnect_6900_firmwaresnapdragon_8_gen_1_mobilewcn3660b_firmwarefastconnect_7800wcn3660bSnapdragon
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-45555
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.03% / 5.87%
||
7 Day CHG~0.00%
Published-06 Jan, 2025 | 10:33
Updated-28 Feb, 2025 | 06:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow to Buffer Overflow in Automotive OS Platform

Memory corruption can occur if an already verified IFS2 image is overwritten, bypassing boot verification. This allows unauthorized programs to be injected into security-sensitive images, enabling the booting of a tampered IFS2 system image.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa8770p_firmwaresa7775pqca6564aqam8620pqam8255p_firmwaresa8540psa8155pqam8255psrv1hsa7255pqca6688aq_firmwaresrv1h_firmwaresnapdragon_820_automotive_firmwareqca6595au_firmwaresa8145p_firmwareqam8650p_firmwaresa8155_firmwaresrv1lmsm8996au_firmwaresa8255p_firmwaresa8650p_firmwaresa8540p_firmwaresa6155_firmwareqca6595ausa7255p_firmwaresa6145psa8295p_firmwareqca6696sa8295pqca6584au_firmwaresa6150pqca6574au_firmwaresrv1m_firmwaresa8155qca6584ausa6150p_firmwareqca6595sa8155p_firmwareqca6595_firmwareqca6564ausrv1l_firmwaremsm8996auqamsrv1hsa8255psa6155qca6574aqamsrv1m_firmwareqam8775p_firmwareqam8295p_firmwaresa8620p_firmwaresa8650pqam8650psa8770psa8195p_firmwareqca6574a_firmwaresa8620psa8145pqca6564a_firmwaresa8150p_firmwareqca6696_firmwaresa8775psa6155psa9000p_firmwaresa8150pqca6698aqqamsrv1h_firmwaresa6155p_firmwaresrv1mqam8775psa7775p_firmwareqam8295psnapdragon_820_automotiveqam8620p_firmwaresa9000pqca6564au_firmwaresa8775p_firmwareqca6698aq_firmwareqca6574ausa6145p_firmwaresa8195pqamsrv1mqca6688aqSnapdragon
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2024-43053
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.62%
||
7 Day CHG~0.00%
Published-02 Dec, 2024 | 10:18
Updated-12 Dec, 2024 | 15:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Restriction of Operations within the Bounds of a Memory Buffer in WLAN Windows Host

Memory corruption while invoking IOCTL calls from user space to read WLAN target diagnostic information.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800qca2062_firmwareqca2066wcd9380_firmwaresdm429wwsa8840_firmwarefastconnect_6900fastconnect_6900_firmwaresc8380xp_firmwarewsa8840sdm429w_firmwarefastconnect_6700_firmwaresnapdragon_7c\+_gen_3_computewcd9380fastconnect_7800_firmwarewsa8845hfastconnect_6700qca2064_firmwareqca2062wcd9385qca2066_firmwareqca2065_firmwareqcc2076_firmwarewcd9385_firmwarewsa8845snapdragon_429_mobile_platformqcc2073_firmwareqca2064wcn3660bqca2065qcc2076wsa8845_firmwarewcn3620_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewcn3660b_firmwaresc8380xpsnapdragon_429_mobile_platform_firmwarewcn3620wsa8845h_firmwareqcc2073Snapdragonqca2062_firmwarewcd9380_firmwareqca2066_firmwareqca2065_firmwareqcc2076_firmwarewsa8840_firmwarewcd9385_firmwarefastconnect_6900_firmwareqcc2073_firmwaresc8380xp_firmwarewsa8845_firmwarewcn3620_firmwaresdm429w_firmwarefastconnect_6700_firmwarewcn3660b_firmwaresnapdragon_429_mobile_platform_firmwarefastconnect_7800_firmwarewsa8845h_firmwareqca2064_firmware
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-43052
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 12.10%
||
7 Day CHG~0.00%
Published-02 Dec, 2024 | 10:18
Updated-12 Dec, 2024 | 15:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in Video Analytics and Processing

Memory corruption while processing API calls to NPU with invalid input.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_wear_2100_platformwsa8830sg8275p_firmwareqca6431_firmwaresnapdragon_870_5g_mobile_platform_firmwaresnapdragon_865_5g_mobile_platformwsa8840snapdragon_wear_2100_platform_firmwaresnapdragon_212_mobile_platformwcn6755_firmwaresnapdragon_427_mobile_platformwcd9370home_hub_100_platformqca6426snapdragon_8_gen_2_mobile_platformmsm8108msm8108_firmwarewcd9385_firmwarewcn7881_firmwarewcd9326_firmwarewcn3615_firmwareqsw8573_firmwarewcn3660bapq8037snapdragon_435_mobile_platform_firmwaresnapdragon_429_mobile_platform_firmwaresnapdragon_x55_5g_modem-rf_systemwcn3680b_firmwaresdx55_firmwaresnapdragon_208_processor_firmwaresnapdragon_212_mobile_platform_firmwarewcd9375_firmwaresnapdragon_8_gen_3_mobile_platformwcn3615wsa8845h_firmwaremsm8909wsnapdragon_425_mobile_platformwcn3610_firmwaresnapdragon_429_mobile_platformqca6436_firmwaresnapdragon_xr2\+_gen_1_platformwcn7860snapdragon_427_mobile_platform_firmwareqcm8550_firmwareqcn9274pm8937snapdragon_870_5g_mobile_platformsnapdragon_208_processorwcn7881snapdragon_439_mobile_platformwsa8840_firmwarevideo_collaboration_vc5_platformqcs8550_firmwaresc8380xp_firmwaresnapdragon_wear_3100_platformsm8635wcn7880_firmwareqca6421apq8017_firmwarewsa8810_firmwarehome_hub_100_platform_firmwarewsa8845hqca6436wcd9326wcd9335sm8750_firmwareqcs7230sm8750p_firmwarewcd9395_firmwarewcn6755msm8209_firmwareqca6174a_firmwarewcd9385sxr2130_firmwaresnapdragon_wear_2500_platformpm8937_firmwareqca6431wcd9375snapdragon_210_processor_firmwaresnapdragon_430_mobile_platformwcd9390wsa8830_firmwaresd865_5g_firmwarewcn3620_firmwarewsa8815_firmwarewsa8835_firmwarewcn3620video_collaboration_vc5_platform_firmwaresnapdragon_865_5g_mobile_platform_firmwareapq8017fastconnect_6800_firmwaresnapdragon_8_gen_2_mobile_platform_firmwarewcn3610wcn7880msm8608wcd9380_firmwareqcm2150_firmwaresdm429wsd865_5gfastconnect_6800qcm8550qcs7230_firmwareqet4101_firmwaremsm8909w_firmwarewsa8835sdm429w_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwarewcd9380snapdragon_wear_4100\+_platform_firmwaresnapdragon_210_processorsxr2130snapdragon_425_mobile_platform_firmwaresm8635_firmwaresnapdragon_wear_4100\+_platformsnapdragon_430_mobile_platform_firmwareqca9379_firmwareqca6174asg8275pwcd9335_firmwarewcn3980qcn9274_firmwarewsa8845qsw8573wsa8815snapdragon_865\+_5g_mobile_platformwsa8845_firmware205_mobile_platform_firmwaresnapdragon_xr2_5g_platform_firmwaresnapdragon_439_mobile_platform_firmwareqca6426_firmwareqcs8250snapdragon_435_mobile_platformsc8380xpsm8750pwcn3660b_firmwarewcn3680msm8209wcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresnapdragon_xr2\+_gen_1_platform_firmwareqca6391qca6421_firmwarefastconnect_7800snapdragon_865\+_5g_mobile_platform_firmwaresmart_audio_200_platform215_mobile_platformsnapdragon_xr2_5g_platformwcn7861_firmwarewcn3680_firmwarewsa8832_firmwarefastconnect_6900fastconnect_6900_firmwareqcm2150smart_audio_200_platform_firmwareqcs8250_firmwarefastconnect_7800_firmwaresnapdragon_8\+_gen_2_mobile_platformwsa8810wsa8832sm8550pqsm8250wcn3680bsm8750snapdragon_wear_2500_platform_firmwarewcn7860_firmwarewcd9395wcn7861205_mobile_platform215_mobile_platform_firmwareqca6391_firmwareqcs8550msm8608_firmwaresm8550p_firmwarewcd9370_firmwaresdx55snapdragon_8_gen_3_mobile_platform_firmwarewcd9390_firmwareapq8037_firmwareqet4101snapdragon_wear_3100_platform_firmwareqca9379qsm8250_firmwareSnapdragonwcd9380_firmwareqcm2150_firmwaresg8275p_firmwareqca6431_firmwareqcs7230_firmwareqet4101_firmwaremsm8909w_firmwaresnapdragon_wear_2100_platform_firmwaresdm429w_firmwarewcn6755_firmwaresnapdragon_425_mobile_platform_firmwaresm8635_firmwaresnapdragon_430_mobile_platform_firmwareqca9379_firmwarewcd9335_firmwareqcn9274_firmwaremsm8108_firmwarewcd9385_firmwarewcn7881_firmwarewcd9326_firmwarewcn3615_firmwareqsw8573_firmwarewsa8845_firmwaresnapdragon_xr2_5g_platform_firmwaresnapdragon_439_mobile_platform_firmwaresnapdragon_435_mobile_platform_firmwareqca6426_firmwarewcn3660b_firmwaresnapdragon_429_mobile_platform_firmwarewcn3680b_firmwaresdx55_firmwaresnapdragon_208_processor_firmwaresnapdragon_212_mobile_platform_firmwarewcd9375_firmwarewsa8845h_firmwarewcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcn3610_firmwareqca6436_firmwareqca6421_firmwaresnapdragon_427_mobile_platform_firmwareqcm8550_firmwarewcn7861_firmwarewcn3680_firmwarewsa8840_firmwarewsa8832_firmwarefastconnect_6900_firmwareqcs8550_firmwaresc8380xp_firmwarewcn7880_firmwaresmart_audio_200_platform_firmwareapq8017_firmwarewsa8810_firmwareqcs8250_firmwarefastconnect_7800_firmwarehome_hub_100_platform_firmwarewcd9395_firmwaresm8750_firmwaresm8750p_firmwaremsm8209_firmwarequalcomm_215_mobile_platform_firmwareqca6174a_firmwarequalcomm_205_mobile_platform_firmwaresxr2130_firmwarepm8937_firmwaresnapdragon_wear_2500_platform_firmwarewcn7860_firmwareqca6391_firmwaremsm8608_firmwaresm8550p_firmwaresnapdragon_210_processor_firmwarewcd9370_firmwarequalcomm_video_collaboration_vc5_platform_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewcd9390_firmwarewsa8830_firmwaresd865_5g_firmwarewcn3620_firmwareapq8037_firmwarewsa8815_firmwarewsa8835_firmwaresnapdragon_865_5g_mobile_platform_firmwaresnapdragon_wear_3100_platform_firmwarefastconnect_6800_firmwaresnapdragon_8_gen_2_mobile_platform_firmwareqsm8250_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2024-43050
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.62%
||
7 Day CHG~0.00%
Published-02 Dec, 2024 | 10:18
Updated-12 Dec, 2024 | 15:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack-based Buffer Overflow in WLAN Windows Host

Memory corruption while invoking IOCTL calls from user space to issue factory test command inside WLAN driver.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwareqca2066wsa8830wcd9380_firmwareqca1062_firmwaresdm429wsnapdragon_8cx_gen_2_5g_compute_platformfastconnect_6800snapdragon_8c_compute_platformwsa8840wsa8835sdm429w_firmwaresnapdragon_7c\+_gen_3_computewcd9380qca6420_firmwareqca6595au_firmwarefastconnect_6700video_collaboration_vc3_platformqca2064_firmwareqca2062qca6174_firmwarewcd9370sc8180xqcm5430_firmwareqca6174avideo_collaboration_vc3_platform_firmwareqca6174qca9377qca6430_firmwareqcc2076_firmwareqcn7605wcd9385_firmwarewsa8845qcc2073_firmwarefastconnect_6200wcd9340_firmwarewcn3660bwsa8815qca2065wsa8845_firmwareqca1064wcn3660b_firmwaresnapdragon_429_mobile_platform_firmwaresc8380xpfastconnect_6200_firmwaresdx55_firmwareqca6595auwcd9375_firmwarewsa8845h_firmwareqca6391snapdragon_429_mobile_platformqca6420snapdragon_8cx_gen_3_compute_platform_firmwarefastconnect_7800aqt1000_firmwareqca2062_firmwaresnapdragon_8cx_compute_platform_firmwareqcs6490qcm6490_firmwarewsa8840_firmwarefastconnect_6900fastconnect_6900_firmwaresc8380xp_firmwaresc8180x_firmwareqca6164_firmwareqca6430fastconnect_6700_firmwaresnapdragon_8cx_compute_platformwcd9340wsa8810_firmwarewcd9341_firmwarefastconnect_7800_firmwarewsa8810wsa8845hqcn7605_firmwaresnapdragon_8cx_gen_3_compute_platformqcm5430snapdragon_8c_compute_platform_firmwareqcs5430qca6174a_firmwarewcd9385wcd9341qca2066_firmwareqca2065_firmwareqcs6490_firmwareqca1064_firmwareqca6164qca1062qcs5430_firmwareqca6391_firmwarewcd9375qca2064aqt1000wcd9370_firmwaresdx55wsa8830_firmwareqcc2076wcn3620_firmwaresnapdragon_7c\+_gen_3_compute_firmwareqcm6490wsa8815_firmwarewsa8835_firmwarewcn3620snapdragon_8cx_gen_2_5g_compute_platform_firmwarefastconnect_6800_firmwareqcn7606_firmwareqcc2073qcn7606Snapdragonaqt1000_firmwareqca2062_firmwareqca9377_firmwarewcd9380_firmwareqca1062_firmwareqcm6490_firmwarewsa8840_firmwarefastconnect_6900_firmwaresc8380xp_firmwareqca6164_firmwaresdm429w_firmwarefastconnect_6700_firmwarewsa8810_firmwarewcd9341_firmwarefastconnect_7800_firmwareqca6420_firmwareqca6595au_firmwareqcn7605_firmwareqca2064_firmwareqca6174_firmwareqcm5430_firmwareqca6174a_firmwareqca2066_firmwareqca2065_firmwareqca6430_firmwareqca1064_firmwareqcc2076_firmwareqcs5430_firmwareqcs6490_firmwarequalcomm_video_collaboration_vc3_platform_firmwareqca6391_firmwarewcd9385_firmwareqcc2073_firmwarewcd9370_firmwarewcd9340_firmwarewsa8830_firmwarewsa8845_firmwarewcn3620_firmwarewsa8815_firmwarewcn3660b_firmwarewsa8835_firmwaresnapdragon_429_mobile_platform_firmwarefastconnect_6200_firmwarewcd9375_firmwarewsa8845h_firmwarefastconnect_6800_firmwareqcn7606_firmware
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-33074
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.03% / 6.79%
||
7 Day CHG~0.00%
Published-07 Nov, 2023 | 05:26
Updated-05 Feb, 2025 | 18:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Audio

Memory corruption in Audio when SSR event is triggered after music playback is stopped.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qam8255p_firmwarewsa8830wcd9380_firmwaresa6150p_firmwaressg2125psa8145p_firmwaresxr2230p_firmwaresw5100pqam8650psd865_5gsg8275p_firmwaresnapdragon_w5\+_gen_1_wearable_platformwcn785x-5qca6595qam8775pwsa8840wsa8835qca6574sxr1230p_firmwarewcn3950_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwarewcd9380sa8150p_firmwareqca6595au_firmwaressg2125p_firmwareqca6574assg2115pwcn685x-5_firmwaresxr1230pwcn685x-1sg8275psnapdragon_8_gen_2_mobile_platformwcn6750wcn3980wcd9385_firmwareqam8295pwcn3950wsa8845qcm4325_firmwareqca6574_firmwarewsa8815sxr2230pwsa8845_firmwareqam8295p_firmwaresnapdragon_xr2_5g_platform_firmwareqca6574a_firmwareqca6574au_firmwareqca6595ausm6225-adwsa8845h_firmwarewcn785x-5_firmwarewcn3980_firmwaresa8295psnapdragon_w5\+_gen_1_wearable_platform_firmwaresm8475_firmwaresa6155p_firmwaresm6225snapdragon_xr2_5g_platformsm6225-ad_firmwarewsa8840_firmwareqca6698aqsa4155p_firmwarewsa8832_firmwarewcn685x-5sm6225_firmwarewcn3988_firmwareqca6797aq_firmwarewcn785x-1_firmwareqca6574ausa6145p_firmwaresa8155p_firmwaresa8195pwsa8810_firmwaresnapdragon_8\+_gen_2_mobile_platformsw5100wsa8810wsa8845hwsa8832wcd9395_firmwaresa8255p_firmwaresa6155psw5100p_firmwaresm8550pqca6698aq_firmwaresa6145pwcn685x-1_firmwarewcd9385qam8650p_firmwareqam8775p_firmwaresa8255pqca6696_firmwareqca6595_firmwaresa8145pwcd9395qca6696qca6797aqsa4150p_firmwarewcn6750_firmwaresa8150psm8550p_firmwaresa6150pwcd9390wcd9390_firmwaresa8155pwsa8830_firmwaresd865_5g_firmwarewcn3988wsa8815_firmwarewsa8835_firmwaresa8195p_firmwaressg2115p_firmwaresw5100_firmwaresm8475sa8295p_firmwareqam8255psa4155psa4150psnapdragon_8_gen_2_mobile_platform_firmwarewcn785x-1qcm4325Snapdragon
CWE ID-CWE-416
Use After Free
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-22080
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.05% / 16.02%
||
7 Day CHG~0.00%
Published-02 Sep, 2022 | 11:31
Updated-03 Aug, 2024 | 03:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper validation of backend id in PCM routing process can lead to memory corruption in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarewcn3991_firmwaremdm9150_firmwarewcd937sd678mdm9640_firmwaresm6250p_firmwarewsa8830qcs610qcs2290_firmwareqca8337mdm9628_firmwarewcn361mdm9650csra6620qcs4290wcn3950_firmwaresd765g_firmwarewcd934qca6420_firmwareqca6595au_firmwareqcs2290qca6390_firmwaresa6155sd690_5gsd730_firmwarecsra6620_firmwaresd_675_firmwaresd675_firmwarecsra6640_firmwareqca6564qca6426wcn3990_firmwareqrb5165n_firmwareqca9377sa415mwcn3998sdxr2_5g_firmwarewcn3950sm4125mdm9628sd720gsd662sd460_firmwaresa8155sm7315_firmwarewcn7850qca6574au_firmwaresdx55_firmwarewcn3680b_firmwareqca6595ausa6155_firmwaresdx12_firmwarewcn3998_firmwaresm7250p_firmwarewcn3999_firmwareqca6420qca6436_firmwareapq8053_firmwareqrb5165nqca6564au_firmwaresd680_firmwaresa6155p_firmwaresd778gwcn3999sa515m_firmwareqcs6490qrb5165_firmwareqrb5165m_firmwaresdxr2_5gwcn7851wcd936wcn361_firmwaresa8155_firmwaresd662_firmwaresa415m_firmwareqcs405qca6430wcn3988_firmwaresa6145p_firmwaresm6250sd778g_firmwaresa8195pwsa8810_firmwaresd765gsd765_firmwareqca6436sd680wcd937_firmwaresa6155pwcn6851wcn7851_firmwareqca6174a_firmwareqcs4290_firmwareqca6696_firmwareqcs6490_firmwaresd750gsd870_firmwarewcd938_firmwarear8035qca6390sd750g_firmwareaqt1000wcn3910_firmwaresm6250_firmwaremsm8953_firmwarewsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwareqcm6490sd888_5g_firmwarewcn3988sd660_firmwarewcn6850_firmwarewcn7850_firmwaresa8195p_firmwarewsa8815_firmwarewsa8835_firmwareqca6564awcn6750_firmwarewcd936_firmwarewcd938mdm9640qcm2290_firmwarewcn3991qca8337_firmwarewcn3990sd_675sd780gsd865_5gqca6564ausdx55m_firmwarewcn6856_firmwaresd888wsa8835qca6574sd888_5gsm6250pqcs410qca6574asd690_5g_firmwaresdx50m_firmwarewcn6855_firmwareqca6174asm7325qca6430_firmwarewcn3980wcn6750sd439_firmwarewcd934_firmwaresa515mqca6574_firmwaresd855sm4125_firmwarewcn6850wcd932_firmwarewcn3910wsa8815mdm9650_firmwaresd765wcd932qca6426_firmwareqca6574a_firmwaresd695sd768g_firmwareqrb5165mwcd933wcn3980_firmwaresm7315sd460qca6391sd730sdx55maqt1000_firmwarewcn6740_firmwaremsm8953sd678_firmwarear8031_firmwareqcm4290qcm6490_firmwaresdx50mqrb5165sd480_firmwarewcn6851_firmwareqca6574ausa8155p_firmwareqca6564a_firmwareqcm4290_firmwaresd480sd870wcn6855wsa8810qcs610_firmwaremdm9150wcn6856sa6145pwcn3680bqca6564_firmwaresd695_firmwaresd768gapq8096auar8031qcs405_firmwarewcn6740qca6696qca6391_firmwaresd780g_firmwaresdx55sd888_firmwareapq8053apq8096au_firmwarecsra6640sa8155psd675sd439sm7250psd720g_firmwaresdx12qcs410_firmwarear8035_firmwareqcm2290wcd933_firmwaresm7325_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-22084
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.12% / 31.49%
||
7 Day CHG~0.00%
Published-14 Jun, 2022 | 09:40
Updated-03 Aug, 2024 | 03:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory corruption when extracting qcp audio file due to lack of check on data length in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresm6250p_firmwareqcs610sdx65wcn3950_firmwareqcs2290qca6595au_firmwaresa6155qca6335msm8917csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwaresd632wcn3998wcd9371_firmwarewcn3950sm4125mdm9628sd720gmdm9206_firmwaresd_8_gen1_5g_firmwarewcn3660bsd450_firmwaresd710_firmwaresd460_firmwareqca4020sm7315_firmwarewcn7850qca6574au_firmwarewcd9375_firmwarewcn3998_firmwaresa6155_firmwaremsm8909wapq8009w_firmwareqca6420apq8053_firmwaresm7450_firmwaresd680_firmwareqca9367_firmwarewcn3999sa8155_firmwaresd662_firmwareqcs405qca6430wcd9340qualcomm215_firmwaresd765gsw5100qca4020_firmwareqca6436sd680sa6155pwcn6851qcs603_firmwarewcn7851_firmwaremsm8937mdm9250_firmwarewcn3660_firmwarewcd9341pm8937_firmwareqca6696_firmwarewcd9371sd750gsd870_firmwarewcn3910_firmwarewsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwarewcn3988sd660_firmwarewcn7850_firmwaresa8195p_firmwaresm8475wcn6750_firmwaresd450wcn3610wcn3991wcd9380_firmwaresdm429wmsm8996au_firmwaresw5100pwcd9330qca6564ausdx55m_firmwarewcn6856_firmwaresd670_firmwareqca6574sd632_firmwarewcd9380qualcomm215qcs410sd690_5g_firmwaresdx50m_firmwareqca9379_firmwareqca6430_firmwarewcd9335_firmwarewcn3980sd439_firmwareqca6335_firmwareqcs605wcd9340_firmwarewsa8815wcn6850wcn3910qca6320msm8937_firmwaremdm9650_firmwareqca6426_firmwarewcn3660b_firmwarewcn3680sd835wcn3980_firmwaresd730wcd9330_firmwaresdx55msm8475_firmwarewcn6740_firmwaremsm8953sd678_firmwarear8031_firmwarewcn3680_firmwarewcn6851_firmwareqcs603sd_636_firmwaresd670qca6564a_firmwareapq8009wqcm4290_firmwaresd480sd870wcn6855wsa8832sw5100p_firmwareqcs610_firmwaresa6145psdxr1apq8096auar8031qcs405_firmwaresdm630_firmwaresd820_firmwareqca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55sd888_firmwareapq8053sa8155pcsra6640sd675sd439wcn3660sm8475p_firmwareqca9379qcm2290wcn3991_firmwarewsa8830sd678qcs2290_firmwaremdm9628_firmwaremdm9650sd_636csra6620qcs4290mdm9250sd765g_firmwareqca6420_firmwareqca6390_firmwareapq8009_firmwaresd690_5gsd730_firmwarewcd9370sd675_firmwareqca6564qca6426wcn3990_firmwareqca9377sdw2500_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwarewcn3615_firmwaresd662sa8155qca6320_firmwarewcn3680b_firmwaresdx55_firmwareqca6595auwcn3615wcn3999_firmwaresm7250p_firmwarewcn3610_firmwareqca6436_firmwareqca6564au_firmwaresd778gsa6155p_firmwareqca6310pm8937wcn7851qcs6490sd429sdxr2_5gqca9367sdm630mdm9607_firmwarewcn3988_firmwaresa6145p_firmwaresd429_firmwaresm6250sd778g_firmwaresa8195papq8017_firmwarewsa8810_firmwaresd765_firmwarewcd9326wcd9335qca6174a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwareqca6390wcd9375sd750g_firmwareaqt1000sm6250_firmwaremsm8953_firmwaremsm8917_firmwarewcn3620_firmwaresd820qcm6490sd888_5g_firmwarewsa8835_firmwaresdx20_firmwarewcn3620wcn6850_firmwarewsa8815_firmwaresm7450apq8017qca6564aqcm2290_firmwarewcn3990sd_675sd780gsd865_5gsd888msm8909w_firmwarewsa8835msm8996ausdm429w_firmwaresd888_5gsm6250pqca6574amdm9206wcn6855_firmwareqca6174asm7325pqca6310_firmwarewcn6750qca6574_firmwaresd855sm4125_firmwaresm7325p_firmwaresd765qca6574a_firmwaresd768g_firmwaresm7315apq8009qca6391sd460sdxr1_firmwareaqt1000_firmwaresdx65_firmwaremdm9626qcm4290qcm6490_firmwaresdx50mwsa8832_firmwaresdx20sd480_firmwaremdm9626_firmwareqca6574ausa8155p_firmwaresd710mdm9607wcd9341_firmwarewsa8810wcn6856wcn3680bsd835_firmwareqca6564_firmwaresd768gwcn6740qca6696sd845_firmwaresdw2500apq8096au_firmwaresd845sm7250psd720g_firmwaresw5100_firmwareqcs410_firmwaresm8475pSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-22085
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.12% / 32.22%
||
7 Day CHG~0.00%
Published-14 Jun, 2022 | 09:40
Updated-03 Aug, 2024 | 03:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory corruption in video due to buffer overflow while reading the dts file in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresm6250p_firmwareqcs610sdx65wcn3950_firmwareqcs2290qca6595au_firmwaresa6155qca6335msm8917csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareqcs6125_firmwaresd632wcn3998wcd9371_firmwarewcn3950sm4125sd720gmdm9628mdm9206_firmwaresd_8_gen1_5g_firmwarewcn3660bsd450_firmwaresd710_firmwaresd460_firmwareqca4020sm7315_firmwarewcn7850qca6574au_firmwarewcd9375_firmwarewcn3998_firmwaresa6155_firmwaremsm8909wapq8009w_firmwareqca6420apq8053_firmwaresm7450_firmwaresd680_firmwareqca9367_firmwarewcn3999qcs6125sa8155_firmwaresd662_firmwareqcs405qca6430wcd9340sd765gqualcomm215_firmwaresw5100sd680qca4020_firmwareqca6436wcn6851sa6155pqcs603_firmwarewcn7851_firmwaremsm8937mdm9250_firmwarewcn3660_firmwarewcd9341pm8937_firmwareqca6696_firmwarewcd9371sd870_firmwaresd750gwcn3910_firmwarewsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwarewcn3988sd660_firmwarewcn7850_firmwaresa8195p_firmwaresm8475wcn6750_firmwaresd450wcn3610wcn3991wcd9380_firmwaresdm429wsw5100pmsm8996au_firmwarewcd9330qca6564ausdx55m_firmwarewcn6856_firmwaresd670_firmwareqca6574sd632_firmwarewcd9380qualcomm215qcs410sd690_5g_firmwaresdx50m_firmwareqca9379_firmwareqca6430_firmwarewcd9335_firmwarewcn3980sd439_firmwareqca6335_firmwareqcs605wcd9340_firmwarewsa8815wcn6850wcn3910qca6320msm8937_firmwaremdm9650_firmwareqca6426_firmwarewcn3660b_firmwarewcn3680sd835wcn3980_firmwaresd730wcd9330_firmwaresdx55msm8475_firmwarewcn6740_firmwaremsm8953sd678_firmwarear8031_firmwarewcn3680_firmwarewcn6851_firmwareqcs603sd670sd_636_firmwareqca6564a_firmwareapq8009wqcm4290_firmwaresd480sd870wcn6855wsa8832sw5100p_firmwareqcs610_firmwaresa6145psdxr1ar8031apq8096auqcs405_firmwaresdm630_firmwaresd820_firmwareqca6391_firmwarewcd9370_firmwaresd780g_firmwaresdx55sd888_firmwareapq8053sa8155pcsra6640sd675sd439wcn3660sm8475p_firmwareqca9379qcm2290wcn3991_firmwarewsa8830sd678qcs2290_firmwaremdm9628_firmwaremdm9650sd_636csra6620qcs4290mdm9250sd765g_firmwareqca6420_firmwareqca6390_firmwareapq8009_firmwaresd690_5gsd730_firmwarewcd9370sd675_firmwareqca6564qca6426wcn3990_firmwareqca9377sdw2500_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwarewcn3615_firmwaresd662sa8155qca6320_firmwarewcn3680b_firmwaresdx55_firmwarewcn3615qca6595auwcn3999_firmwaresm7250p_firmwarewcn3610_firmwareqca6436_firmwareqca6564au_firmwaresd778gsa6155p_firmwareqca6310pm8937wcn7851sd429qcs6490sdxr2_5gqca9367sdm630mdm9607_firmwarewcn3988_firmwaresd429_firmwaresa6145p_firmwaresm6250sd778g_firmwaresa8195papq8017_firmwarewsa8810_firmwaresd765_firmwarewcd9326wcd9335qca6174a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwareqca6390wcd9375sd750g_firmwareaqt1000sm6250_firmwaremsm8953_firmwaremsm8917_firmwarewcn3620_firmwaresdx20_firmwarewsa8815_firmwaresd888_5g_firmwaresd820qcm6490wcn6850_firmwarewsa8835_firmwarewcn3620sm7450apq8017qca6564aqcm6125_firmwareqcm2290_firmwarewcn3990sd_675sd780gsd865_5gsd888msm8909w_firmwarewsa8835msm8996ausdm429w_firmwaresd888_5gsm6250pqca6574amdm9206wcn6855_firmwareqca6174asm7325pqca6310_firmwarewcn6750qca6574_firmwaresd855sm4125_firmwaresm7325p_firmwaresd765qca6574a_firmwaresd768g_firmwaresm7315apq8009sd460qca6391sdxr1_firmwareaqt1000_firmwaresdx65_firmwaremdm9626qcm4290qcm6490_firmwaresdx50mwsa8832_firmwaresdx20sd480_firmwaremdm9626_firmwareqca6574ausd710sa8155p_firmwaremdm9607wcd9341_firmwareqcm6125wsa8810wcn6856wcn3680bsd835_firmwareqca6564_firmwaresd768gwcn6740qca6696sd845_firmwaresdw2500apq8096au_firmwaresd845sm7250psd720g_firmwaresw5100_firmwareqcs410_firmwaresm8475pSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-22070
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 22.28%
||
7 Day CHG~0.00%
Published-02 Sep, 2022 | 11:31
Updated-03 Aug, 2024 | 03:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory corruption in audio due to lack of check of invalid routing address into APR Routing table in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresm6250p_firmwareqcs610qca8337qca6431_firmwarewcd9360_firmwaresdx65wcn3950_firmwaresc8180x\+sdx55qcs2290qca6595au_firmwaresa6155qca6335csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareqcs6125_firmwaresa415mwcn3998wcd9371_firmwaresd_8cx_gen2_firmwaresm4125sd720gwcn3950sd_8_gen1_5g_firmwaresd710_firmwaresd460_firmwaresm7315_firmwareqca6574au_firmwarewcd9375_firmwareqca8081_firmwaresa6155_firmwaresdx12_firmwarewcn3998_firmwareqca6420wcd9360sm7450_firmwaresd680_firmwarewcn3999sd_8cx_gen2qrb5165_firmwareqrb5165m_firmwareqcs6125sa8155_firmwaresd662_firmwareqcs405qca6430wcd9340sd765gsw5100qca6436sd680wcn6851sa6155pqcs603_firmwarewcn7851_firmwaremdm9250_firmwarewcd9341qca6431qca6696_firmwarewcd9371sd750gsd870_firmwarewcn3910_firmwaresd_8cxwsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwaresd712wcn3988sd660_firmwaresa8195p_firmwaresm8475wcn6750_firmwarewcn3991qca8337_firmwarewcd9380_firmwaresw5100pqca6564ausdx55m_firmwarewcn6856_firmwaresd670_firmwareqca6574wcd9380qcs410sd690_5g_firmwaresdx50m_firmwaresdx24_firmwareqca6430_firmwarewcd9335_firmwarewcn3980qca6335_firmwareqcs605wcd9340_firmwarewsa8815wcn6850sd7cwcn3910qca6320mdm9650_firmwareqca6426_firmwaresd695sd835wcn3980_firmwaresd730sdx55mqca6421_firmwaresm8475_firmwarewcn6740_firmwaresd678_firmwarear8031_firmwareqrb5165wcn6851_firmwareqcs603sd_636_firmwaresd670qca6564a_firmwareqcm4290_firmwaresd480sd870wcn6855wsa8832sw5100p_firmwareqcs610_firmwaresa6145psd695_firmwaresdxr1ar8031qca6595_firmwareqcs405_firmwaresdm630_firmwareqca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55sd888_firmwaresa8155pcsra6640sd675sm8475p_firmwarear8035_firmwareqcm2290wcn3991_firmwaremdm9150_firmwarewsa8830sd678qcs2290_firmwaresd7c_firmwarecsrb31024mdm9650sd_636csra6620qcs4290mdm9250sd765g_firmwareqca6420_firmwareqca6390_firmwaresd690_5gsd730_firmwarewcd9370sd675_firmwareqca6564qca6426wcn3990_firmwareqrb5165n_firmwareqca9377sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwaresd662sa8155qca6320_firmwaresdx55_firmwareqca6595auwcn3999_firmwaresm7250p_firmwareqca6436_firmwareqrb5165nqca6564au_firmwaresd778gsa6155p_firmwareqca6310sa515m_firmwareqcs6490wcn7851sdxr2_5gsdm630sa415m_firmwarewcn3988_firmwaresa6145p_firmwareqca6421sd712_firmwaresd778g_firmwaresm6250sa8195pwsa8810_firmwaresd765_firmwarewcd9326wcd9335qca8081qca6174a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwarear8035qca6390sd750g_firmwareaqt1000wcd9375sc8180x\+sdx55_firmwaresm6250_firmwaresdx20_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewsa8815_firmwarewsa8835_firmwaresm7450qca6564aqcm6125_firmwareqcm2290_firmwarewcn3990sd_675sd780gsd865_5gqca6595sdx24sd888wsa8835sd665_firmwaresd888_5gsm6250pqca6574awcn6855_firmwareqca6174asm7325pqca6310_firmwarewcn6750sa515mqca6574_firmwaresd855sm4125_firmwaresm7325p_firmwaresd665qca6175asd765qca6574a_firmwaresd768g_firmwareqrb5165msd850_firmwaresm7315sd460qca6391sdxr1_firmwareaqt1000_firmwaresdx65_firmwareqcm4290csrb31024_firmwareqcm6490_firmwaresdx50mwsa8832_firmwaresdx20sd480_firmwareqca6574ausa8155p_firmwaresd710wcd9341_firmwareqcm6125wsa8810mdm9150wcn6856sd835_firmwareqca6564_firmwaresd768gwcn6740qca6696sd845_firmwaresd845sm7250psd720g_firmwaresdx12sw5100_firmwareqcs410_firmwareqca6175a_firmwaresd850sm8475pSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-22063
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-1.12% / 77.35%
||
7 Day CHG~0.00%
Published-14 Dec, 2022 | 05:54
Updated-18 Apr, 2025 | 14:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Memory corruption in Core

Memory corruption in Core due to improper configuration in boot remapper.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-mdm9640_firmwaremdm9645mdm9645_firmwareqca6174_firmwarewcn3990qca6574au_firmwareqca6574auqca6174a_firmwaremdm9640wcn3990_firmwareqca6174aqca6574aapq8096auapq8096au_firmwareqca6574a_firmwareqca6174Snapdragon
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-35122
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.05% / 13.54%
||
7 Day CHG~0.00%
Published-02 Sep, 2022 | 11:30
Updated-04 Aug, 2024 | 00:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Non-secure region can try modifying RG permissions of IO space xPUs due to improper input validation in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwaresd_8cx_gen3_firmwarewsa8830sd678sm6250p_firmwareqcs610qcs2290_firmwareqca8337qca6431_firmwaresd7c_firmwarewcd9360_firmwaresdx65qcs4290wcn3950_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqcs2290qca6390_firmwaresd690_5gsd730_firmwarewcd9370sd_675_firmwaresd675_firmwareqca6426wcn3990_firmwareqrb5165n_firmwarewcn3998sd_8cx_firmwarewcd9371_firmwaresdxr2_5g_firmwaresd_8cx_gen2_firmwaresm4125sd720gwcd9385_firmwarewcn3950wcn3660bqsm8350_firmwaresd662qsm8350sd460_firmwaresa9000p_firmwaresm7315_firmwarewcn7850qca6574au_firmwaresdx55_firmwareqca6595auqca8081_firmwarewcd9375_firmwarewcn3998_firmwaresm7250p_firmwareqca6420qca6436_firmwarewcd9360qrb5165nsd680_firmwaresd778gsd_8cx_gen2sa515m_firmwareqcs6490qrb5165_firmwareqrb5165m_firmwaresd429sdxr2_5gwcn7851sd662_firmwarewcn3988_firmwareqca6430sd429_firmwareqca6421sd778g_firmwaresm6250wcd9340wsa8810_firmwaresd765gsw5100sd765_firmwareqca6436sd680wcn6851qca8081wcn7851_firmwareqcs4290_firmwarewcd9385wcd9341qca6431qca6696_firmwareqcs6490_firmwarewcd9371sd750gsd870_firmwaresd_8cx_gen3qca6390ar8035sd_8cxaqt1000sd750g_firmwarewcd9375sm6250_firmwarewcn3910_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3620_firmwareqcm6490sd888_5g_firmwarewcn3988wcn3620wcn6850_firmwarewcn7850_firmwarewsa8815_firmwarewsa8835_firmwarewcn6750_firmwareqcm2290_firmwarewcn3991qca8337_firmwarewcd9380_firmwarewcn3990sd_675sdm429wsd780gsw5100psd865_5gsdx55m_firmwarewcn6856_firmwaresd888wsa8835sdm429w_firmwaresa8540p_firmwarewcd9380sd888_5gsm6250pqcs410qca6574asd690_5g_firmwaresdx50m_firmwarewcn6855_firmwaresm7325pqca6430_firmwarewcn3980wcn6750sa515msa9000pwcd9340_firmwaresd855sm4125_firmwaresm7325p_firmwaresd7cwcn3910wcn6850wsa8815sd765qca6426_firmwarewcn3660b_firmwareqca6574a_firmwaresd695sd768g_firmwareqrb5165mwcn3980_firmwaresm7315sd460qca6391sd730sdx55mqca6421_firmwareaqt1000_firmwarewcn6740_firmwaresdx65_firmwaresd678_firmwareqcm4290qcm6490_firmwaresdx50mqrb5165sd480_firmwarewcn6851_firmwareqca6574auwcd9341_firmwareqcm4290_firmwaresd480sd870wcn6855wsa8810sa8540psw5100p_firmwareqcs610_firmwarewcn6856sd695_firmwaresd768gwcn6740qca6696qca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55sd888_firmwaresd675sm7250psd720g_firmwaresw5100_firmwareqcs410_firmwarear8035_firmwareqcm2290Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
CWE ID-CWE-20
Improper Input Validation
CVE-2021-30254
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 8.43%
||
7 Day CHG~0.00%
Published-12 Nov, 2021 | 06:15
Updated-03 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible buffer overflow due to improper input validation in factory calibration and test DIAG command in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresm7250mdm9640_firmwaresm6250p_firmwareqcs610qca8337sdx65wcn3950_firmwareqcs2290qca6595au_firmwaremsm8917qcs605_firmwaresd_675_firmwareqcs6125_firmwaresd632msm8108wcn3998wcd9371_firmwaremsm8108_firmwarewcn3950sm4125sd720gmdm9628mdm9206_firmwareqsw8573_firmwaresm6375_firmwarewcn3660bsd450_firmwaresd710_firmwaresd460_firmwaremdm9230_firmwareqca6574au_firmwaremdm9630wcd9375_firmwareqca8081_firmwarewcn3998_firmwaresdx12_firmwaremsm8909wapq8009w_firmwareqca6420apq8053_firmwareqca9367_firmwaremdm8207qcs6125qca4004_firmwaresd662_firmwareqca6430wcd9306_firmwarewcd9340sd765gqualcomm215_firmwarewcn6851qcs603_firmwaremsm8937msm8209_firmwaremdm9250_firmwarewcn3660_firmwarewcd9341wcd9371sd870_firmwarewcn3910_firmwaremdm9207_firmwareqca4004wsa8830_firmwaremdm9330_firmwaresd855_firmwaresd660sd865_5g_firmwaresd712wcn3988sd660_firmwaremsm8208_firmwarewcn6750_firmwaresd450wcn3610msm8608mdm9640sm6375wcn3991qca8337_firmwaresda429w_firmwarewcd9380_firmwaresdm429wwcd9330msm8996au_firmwarecsr6030qca6564ausdx55m_firmwarewcn6856_firmwaremsm8940_firmwareqet4101_firmwaremsm8976_firmwareqca6574sd632_firmwaresd670_firmwarewcd9380qualcomm215mdm9230qcs410sd690_5g_firmwaresdx50m_firmwareqca9379_firmwareqca6174qca6430_firmwarewcd9335_firmwaresd439_firmwarewcn3980qsw8573qcs605wcd9340_firmwarewsa8815wcn6850wcn3910qca6320qca6584_firmwaremsm8937_firmwaremdm9650_firmwarewcn3660b_firmwarewcn3680sd835wcn3980_firmwaresd730wcd9330_firmwaresdx55mwcn6740_firmwaremsm8953sd821_firmwaresd678_firmwarewcn3680_firmwarewcn6851_firmwareqcs603sd670sd_636_firmwareqca6564a_firmwareapq8009wqca6694au_firmwaremsm8976sg_firmwareqcm4290_firmwaresd480sd870wcn6855sd210_firmwareqcs610_firmwaresdxr1apq8096aumdm8207_firmwaresdm630_firmwaremdm9205_firmwareqca6391_firmwaresd820_firmwarewcd9370_firmwaresd780g_firmwaresdx55apq8053sd675sd439qet4101wcn3660qca9379ar8035_firmwareqcm2290wcn3991_firmwaremdm9150_firmwarewsa8830sd678qcs2290_firmwaresm7250_firmwaremdm9628_firmwaremdm9650sd_636qcs4290mdm9250sd765g_firmwareqca6420_firmwareqca6390_firmwareapq8009_firmwaresd690_5gqca6174_firmwaresd730_firmwarewcd9370sd675_firmwareqca6584au_firmwarewcn3990_firmwaresm8450qca9377sdw2500_firmwarewcd9385_firmwarewcd9326_firmwarewcn3615_firmwaresd662apq8037qca6320_firmwareqca6584wcn3680b_firmwaresdx55_firmwarewcn3615qca6595auwcn3610_firmwaremdm9207wcd9306qca6584ausd778gqca6564au_firmwaremsm8208qca6310sm6225sd429qcs6490qca9367sdm630mdm9607_firmwaresd821msm8976sgwcn3988_firmwaresd205sd429_firmwaresm6250sd778g_firmwaresd712_firmwareapq8017_firmwarewsa8810_firmwareqca6694sm8450_firmwaresd765_firmwarewcd9326wcd9335qca8081qca6174a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwareqca6390wcd9375ar8035aqt1000msm8976qca6694_firmwaresm6250_firmwaremsm8953_firmwareqca6694ausda429wmsm8917_firmwaresd210wcn3620_firmwaresd820wsa8815_firmwaresd888_5g_firmwareqcm6490wcn6850_firmwarewsa8835_firmwarewcn3620apq8017qcx315csr6030_firmwareqca6564amdm9630_firmwareqcm6125_firmwareqcm2290_firmwarewcn3990sd_675sd780gsd865_5gsm8450p_firmwaremsm8909w_firmwareqcx315_firmwarewsa8835msm8996ausdm429w_firmwaresd665_firmwaresd888_5gsm6250pqca6574amdm9206wcn6855_firmwareqca6174aqca6310_firmwaresm7325wcn6750mdm9205qca6574_firmwaresd855sm4125_firmwaresd665sd765qca6574a_firmwaresd768g_firmwaremsm8209apq8009sd460qca6391sdxr1_firmwareaqt1000_firmwaremsm8920sdx65_firmwareqcm4290qcm6490_firmwaresdx50msd480_firmwaremsm8920_firmwaresm6225_firmwareqca6574ausd710mdm9607sd205_firmwarewcd9341_firmwareqcm6125wsa8810sm8450pmdm9150wcn6856wcn3680bsd835_firmwaresd768gwcn6740sd845_firmwaremsm8608_firmwaresdw2500msm8940apq8096au_firmwaresd845apq8037_firmwaresd720g_firmwaresdx12qcs410_firmwaremdm9330sm7325_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-20
Improper Input Validation
CVE-2021-30288
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.03% / 8.43%
||
7 Day CHG~0.00%
Published-20 Oct, 2021 | 06:31
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible stack overflow due to improper length check of TLV while copying the TLV to a local stack variable in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwareqca2066sm7250sm6250p_firmwareqcs610qcn5550qca1023ipq8173_firmwareqca6431_firmwarewcd9360_firmwareqcn5124qca4024_firmwarewcn3950_firmwaresc8180x\+sdx55ipq8078aipq5028_firmwareqcs2290qca6595au_firmwareqca6335qca2062qcn5064csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareqcs6125_firmwarewcn3998wcd9371_firmwarewcn3950qcn6024_firmwaresd720gsm4125ipq8076awcn3660bqsm8350_firmwaresd710_firmwareqsm8350sd460_firmwareqca4020qca6428qca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwareqca8081_firmwarewcn3998_firmwareqca6420apq8053_firmwarewcd9360qca10901_firmwaresdx20mqca6438_firmwareipq8070_firmwarewhs9410_firmwareipq8078a_firmwarewcn3999qrb5165_firmwareipq5028ipq8072_firmwareqcs6125sa8155_firmwareipq6010sd662_firmwareqcs405qca6430sc8280xp_firmwarewcd9340sdm830_firmwaresd765gqca4020_firmwareqca6436wcn6851qca9888_firmwareqcn6122wcd9341qca2066_firmwareqca6431qca6696_firmwarewcd9371sd870_firmwaresd750gqca1062qcn5154_firmwarewcn3910_firmwaresd_8cxwsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwarewcn3988qca6438sd660_firmwareqcn5121qcn5022_firmwareqcn7606_firmwarewcn6750_firmwareqca4010_firmwarewcn3610qca6428_firmwareipq5018_firmwarewcn3991wcd9380_firmwareipq8072amsm8996au_firmwareipq8076a_firmwareipq8078qca6564ausdx55m_firmwareipq8173wcn6856_firmwareqcn5164sd670_firmwareqca6574csr8811_firmwarewcd9380qcn5054_firmwareqcs410qcn5024sd690_5g_firmwaresdx50m_firmwareqca9379_firmwaresdx24_firmwareqca8072_firmwareqca6430_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980qca6335_firmwareipq6018_firmwareqcs605wcd9340_firmwarewsa8815wcn6850sd7cpmp8074_firmwarewcn3910sd_8c_firmwareqca6426_firmwarewcn3660b_firmwareqca9984ipq6028qcn9024pmp8074wcn3980_firmwaresd730qcn5550_firmwaresdx55mqca6421_firmwareqca2062_firmwarewcn6740_firmwareqcn5064_firmwaresd678_firmwarear8031_firmwareipq8078_firmwareqcn5054qrb5165wcn6851_firmwareipq8070sd670qcn9024_firmwareipq8174_firmwareqcm4290_firmwaresd480sd870wcn6855qcn7605_firmwareqcn5121_firmwaresd210_firmwareqcs610_firmwareipq6018sdxr1ar8031qca1023_firmwareapq8096auqcs405_firmwaresd820_firmwareqca6391_firmwareqca4024wcd9370_firmwareqca2064sd780g_firmwaresdx55sd888_firmwaresc8280xpapq8053qcn5021_firmwarecsra6640sa8155psd675qca9379ar8035_firmwareqcm2290qcn7606qcn5024_firmwarewcn3991_firmwarewsa8830sd678qcn9070qca1062_firmwareqcs2290_firmwaresm7250_firmwaresd7c_firmwarecsrb31024csra6620qcn9072qcs4290sd765g_firmwareqca6420_firmwareqca6390_firmwareapq8009_firmwareqca2064_firmwaresd690_5gipq6000sd730_firmwarewcd9370sd675_firmwareipq8072qcn5152_firmwareqca6426qca6584au_firmwarewcn3990_firmwareqcn9000_firmwareqca9984_firmwareqca9377ipq5018qca9369sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewhs9410wcd9326_firmwareqcn7605wcn3615_firmwareipq8074aqca2065sd662qcn5124_firmwareqca1064sa8155wcn3680b_firmwareqcn5122_firmwaresdx55_firmwarewcn3615qcn6023_firmwareqca6595auwcn3999_firmwarewcn3610_firmwareqca6436_firmwareipq5010qca6564au_firmwareqca6584ausd778gqca6310ipq8174qcs6490sdxr2_5gqcn5052wcn3988_firmwareqcn9074qca6421sd778g_firmwaresm6250wsa8810_firmwareqca6694sd765_firmwarewcd9326wcd9335qca4010qca8081qcn6023ipq8071aqca6174a_firmwareipq8071a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwareqca2065_firmwareqca6390wcd9375sd750g_firmwareaqt1000ar8035csr8811sc8180x\+sdx55_firmwaresm6250_firmwareqca6694_firmwareqcn9100_firmwaresd210ipq5010_firmwareipq8074a_firmwaresd888_5g_firmwaresdx20_firmwarewsa8815_firmwaresd820qcm6490wcn6850_firmwarewsa8835_firmwareqcm6125_firmwareqca8072qcm2290_firmwarewcn3990qcn9000sd_675sd780gsd865_5gsdx24sd888qcn6122_firmwarewsa8835msm8996auqca10901sd665_firmwaresd888_5gqca9369_firmwaresm6250pqcn5154qca8075_firmwareqca6574aipq6005_firmwarewcn6855_firmwareqca9889qca6174aqca9888qca6310_firmwaresm7325ipq8074wcn6750ipq8070a_firmwareipq8076_firmwareqca6574_firmwaresd855sm4125_firmwaresd665ipq8076sd765qca6574a_firmwareqcn5021qcn5152sd768g_firmwaresd850_firmwareapq8009sd460qca6391sdxr1_firmwareipq6005aqt1000_firmwareqcn9100qcm4290csrb31024_firmwareqcm6490_firmwaresdx50mqcn9070_firmwaresdx20sd480_firmwareipq6028_firmwareipq8072a_firmwareipq8074_firmwareqca6574auqca9889_firmwaresd710sa8155p_firmwareqcn5122wcd9341_firmwaresdx20m_firmwareqcm6125wsa8810wcn6856sd_8cqcn5022wcn3680bsd768gipq6010_firmwareqca1064_firmwarewcn6740qca6696sd845_firmwareqca8075qcn9022_firmwareapq8096au_firmwareqcn6024qcn9022sd845ipq8070aqcn9072_firmwaresdm830ipq6000_firmwaresd720g_firmwareipq8071_firmwareqcn9074_firmwareqcs410_firmwaresd850sm7325_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-30333
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.12% / 31.64%
||
7 Day CHG~0.00%
Published-01 Apr, 2022 | 04:40
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper validation of buffer size input to the EFS file can lead to memory corruption in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaremdm9640_firmwaresm6250p_firmwareqcs610qca8337wcd9360_firmwaresdx65wcn3950_firmwareqcs2290qca6595au_firmwaresd_675_firmwareqcs6125_firmwaresa415mwcn3998sd_8cx_gen2_firmwarewcn3950mdm9628sd720gqsw8573_firmwaresd_8_gen1_5g_firmwaresm6375_firmwarewcn3660bsd460_firmwaresm7315_firmwareqca6574au_firmwarewcd9375_firmwarewcn3998_firmwareqca8081_firmwaremsm8909wapq8009w_firmwareqca6420apq8053_firmwarewcd9360qca9367_firmwaremdm8207sd_8cx_gen2qcs6125sd662_firmwareqca6430wcd9306_firmwarewcd9340qualcomm215_firmwaresd765gsw5100qca6436wcn6851wcd9341qca6696_firmwaresd750gsd870_firmwarewcn3910_firmwaremdm9207_firmwarewsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwarewcn3988sd660_firmwaresm8475wcn6750_firmwarewcn3610mdm9640sm6375wcn3991qca8337_firmwaresda429w_firmwarewcd9380_firmwaresdm429wmsm8996au_firmwaresw5100pwcd9330qca6564ausdx55m_firmwarewcn6856_firmwareqet4101_firmwareqca6574wcd9380qualcomm215qcs410sd690_5g_firmwaresdx24_firmwareqca6430_firmwarewcd9335_firmwarewcn3980sd439_firmwareqsw8573wcd9340_firmwarewsa8815wcn6850sd7cwcn3910qca6426_firmwarewcn3660b_firmwarewcn3980_firmwaresd730wcd9330_firmwaresdx55mmsm8953sd678_firmwarewcn6851_firmwareqca6564a_firmwareapq8009wqcm4290_firmwaresd480sd870wcn6855sw5100p_firmwaresd210_firmwareqcs610_firmwaresdxr1apq8096aumdm8207_firmwareqca6391_firmwarewcd9370_firmwaresdx55sd888_firmwareapq8053sd675sd439qet4101ar8035_firmwareqcm2290wcn3991_firmwarewsa8830sd678qcs2290_firmwaresd7c_firmwarecsrb31024mdm9628_firmwareqcs4290sd765g_firmwareqca6420_firmwareqca6390_firmwaresd690_5gsd730_firmwarewcd9370sd675_firmwareqca6426qca6584au_firmwarewcn3990_firmwareqca9377sdw2500_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwarewcn3615_firmwaresd662wcn3680b_firmwaresdx55_firmwareqca6595auwcn3615sm7250p_firmwarewcn3610_firmwareqca6436_firmwaremdm9207qca6564au_firmwareqca6584ausd778gwcd9306sm6225sa515m_firmwareqcs6490sd429sdxr2_5gqca9367mdm9607_firmwaresa415m_firmwarewcn3988_firmwaresd205sd429_firmwaresm6250sd778g_firmwareapq8017_firmwarewsa8810_firmwaresd765_firmwarewcd9326wcd9335qca8081qca6174a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwarear8035qca6390sd750g_firmwareaqt1000wcd9375sm6250_firmwaremsm8953_firmwaresda429wsd210wcn3620_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewcn3620wsa8815_firmwarewsa8835_firmwareapq8017qcx315qca6564aqcm6125_firmwareqcm2290_firmwarewcn3990sd_675sd865_5gsdx24sd888msm8909w_firmwareqcx315_firmwaremsm8996ausdm429w_firmwarewsa8835sd665_firmwaresd888_5gsm6250pqca6574awcn6855_firmwareqca6174asm7325pwcn6750sa515mqca6574_firmwaresd855sm7325p_firmwaresd665sd765qca6574a_firmwaresd768g_firmwaresd850_firmwaresm7315sd460qca6391sdxr1_firmwareaqt1000_firmwaresdx65_firmwareqcm4290csrb31024_firmwareqcm6490_firmwaresd480_firmwaresm6225_firmwareqca6574aumdm9607sd205_firmwarewcd9341_firmwareqcm6125wsa8810wcn6856wcn3680bsd768gqca6696sdw2500apq8096au_firmwaresm7250psd720g_firmwaresw5100_firmwareqcs410_firmwaresd850Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-30291
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.04% / 10.42%
||
7 Day CHG~0.00%
Published-20 Oct, 2021 | 06:31
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible memory corruption due to lack of validation of client data used for memory allocation in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewsa8830sd678sm7250sm6250p_firmwareqcs2290_firmwaresm7250_firmwaresd_636qcs4290wcn3950_firmwaresd765g_firmwareqca6420_firmwareqcs2290qca6390_firmwareqca6335msm8917sd690_5gsd730_firmwaresd_455_firmwarewcd9370qcs605_firmwaresd_675_firmwaresd675_firmwareqcs6125_firmwareqca6426sd632wcn3998wcd9385_firmwaresdxr2_5g_firmwarewcn3950sm4125sd720gwcn3615_firmwarewcn3660bsd662sd460_firmwareqca6320_firmwareqca6574au_firmwaresdx55_firmwarewcn3680b_firmwarewcd9375_firmwarewcn3615wcn3998_firmwarewcn3610_firmwareqca6420qca6436_firmwareapq8053_firmwareqca6564au_firmwaresd778gqca6310sd429sdxr2_5gqcs6125sd662_firmwaresdm630wcn3988_firmwareqca6430sd205sd429_firmwaresm6250sd778g_firmwareapq8017_firmwarequalcomm215_firmwaresd765gsd765_firmwareqca6436wcn6851qcs603_firmwareqcs4290_firmwarewcd9385sd750gsd870_firmwareqca6390wcd9375sd750g_firmwareapq8064auaqt1000wcn3910_firmwaresm6250_firmwaremsm8953_firmwarewsa8830_firmwaremsm8917_firmwaresd210sd855_firmwaresd865_5g_firmwarewcn3988sd888_5g_firmwarewcn6850_firmwarewsa8835_firmwareapq8017qca6564awcn6750_firmwarewcn3610qcm6125_firmwareqcm2290_firmwarewcn3991wcd9380_firmwaresd_675msm8996au_firmwaresd780gsd865_5gqca6564ausdx55m_firmwarewcn6856_firmwaresd888wsa8835sd632_firmwaremsm8996ausd665_firmwarewcd9380sd888_5gsm6250pqualcomm215qca6574asd690_5g_firmwaresdx50m_firmwarewcn6855_firmwareqca6310_firmwaresm7325qca6430_firmwarewcn6750sd439_firmwareqca6335_firmwareqcs605sd855sm4125_firmwarewcn6850sd665wcn3910qca6320sd765qca6426_firmwarewcn3660b_firmwarewcn3680qca6574a_firmwaresd768g_firmwaresd460qca6391sd730sdx55msdxr1_firmwareaqt1000_firmwarewcn6740_firmwaremsm8953sd678_firmwareapq8064au_firmwareqcm4290sdx50mwcn3680_firmwarewcn6851_firmwareqcs603sd_455qca6574ausd_636_firmwaresd205_firmwareqca6564a_firmwareqcm6125qcm4290_firmwaresd870wcn6855sd210_firmwarewcn6856wcn3680bsdxr1sd768gapq8096auwcn6740sdm630_firmwareqca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55sd888_firmwareapq8053apq8096au_firmwaresd675sd439sd720g_firmwareqcm2290sm7325_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wearables
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-30257
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.09% / 27.23%
||
7 Day CHG~0.00%
Published-20 Oct, 2021 | 06:31
Updated-03 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible out of bound read or write in VR service due to lack of validation of DSP selection values in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewsa8830sd678sm7250qcs2290_firmwaresm7250_firmwaresd_636qcs4290wcn3950_firmwaresd765g_firmwareqca6420_firmwareqcs2290qca6390_firmwaremsm8917sd690_5gsd730_firmwarewcd9370qcs605_firmwaresd_675_firmwaresd675_firmwareqcs6125_firmwareqca6426sd632wcn3998wcd9385_firmwaresdxr2_5g_firmwarewcn3950sm4125sd720gwcn3615_firmwarewcn3660bsd662sd460_firmwarewcn3680b_firmwaresdx55_firmwarewcd9375_firmwarewcn3615wcn3998_firmwareqca6420qca6436_firmwareapq8053_firmwaresd778gqcs6490sd429sdxr2_5gqcs6125sd662_firmwaresdm630wcn3988_firmwareqca6430sd429_firmwaresm6250sd778g_firmwareapq8017_firmwarequalcomm215_firmwaresd765gsd765_firmwareqca6436wcn6851qcs4290_firmwarewcd9385qcs6490_firmwaresd750gsd870_firmwareqca6390wcd9375sd750g_firmwareaqt1000wcn3910_firmwaresm6250_firmwaremsm8953_firmwarewsa8830_firmwaremsm8917_firmwaresd855_firmwaresd865_5g_firmwareqcm6490sd888_5g_firmwarewcn3988wcn6850_firmwarewsa8835_firmwareapq8017wcn6750_firmwareqcm6125_firmwareqcm2290_firmwarewcn3991wcd9380_firmwaresd_675sd780gsd865_5gsdx55m_firmwarewcn6856_firmwaresd888wsa8835sd632_firmwaresd665_firmwarewcd9380sd888_5gqualcomm215sd690_5g_firmwaresdx50m_firmwarewcn6855_firmwaresm7325qca6430_firmwarewcn6750sd439_firmwareqcs605sd855sm4125_firmwarewcn6850sd665wcn3910sd765qca6426_firmwarewcn3660b_firmwarewcn3680sd768g_firmwaresd730sd460qca6391sdx55msdxr1_firmwareaqt1000_firmwarewcn6740_firmwaremsm8953sd678_firmwareqcm4290qcm6490_firmwaresdx50mwcn3680_firmwaresd480_firmwarewcn6851_firmwaresd_636_firmwareqcm6125qcm4290_firmwaresd480sd870wcn6855wcn6856wcn3680bsdxr1sd768gwcn6740sdm630_firmwareqca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55sd888_firmwareapq8053sd675sd439sd720g_firmwareqcm2290sm7325_firmwareSnapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-30258
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.03% / 8.43%
||
7 Day CHG~0.00%
Published-20 Oct, 2021 | 06:31
Updated-03 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible buffer overflow due to improper size calculation of payload received in VR service in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewsa8830sd678sm7250sm6250p_firmwareqcs610qcs2290_firmwaresm7250_firmwaresd_636qcs4290wcn3950_firmwaresd765g_firmwareqca6420_firmwareqcs2290qca6390_firmwareqca6335msm8917sd690_5gsd730_firmwaresd_455_firmwarewcd9370qcs605_firmwaresd_675_firmwaresd675_firmwareqcs6125_firmwareqca6426sd632wcn3998wcd9371_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcn3950sm4125sd720gwcn3615_firmwarewcn3660bsd662sd460_firmwareqca6320_firmwareqca6574au_firmwaresdx55_firmwarewcn3680b_firmwarewcd9375_firmwarewcn3615wcn3998_firmwarewcn3610_firmwareqca6420qca6436_firmwareapq8053_firmwareqca6564au_firmwaresd778gqca6310qcs6490sd429sdxr2_5gqcs6125sd662_firmwaresdm630wcn3988_firmwareqca6430sd205sd429_firmwaresm6250sd778g_firmwareapq8017_firmwarequalcomm215_firmwaresd765gsd765_firmwareqca6436wcn6851qcs603_firmwareqcs4290_firmwarewcd9385qcs6490_firmwarewcd9371sd750gsd870_firmwareqca6390wcd9375sd750g_firmwareaqt1000apq8064auwcn3910_firmwaresm6250_firmwaremsm8953_firmwarewsa8830_firmwaremsm8917_firmwaresd210sd855_firmwaresd865_5g_firmwarewcn3620_firmwareqcm6490sd888_5g_firmwarewcn3988wcn3620wcn6850_firmwarewsa8835_firmwareapq8017qca6564awcn6750_firmwarewcn3610qcm6125_firmwareqcm2290_firmwarewcn3991wcd9380_firmwaresd_675sdm429wmsm8996au_firmwaresd780gsd865_5gqca6564ausdx55m_firmwarewcn6856_firmwaresd888wsa8835sd632_firmwaremsm8996ausdm429w_firmwaresd665_firmwarewcd9380sd888_5gsm6250pqualcomm215qca6574asd690_5g_firmwaresdx50m_firmwarewcn6855_firmwareqca6310_firmwaresm7325qca6430_firmwarewcn6750sd439_firmwareqca6335_firmwareqcs605sd855sm4125_firmwarewcn6850sd665wcn3910qca6320sd765qca6426_firmwarewcn3660b_firmwarewcn3680qca6574a_firmwaresd768g_firmwaresd460qca6391sd730sdx55msdxr1_firmwareaqt1000_firmwarewcn6740_firmwaremsm8953sd678_firmwareapq8064au_firmwareqcm4290qcm6490_firmwaresdx50mwcn3680_firmwaresd480_firmwareqcs603wcn6851_firmwaresd_455qca6574ausd_636_firmwaresd205_firmwareqca6564a_firmwareqcm6125qcm4290_firmwaresd480sd870wcn6855sd210_firmwareqcs610_firmwarewcn6856wcn3680bsdxr1sd768gapq8096auwcn6740sdm630_firmwareqca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55sd888_firmwareapq8053apq8096au_firmwaresd675sd439sd720g_firmwareqcm2290sm7325_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wearables
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-30261
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.03% / 8.43%
||
7 Day CHG~0.00%
Published-17 Sep, 2021 | 07:05
Updated-03 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible integer and heap overflow due to lack of input command size validation while handling beacon template update command from HLOS in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresm7250mdm9640_firmwaresm6250p_firmwaresa6150p_firmwareqcs610qca6431_firmwarewcd9360_firmwaremdm9645wcn3950_firmwaresc8180x\+sdx55sa8150p_firmwareqca6595au_firmwaresa6155qca6335msm8917mdm8215sd_455_firmwareqcs605_firmwaresd_675_firmwareqcs6125_firmwaremdm8615m_firmwaresd632msm8108sa415mwcn3998wcd9371_firmwaremsm8108_firmwarewcn3950sd720gmdm9628mdm9206_firmwareqsw8573_firmwarewcn3660bsd450_firmwaremdm9230_firmwaremdm8215mqca6574au_firmwaremdm9630wcd9375_firmwarewcn3998_firmwaresa6155_firmwaresdx12_firmwaremsm8909wapq8009w_firmwareqca6420apq8053_firmwarewcd9360qca9367_firmwarewhs9410_firmwaremdm8207qcs6125sa8155_firmwareqca4004_firmwaremdm9615mqca6430wcd9306_firmwarewcd9340mdm9625_firmwaresd765gqca1990_firmwarequalcomm215_firmwareqca6436wcn6851sa6155pqcs603_firmwaremsm8937msm8209_firmwaremdm9250_firmwarewcn3660_firmwaremdm9655qca6696_firmwareqca6431wcd9371sd870_firmwaresd750gmdm8215_firmwarewcn3910_firmwaresd_8cxsa8150pmdm9207_firmwareqca4004wsa8830_firmwaremdm9330_firmwaresd855_firmwaresd865_5g_firmwaresd712wcn3988sa8195p_firmwaremsm8208_firmwarewcn6750_firmwaresd450wcn3610mdm9640msm8608wcn3991sda429w_firmwarewcd9380_firmwaresdm429wwcd9330msm8996au_firmwarecsr6030qca6564ausdx55m_firmwarewcn6856_firmwaremsm8940_firmwaremsm8976_firmwareqca6574sd632_firmwaresd670_firmwarewcd9380qualcomm215mdm9230qcs410sd690_5g_firmwaresdx50m_firmwareqca9379_firmwaresdx24_firmwareqca6174qca6430_firmwaresd439_firmwareqca6335_firmwareqsw8573qcs605wcd9340_firmwarewsa8815wcn6850wcn3910qca6320qca6584_firmwaremsm8937_firmwaremdm9650_firmwaresd_8c_firmwaremdm9215_firmwareqca6426_firmwarewcn3660b_firmwarewcn3680sd835qca1990sd730wcd9330_firmwaresdx55mqca6421_firmwarewcn6740_firmwarear6003_firmwaremsm8953sd821_firmwaresd678_firmwarewcn3680_firmwarewcn6851_firmwareqcs603sd670sd_636_firmwareqca6564a_firmwareapq8009wqca6694au_firmwaremsm8976sg_firmwareqcm4290_firmwaresd480sd870wcn6855sd210_firmwareqcs610_firmwareapq8084_firmwaresa6145psdxr1apq8096ausa8145pmdm8207_firmwaresdm630_firmwaremdm9205_firmwareqca6391_firmwaresd820_firmwarewcd9370_firmwaresd780g_firmwaresdx55apq8053sa8155psd675sd439wcn3660qca9379wcn3991_firmwaremdm9150_firmwarewsa8830sd678sa8145p_firmwaresm7250_firmwarecsrb31024mdm9628_firmwaremdm9650sd_636qcs4290mdm9250sd765g_firmwareqca6420_firmwareqca6390_firmwareapq8009_firmwaresd690_5gqca6174_firmwaresd730_firmwaremdm9310_firmwarewcd9370sd675_firmwareqca6426qca6584au_firmwareqca9377sdw2500_firmwaresd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewhs9410mdm9615m_firmwarewcn3615_firmwareapq8037sa8155qca6320_firmwareqca6584wcn3680b_firmwaresdx55_firmwarewcn3615qca6595auwcn3610_firmwareqca6436_firmwaremdm9207wcd9306qca6584ausd778gqca6564au_firmwaremsm8208sa6155p_firmwareqca6310sa515m_firmwaresd429sdxr2_5gqca9367apq8084sdm630mdm9607_firmwaresd821mdm9655_firmwaremsm8976sgsa415m_firmwarewcn3988_firmwaresd205sd429_firmwareqca6421sd778g_firmwaresa6145p_firmwaresm6250sa8195psd712_firmwareapq8017_firmwarewsa8810_firmwareqca6694sd765_firmwareqca6174a_firmwareqcs4290_firmwarewcd9385mdm8615mmdm9625qca6390wcd9375sd750g_firmwareaqt1000msm8976qca6694_firmwaresm6250_firmwaresc8180x\+sdx55_firmwaremsm8953_firmwareqca6694ausda429wmsm8917_firmwaresd210wcn3620_firmwaresdx20_firmwarewsa8815_firmwaresd888_5g_firmwaresd820wcn6850_firmwarewsa8835_firmwarewcn3620apq8017qcx315ar6003csr6030_firmwareqca6564amdm9630_firmwareqcm6125_firmwaremdm9635m_firmwaresd_675sd780gsd865_5gsdx24msm8909w_firmwareqcx315_firmwarewsa8835msm8996ausdm429w_firmwaresd665_firmwaresd888_5gsm6250pqca6574amdm9206wcn6855_firmwareqca6174aqca6310_firmwarewcn6750mdm9635mmdm9615mdm9205sa515mqca6574_firmwaresd855sd665sd765qca6574a_firmwaresd768g_firmwaremsm8209sd850_firmwareapq8009qca6391sdxr1_firmwaremdm9310aqt1000_firmwaremsm8920qcm4290csrb31024_firmwaresdx50msdx20sd480_firmwaremsm8920_firmwaremdm9215sd_455qca6574ausa8155p_firmwaremdm8215m_firmwaremdm9607sd205_firmwaremdm9645_firmwareqcm6125wsa8810mdm9150wcn6856sd_8cwcn3680bsd835_firmwaresd768gwcn6740qca6696sd845_firmwaremsm8608_firmwaresdw2500sa6150pmsm8940apq8096au_firmwaresd845mdm9615_firmwareapq8037_firmwaresd720g_firmwaresdx12qcs410_firmwaremdm9330sd850Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-20
Improper Input Validation
CVE-2024-53031
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 9.48%
||
7 Day CHG~0.00%
Published-03 Mar, 2025 | 10:07
Updated-07 Mar, 2025 | 11:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in Automotive OS Platform

Memory corruption while reading a type value from a buffer controlled by the Guest Virtual Machine.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa9000pqca6595au_firmwaresa8650p_firmwareqam8775psa8255pqamsrv1m_firmwareqca6595qca6688aq_firmwaresa8770psa8775psrv1h_firmwaresa8620p_firmwareqam8650p_firmwareqca6595_firmwaresrv1mqam8620psa8775p_firmwareqamsrv1msa9000p_firmwaresrv1hqca6574ausa7255psrv1m_firmwaresa8620psa7775psa8650pqam8620p_firmwaresa8540p_firmwaresa7255p_firmwareqam8775p_firmwareqam8295p_firmwareqam8255pqca6688aqqca6698aqsa7775p_firmwaresa8255p_firmwaresa8770p_firmwaresa8295p_firmwareqca6696_firmwareqam8295pqamsrv1hsrv1l_firmwareqca6574au_firmwareqamsrv1h_firmwareqca6595auqam8255p_firmwaresa8295psrv1lqca6698aq_firmwareqam8650pqca6696sa8540pSnapdragon
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-53022
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 9.48%
||
7 Day CHG~0.00%
Published-03 Mar, 2025 | 10:07
Updated-06 Mar, 2025 | 17:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in Automotive OS Platform

Memory corruption may occur during communication between primary and guest VM.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6696sa7775psa8775psa8540p_firmwaresa8775p_firmwareqam8255p_firmwaresrv1m_firmwaresrv1mqamsrv1h_firmwareqam8295p_firmwaresrv1l_firmwaresa8620pqam8775pqam8255pqca6696_firmwaresa9000p_firmwareqca6595_firmwaresa8540psa8620p_firmwaresa8770p_firmwaresa8255p_firmwareqca6595au_firmwaresrv1lqam8620p_firmwaresa7255psa8770psa8650p_firmwaresa9000psrv1hqam8775p_firmwareqamsrv1hsa7775p_firmwareqam8650p_firmwaresa8295pqamsrv1mqam8295pqca6595qamsrv1m_firmwaresa8295p_firmwareqam8650psa8255psa8650psrv1h_firmwareqam8620pqca6595ausa7255p_firmwareSnapdragon
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-53029
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 9.48%
||
7 Day CHG~0.00%
Published-03 Mar, 2025 | 10:07
Updated-05 Mar, 2025 | 04:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in Automotive OS Platform

Memory corruption while reading a value from a buffer controlled by the Guest Virtual Machine.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-Snapdragon
CWE ID-CWE-20
Improper Input Validation
CVE-2024-53012
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 9.48%
||
7 Day CHG~0.00%
Published-03 Mar, 2025 | 10:07
Updated-05 Mar, 2025 | 04:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in Automotive OS Platform

Memory corruption may occur due to improper input validation in clock device.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-Snapdragon
CWE ID-CWE-20
Improper Input Validation
CVE-2024-53030
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 9.48%
||
7 Day CHG~0.00%
Published-03 Mar, 2025 | 10:07
Updated-07 Mar, 2025 | 11:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in Automotive OS Platform

Memory corruption while processing input message passed from FE driver.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa9000pqca6595au_firmwaresa8650p_firmwareqca6678aqsa8255psa8155p_firmwareqamsrv1m_firmwareqcs9100msm8996aumsm8996au_firmwaresa8620p_firmwaresa8155pqam8650p_firmwareqca6574a_firmwareqca6595_firmwaresnapdragon_820_automotive_firmwareqca6584au_firmwaresa6155_firmwareqam8620psrv1hqca6564auqca6564a_firmwaresa7255psa8620pqam8620p_firmwaresa7255p_firmwareqam8775p_firmwareqam8295p_firmwareqca6797aqqam8255pqca6688aqsa7775p_firmwaresa8255p_firmwaresa8155_firmwaresa8770p_firmwaresa8295p_firmwaresa6150pqca6696_firmwareqam8295psa8150pqca6595ausa6150p_firmwareqcs9100_firmwaresa8295psa8145psa8150p_firmwaresrv1lsa6145psa6155p_firmwareqca6698aq_firmwareqam8650pqam8775pqca6595qca6688aq_firmwaresa8770psrv1h_firmwaresa8775psrv1msnapdragon_820_automotivesa8775p_firmwaresa9000p_firmwareqamsrv1mqca6564au_firmwareqca6574auqca6797aq_firmwaresrv1m_firmwaresa7775psa8650psa8540p_firmwaresa8145p_firmwaresa6155sa8195p_firmwareqca6698aqsa8195pqca6584ausa6155pqamsrv1hqca6564aqca6574au_firmwareqamsrv1h_firmwareqca6678aq_firmwareqca6574aqam8255p_firmwaresa6145p_firmwaresa8155srv1l_firmwareqca6696sa8540pSnapdragon
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-35103
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.10% / 28.52%
||
7 Day CHG~0.00%
Published-01 Apr, 2022 | 04:40
Updated-04 Aug, 2024 | 00:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible out of bound write due to improper validation of number of timer values received from firmware while syncing timers in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa6150p_firmwareipq4028_firmwareqca8337ar9380ipq8173_firmwarewcd9360_firmwaresdx65qcn5124qca4024_firmwarewcn3950_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqca6595au_firmwaresa6155qcs6125_firmwaresa415mwcn3998qca6554a_firmwarewcn3950ipq8076aqcn6024_firmwaresd_8_gen1_5g_firmwaresm6375_firmwaresd460_firmwaresm7315_firmwareqca6574au_firmwareqcn5164_firmwarewcd9375_firmwareqca8081_firmwaresa6155_firmwarewcn3998_firmwarewcd9360ipq8070_firmwareipq8065ipq8078a_firmwareqrb5165_firmwareipq5028qca7500ipq4029_firmwareqcs6125qrb5165m_firmwaresa4155p_firmwaresa8155_firmwareipq6010sd662_firmwareipq8068qcn6132sd765gsw5100qca6436wcn6851sa6155pqca9888_firmwareqcn6122ipq8068_firmwareqca6696_firmwaresd870_firmwareqcn5154_firmwaresa8150pwsa8830_firmwareqca9992_firmwaresd865_5g_firmwarewcn3988sa8195p_firmwaresm8475qca9898qcn5022_firmwarewcn6750_firmwareipq4028ipq5018_firmwaresm6375qca9985_firmwarewcn3991ipq4018_firmwareqca8337_firmwarewcd9380_firmwareipq8072aqca7500_firmwareqca9980_firmwaresw5100pipq8076a_firmwareipq8078qca6564ausdx55m_firmwareipq8173wcn6856_firmwareqcn5164qca6574csr8811_firmwarewcd9380qcn5054_firmwareipq4019_firmwareqcn5024qca8072_firmwareqca9985qcn9012_firmwareqcn5052_firmwarewcn3980ipq6018_firmwarewsa8815wcn6850pmp8074_firmwareqcn6112qca6426_firmwareqca9984ipq6028ipq8064qcn9024pmp8074wcn3980_firmwaresdx55mipq8064_firmwarewcn6740_firmwareipq8078_firmwareqcn5054qrb5165wcn6851_firmwareipq8070qca9994qca9980qcn9024_firmwareipq8174_firmwareqca9880sd480sd870wcn6855sw5100p_firmwareipq6018sa6145pqca9886_firmwareqca6595_firmwaresa8145pqca6391_firmwaresa4150p_firmwareqca4024sd780g_firmwarewcd9370_firmwaresdx55sd888_firmwareqcn5021_firmwaresa8155psa4155par8035_firmwareqcn5024_firmwarewcn3991_firmwarewsa8830qcn9070sa8145p_firmwarecsrb31024qcn9072qca9880_firmwareqca9992sd765g_firmwareqca6390_firmwarewcd9370qcn5152_firmwareqca6426qca6584au_firmwareqrb5165n_firmwareqcn9000_firmwareqca9984_firmwareipq5018wcd9385_firmwaresdxr2_5g_firmwareipq8074asd662qcn5124_firmwareqcn6100_firmwareqcn6102_firmwareqcn9011_firmwaresa8155qcn5122_firmwaresdx55_firmwareqca6595auqcn6023_firmwaresm7250p_firmwareqca6436_firmwareqrb5165nipq5010qca6564au_firmwareqca6584ausa6155p_firmwaresd778gsm6225sa515m_firmwareipq8174qca9990sdxr2_5gqcs6490qcn5052qcn6112_firmwaresa415m_firmwarewcn3988_firmwareqcn9074sa6145p_firmwaresd778g_firmwaresa8195pwsa8810_firmwaresd765_firmwareqca8081ipq8071aqcn6023ipq8071a_firmwarewcd9385qcs6490_firmwarear8035csr8811qca6390qca9898_firmwareipq4019wcd9375qcn9100_firmwareipq5010_firmwareipq8074a_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewsa8815_firmwarewsa8835_firmwaresa4150pqcm6125_firmwareqca8072qcn9000sd780gqca6554asd865_5gqca6595ar9380_firmwareqcn9012sd888qcn6122_firmwareipq8065_firmwarewsa8835sd888_5gqcn5154qca8075_firmwareipq4018qca6574awcn6855_firmwareqca9889sm7325pqcn6132_firmwareqca9888qca9994_firmwarewcn6750ipq8070a_firmwareipq8076_firmwaresa515mqca6574_firmwareqca9886sm7325p_firmwareipq8076sd765qca6574a_firmwareqcn5021qcn5152sd768g_firmwareqrb5165msm7315sd460qca6391qcn6102qcn9100sdx65_firmwarecsrb31024_firmwareqcm6490_firmwareqcn9070_firmwaresd480_firmwareipq6028_firmwareipq8072a_firmwareqcn9011sm6225_firmwareqca6574auqca9889_firmwaresa8155p_firmwareqcn5122qcm6125wsa8810wcn6856qcn5022ipq6010_firmwaresd768gwcn6740qca6696sa6150pqca8075qcn9022_firmwareqcn6024qcn9022qca9990_firmwareipq8070aqcn6100qcn9072_firmwaresm7250psw5100_firmwareqcn9074_firmwareipq4029Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-33300
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.04% / 12.67%
||
7 Day CHG~0.00%
Published-06 Jan, 2023 | 05:02
Updated-09 Apr, 2025 | 14:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper input validation in Automotive Android OS

Memory corruption in Automotive Android OS due to improper input validation.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarewsa8830wcd9380_firmwaresa6150p_firmwarewcn3990sa8145p_firmwaresw5100psd865_5gqcc5100sdx55m_firmwarewcn6856_firmwareqcn9012wsa8835wcd9380sa8150p_firmwaresd888_5gqca6595au_firmwareqca6390_firmwarewcn6855_firmwareqca6174aqca6426wcn3990_firmwareqrb5165n_firmwareqcn9012_firmwareqca9377wcd9335_firmwarewcn3980wcd9385_firmwareqam8295psdxr2_5g_firmwaresd_8_gen1_5g_firmwarewsa8815wcn6850qam8295p_firmwareqcn9011_firmwareqca6426_firmwarewcn7850qca6574au_firmwareqca6595ausdx12_firmwareqrb5165mwcn3980_firmwareqca6391sdx55mqca6436_firmwareqrb5165nsa8295pqcc5100_firmwaresa6155p_firmwarewcn7851qrb5165_firmwareqrb5165m_firmwaresdxr2_5gqrb5165wcn6851_firmwareqcn9011wcn3988_firmwareqca6574ausa6145p_firmwaresa8155p_firmwaresa8195pwsa8810_firmwarewcd9341_firmwaresw5100wsa8810sd870qca6436wcn6851wcd9335sa6155pwcn6855sw5100p_firmwarewcn7851_firmwarewcn6856sa6145pqca6174a_firmwarewcd9385wcd9341qca6696_firmwaresa8145psd870_firmwareqca6696qca6391_firmwareqca6390sa8150psa6150psa8155pwsa8830_firmwaresd660sd865_5g_firmwarewcn3988sd888_5g_firmwarewcn6850_firmwaresd660_firmwarewcn7850_firmwarewsa8815_firmwaresa8195p_firmwarewsa8835_firmwaresdx12sw5100_firmwaresm8475sa8295p_firmwareSnapdragon
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-33233
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 18.96%
||
7 Day CHG~0.00%
Published-09 Feb, 2023 | 06:58
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Configuration weakness in modem

Memory corruption due to configuration weakness in modem wile sending command to write protected files.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarefsm10055mdm9640_firmwaresm6250p_firmwareqcs610qca8337qca6431_firmwarewcd9360_firmwaresdx65wcn3950_firmwareqcs2290qca6595au_firmwareqca6335msm8917sd_455_firmwarecsra6620_firmwareqcs605_firmwareapq8076sd_675_firmwarecsra6640_firmwareqcs6125_firmwaresd632msm8108sa415mwcn3998wcd9371_firmwaremsm8108_firmwarewcn3950qcn6024_firmwaresd720gsd_8cx_gen2_firmwaremdm9206_firmwareqsw8573_firmwaremdm9628sd_8_gen1_5g_firmwarewcn3660bsd450_firmwaresd710_firmwaresd460_firmwaremdm9230_firmwaresm7315_firmwarewcn7850qca6574au_firmwaremdm9630wcd9375_firmwareqca8081_firmwarewcn3998_firmwaresdx12_firmwaremsm8909wapq8009w_firmwareqca6420wcd9360sd680_firmwareqca9367_firmwaremdm8207sd_8cx_gen2qcs6125apq8056_firmwareqca4004_firmwaresd662_firmwareqcs405qca6430qts110wcd9306_firmwarewcd9340sd626_firmwaresd765gqualcomm215_firmwaresw5100sd680qca6436wcn6851qcs603_firmwarewcn7851_firmwaremsm8937apq8052msm8209_firmwaremdm9250_firmwarewcn3660_firmwarewcd9341qca6431qca6696_firmwarewcd9371sd870_firmwaresd750gwcn3910_firmwaremdm9207_firmwareqca4004wsa8830_firmwaremdm9330_firmwaresd855_firmwaresd660sd865_5g_firmwaresnapdragon_4_gen_1sd712wcn3988sd660_firmwarewcn7850_firmwaresm8475msm8208_firmwarewcn6750_firmwaresd450wcn3610msm8608mdm9640wcn3991qca8337_firmwaresda429w_firmwarewcd9380_firmwaresdm429wsw5100pmsm8996au_firmwarewcd9330sd625_firmwareqca6564ausdx55m_firmwarewcn6856_firmwaremsm8940_firmwareqet4101_firmwaremsm8976_firmwareqca6574sd632_firmwaresd670_firmwarewcd9380qualcomm215mdm9230qcs410sd690_5g_firmwaresdx50m_firmwareqca9379_firmwaresdx24_firmwaresd626qca6174qca6430_firmwaresd439_firmwarewcd9335_firmwarewcn3980qca6335_firmwareqsw8573qcm4325_firmwareqcs605wcd9340_firmwarewsa8815wcn6850sd7cwcn3910msm8956_firmwareqca6584_firmwareqca6320msm8937_firmwaremdm9650_firmwareqca6426_firmwarewcn3660b_firmwarewcn3680sd695sd835qcn9024wcn3980_firmwaresd730wcd9330_firmwaresdx55mqcc5100_firmwareqca6421_firmwarewcn6740_firmwaresd821_firmwaresd678_firmwarewcn3680_firmwarewcn6851_firmwareqcs603sd670sd_636_firmwareqcn9024_firmwareqca6564a_firmwareapq8009wmsm8976sg_firmwaresdx57mqcm4290_firmwaresd480sd870wcn6855sw5100p_firmwaresd210_firmwareqcs610_firmwaresd695_firmwaresdxr1apq8096auqcs405_firmwaremdm8207_firmwaresdm630_firmwaremdm9205_firmwareqca6391_firmwaresd820_firmwarewcd9370_firmwaresd780g_firmwaresdx55sd888_firmwaresd675csra6640sdx70msd439qet4101wcn3660qca9379ar8035_firmwareqcm2290wcn3991_firmwaremdm9150_firmwarewsa8830sd678qcs2290_firmwaresd7c_firmwarecsrb31024mdm9628_firmwaresnapdragon_4_gen_1_firmwaremdm9650sd_636csra6620fsm10055_firmwareqcs4290mdm9250sd765g_firmwareqca6420_firmwareqca6390_firmwareapq8009_firmwaresd690_5gqca6174_firmwaresd730_firmwarewcd9370sd675_firmwaresd625qca6426qca6584au_firmwarewcn3990_firmwareapq8076_firmwareqca9377sdw2500_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwarewcn3615_firmwaresd662apq8037qca6320_firmwareqca6584wcn3680b_firmwaresdx55_firmwarewcn3615qca6595ausm7250p_firmwarewcn3610_firmwareqca6436_firmwaremdm9207wcd9306qca6584ausd778gqca6564au_firmwaremsm8208qca6310wcn7851sd429sa515m_firmwareqcs6490sdxr2_5gqca9367sdm630mdm9607_firmwaresd821msm8976sgsa415m_firmwarewcn3988_firmwaresd205sd429_firmwareqca6421sd778g_firmwaresm6250sd712_firmwareapq8017_firmwarewsa8810_firmwaresd765_firmwarewcd9326wcd9335sg4150pqca8081qca6174a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwaresdx70m_firmwareqca6390wcd9375sd750g_firmwareaqt1000msm8956msm8976sm6250_firmwarear8035msm8952apq8056msm8917_firmwaresda429wsd210wcn3620_firmwaresdx20_firmwarewsa8815_firmwaresd888_5g_firmwaresd820qcm6490wcn6850_firmwarewsa8835_firmwarewcn3620apq8017qcx315qca6564amdm9630_firmwaresg4150p_firmwareqcm6125_firmwareqcm4325qcm2290_firmwarewcn3990sd_675sd780gsd865_5gqcc5100sdx24sd888msm8952_firmwaremsm8909w_firmwareqcx315_firmwarewsa8835msm8996ausdm429w_firmwaresd665_firmwaresd888_5gsm6250psc8180xqca6574amdm9206wcn6855_firmwareqca6174asm7325pqca6310_firmwarewcn6750apq8052_firmwaremdm9205sa515mqca6574_firmwaresd855sm7325p_firmwaresd665sdx57m_firmwaresd765qca6574a_firmwaresd768g_firmwaremsm8209sd850_firmwaresm7315apq8009sd460qca6391sdxr1_firmwareaqt1000_firmwaremsm8920sdx65_firmwareqcm4290csrb31024_firmwareqcm6490_firmwaresdx50msdx20sd480_firmwaremsm8920_firmwaresd_455sc8180x_firmwareqca6574ausd710mdm9607sd205_firmwarewcd9341_firmwareqcm6125wsa8810mdm9150wcn6856wcn3680bsd835_firmwaresd768gwcn6740qca6696sd845_firmwaremsm8608_firmwaresdw2500msm8940apq8096au_firmwareqcn6024sd845apq8037_firmwaresm7250psd720g_firmwaresdx12sw5100_firmwareqcs410_firmwaremdm9330sd850qts110_firmwareSnapdragon
CWE ID-CWE-16
Not Available
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-49845
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 5.34%
||
7 Day CHG~0.00%
Published-06 May, 2025 | 08:32
Updated-09 May, 2025 | 19:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in HLOS

Memory corruption during the FRS UDS generation process.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qdx1011_firmwarewcd9340_firmwaresa8775psnapdragon_765_5g_mobileqca6678aqwcd9385_firmwarewcn3988_firmwaresnapdragon_x35_5g_modem-rf_firmwareqca6431_firmwareqca6678aq_firmwareqam8295p_firmwareqca6698aq_firmwaresa8775p_firmwaresnapdragon_ar1_gen_1qfw7114_firmwarewsa8832_firmwareqcs615_firmwaresd_8_gen1_5g_firmwareqdx1010wcd9385snapdragon_x55_5g_modem-rf_firmwarewcd9340qsm8350qca6797aqqcs8550_firmwarefastconnect_6900snapdragon_865\+_5g_mobile_firmwaresm6650pqcn9274fastconnect_6200_firmwareqca6574_firmwareqfw7124_firmwareqca6595ausm7250p_firmwaresa8150pqca8337_firmwarewsa8835snapdragon_888\+_5g_mobile_firmwarear8035_firmwaresc8380xp_firmwaresa9000p_firmwarewcd9390sa8195psa6150pwcd9390_firmwarewcd9395snapdragon_x55_5g_modem-rfqcs5430_firmwaresm8650qsd865_5gqca6421_firmwareqca6688aqqca6574asnapdragon_x65_5g_modem-rfsnapdragon_x72_5g_modem-rfwsa8810_firmwaresxr2330pqru1062_firmwareqru1052_firmwareqdu1110_firmwarewsa8815fastconnect_6200qca6436_firmwaresm8650q_firmwaresa6155psa8155psa7255psa8650p_firmwareqcc710qca6797aq_firmwareqca6391_firmwarefastconnect_7800qcn6224wcn7881_firmwareqca6696_firmwaresnapdragon_888\+_5g_mobilesnapdragon_765_5g_mobile_firmwaresa9000psxr2330p_firmwarewsa8845hsrv1lqdx1011sa8540p_firmwaresrv1h_firmwaresnapdragon_888_5g_mobile_firmwareqca6174asm4635_firmwareqcn6274snapdragon_x62_5g_modem-rf_firmwaresm8750psa8530psm7675qca8081wsa8840_firmwarewsa8845qru1032qca6688aq_firmwaresm4635qam8620pqru1052sa8255p_firmwareqca6431snapdragon_8_gen_1_mobilesa8145p_firmwarewcd9380_firmwaresm8635p_firmwareqamsrv1hsa8650pqam8650pqdu1000wcd9370qca6574ausa6145psnapdragon_8_gen_1_mobile_firmwarewsa8815_firmwaresnapdragon_768g_5g_mobilewcn3950_firmwareqca8081_firmwareqcm5430_firmwaresa8620psnapdragon_8_gen_3_mobile_firmwareqmp1000qca6426_firmwaresa8150p_firmwaresrv1hwcn3950wcd9395_firmwareqdu1210_firmwaresm8635wcn7860_firmwaresnapdragon_x75_5g_modem-rfwcd9380qcs8550sa8770psm8635_firmwarewcn6650qdu1010_firmwaresnapdragon_auto_5g_modem-rf_gen_2qam8620p_firmwarewsa8840fastconnect_7800_firmwaresc8380xpsnapdragon_x35_5g_modem-rfqcs5430sm8635pqca6426qdu1110wsa8835_firmwaresm8735qru1032_firmwareqam8255p_firmwareqca6696snapdragon_765g_5g_mobilesc8280xp-abbb_firmwaresa6150p_firmwarewcn6755qcn6224_firmwaresd_8_gen1_5gqcs8300_firmwareqcs8300sa8295psm7675p_firmwareqep8111qca6174a_firmwareqdu1210qca8337fastconnect_6800_firmwaresm7250pwcd9378snapdragon_xr2_5gwcn6450sm7675_firmwarewcn6650_firmwareqca6698aqsm7675psnapdragon_888_5g_mobilewcn7860sxr2130_firmwarewsa8810sd865_5g_firmwaresnapdragon_768g_5g_mobile_firmwareqmp1000_firmwaresnapdragon_x32_5g_modem-rfsa7775pqam8775pqca6574a_firmwareqfw7124qca6595au_firmwarewcn7750_firmwareqcs9100sa8530p_firmwaresa8540psa8295p_firmwaresnapdragon_x65_5g_modem-rf_firmwareqca6574snapdragon_auto_5g_modem-rf_gen_2_firmwaresxr2130sm8750_firmwareqamsrv1h_firmwarefastconnect_6800qdu1010sa7255p_firmwarefastconnect_6700_firmwaresm8750p_firmwareqcm5430sm7635sm6650p_firmwareqcs9100_firmwaresnapdragon_x32_5g_modem-rf_firmwareqamsrv1mqca6436snapdragon_8_gen_3_mobilesnapdragon_765g_5g_mobile_firmwareqcn6274_firmwareqca6421qcm6490qcc710_firmwaresm8750sm6650_firmwaresrv1m_firmwarewcn7880qam8295psa8770p_firmwaresnapdragon_865\+_5g_mobileqcm6490_firmwaresc8280xp-abbbwcn7750wsa8845_firmwareqcm8550snapdragon_x72_5g_modem-rf_firmwarewcn7880_firmwareqca6391qca6595sa8620p_firmwarewsa8845h_firmwaresnapdragon_865_5g_mobile_firmwaresa6155p_firmwarewcn6450_firmwarewcn7861qam8775p_firmwareqca6584au_firmwareqca6584auqcs6490_firmwaresa8195p_firmwareqca6574au_firmwarewcd9370_firmwaresa8155p_firmwareqfw7114sm6650qam8255psnapdragon_870_5g_mobile_firmwaresm8735_firmwarewsa8832wcn6755_firmwareqep8111_firmwaresrv1mwcd9375qru1062sa7775p_firmwarear8035snapdragon_xr2_5g_firmwareqcs615wsa8830video_collaboration_vc3_platformqcm8550_firmwaresnapdragon_ar1_gen_1_firmwarewcd9375_firmwaresnapdragon_865_5g_mobilesrv1l_firmwarewcn7861_firmwaresa8255pfastconnect_6700video_collaboration_vc3_platform_firmwareqca6595_firmwarewcn7881qsm8350_firmwaresnapdragon_x75_5g_modem-rf_firmwaresnapdragon_x62_5g_modem-rfqdu1000_firmwareqcs6490snapdragon_870_5g_mobilewcn3988wsa8830_firmwareqam8650p_firmwaresm7635_firmwaresa8145pfastconnect_6900_firmwarewcd9378_firmwareqcn9274_firmwareqamsrv1m_firmwaresa6145p_firmwareqdx1010_firmwareSnapdragon
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-49835
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 2.59%
||
7 Day CHG~0.00%
Published-06 May, 2025 | 08:32
Updated-09 May, 2025 | 19:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds Write in SPS Applications

Memory corruption while reading secure file.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qdx1011_firmwarewcd9340_firmwareqcs6125_firmwaresa8775psnapdragon_765_5g_mobileqca6678aqwcd9385_firmwarewcn3988_firmwaresnapdragon_x35_5g_modem-rf_firmwareqca6431_firmwaresnapdragon_8cx_gen_3_compute_firmwareqca6678aq_firmwareqam8295p_firmwareqcs6125snapdragon_685_4g_mobileqca6698aq_firmwaresa8775p_firmwaresnapdragon_ar1_gen_1qfw7114_firmwarewsa8832_firmwaresnapdragon_xr2\+_gen_1_firmwareqcs615_firmwaresd_8_gen1_5g_firmwareqdx1010snapdragon_x55_5g_modem-rf_firmwarewcd9385wcd9340qsm8350qcn7606_firmwaresnapdragon_855\+_mobileqca6797aqsd730_firmwareqcs8550_firmwaresnapdragon_780g_5g_mobile_firmwaresm6370_firmwarefastconnect_6900wcd9326sm6650psnapdragon_865\+_5g_mobile_firmwareqcn9274snapdragon_4_gen_1_mobilefastconnect_6200_firmwareqca6574_firmwaresa8155qca6595ausm7250p_firmwareqfw7124_firmwaresnapdragon_675_mobile_firmwaresnapdragon_x50_5g_modem-rfsa8150pqca8337_firmwaresxr1120_firmwarevideo_collaboration_vc1_platform_firmwarewsa8835wcn3990_firmwaresnapdragon_888\+_5g_mobile_firmwarear8035_firmwarecsra6640sg4150p_firmwaresnapdragon_680_4g_mobile_firmwaresc8380xp_firmwaresa9000p_firmwarewcd9390sa8195psa6150pwcd9390_firmwaresnapdragon_xr1sm4125wcd9395snapdragon_x55_5g_modem-rfsnapdragon_730_mobile_firmwareqcs5430_firmwaresm8650qsd865_5gsmart_audio_400_firmwareqca6421_firmwareqca6688aqqca6574asnapdragon_x65_5g_modem-rfsnapdragon_x72_5g_modem-rfwcn3990sxr2330pwsa8810_firmwaresd670qru1062_firmwarewcd9335_firmwareqru1052_firmwareqdu1110_firmwareqcs4290wsa8815fastconnect_6200qca6436_firmwaresm8650q_firmwaresa6155psa8155psa7255psnapdragon_780g_5g_mobilesa8650p_firmwareqcc710qca6797aq_firmwarefastconnect_7800qca6391_firmwareqcn6224wcn7881_firmwareqca6696_firmwaresnapdragon_888\+_5g_mobilesm6250snapdragon_730_mobilesnapdragon_765_5g_mobile_firmwaresa9000psa4150pcsra6640_firmwaresxr2330p_firmwaresrv1lwsa8845hqdx1011snapdragon_860_mobile_firmwaresa8540p_firmwaresrv1h_firmwaresnapdragon_888_5g_mobile_firmwareqca6174asnapdragon_8cx_gen_3_computesnapdragon_778g\+_5g_mobile_firmwaresm4635_firmwareqcn6274snapdragon_x62_5g_modem-rf_firmwaresm8750psnapdragon_690_5g_mobilesa8530psm7675qca8081aqt1000_firmwareqcm2290_firmwarewsa8840_firmwarewsa8845qru1032qca6688aq_firmwaresm4635qam8620pqcs4290_firmwaresa8155_firmwareqru1052wcn6740snapdragon_678_mobilesa8255p_firmwareqca6431sd730snapdragon_8_gen_1_mobilesnapdragon_x50_5g_modem-rf_firmwaresnapdragon_778g_5g_mobilesa8145p_firmwaresnapdragon_720g_mobile_firmwarewcn3910wcn3910_firmwaresd888snapdragon_690_5g_mobile_firmwarewcd9380_firmwaresm8635p_firmwarewcn6740_firmwareqamsrv1hsa8650psnapdragon_695_5g_mobile_firmwareqam8650pqdu1000wcd9370sa6155qca6574ausa6145psnapdragon_710_mobilesnapdragon_8_gen_1_mobile_firmwarewsa8815_firmwaresnapdragon_768g_5g_mobilesmart_audio_400snapdragon_xr1_firmwarewcn3950_firmwaresnapdragon_670_mobile_firmwaresnapdragon_782g_mobile_firmwaresm7325pqca8081_firmwareqcm5430_firmwaresa8620psnapdragon_8_gen_3_mobile_firmwareqmp1000qca6426_firmwaresrv1hsa8150p_firmwarewcn3950wcd9395_firmwareqcs2290_firmwaresm8635sa6155_firmwaresnapdragon_x75_5g_modem-rfwcd9380qdu1210_firmwareqcm4290_firmwarewcn7860_firmwareqcs8550sa8770psm8635_firmwarewcn6650qcm4290wcd9326_firmwareqdu1010_firmwareqcm6125_firmwareqcn7606sm4125_firmwaresnapdragon_480\+_5g_mobilesnapdragon_auto_5g_modem-rf_gen_2qam8620p_firmwarevideo_collaboration_vc1_platformqca6420_firmwaresm7325p_firmwaresnapdragon_xr2\+_gen_1snapdragon_662_mobile_firmwarerobotics_rb2_firmwarewsa8840fastconnect_7800_firmwareqcm6125sc8380xpwcd9341snapdragon_x35_5g_modem-rfqcs5430sm8635pqca6426qdu1110wsa8835_firmwaresm8735qru1032_firmwareqcs2290qam8255p_firmwaresnapdragon_730g_mobilewcn3980qca6696snapdragon_765g_5g_mobilesnapdragon_685_4g_mobile_firmwaresa6150p_firmwarewcn6755qcn6224_firmwaresd_8_gen1_5gqcs8300_firmwareqcs8300sa8295psm7675p_firmwareqep8111robotics_rb2qca6420qdu1210qca8337qca6174a_firmwarefastconnect_6800_firmwaresm7250psnapdragon_460_mobile_firmwaresd888_firmwarewcd9378snapdragon_xr2_5gwcn6450sm7675_firmwaresm7675pwcn6650_firmwareqca6698aqsnapdragon_888_5g_mobileqca6430snapdragon_680_4g_mobilesxr2130_firmwarewcn7860wsa8810sd865_5g_firmwaresnapdragon_768g_5g_mobile_firmwareqmp1000_firmwarewcd9341_firmwaresnapdragon_x32_5g_modem-rfsa7775pqam8775psnapdragon_4_gen_1_mobile_firmwareqca6574a_firmwareqfw7124qca6595au_firmwaresnapdragon_460_mobileqcm2290wcn7750_firmwareqcs9100sa8530p_firmwaresa8540psnapdragon_730g_mobile_firmwaresa8295p_firmwaresnapdragon_480_5g_mobilesnapdragon_x65_5g_modem-rf_firmwareqca6574snapdragon_auto_5g_modem-rf_gen_2_firmwaresm7315_firmwaresxr2130wcd9335sm8750_firmwareqamsrv1h_firmwarefastconnect_6800qdu1010sa7255p_firmwarefastconnect_6700_firmwaresm8750p_firmwaresnapdragon_480_5g_mobile_firmwareqcm5430sm7635qca6430_firmwaresxr1120sm6250_firmwaresnapdragon_695_5g_mobilesm6650p_firmwaresnapdragon_670_mobilesnapdragon_x32_5g_modem-rf_firmwareqcs9100_firmwareqamsrv1msnapdragon_8_gen_3_mobileqca6436aqt1000qcn6274_firmwaresnapdragon_765g_5g_mobile_firmwaresnapdragon_778g_5g_mobile_firmwareqca6421qcm6490qcc710_firmwaresd855_firmwaresm8750sm6650_firmwaresrv1m_firmwaresnapdragon_665_mobilewcn7880sd855qam8295psnapdragon_778g\+_5g_mobilesnapdragon_480\+_5g_mobile_firmwaresa8770p_firmwaresnapdragon_855_mobilesnapdragon_865\+_5g_mobileqcm6490_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_855\+_mobile_firmwarewcn7750sa4150p_firmwaresnapdragon_732g_mobilewsa8845_firmwareqcm8550snapdragon_675_mobilesnapdragon_7c\+_gen_3_compute_firmwaresnapdragon_x72_5g_modem-rf_firmwaresnapdragon_750g_5g_mobileqca6391qca6595sa8620p_firmwarewcn7880_firmwarecsra6620snapdragon_855_mobile_firmwarewsa8845h_firmwaresnapdragon_865_5g_mobile_firmwaresd670_firmwaresa6155p_firmwareqam8775p_firmwarewcn6450_firmwarewcn7861qca6584auqca6584au_firmwareqcs6490_firmwaresa8195p_firmwareqca6574au_firmwarewcd9370_firmwaresnapdragon_720g_mobilesnapdragon_782g_mobilesa8155p_firmwareqfw7114sm6650snapdragon_870_5g_mobile_firmwareqam8255psm8735_firmwarewcn6755_firmwarewsa8832srv1mqep8111_firmwarewcd9375snapdragon_678_mobile_firmwareqru1062sa7775p_firmwaresm6370ar8035snapdragon_xr2_5g_firmwareqcs615wsa8830video_collaboration_vc3_platformqcm8550_firmwaresnapdragon_ar1_gen_1_firmwarewcd9375_firmwaresnapdragon_865_5g_mobilewcn3980_firmwaresnapdragon_662_mobilesrv1l_firmwarewcn7861_firmwaresa8255pfastconnect_6700video_collaboration_vc3_platform_firmwareqca6595_firmwaresnapdragon_x75_5g_modem-rf_firmwarewcn7881qsm8350_firmwaresnapdragon_x62_5g_modem-rfqdu1000_firmwaresm7315snapdragon_710_mobile_firmwareqcs6490snapdragon_665_mobile_firmwaresnapdragon_870_5g_mobilewcn3988wsa8830_firmwaresnapdragon_732g_mobile_firmwarecsra6620_firmwareqam8650p_firmwaresm7635_firmwaresa8145pfastconnect_6900_firmwarewcd9378_firmwareqcn9274_firmwareqamsrv1m_firmwaresnapdragon_860_mobilesa6145p_firmwaresg4150psnapdragon_750g_5g_mobile_firmwareqdx1010_firmwareSnapdragon
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-21461
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.35%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 07:25
Updated-07 Aug, 2025 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds Write in Camera_Linux

Memory corruption when programming registers through virtual CDM.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-Snapdragon
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-21439
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.52%
||
7 Day CHG~0.00%
Published-07 Apr, 2025 | 10:16
Updated-08 Apr, 2025 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds Read in Windows WLAN Host

Memory corruption may occur while reading board data via IOCTL call when the WLAN driver copies the content to the provided output buffer.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-Snapdragon
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-49844
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 5.34%
||
7 Day CHG~0.00%
Published-06 May, 2025 | 08:32
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in Automotive

Memory corruption while triggering commands in the PlayReady Trusted application.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qdx1010_firmwaresdm429w_firmwareqcm8550_firmwarewcn6650sd865_5gsa6150p_firmwareqcs8155_firmwaresxr1120sm8735qca6595wcd9335wcd9370qca8081_firmwaresnapdragon_670_mobileqca6696qam8620p_firmwarewcn7880_firmwarewcd9340_firmwaresa8530pwcd9341_firmwaresxr2330p_firmwarewcd9395_firmwarewcn7881_firmwarewcn7750wcn6450qcc710_firmwareqca6426fastconnect_6700sa4150pwsa8832_firmwaresnapdragon_wear_4100\+_firmwareqca8337qdu1110qca6426_firmwarewcd9395qca6574au_firmwaresnapdragon_x72_5g_modem-rfqca6564_firmwareqam8295pwcd9341qca6574auwcd9390snapdragon_888\+_5g_mobile_firmwaresa8620p_firmwarewsa8810_firmwarewsa8845h_firmwaresa9000p_firmwaresrv1hsm8650q_firmwarewcn3660b_firmwareqcs9100fastconnect_6800_firmwareqcs5430wcn7860qcm5430qcm5430_firmwaresa4155psnapdragon_712_mobile_firmwaresa8770pqcc710snapdragon_x32_5g_modem-rf_firmwaresnapdragon_xr2_5g_firmwaresnapdragon_xr1_firmwaresa8540psxr1120_firmwareqsm8250_firmwareqsm8350_firmwaresnapdragon_wear_4100\+fastconnect_6900qru1032_firmwareqep8111sm8635sa7255pqfw7114wcd9385_firmwareqca6421qam8255p_firmwaresa8155_firmwaresnapdragon_x65_5g_modem-rfwsa8845sa6155pqca6421_firmwareqca6564au_firmwaresnapdragon_429_mobile_firmwarewsa8810qam8650pvideo_collaboration_vc5_platform_firmwaresa9000pqdu1000_firmwareqsm8250srv1h_firmwaresnapdragon_888_5g_mobile_firmwareqca6595ausnapdragon_888_5g_mobileqdu1010wcd9326_firmwaresa6155p_firmwarewsa8840snapdragon_ar1_gen_1srv1m_firmwareqcs8550_firmwaresnapdragon_x35_5g_modem-rf_firmwareqdu1210_firmwaresnapdragon_x55_5g_modem-rfqfw7124_firmwareqca6436_firmwaresm8750pqcn9012snapdragon_x55_5g_modem-rf_firmwaresm8635psnapdragon_x62_5g_modem-rf_firmwareqmp1000wcd9370_firmwaresnapdragon_712_mobileqdu1110_firmwareqdu1000wcn3660bqca6574asnapdragon_x72_5g_modem-rf_firmwaresa7255p_firmwarewcn3620_firmwareqca6174asa8195pwcd9340qcs8250_firmwareqdu1210snapdragon_auto_5g_modem-rf_gen_2sa8540p_firmwareqcm6490qcm8550snapdragon_765_5g_mobile_firmwareqcn9274vision_intelligence_300_firmwaresa8775pqca6574qcn9011sa8775p_firmwareqamsrv1hwsa8845hsa6150pwcd9326sm8650qsa8155p_firmwareqca6564asa8155psnapdragon_765g_5g_mobile_firmwarewsa8830sa6145psnapdragon_768g_5g_mobile_firmwaresm7675_firmwaresa8255p_firmwarear8035sm7635_firmwareqamsrv1m_firmwareqca6564wcn7750_firmwaresa8650p_firmwareqrb5165m_firmwarewcn3620wcn6450_firmwaresa6155srv1l_firmwareqcs9100_firmwaresnapdragon_865\+_5g_mobile_firmwareqcn6224snapdragon_429_mobileqcs615sa7775p_firmwareqca6698aqsm7635qrb5165nsa8530p_firmwarefastconnect_6200sd670wcn3680bsa8145p_firmwarewcd9378qcs8155sm8635p_firmwaresm6650p_firmwareqdx1011sa8150p_firmwarefastconnect_6700_firmwaresnapdragon_710_mobile_firmwarevideo_collaboration_vc3_platform_firmwarewcn3990snapdragon_x75_5g_modem-rf_firmwaresd670_firmwaresnapdragon_8_gen_3_mobileqcs6490qcs8250fastconnect_6200_firmwarewsa8830_firmwareqcn6224_firmwareqca6431qca6678aq_firmwarewsa8845_firmwarewsa8832wcd9378_firmwaresrv1lsxr2130_firmwaresm7675psrv1mqca6678aqsnapdragon_x35_5g_modem-rfar8035_firmwarewcn7860_firmwareqrb5165msc8380xpsa4150p_firmwaresnapdragon_x62_5g_modem-rfqca6564ausc8280xp-abbbwsa8815_firmwaresa8195p_firmwareqca8337_firmwareqcm6490_firmwaresm7250p_firmwareqru1032vision_intelligence_400_firmwareflight_rb5_5gsnapdragon_870_5g_mobile_firmwaresm8750qca6797aq_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresa8295p_firmwaresnapdragon_870_5g_mobilesa4155p_firmwaresm7250psa8155qca6584auqcn6274_firmwarewcn6755_firmwareqcn9011_firmwareqru1062_firmwarewcn6650_firmwaresnapdragon_768g_5g_mobilesc8380xp_firmwareqru1062snapdragon_8_gen_3_mobile_firmwarefastconnect_6800qfw7114_firmwareqcs7230qca6595_firmwarefastconnect_7800_firmwaresnapdragon_865_5g_mobile_firmwaresm8635_firmwarefastconnect_6900_firmwarerobotics_rb5_firmwarewcd9380sa6145p_firmwareqam8255psa6155_firmwareqmp1000_firmwaresnapdragon_xr2_5gwcn7880sa8150pwcn6755sxr2330pwcn7881sm6650video_collaboration_vc3_platformsm6650pqca6688aqqam8295p_firmwareqca6431_firmwarewcn3990_firmwareqca6698aq_firmwareqca6564a_firmwarewcd9385snapdragon_888\+_5g_mobileqsm8350snapdragon_8_gen_1_mobilesa8255pqcs7230_firmwarewcd9390_firmwaresnapdragon_865\+_5g_mobileqep8111_firmwareqcs615_firmwaresnapdragon_765_5g_mobileqdx1011_firmwaresdx55_firmwaresm8750_firmwareflight_rb5_5g_firmwareqru1052sxr2130snapdragon_x65_5g_modem-rf_firmwareqamsrv1mrobotics_rb5qca6174a_firmwarewcn7861_firmwarewcn7861qam8650p_firmwarevideo_collaboration_vc5_platformsnapdragon_670_mobile_firmwareqcs6490_firmwaresm6650_firmwaresdm429wqam8620pwcd9335_firmwareqrb5165n_firmwareqca6436wcn3980_firmwareqca6584au_firmwarewsa8835wsa8840_firmwareqca6391_firmwareqcn6274qfw7124qca6595au_firmwareqdu1010_firmwareqcs8300_firmwareqca6696_firmwareqcs8300wcd9380_firmwareqca6574_firmwareqca8081wsa8815sd_8_gen1_5gqam8775pqca6797aqsnapdragon_x75_5g_modem-rfsa8620psdx55qca6574a_firmwaresnapdragon_865_5g_mobilesd_8_gen1_5g_firmwarewcd9375_firmwaresa7775pqca6391snapdragon_ar1_gen_1_firmwaresnapdragon_710_mobileqcn9274_firmwareqcn9012_firmwareqcs5430_firmwaresnapdragon_x32_5g_modem-rfqru1052_firmwaresa8770p_firmwaresa8295pqcs8550sm8735_firmwaresc8280xp-abbb_firmwarefastconnect_7800sa8650pqam8775p_firmwaresd865_5g_firmwaresm8750p_firmwaresnapdragon_xr1wcd9375qca6688aq_firmwarevision_intelligence_300snapdragon_765g_5g_mobileqamsrv1h_firmwaresm7675sa8145pwsa8835_firmwarevision_intelligence_400wcn3980sm7675p_firmwareqdx1010wcn3680b_firmwaresnapdragon_8_gen_1_mobile_firmwareSnapdragon
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-45581
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.05% / 16.43%
||
7 Day CHG~0.00%
Published-06 May, 2025 | 08:32
Updated-09 May, 2025 | 19:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds Write in Audio

Memory corruption while sound model registration for voice activation with audio kernel driver.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_429_mobile_firmwareqam8295pqca6696_firmwareqca6678aqsdm429w_firmwaremdm9628_firmwaresa9000pqca6574ausa9000p_firmwaresa6145psa8195pqca6574a_firmwareqca6678aq_firmwareqam8295p_firmwaresa6150pqca6595au_firmwareqca9367qca6698aq_firmwaresa8540p_firmwareqca6696sa8530p_firmwaresa8540psa8295p_firmwareqca6564au_firmwareqca6688aqqca9377_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqca6574asa6150p_firmwarewcn3620_firmwaresa8530psa8150p_firmwareqca9367_firmwaresa8295pqca6688aq_firmwareqca6564auqca9377wcn3620qcs8550sa6155p_firmwareqcs8550_firmwaresnapdragon_429_mobilesa8195p_firmwareqca6574au_firmwaresa6155psa8155psnapdragon_auto_5g_modem-rf_gen_2sa8155p_firmwaresa8145psdm429wmdm9628qca6564aqca6595ausa8145p_firmwareqca6698aqsa6145p_firmwareqca6564a_firmwaresa8150pwcn3660b_firmwarewcn3660bSnapdragon
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-45563
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.02% / 2.59%
||
7 Day CHG~0.00%
Published-06 May, 2025 | 08:31
Updated-09 May, 2025 | 19:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds Write in Camera Driver

Memory corruption while handling schedule request in Camera Request Manager(CRM) due to invalid link count in the corresponding session.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380_firmwaresnapdragon_429_mobile_firmwarefastconnect_7800_firmwarewcn3620_firmwarewcd9385wsa8835sxr2230p_firmwarewcn3660bwcd9385_firmwaresxr2230pwcn3620sdm429w_firmwarewsa8830wsa8830_firmwarewsa8835_firmwaresxr2250p_firmwarewcd9380snapdragon_8_gen_1_mobile_firmwaresnapdragon_429_mobilefastconnect_6900sdm429wfastconnect_6900_firmwaresnapdragon_8_gen_1_mobilewsa8832_firmwarewsa8832wcn3660b_firmwarefastconnect_7800sxr2250pSnapdragon
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-45577
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 5.34%
||
7 Day CHG~0.00%
Published-06 May, 2025 | 08:32
Updated-09 May, 2025 | 19:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in Camera Driver

Memory corruption while invoking IOCTL calls from userspace to camera kernel driver to dump request information.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380_firmwaresnapdragon_429_mobile_firmwarefastconnect_7800_firmwarewcn3620_firmwarewsa8835wcn3620sdm429w_firmwarewsa8830wsa8830_firmwarewsa8835_firmwarewcd9380snapdragon_8_gen_1_mobile_firmwaresnapdragon_429_mobilefastconnect_6900sdm429wfastconnect_6900_firmwaresnapdragon_8_gen_1_mobilewcn3660b_firmwarefastconnect_7800wcn3660bSnapdragon
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-43049
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.62%
||
7 Day CHG~0.00%
Published-02 Dec, 2024 | 10:18
Updated-12 Dec, 2024 | 15:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Restriction of Operations within the Bounds of a Memory Buffer in WLAN Windows Host

Memory corruption while invoking IOCTL calls from user space to set generic private command inside WLAN driver.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800wcd9380_firmwarewsa8830sdm429wwsa8840_firmwarefastconnect_6900fastconnect_6900_firmwaresc8380xp_firmwareqcc2073wsa8835wsa8840sdm429w_firmwarefastconnect_6700_firmwaresnapdragon_7c\+_gen_3_computewcd9380fastconnect_7800_firmwarewsa8845hfastconnect_6700snapdragon_8cx_gen_3_compute_platformwcd9385qcc2076_firmwarewcd9385_firmwarewsa8845qcc2073_firmwarewcn3660bwsa8830_firmwareqcc2076wsa8845_firmwarewcn3620_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewcn3660b_firmwarewsa8835_firmwaresc8380xpsnapdragon_429_mobile_platform_firmwarewcn3620wsa8845h_firmwaresnapdragon_429_mobile_platformsnapdragon_8cx_gen_3_compute_platform_firmwareSnapdragonwcd9380_firmwareqcc2076_firmwarewsa8840_firmwarewcd9385_firmwarefastconnect_6900_firmwareqcc2073_firmwaresc8380xp_firmwarewsa8830_firmwarewsa8845_firmwarewcn3620_firmwaresdm429w_firmwarefastconnect_6700_firmwarewcn3660b_firmwarewsa8835_firmwaresnapdragon_429_mobile_platform_firmwarefastconnect_7800_firmwarewsa8845h_firmware
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-43048
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.62%
||
7 Day CHG~0.00%
Published-02 Dec, 2024 | 10:18
Updated-12 Dec, 2024 | 15:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack-based Buffer Overflow in Performance

Memory corruption when invalid input is passed to invoke GPU Headroom API call.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_662_mobile_platform_firmwarewsa8830wcd9380_firmwaresm4635_firmwarewcn3990sdm429wwcd9378_firmwareqcm8550wsa8840wsa8835sdm429w_firmwarewcn3950_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwarewcd9380wcn6755_firmwaresnapdragon_480_5g_mobile_platformsnapdragon_4_gen_1_mobile_platform_firmwarewcd9370sm8635_firmwaresnapdragon_460_mobile_platform_firmwaresnapdragon_480\+_5g_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwarewcn7880wcn3990_firmwaresnapdragon_8_gen_2_mobile_platformwcd9335_firmwarewcd9385_firmwarewsa8845wcn3950wcn7881_firmwarefastconnect_6200qcm4325_firmwarewcn3660bwsa8815snapdragon_460_mobile_platformwsa8845_firmwaresnapdragon_4_gen_1_mobile_platformwcn3660b_firmwaresnapdragon_429_mobile_platform_firmwaresnapdragon_695_5g_mobile_platform_firmwaresm8750pfastconnect_6200_firmwarewcd9375_firmwaresnapdragon_8_gen_3_mobile_platformwsa8845h_firmwaresnapdragon_429_mobile_platformsnapdragon_680_4g_mobile_platform_firmwarewcn7860fastconnect_7800qcm8550_firmwarewcn7881wcn7861_firmwarewsa8840_firmwarewsa8832_firmwaresm4635fastconnect_6900fastconnect_6900_firmwaresm8635wcn3988_firmwarewcn7880_firmwarewsa8810_firmwarewcd9341_firmwarevision_intelligence_400_platformfastconnect_7800_firmwaresnapdragon_8\+_gen_2_mobile_platformwsa8845hwcn6755wcd9395_firmwarewcd9335sg4150psm8750_firmwaresm8750p_firmwarewsa8810wsa8832sm8550psnapdragon_680_4g_mobile_platformsm8750wcd9385wcd9341wcn7860_firmwarewcd9395wcn7861wcd9375wcd9370_firmwaresm8550p_firmwarewcd9390vision_intelligence_400_platform_firmwaresnapdragon_8_gen_3_mobile_platform_firmwaresnapdragon_662_mobile_platformsnapdragon_685_4g_mobile_platformwsa8830_firmwarewcd9390_firmwarewcn3620_firmwarewcn3988wsa8815_firmwarewsa8835_firmwarewcn3620snapdragon_695_5g_mobile_platformsnapdragon_685_4g_mobile_platform_firmwarewcd9378sg4150p_firmwaresnapdragon_8_gen_2_mobile_platform_firmwaresnapdragon_480\+_5g_mobile_platformqcm4325Snapdragonsnapdragon_662_mobile_platform_firmwarewcd9380_firmwareqcm8550_firmwaresm4635_firmwarewcd9378_firmwarewcn7861_firmwarewsa8832_firmwarewsa8840_firmwarefastconnect_6900_firmwarewcn3988_firmwarewcn7880_firmwaresdm429w_firmwarewcn3950_firmwarewsa8810_firmwarewcd9341_firmwarefastconnect_7800_firmwarewcn6755_firmwarewcd9395_firmwaresm8750_firmwaresm8750p_firmwaresnapdragon_4_gen_1_mobile_platform_firmwaresm8635_firmwaresnapdragon_460_mobile_platform_firmwaresnapdragon_8_gen_2_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwarewcn3990_firmwarewcn7860_firmwarewcd9335_firmwarewcd9385_firmwarewcn7881_firmwareqcm4325_firmwarewcd9370_firmwaresm8550p_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarevision_intelligence_400_platform_firmwarewcd9390_firmwarewsa8830_firmwarewsa8845_firmwarewcn3620_firmwarewsa8815_firmwarewcn3660b_firmwarewsa8835_firmwaresnapdragon_429_mobile_platform_firmwarefastconnect_6200_firmwaresnapdragon_695_5g_mobile_platform_firmwarewcd9375_firmwarewsa8845h_firmwaresg4150p_firmwaresnapdragon_680_4g_mobile_platform_firmware
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-1942
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.05% / 15.39%
||
7 Day CHG~0.00%
Published-01 Apr, 2022 | 04:40
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper handling of permissions of a shared memory region can lead to memory corruption in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055sd_8cx_gen3_firmwaremdm9150_firmwarewcn3991_firmwaresd678sa6150p_firmwaresm6250p_firmwaresa8145p_firmwareqcs610wsa8830qcs2290_firmwarefsm10056qca8337sd7c_firmwarewcd9360_firmwarecsra6620fsm10055_firmwareqcs4290wcn3950_firmwaresa8150p_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqcs2290qca6390_firmwaresa6155sd690_5gsd730_firmwarewcd9370csra6620_firmwaresd_675_firmwaresd675_firmwarecsra6640_firmwareqca6564qca6426qrb5165n_firmwareqca9984_firmwaresa415mwcn3998wcd9385_firmwaresdxr2_5g_firmwaresd_8cx_gen2_firmwarewcn3950sd720gsm6375_firmwaresd662sd460_firmwareqcn9011_firmwaresa8155qca6574au_firmwaresdx55_firmwareqca6595ausa6155_firmwarewcd9375_firmwarewcn3998_firmwaresm7250p_firmwarewcn3999_firmwareqca6420qca6436_firmwarewcd9360qrb5165nqca6564au_firmwaresd778gsa6155p_firmwaresm6225wcn3999sd_8cx_gen2sa515m_firmwareqcs6490qrb5165_firmwareqrb5165m_firmwaresdxr2_5gsa4155p_firmwaresa8155_firmwaresd662_firmwaresa415m_firmwareqcs405qca6430wcn3988_firmwaresa6145p_firmwaresm6250sd778g_firmwarewcd9340sa8195pwsa8810_firmwaresd765gsw5100sd765_firmwarefsm10056_firmwareqca6436wcn6851wcd9335sa6155pqcs4290_firmwarewcd9385wcd9341qca6696_firmwareqcs6490_firmwaresd750gsd870_firmwaresd_8cx_gen3qca6390ar8035sd750g_firmwareaqt1000sa8150psxr2150p_firmwaresm6250_firmwarewcd9375wcn3910_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwareqcm6490sd888_5g_firmwarewcn3988wcn6850_firmwarewsa8815_firmwarewsa8835_firmwaresa8195p_firmwareqcx315qca6564awcn6750_firmwaresa4150pqcm2290_firmwaresm6375wcn3991qca8337_firmwarewcd9380_firmwaresd_675sw5100psd865_5gqca6564ausdx55m_firmwarewcn6856_firmwareqcn9012wsa8835qca6574qcx315_firmwarewcd9380sd888_5gsm6250pqcs410qca6574asd690_5g_firmwarewcn6855_firmwaresm7325pqca6430_firmwareqcn9012_firmwarewcd9335_firmwarewcn3980wcn6750sa515mqca6574_firmwarewcd9340_firmwaresd855wsa8815sm7325p_firmwaresd7cwcn3910wcn6850sdx57m_firmwaresd765qca6426_firmwareqca6574a_firmwareqca9984sd768g_firmwareqrb5165mwcn3980_firmwaresd460qca6391sd730sdx55msxr2150paqt1000_firmwaresd678_firmwarear8031_firmwareqcm4290qcm6490_firmwareqrb5165sd480_firmwarewcn6851_firmwareqcn9011sm6225_firmwareqca6574ausa8155p_firmwareqca6564a_firmwaresdx57mwcd9341_firmwareqcm4290_firmwaresd480sd870wcn6855wsa8810sw5100p_firmwareqcs610_firmwaremdm9150wcn6856qsm8250sa6145pqca6564_firmwaresd768gar8031qcs405_firmwaresa8145pqca6696qca6391_firmwaresa4150p_firmwarewcd9370_firmwaresa6150psdx55sa8155pcsra6640sd675sm7250psd720g_firmwaresw5100_firmwareqcs410_firmwaresa4155par8035_firmwareqcm2290qsm8250_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-1892
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.04% / 10.42%
||
7 Day CHG~0.00%
Published-07 Apr, 2021 | 07:55
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory corruption due to improper input validation while processing IO control which is nonstandard in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qfe3100qca9377_firmwareqca2066wcn3990qca1062_firmwareqfe4455fc_firmwareqfe3440fc_firmwarewgr7640wcn6856_firmwarepm8005_firmwareqfe2081fc_firmwareqca6420_firmwareqca6595au_firmwaresmb1351_firmwaresd850qln1035bdqca6335qca6174_firmwarepm8998_firmwaresmb1380_firmwaresmb1381pm855p_firmwarewcn6855_firmwarewtr5975_firmwareqfe3100_firmwaresmb1390_firmwareqca6174asd8cwcn3990_firmwareqca6310_firmwarewtr5975qca6174qca9377qca6430_firmwarewcn3998wcd9335_firmwareqcn7605qca6335_firmwarewcd9340_firmwarewgr7640_firmwarewsa8815sd8cxwcn6850smb1380qca1064smb2351_firmwaresd835qca6595auwcn3998_firmwaresd850_firmwaresmb1351qca6391pm855pqca6420sd8cx_firmwareaqt1000_firmwareqfe2082fcqca6310sd8c_firmwarepmi8998qfe2081fcpm855sdr8150qfe2082fc_firmwarewcn6851_firmwareqca6164_firmwareqca6430qfe4455fcwcd9340qln1035bd_firmwarewsa8810_firmwarewcd9341_firmwareqfe3440fcwsa8810wcn6855wcn6851wcd9335qcn7605_firmwarepmi8998_firmwareqat3550pm8005wcn6856pm855_firmwaresd835_firmwareqca6174a_firmwaresdr8150_firmwarewcd9341qca2066_firmwareqet4100_firmwaresmb1350qca1064_firmwareqca1062qat3550_firmwareqca6164smb1350_firmwareqca6391_firmwaresmb1381_firmwaresd845_firmwareaqt1000sd845wsa8815_firmwarewcn6850_firmwarepm8998smb1390qcn7606_firmwaresmb2351qet4100qcn7606Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-33041
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 3.85%
||
7 Day CHG~0.00%
Published-06 Jan, 2025 | 10:33
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use of Out-of-range Pointer Offset in Computer Vision

Memory corruption when input parameter validation for number of fences is missing for fence frame IOCTL calls,

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcm8550_firmwaresa6150p_firmwarewsa8845_firmwarewsa8832sa6155p_firmwarewsa8840qam8295p_firmwareqcs8550_firmwareqca6696snapdragon_8_gen_2_mobile_firmwarewcd9385wcd9395_firmwaresxr1230p_firmwarewcd9390_firmwaresnapdragon_8_gen_2_mobilesg8275pwsa8832_firmwaresa8195p_firmwarewcd9395ssg2125psg8275p_firmwaresnapdragon_8\+_gen_2_mobileqca6574au_firmwaresa8195pqam8295pqca6574auwcd9390wsa8845h_firmwaresm8550p_firmwareqcm8550qcs6490_firmwarewsa8835wsa8840_firmwaresa8295p_firmwareqca6696_firmwarewsa8845hwcd9380_firmwaresa6150psa8155p_firmwaresa8155pwsa8830sm8550psa6145pssg2115psnapdragon_8_gen_3_mobile_firmwarefastconnect_7800_firmwarefastconnect_6900ssg2125p_firmwarewcd9385_firmwarefastconnect_6900_firmwaresa8295pqcs8550sa6145p_firmwarewcd9380fastconnect_7800sa8145p_firmwaresa8150psnapdragon_8\+_gen_2_mobile_firmwaresa8150p_firmwarewsa8845sa6155pvideo_collaboration_vc3_platform_firmwaresa8145pwsa8835_firmwaressg2115p_firmwaresxr1230pqcs6490snapdragon_8_gen_3_mobilewsa8830_firmwarevideo_collaboration_vc3_platformSnapdragon
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-823
Use of Out-of-range Pointer Offset
CVE-2024-38399
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.03% / 8.29%
||
7 Day CHG~0.00%
Published-07 Oct, 2024 | 12:58
Updated-16 Oct, 2024 | 18:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Graphics

Memory corruption while processing user packets to generate page faults.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qam8255p_firmwaresnapdragon_8_gen_1_mobile_platformwsa8830wcd9380_firmwareqam8650pqca6595qam8775pqamsrv1mwsa8835wcn3950_firmwarewcd9380snapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmwareqca6595au_firmwaresnapdragon_685_4g_mobile_platform_\(sm6225-ad\)wcd9370qamsrv1hqam8295pwcn3950sa8650pqamsrv1h_firmwaresa9000pqca6688aqqam8295p_firmwaresa9000p_firmwaresa8775pqca6574au_firmwaresa7255pwcd9375_firmwareqca6595ausnapdragon_680_4g_mobile_platform_firmwaresa8295pfastconnect_7800sa8620p_firmwaresa6155p_firmwaresa8775p_firmwaresa8650p_firmwareqca6698aqfastconnect_6900srv1h_firmwarefastconnect_6900_firmwareqca6797aq_firmwareqca6574ausrv1hsa8155p_firmwaresa7775p_firmwaresa8195psa7255p_firmwarewsa8810_firmwarefastconnect_7800_firmwarewsa8810sa8620psa8255p_firmwaresg4150psa6155psnapdragon_8_gen_1_mobile_platform_firmwaresnapdragon_680_4g_mobile_platformqca6698aq_firmwaresrv1m_firmwaresa7775pqamsrv1m_firmwareqam8650p_firmwaresa8770p_firmwaresa8255pqam8775p_firmwareqca6696_firmwareqca6595_firmwareqca6696qca6797aqwcd9375wcd9370_firmwaresa8155pwsa8830_firmwarewsa8835_firmwaresrv1msa8195p_firmwaresa8295p_firmwareqam8255psg4150p_firmwaresa8770pqca6688aq_firmwareSnapdragonqam8255p_firmwaresa8620p_firmwaresa6155p_firmwarewcd9380_firmwaresa8775p_firmwaresa8650p_firmwarefastconnect_6900_firmwaresrv1h_firmwareqca6797aq_firmwaresa8155p_firmwaresa7775p_firmwaresa7255p_firmwarewcn3950_firmwarewsa8810_firmwarefastconnect_7800_firmwareqca6595au_firmwaresa8255p_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareqca6698aq_firmwareqamsrv1m_firmwaresrv1m_firmwareqam8650p_firmwaresa8770p_firmwareqam8775p_firmwareqca6696_firmwareqca6595_firmwareqamsrv1h_firmwarewcd9370_firmwarewsa8830_firmwareqam8295p_firmwaresa9000p_firmwarewsa8835_firmwareqca6574au_firmwaresa8195p_firmwarewcd9375_firmwaresa8295p_firmwaresg4150p_firmwaresnapdragon_680_4g_mobile_platform_firmwareqca6688aq_firmware
CWE ID-CWE-416
Use After Free
CVE-2024-38418
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.75%
||
7 Day CHG~0.00%
Published-03 Feb, 2025 | 16:51
Updated-05 Feb, 2025 | 13:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Camera Linux

Memory corruption while parsing the memory map info in IOCTL calls.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800_firmwareqca6426sdm429wqca6696sd865_5gcsrb31024qcs610sa8155p_firmwareqam8295p_firmwaresd865_5g_firmwarec-v2x_9150_firmwaresa8195p_firmwaresa8145p_firmwareqcn9074_firmwarewcn3620_firmwarevideo_collaboration_vc1_platform_firmwarewcn3680bwcd9380_firmwaresnapdragon_auto_4g_modemqca6574au_firmwareqsm8250_firmwareqca6391_firmwaresa8195psnapdragon_auto_4g_modem_firmwarewcn3950_firmwareqca6391wcn3660bsdm429w_firmwarec-v2x_9150wcn3980wcn3950video_collaboration_vc3_platform_firmwaresnapdragon_w5\+_gen_1_wearablesw5100sxr2230pwcd9370sa8540p_firmwaresnapdragon_x55_5g_modem-rfsw5100p_firmwaresa8295p_firmwaresnapdragon_865\+_5g_mobilesa8150p_firmwaresxr2230p_firmwaresnapdragon_429_mobile_firmwarewsa8835sa9000psxr2130csrb31024_firmwareqsm8250qca6426_firmwareqcn9074fastconnect_7800sa6155p_firmwarewcd9341_firmwaresnapdragon_8_gen_1_mobileqca6564au_firmwaresnapdragon_870_5g_mobilesnapdragon_865_5g_mobile_firmwareqam8295psnapdragon_xr2_5g_firmwarewcd9341wcn3988snapdragon_x55_5g_modem-rf_firmwaresnapdragon_865_5g_mobileqca6574ausa8150psa6150p_firmwarefastconnect_6900snapdragon_xr2_5gwcn3988_firmwaresw5100_firmwaresxr2250pfastconnect_6800snapdragon_429_mobileqcs410_firmwaresa8530p_firmwareqca6696_firmwaresnapdragon_8_gen_1_mobile_firmwarewsa8810_firmwarewcd9385_firmwaresa6150pwcn3680b_firmwarewsa8810wsa8832sa8295psa6145p_firmwareqcs610_firmwaresa6145psnapdragon_870_5g_mobile_firmwarewsa8815snapdragon_w5\+_gen_1_wearable_firmwareqcs410sdx55sdx55_firmwaresa6155psnapdragon_865\+_5g_mobile_firmwarewcd9380video_collaboration_vc3_platformwsa8830qca6436_firmwarewsa8815_firmwaresa8155pwsa8832_firmwaresa8145psw5100psa8530pwsa8830_firmwarewcn3620wcn3980_firmwareqca6564ausxr2130_firmwarevideo_collaboration_vc1_platformqca6436fastconnect_6900_firmwaresa8540pqca6595au_firmwaresa9000p_firmwarefastconnect_6800_firmwarewcd9385qca6595auwcn3660b_firmwarewsa8835_firmwaresxr2250p_firmwarewcd9370_firmwareSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • ...
  • 46
  • 47
  • Next
Details not found