Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-52060

Summary
Assigner-RTI
Assigner Org ID-3f572a00-62e2-4423-959a-7ea25eff1638
Published At-13 Dec, 2024 | 10:19
Updated At-07 Feb, 2025 | 21:48
Rejected At-
Credits

Potential stack overflow when using XML configuration file referencing environment variables

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Routing Service, Recording Service, Queuing Service, Observability Collector Service, Cloud Discovery Service) allows Buffer Overflow via Environment Variables.This issue affects Connext Professional: from 7.0.0 before 7.3.0.5, from 6.1.0 before 6.1.2.21, from 6.0.0 before 6.0.*, from 5.3.0 before 5.3.1.45.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:RTI
Assigner Org ID:3f572a00-62e2-4423-959a-7ea25eff1638
Published At:13 Dec, 2024 | 10:19
Updated At:07 Feb, 2025 | 21:48
Rejected At:
▼CVE Numbering Authority (CNA)
Potential stack overflow when using XML configuration file referencing environment variables

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Routing Service, Recording Service, Queuing Service, Observability Collector Service, Cloud Discovery Service) allows Buffer Overflow via Environment Variables.This issue affects Connext Professional: from 7.0.0 before 7.3.0.5, from 6.1.0 before 6.1.2.21, from 6.0.0 before 6.0.*, from 5.3.0 before 5.3.1.45.

Affected Products
Vendor
RTI
Product
Connext Professional
Modules
  • Routing Service
  • Recording Service
  • Queuing Service
  • Observability Collector Service
  • Cloud Discovery Service
Default Status
unaffected
Versions
Affected
  • From 7.0.0 before 7.3.0.5 (custom)
  • From 6.1.0 before 6.1.2.21 (custom)
  • From 6.0.0 before 6.0.1.40 (custom)
  • From 5.3.0 before 5.3.1.45 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-120CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Type: CWE
CWE ID: CWE-120
Description: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Metrics
VersionBase scoreBase severityVector
4.08.3HIGH
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
Version: 4.0
Base score: 8.3
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-10CAPEC-10 Buffer Overflow via Environment Variables
CAPEC ID: CAPEC-10
Description: CAPEC-10 Buffer Overflow via Environment Variables
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.rti.com/vulnerabilities/#cve-2024-52060
N/A
Hyperlink: https://www.rti.com/vulnerabilities/#cve-2024-52060
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:3f572a00-62e2-4423-959a-7ea25eff1638
Published At:13 Dec, 2024 | 11:15
Updated At:02 Oct, 2025 | 13:36

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Routing Service, Recording Service, Queuing Service, Observability Collector Service, Cloud Discovery Service) allows Buffer Overflow via Environment Variables.This issue affects Connext Professional: from 7.0.0 before 7.3.0.5, from 6.1.0 before 6.1.2.21, from 6.0.0 before 6.0.*, from 5.3.0 before 5.3.1.45.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.08.3HIGH
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 4.0
Base score: 8.3
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

rti
rti
>>connext_professional>>Versions from 5.3.0(inclusive) to 5.3.1.45(exclusive)
cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:*
rti
rti
>>connext_professional>>Versions from 6.0.0(inclusive) to 6.0.1.40(exclusive)
cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:*
rti
rti
>>connext_professional>>Versions from 6.1.0(inclusive) to 6.1.2.21(exclusive)
cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:*
rti
rti
>>connext_professional>>Versions from 7.0.0(inclusive) to 7.3.0.5(exclusive)
cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-120Secondary3f572a00-62e2-4423-959a-7ea25eff1638
CWE ID: CWE-120
Type: Secondary
Source: 3f572a00-62e2-4423-959a-7ea25eff1638
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.rti.com/vulnerabilities/#cve-2024-520603f572a00-62e2-4423-959a-7ea25eff1638
Vendor Advisory
Hyperlink: https://www.rti.com/vulnerabilities/#cve-2024-52060
Source: 3f572a00-62e2-4423-959a-7ea25eff1638
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

377Records found

CVE-2025-1253
Matching Score-10
Assigner-Real-Time Innovations, Inc.
ShareView Details
Matching Score-10
Assigner-Real-Time Innovations, Inc.
CVSS Score-6.9||MEDIUM
EPSS-0.08% / 22.91%
||
7 Day CHG~0.00%
Published-08 May, 2025 | 08:32
Updated-16 Dec, 2025 | 16:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), Stack-based Buffer Overflow vulnerability in RTI Connext Professional (Core Libraries) allows Overflow Variables and Tags.

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), Stack-based Buffer Overflow vulnerability in RTI Connext Professional (Core Libraries) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.4.0 before 7.5.0, from 7.0.0 before 7.3.0.7, from 6.1.0 before 6.1.2.23, from 6.0.0 before 6.0.1.42, from 5.3.0 before 5.3.*, from 4.5c before 5.2.*.

Action-Not Available
Vendor-rtiRTI
Product-connext_professionalConnext Professional
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2024-52059
Matching Score-10
Assigner-Real-Time Innovations, Inc.
ShareView Details
Matching Score-10
Assigner-Real-Time Innovations, Inc.
CVSS Score-6.9||MEDIUM
EPSS-0.35% / 57.45%
||
7 Day CHG+0.09%
Published-13 Dec, 2024 | 10:18
Updated-02 Dec, 2025 | 16:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), Heap-based Buffer Overflow, Integer Overflow or Wraparound vulnerability in RTI Connext Professional (Security Plugins) allows Overflow Variables and Tags.

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), Heap-based Buffer Overflow, Integer Overflow or Wraparound vulnerability in RTI Connext Professional (Security Plugins) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.0.0 before 7.3.0.2, from 6.1.0 before 6.1.2.17.

Action-Not Available
Vendor-rtiRTI
Product-connext_professionalConnext Professional
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-38427
Matching Score-8
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-8
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-6.6||MEDIUM
EPSS-0.10% / 27.50%
||
7 Day CHG~0.00%
Published-05 May, 2022 | 15:25
Updated-16 Apr, 2025 | 16:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
RTI Connext DDS Professional and Connext DDS Secure Stack-based Buffer Overflow

RTI Connext DDS Professional and Connext DDS Secure Versions 4.2.x to 6.1.0 are vulnerable to a stack-based buffer overflow, which may allow a local attacker to execute arbitrary code.

Action-Not Available
Vendor-rtiRTI
Product-connext_secureconnext_professionalConnext DDS ProfessionalConnext DDS Secure
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-38433
Matching Score-8
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-8
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-6.6||MEDIUM
EPSS-0.10% / 26.19%
||
7 Day CHG~0.00%
Published-05 May, 2022 | 15:27
Updated-16 Apr, 2025 | 16:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
RTI Connext DDS Professional and Connext DDS Secure Stack-based Buffer Overflow

RTI Connext DDS Professional and Connext DDS Secure Versions 4.2x to 6.1.0 vulnerable to a stack-based buffer overflow, which may allow a local attacker to execute arbitrary code.

Action-Not Available
Vendor-rtiRTI
Product-connext_secureconnext_professionalConnext DDS ProfessionalConnext DDS Secure
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2024-52058
Matching Score-8
Assigner-Real-Time Innovations, Inc.
ShareView Details
Matching Score-8
Assigner-Real-Time Innovations, Inc.
CVSS Score-8.6||HIGH
EPSS-0.69% / 72.00%
||
7 Day CHG+0.18%
Published-13 Dec, 2024 | 10:17
Updated-02 Oct, 2025 | 13:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential arbitrary command execution in System Designer while parsing malicious HTTP/REST requests

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in RTI Connext Professional (System Designer) allows OS Command Injection.This issue affects Connext Professional: from 7.0.0 before 7.3.0.2, from 6.1.0 before 6.1.2.19.

Action-Not Available
Vendor-rtiRTI
Product-connext_professionalConnext Professional
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-52062
Matching Score-6
Assigner-Real-Time Innovations, Inc.
ShareView Details
Matching Score-6
Assigner-Real-Time Innovations, Inc.
CVSS Score-6.9||MEDIUM
EPSS-0.29% / 52.62%
||
7 Day CHG+0.08%
Published-13 Dec, 2024 | 10:20
Updated-02 Oct, 2025 | 13:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential stack buffer write overflow in Connext applications while parsing malicious XML types document

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Core Libraries) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.0.0 before 7.3.0.5, from 6.1.0 before 6.1.2.21, from 6.0.0 before 6.0.1.40, from 5.0.0 before 5.3.1.45.

Action-Not Available
Vendor-rtiRTI
Product-connext_professionalConnext Professional
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-52064
Matching Score-6
Assigner-Real-Time Innovations, Inc.
ShareView Details
Matching Score-6
Assigner-Real-Time Innovations, Inc.
CVSS Score-6.9||MEDIUM
EPSS-0.21% / 43.02%
||
7 Day CHG~0.00%
Published-13 Dec, 2024 | 10:21
Updated-02 Oct, 2025 | 13:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential stack buffer write overflow in Connext applications while parsing malicious license file

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Core Libraries) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.0.0 before 7.3.0.2, from 6.1.0 before 6.1.2.21, from 6.0.0 before 6.0.1.40, from 5.0.0 before 5.3.1.45.

Action-Not Available
Vendor-rtiRTI
Product-connext_professionalConnext Professional
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-52066
Matching Score-6
Assigner-Real-Time Innovations, Inc.
ShareView Details
Matching Score-6
Assigner-Real-Time Innovations, Inc.
CVSS Score-8.3||HIGH
EPSS-0.66% / 71.20%
||
7 Day CHG+0.17%
Published-13 Dec, 2024 | 10:23
Updated-02 Oct, 2025 | 13:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential stack corruption in Routing Service when using a malicious XML configuration document

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Routing Service) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.4.0 before 7.5.0, from 7.0.0 before 7.3.0.5, from 6.1.0 before 6.1.2.21, from 6.0.0 before 6.0.1.40.

Action-Not Available
Vendor-rtiRTI
Product-connext_professionalConnext Professional
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-52065
Matching Score-6
Assigner-Real-Time Innovations, Inc.
ShareView Details
Matching Score-6
Assigner-Real-Time Innovations, Inc.
CVSS Score-6.9||MEDIUM
EPSS-0.21% / 43.02%
||
7 Day CHG~0.00%
Published-13 Dec, 2024 | 10:22
Updated-02 Oct, 2025 | 13:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential stack buffer write overflow in Persistence Service while parsing malicious environment variable on non-Windows systems

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional on non-Windows (Persistence Service) allows Buffer Overflow via Environment Variables.This issue affects Connext Professional: from 7.0.0 before 7.3.0.2, from 6.1.1.2 before 6.1.2.21, from 5.3.1.40 before 5.3.1.41.

Action-Not Available
Vendor-rtiRTI
Product-connext_professionalConnext Professional
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-52061
Matching Score-6
Assigner-Real-Time Innovations, Inc.
ShareView Details
Matching Score-6
Assigner-Real-Time Innovations, Inc.
CVSS Score-8.3||HIGH
EPSS-1.15% / 78.64%
||
7 Day CHG+0.30%
Published-13 Dec, 2024 | 10:20
Updated-02 Oct, 2025 | 13:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential stack buffer overflow when parsing an XML type

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Core Libraries, Queuing Service, Recording Service, Routing Service) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.4.0 before 7.5.0, from 7.0.0 before 7.3.0.5, from 6.1.0 before 6.1.2.21, from 6.0.0 before 6.0.1.40, from 5.0.0 before 5.3.1.45.

Action-Not Available
Vendor-rtiRTI
Product-connext_professionalConnext Professional
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-52063
Matching Score-6
Assigner-Real-Time Innovations, Inc.
ShareView Details
Matching Score-6
Assigner-Real-Time Innovations, Inc.
CVSS Score-8.3||HIGH
EPSS-0.61% / 69.80%
||
7 Day CHG~0.00%
Published-13 Dec, 2024 | 10:21
Updated-02 Oct, 2025 | 13:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential stack buffer write overflow in Connext applications while parsing malicious XML types document

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Core Libraries, Routing Service) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.0.0 before 7.3.0.5, from 6.1.0 before 6.1.2.21, from 6.0.0 before 6.0.1.40, from 5.0.0 before 5.3.1.45.

Action-Not Available
Vendor-rtiRTI
Product-connext_professionalConnext Professional
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-25724
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.3||HIGH
EPSS-0.28% / 51.54%
||
7 Day CHG~0.00%
Published-21 May, 2024 | 18:38
Updated-21 Oct, 2025 | 11:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In RTI Connext Professional 5.3.1 through 6.1.0 before 6.1.1, a buffer overflow in XML parsing from Routing Service, Recording Service, Queuing Service, and Cloud Discovery Service allows attackers to execute code with the affected service's privileges, compromise the service's integrity, leak sensitive information, or crash the service. These attacks could be done via a remote malicious RTPS message; a compromised call with malicious parameters to the RTI_RoutingService_new, rti::recording::Service, RTI_QueuingService_new, or RTI_CDS_Service_new public APIs; or a compromised local file system containing a malicious XML file.

Action-Not Available
Vendor-rtin/arti
Product-connext_professionaln/aconnext_dds_professional
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-42624
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.57%
||
7 Day CHG~0.00%
Published-04 Nov, 2021 | 10:36
Updated-04 Aug, 2024 | 03:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A local buffer overflow vulnerability exists in the latest version of Miniftpd in ftpproto.c through the tmp variable, where a crafted payload can be sent to the affected function.

Action-Not Available
Vendor-miniftpd_projectn/a
Product-miniftpdn/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-51798
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 13.87%
||
7 Day CHG~0.00%
Published-19 Apr, 2024 | 00:00
Updated-07 Jan, 2026 | 15:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a local attacker to execute arbitrary code via a floating point exception (FPE) error at libavfilter/vf_minterpolate.c:1078:60 in interpolate.

Action-Not Available
Vendor-n/aFedora ProjectFFmpeg
Product-ffmpegfedoran/affmpeg
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-51434
Matching Score-4
Assigner-Honor Device Co., Ltd.
ShareView Details
Matching Score-4
Assigner-Honor Device Co., Ltd.
CVSS Score-9.3||CRITICAL
EPSS-0.04% / 10.83%
||
7 Day CHG~0.00%
Published-29 Dec, 2023 | 03:49
Updated-02 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Some Honor products are affected by buffer overflow vulnerability, successful exploitation could cause code execution.

Action-Not Available
Vendor-Honor Device Co., Ltd.
Product-magic_uiMagic UI
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-52614
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.99%
||
7 Day CHG~0.00%
Published-18 Mar, 2024 | 10:14
Updated-04 May, 2025 | 07:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PM / devfreq: Fix buffer overflow in trans_stat_show

In the Linux kernel, the following vulnerability has been resolved: PM / devfreq: Fix buffer overflow in trans_stat_show Fix buffer overflow in trans_stat_show(). Convert simple snprintf to the more secure scnprintf with size of PAGE_SIZE. Add condition checking if we are exceeding PAGE_SIZE and exit early from loop. Also add at the end a warning that we exceeded PAGE_SIZE and that stats is disabled. Return -EFBIG in the case where we don't have enough space to write the full transition table. Also document in the ABI that this function can return -EFBIG error.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-51793
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 9.81%
||
7 Day CHG~0.00%
Published-19 Apr, 2024 | 00:00
Updated-07 Jan, 2026 | 17:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a local attacker to execute arbitrary code via the libavutil/imgutils.c:353:9 in image_copy_plane.

Action-Not Available
Vendor-n/aFFmpeg
Product-ffmpegn/affmpeg
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-41216
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 5.46%
||
7 Day CHG~0.00%
Published-05 Nov, 2021 | 22:10
Updated-04 Aug, 2024 | 03:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Heap buffer overflow in `Transpose`

TensorFlow is an open source platform for machine learning. In affected versions the shape inference function for `Transpose` is vulnerable to a heap buffer overflow. This occurs whenever `perm` contains negative elements. The shape inference function does not validate that the indices in `perm` are all valid. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.

Action-Not Available
Vendor-Google LLCTensorFlow
Product-tensorflowtensorflow
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-43896
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.09% / 25.10%
||
7 Day CHG~0.00%
Published-10 Oct, 2023 | 00:00
Updated-19 Sep, 2024 | 14:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A buffer overflow in Macrium Reflect 8.1.7544 and below allows attackers to escalate privileges or execute arbitrary code.

Action-Not Available
Vendor-macriumn/a
Product-reflectn/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-43542
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.07%
||
7 Day CHG~0.00%
Published-03 Jun, 2024 | 10:05
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in Trusted Execution Environment

Memory corruption while copying a keyblob`s material when the key material`s size is not accurately checked.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qdx1010_firmwareqcm8550_firmwarerobotics_rb3sa6150p_firmwaresd865_5gqcs8155_firmwareqca6595wcd9335wcd9370qca8081_firmwaresnapdragon_670_mobileqca4004qca6696snapdragon_x70_modem-rf_firmwarewcd9340_firmwarewcd9341_firmwarewcd9395_firmwareqcn6024qcc710_firmwareqca6426snapdragon_8\+_gen_1_mobilewcn6740_firmwarefastconnect_6700snapdragon_780g_5g_mobileqca9984_firmwaresnapdragon_685_4g_mobilesa4150psnapdragon_782g_mobile_firmwaresnapdragon_x50_5g_modem-rf_firmwarewsa8832_firmwareqca8337qdu1110qca6426_firmwarewcd9395snapdragon_665_mobile_firmwaresc8180xp-aaab9205_lte_modemqca6574au_firmwareqcn7606_firmwareqca6564_firmwareqam8295pwcd9341snapdragon_wear_1300qca6574auwcd9390snapdragon_888\+_5g_mobile_firmwarewsa8810_firmwarewsa8845h_firmwarecsra6640snapdragon_778g_5g_mobile_firmwaresa9000p_firmwaresc8180xp-acafsnapdragon_850_mobile_computefastconnect_6800_firmwareqcs5430qcn6024_firmwareqcm5430qcm5430_firmwaresa4155psa8770psnapdragon_678_mobile_firmwaressg2115pqcc710snapdragon_xr2_5g_firmwaresa8540pqsm8350_firmwarefastconnect_6900qru1032_firmwarefsm10056_firmwareqfw7114wcd9385_firmwareqca6421qca6310qam8255p_firmwaresa8155_firmwareqca6335snapdragon_x65_5g_modem-rfqcs4490snapdragon_680_4g_mobilewsa8845sa6155pqca6421_firmwaresc8180x-adqca6564au_firmwarewsa8810qam8650pvideo_collaboration_vc5_platform_firmwaresa9000pqdu1000_firmwaresnapdragon_888_5g_mobile_firmwareqca6595ausnapdragon_888_5g_mobilesm7315_firmwareqdu1010snapdragon_662_mobile_firmwaresa6155p_firmwaresnapdragon_685_4g_mobile_firmwarewcd9326_firmwaresnapdragon_845_mobile_firmwarewsa8840qcs8550_firmwaresnapdragon_782g_mobileqdu1210_firmwaresnapdragon_8_gen_2_mobile_firmwaresnapdragon_x55_5g_modem-rfqfw7124_firmwaresnapdragon_4_gen_2_mobile_firmwareqca6436_firmwareqcn9012snapdragon_695_5g_mobile_firmwareqcs4490_firmwaresnapdragon_x55_5g_modem-rf_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewcn3910_firmwaresm4125_firmwaresnapdragon_460_mobilesnapdragon_8_gen_2_mobileqca6420wcn3910wcd9370_firmwareqdu1110_firmwareqdu1000qca6574asnapdragon_8\+_gen_2_mobileqca6174asa8195pwcd9340qcs8250_firmwareqcm2290qdu1210snapdragon_auto_5g_modem-rf_gen_2qca6335_firmwareqcm6490sa8540p_firmwaresm8550p_firmwareqcm8550wcn3988snapdragon_765_5g_mobile_firmwaresnapdragon_662_mobileqcn9024vision_intelligence_300_firmwaresa8775pqca6574sxr2230p_firmwaresd675_firmwaresnapdragon_855_mobile_firmwareqca6430_firmwareqcn9011sa8775p_firmwaresdx57msmart_audio_400qcn9024_firmwarewsa8845hsa6150pwcd9326qcm2290_firmwaresa8155p_firmwareqca6564asa8155psnapdragon_765g_5g_mobile_firmwarewsa8830sm8550psa6145psnapdragon_768g_5g_mobile_firmwaresa8255p_firmwarear8035snapdragon_4_gen_2_mobileqca6564sa6155qrb5165m_firmwareqcm4325qcn6224snapdragon_865\+_5g_mobile_firmwareqca6698aqwcn3950_firmwaressg2125p_firmwareqrb5165nsnapdragon_480\+_5g_mobilefastconnect_6200sd670sm7325p_firmwaresa8145p_firmwaresd460sc8180x-acaf_firmwaresnapdragon_480_5g_mobile_firmwareqcs8155qdx1011sa8150p_firmwarefastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwarewcn3990robotics_rb3_firmwaresnapdragon_x75_5g_modem-rf_firmwaresd670_firmwaresnapdragon_855_mobileqcs6490qcs8250snapdragon_695_5g_mobilesc8180xp-acaf_firmwaresnapdragon_778g_5g_mobilefastconnect_6200_firmwarear8031_firmwarewsa8830_firmwaresnapdragon_460_mobile_firmwareqcn6224_firmwareqca6431wsa8845_firmwarewsa8832snapdragon_480_5g_mobilesdx57m_firmwaresxr2130_firmwaresnapdragon_860_mobile_firmwarear8035_firmwaresc8180xp-aaab_firmwaresnapdragon_778g\+_5g_mobileqrb5165msc8380xpsa4150p_firmwaresd888_firmwarewcd9306qca6564ausc8180xp-adsnapdragon_wear_1300_firmwaresc8280xp-abbbwsa8815_firmwaresa8195p_firmwareqca8337_firmwareqcm4290ar8031sg8275p_firmwareqca9377_firmwareqcm6490_firmwaresnapdragon_665_mobilesm7250p_firmwarewcn3999sm4125qcm4490_firmwareqru1032vision_intelligence_400_firmwarewcn3950flight_rb5_5gsnapdragon_870_5g_mobile_firmwareqca6797aq_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_7c\+_gen_3_computeqca4004_firmwaresnapdragon_778g\+_5g_mobile_firmwaresa8295p_firmwaresmart_audio_400_firmwaresd_675_firmwaresnapdragon_870_5g_mobilesnapdragon_678_mobilesa4155p_firmwareqca9984sm7250psc8180x-acafsa8155sd_8cx_firmwaresc8180x-ad_firmwareqca6584ausd888qcn6274_firmwareqcn9011_firmwareqru1062_firmwarefsm10056sd460_firmwaresnapdragon_675_mobile_firmwaresnapdragon_850_mobile_compute_firmwarewcn6740snapdragon_768g_5g_mobilesc8380xp_firmwaresnapdragon_780g_5g_mobile_firmwareqru1062qca6310_firmwaresnapdragon_845_mobilefastconnect_6800qfw7114_firmwareqcs7230qca6595_firmwarefastconnect_7800_firmwaresnapdragon_675_mobilesnapdragon_865_5g_mobile_firmwarefastconnect_6900_firmwarerobotics_rb5_firmwarewcd9380sa6145p_firmwareqam8255psa6155_firmwaresxr2230psnapdragon_xr2_5gsa8150psnapdragon_x24_lte_modemsc8180x-aaabsxr1230psc8180x-aaab_firmwaresd662_firmwarevideo_collaboration_vc3_platformaqt1000wcd9306_firmwaresnapdragon_4_gen_1_mobile_firmwareqam8295p_firmwaresd855qca6431_firmwarewcn3990_firmware9205_lte_modem_firmwaresm7315qca6698aq_firmwareqcs2290qca6564a_firmwareqcn7606wcd9385qcs2290_firmwaresnapdragon_888\+_5g_mobileqsm8350snapdragon_8_gen_1_mobilewcn3999_firmwaresd662snapdragon_680_4g_mobile_firmwaresa8255pqcs7230_firmwareqcs4290sxr1230p_firmwarewcd9390_firmwaresnapdragon_865\+_5g_mobileqca6430snapdragon_855\+_mobilesg8275psnapdragon_765_5g_mobileqdx1011_firmwaresnapdragon_860_mobilesc8180xp-ad_firmwaresdx55_firmwareflight_rb5_5g_firmwaressg2125pqru1052sxr2130qcm4490snapdragon_x65_5g_modem-rf_firmwarecsra6640_firmwaresnapdragon_480\+_5g_mobile_firmwarerobotics_rb5qca6174a_firmwaresm7325psnapdragon_x50_5g_modem-rfqam8650p_firmwarevideo_collaboration_vc5_platformsnapdragon_670_mobile_firmwareqca6420_firmwareaqt1000_firmwareqcs6490_firmwaresd855_firmwarewcd9335_firmwareqrb5165n_firmwareqca6436snapdragon_x70_modem-rfwcn3980_firmwaresnapdragon_x24_lte_modem_firmwarewsa8835qca6391_firmwarewsa8840_firmwareqcn6274qfw7124qdu1010_firmwareqca6595au_firmwareqca6696_firmwareqcs4290_firmwarewcd9380_firmwareqca6574_firmwarecsra6620qca8081wsa8815sg4150psd_8_gen1_5gqam8775pqca9377snapdragon_ar2_gen_1_firmwareqca6797aqsnapdragon_x75_5g_modem-rfqcm4325_firmwareqca6574a_firmwaresdx55snapdragon_4_gen_1_mobileqcm4290_firmwaresnapdragon_865_5g_mobilesnapdragon_855\+_mobile_firmwaresd675sd_8_gen1_5g_firmwarewcd9375_firmwareqca6391qcn9012_firmwareqcs5430_firmwaresg4150p_firmwareqru1052_firmwaresa8770p_firmwarecsra6620_firmwaresa8295pqcs8550sc8280xp-abbb_firmwarefastconnect_7800qam8775p_firmwaresd865_5g_firmwaresnapdragon_8\+_gen_2_mobile_firmwarewcd9375vision_intelligence_300snapdragon_ar2_gen_1snapdragon_765g_5g_mobilewcn3988_firmwaresa8145psd_675snapdragon_8\+_gen_1_mobile_firmwaresd_8cxvision_intelligence_400ssg2115p_firmwarewsa8835_firmwarewcn3980qca6584au_firmwareqdx1010snapdragon_8_gen_1_mobile_firmwareSnapdragonqam8255p_firmwareqca9377_firmwaresnapdragon_850_mobile_compute_platform_firmwaresnapdragon_662_mobile_platform_firmwaresa6150p_firmwaresa8145p_firmwaresxr2230p_firmwareqcs2290_firmwaresnapdragon_x24_lte_modem_firmwaresg8275p_firmwareqca6431_firmwareflight_rb5_5g_platform_firmwareqcn6224_firmwarewcn3950_firmwaresnapdragon_888_5g_mobile_platform_firmwaresa8150p_firmwareqca6420_firmwareqca6595au_firmwarecsra6620_firmwaresd_675_firmwaresd675_firmwarecsra6640_firmwareqcm5430_firmwaresnapdragon_460_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwareqca6584au_firmwarewcn3990_firmwareqrb5165n_firmwareqca9984_firmwarequalcomm_video_collaboration_vc3_platform_firmwaresd_8cx_firmwarewcd9385_firmwareqcn6024_firmwarewcd9326_firmwaresd_8_gen1_5g_firmwareqsm8350_firmwaresd460_firmwareqam8295p_firmwareqcn9011_firmwaresa9000p_firmwaresm7315_firmwaresnapdragon_695_5g_mobile_platform_firmwareqca6574au_firmwaresdx55_firmwarewcd9375_firmwareqca8081_firmwaresa6155_firmwarewcn3999_firmwaresm7250p_firmwarewsa8845h_firmwareqca6436_firmwaresnapdragon_680_4g_mobile_platform_firmwareqca6564au_firmwaresa6155p_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareqcm8550_firmwaresmart_audio_400_platform_firmwaresa8775p_firmwaresnapdragon_x70_modem-rf_system_firmwareqrb5165m_firmwarewsa8840_firmwaresa4155p_firmwaresa8155_firmwarerobotics_rb3_platform_firmwareqca4004_firmwareqcs8550_firmwaresc8380xp_firmwaresd662_firmwarevision_intelligence_300_platform_firmwarewcn3988_firmwareqru1062_firmwaresa6145p_firmwarewcd9306_firmwarefastconnect_6700_firmwarewsa8810_firmwarefsm10056_firmwaresnapdragon_ar2_gen_1_platform_firmwaresa8255p_firmwarewcd9395_firmwareqdu1000_firmwareqca6698aq_firmwareqca6174a_firmwareqcs4290_firmwaresa8770p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqam8775p_firmwaresnapdragon_wear_1300_platform_firmwaresxr2130_firmwareqca6696_firmwareqcs6490_firmwaresnapdragon_665_mobile_platform_firmwareqru1052_firmwarewcn3910_firmwaresnapdragon_855_mobile_platform_firmwareqcc710_firmwarevision_intelligence_400_platform_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewsa8815_firmwarewsa8835_firmwaresnapdragon_780g_5g_mobile_platform_firmwaresa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwarefastconnect_6800_firmwareqcn7606_firmwaresa8295p_firmwaresg4150p_firmwaresnapdragon_8_gen_2_mobile_platform_firmwaresnapdragon_675_mobile_platform_firmwareqcm2290_firmwarerobotics_rb5_platform_firmwareqca8337_firmwarewcd9380_firmwaresnapdragon_778g_5g_mobile_platform_firmwareqcs7230_firmwareqdu1010_firmwaresnapdragon_670_mobile_platform_firmwaresd670_firmwaresxr1230p_firmwareqdu1110_firmwaresa8540p_firmwaresnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaressg2125p_firmwareqca6310_firmwareqca6430_firmwareqcn9012_firmwareqfw7114_firmwarewcd9335_firmwareqca6335_firmwareqcm4325_firmwareqca6574_firmwarewcd9340_firmwaresm4125_firmwaresm7325p_firmwaresdx57m_firmwareqru1032_firmwaresnapdragon_xr2_5g_platform_firmwarewsa8845_firmwareqca6426_firmwareqca6574a_firmwarefastconnect_6200_firmwarewcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresnapdragon_x50_5g_modem-rf_system_firmwareqca6421_firmware9205_lte_modem_firmwareaqt1000_firmwarewcn6740_firmwareqcm4490_firmwaresnapdragon_845_mobile_platform_firmwareqcn6274_firmwareqcs4490_firmwarear8031_firmwareqcm6490_firmwarewsa8832_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900_firmwareqca6797aq_firmwaresa8155p_firmwareqdx1011_firmwareqca6564a_firmwareqcn9024_firmwareqcs8250_firmwarewcd9341_firmwarefastconnect_7800_firmwareqcm4290_firmwareqdx1010_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareqam8650p_firmwareqca6564_firmwareqca6595_firmwareqcs5430_firmwareqca6391_firmwaresa4150p_firmwarewcd9370_firmwaresm8550p_firmwarequalcomm_video_collaboration_vc5_platform_firmwaresd888_firmwarewcd9390_firmwaressg2115p_firmwareqcs8155_firmwareqfw7124_firmwareqdu1210_firmwarear8035_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-43525
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 12.53%
||
7 Day CHG~0.00%
Published-06 May, 2024 | 14:32
Updated-16 Dec, 2025 | 18:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Audio

Memory corruption while copying the sound model data from user to kernel buffer during sound model register.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-Snapdragonsa8255p_firmwaresa8770p_firmwareqam8650p_firmwaresa8775p_firmwarear8035_firmwaresrv1h_firmwaresa9000p_firmwareqca6698aq_firmwaresa8150p_firmwareqfw7114_firmwareqam8255p_firmwareqcn6274_firmwareqca8081_firmwaresa8650p_firmwareqamsrv1m_firmwareqam8295p_firmwaresa6150p_firmwareqam8775p_firmwareqamsrv1h_firmwarefastconnect_7800_firmwareqcn6224_firmwaresa8195p_firmwareqcc710_firmwaresa6155p_firmwaresa6145p_firmwaresrv1m_firmwareqca6574au_firmwaresa8620p_firmwaresa8295p_firmwaresa8145p_firmwareqca6584au_firmwareqfw7124_firmwaresa7255p_firmwareqca6696_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqca8337_firmwaresa8155p_firmwarewcd9340_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-43515
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.05% / 14.62%
||
7 Day CHG~0.00%
Published-01 Apr, 2024 | 15:05
Updated-13 Jan, 2025 | 21:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer copy without checking size of input (Classic buffer overflow) in HLOS

Memory corruption in HLOS while running kernel address sanitizers (syzkaller) on tmecom with DEBUG_FS enabled.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wsa8830_firmwarewcd9380fastconnect_6900wsa8835fastconnect_7800snapdragon_8_gen_1_mobilewsa8830fastconnect_7800_firmwarewcd9380_firmwarefastconnect_6900_firmwarewsa8835_firmwaresnapdragon_8_gen_1_mobile_firmwareSnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-43524
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 12.53%
||
7 Day CHG~0.00%
Published-06 May, 2024 | 14:32
Updated-15 Jan, 2025 | 16:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Audio

Memory corruption when the bandpass filter order received from AHAL is not within the expected range.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-Snapdragonqam8255p_firmwareqca9377_firmwaresa6155p_firmwareqca8337_firmwareqca9367_firmwaresa6150p_firmwareqamsrv1m_firmwareqam8650p_firmwareqcn6274_firmwareqam8775p_firmwareqca6584au_firmwareqca6696_firmwareqfw7114_firmwareqca6391_firmwarefastconnect_6900_firmwareqamsrv1h_firmwareqcc710_firmwareqcn6224_firmwaresa6145p_firmwareqam8295p_firmwareqca6426_firmwareqca6574au_firmwarefastconnect_7800_firmwareqca8081_firmwarefastconnect_6800_firmwareqfw7124_firmwareqca6436_firmwarear8035_firmwareqca6698aq_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-43526
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 12.53%
||
7 Day CHG~0.00%
Published-06 May, 2024 | 14:32
Updated-15 Jan, 2025 | 16:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Audio

Memory corruption while querying module parameters from Listen Sound model client in kernel from user space.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-Snapdragonqam8255p_firmwaresa8620p_firmwaresa6155p_firmwareqca8337_firmwaresa6150p_firmwareqcn6274_firmwaresnapdragon_x72_5g_modem-rf_systemsa8775p_firmwaresa8650p_firmwaresrv1h_firmwareqcn6224_firmwaresa6145p_firmwaresa8155p_firmwaresa7255p_firmwarefastconnect_7800_firmwaresa8255p_firmwareqamsrv1m_firmwaresrv1m_firmwareqam8650p_firmwaresa8770p_firmwareqam8775p_firmwareqca6696_firmwareqfw7114_firmwareqca6391_firmwareqamsrv1h_firmwarewcd9340_firmwareqcc710_firmwareqam8295p_firmwaresa9000p_firmwareqca6574au_firmwaresa8195p_firmwareqca8081_firmwareqfw7124_firmwaresa8295p_firmwarear8035_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-41221
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 5.76%
||
7 Day CHG~0.00%
Published-05 Nov, 2021 | 22:15
Updated-04 Aug, 2024 | 03:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Access to invalid memory during shape inference in `Cudnn*` ops

TensorFlow is an open source platform for machine learning. In affected versions the shape inference code for the `Cudnn*` operations in TensorFlow can be tricked into accessing invalid memory, via a heap buffer overflow. This occurs because the ranks of the `input`, `input_h` and `input_c` parameters are not validated, but code assumes they have certain values. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.

Action-Not Available
Vendor-Google LLCTensorFlow
Product-tensorflowtensorflow
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-39063
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-1.53% / 81.44%
||
7 Day CHG~0.00%
Published-11 Sep, 2023 | 00:00
Updated-26 Sep, 2024 | 19:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer Overflow vulnerability in RaidenFTPD 2.4.4005 allows a local attacker to execute arbitrary code via the Server name field of the Step by step setup wizard.

Action-Not Available
Vendor-raidenftpdn/a
Product-raidenftpdn/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-38258
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 18.58%
||
7 Day CHG~0.00%
Published-25 Oct, 2021 | 21:19
Updated-04 Aug, 2024 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NXP MCUXpresso SDK v2.7.0 was discovered to contain a buffer overflow in the function USB_HostProcessCallback().

Action-Not Available
Vendor-nxpn/a
Product-mcuxpresso_software_development_kitn/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-38160
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 12.01%
||
7 Day CHG~0.00%
Published-07 Aug, 2021 | 03:31
Updated-05 May, 2025 | 14:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior

Action-Not Available
Vendor-n/aRed Hat, Inc.Linux Kernel Organization, IncNetApp, Inc.Debian GNU/Linux
Product-debian_linuxhci_management_nodelinux_kernelhci_bootstrap_oshci_compute_nodeelement_softwarehci_storage_nodeenterprise_linuxsolidfiren/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-0303
Matching Score-4
Assigner-OpenHarmony
ShareView Details
Matching Score-4
Assigner-OpenHarmony
CVSS Score-8.8||HIGH
EPSS-0.07% / 22.11%
||
7 Day CHG~0.00%
Published-07 Feb, 2025 | 09:21
Updated-12 Feb, 2025 | 19:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Liteos_a has a buffer overflow vulnerability

in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through buffer overflow.

Action-Not Available
Vendor-OpenAtom FoundationOpenHarmony (OpenAtom Foundation)
Product-openharmonyOpenHarmony
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-21664
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.58%
||
7 Day CHG~0.00%
Published-05 Sep, 2023 | 06:24
Updated-27 Feb, 2025 | 21:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy without Checking the Size of Input(Classic Buffer Overflow) in Core Platform

Memory Corruption in Core Platform while printing the response buffer in log.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresd_8cx_gen3_firmwaresa6150p_firmwareqca8337qca6431_firmwaresdx65wcn3950_firmwareipq5028_firmwaresa8150p_firmwareqca6595au_firmwaresa6155qca6335qcs605_firmwaresd_675_firmwarewcn3998qam8295psd_8cx_gen2_firmwareqcn6024_firmwareqca8386_firmwarewcn3950sd_8_gen1_5g_firmwareqca8084_firmwareqsm8350_firmwareqsm8350sm7315_firmwarewcn7850qca6574au_firmwarewcd9375_firmwareqca8081_firmwaresa6155_firmwarewcn3998_firmwareqca6420sd_8cx_gen2qrb5165_firmwareipq5028qrb5165m_firmwareqca6698aqsa4155p_firmwaresa8155_firmwareqca6430sdx65mwcd9340qcn6132sd765gfsm10056_firmwareqca6436wcn6851sa6155pqcs603_firmwarewcn7851_firmwareqca6698aq_firmwareqcn6122wcd9341qca6431qca6696_firmwaresd870_firmwareipq9008_firmwaresd_8cxsa8150pwsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwaresd660_firmwarewcn7850_firmwaresa8195p_firmwaresa8295p_firmwarewcn6750_firmwareipq5018_firmwarewcn3991qca8337_firmwarewcd9380_firmwaressg2125pqca8084qca6564ausdx55m_firmwarewcn6856_firmwareipq9008sd670_firmwareqca6574wcd9380sdx50m_firmwaresxr1230psdx24_firmwareqca6430_firmwareqcn9012_firmwareqcn9274_firmwarewcd9335_firmwarewcn3980qca6335_firmwareqcs605wcd9340_firmwarewsa8815wcn6850qca6426_firmwareqcn9024ipq9574_firmwarewcn3980_firmwaresdx55msa8295pqca6421_firmwarewcn6740_firmwaresd678_firmwareqrb5165wcn6851_firmwareqcs603sd670qca6564a_firmwareqcn9024_firmwaresdx57msd870wsa8832wcn6855sa8540psa6145pqca6595_firmwaresa8145pqca6391_firmwaresa4150p_firmwaresd780g_firmwarewcd9370_firmwaresdx55sd888_firmwaresa8155psd675sdx70mssg2115p_firmwareqcs8155_firmwaresa4155par8035_firmwarewcn3991_firmwarewsa8830sd678qcn9070sa8145p_firmwaresxr2230p_firmwarefsm10056qca8082qcn9072qca8386sd765g_firmwareqca6420_firmwareqca6390_firmwarewcd9370sd675_firmwaressg2115pqca6564qca6426wcn3990_firmwareqrb5165n_firmwareqcn9000_firmwareipq5018qca9377sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwareqam8295p_firmwareqcn9011_firmwareqca8082_firmwaresa8155sa9000p_firmwaresdx55_firmwareqca6595auqcn6023_firmwaresm7250p_firmwareqca6436_firmwareqrb5165nipq5010qca6564au_firmwaresd778gsa6155p_firmwareqca6310qcn9274qcs8155wcn7851qcs6490sdxr2_5gqcn9074sa6145p_firmwareqca6421qca8085sd778g_firmwaresa8195pwsa8810_firmwaresd765_firmwarewcd9326wcd9335qca8081qcn6023sdx65m_firmwareqca6174a_firmwarewcd9385qca8085_firmwareqcs6490_firmwaresd_8cx_gen3sdx70m_firmwarear8035qca6390wcd9375aqt1000qcn9100_firmwareipq5010_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewsa8815_firmwarewsa8835_firmwareqca6564asa4150pwcn3990qcn9000sd_675sd780gsd865_5gqca6595sdx24qcn9012sd888qcn6122_firmwarewsa8835sxr1230p_firmwaresa8540p_firmwaresd_8_gen1_5gsd888_5gssg2125p_firmwareqca6574awcn6855_firmwareqca6174asm7325pqcn6132_firmwareqca6310_firmwarewcn6750sa9000pqca6574_firmwaresd855sm7325p_firmwaresxr2230psdx57m_firmwaresd765qca6574a_firmwaresd768g_firmwareqrb5165msd850_firmwaresm7315qca6391aqt1000_firmwareqcn9100sdx65_firmwareqcm6490_firmwaresdx50mwsa8832_firmwareqcn9070_firmwareqcn9011qca6574ausa8155p_firmwareipq9574wcd9341_firmwarewsa8810wcn6856qca6564_firmwaresd768gwcn6740qca6696sd845_firmwaresa6150pqcn9022_firmwareqcn6024qcn9022sd845qcn9072_firmwaresm7250pqcn9074_firmwaresd850Snapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-38260
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 18.58%
||
7 Day CHG~0.00%
Published-25 Oct, 2021 | 21:19
Updated-04 Aug, 2024 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NXP MCUXpresso SDK v2.7.0 was discovered to contain a buffer overflow in the function USB_HostParseDeviceConfigurationDescriptor().

Action-Not Available
Vendor-nxpn/a
Product-mcuxpresso_software_development_kitn/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-37650
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.79%
||
7 Day CHG~0.00%
Published-12 Aug, 2021 | 21:00
Updated-04 Aug, 2024 | 01:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Segfault and heap buffer overflow in `{Experimental,}DatasetToTFRecord` in TensorFlow

TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation for `tf.raw_ops.ExperimentalDatasetToTFRecord` and `tf.raw_ops.DatasetToTFRecord` can trigger heap buffer overflow and segmentation fault. The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/data/experimental/to_tf_record_op.cc#L93-L102) assumes that all records in the dataset are of string type. However, there is no check for that, and the example given above uses numeric types. We have patched the issue in GitHub commit e0b6e58c328059829c3eb968136f17aa72b6c876. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.

Action-Not Available
Vendor-Google LLCTensorFlow
Product-tensorflowtensorflow
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-35129
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.11% / 29.06%
||
7 Day CHG-0.01%
Published-14 Jun, 2022 | 10:11
Updated-04 Aug, 2024 | 00:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory corruption in BT controller due to improper length check while processing vendor specific commands in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-ipq5018_firmwaresd_8cx_gen3_firmwareqca2066wsa8830qcn9070qca8337_firmwarewcd9380_firmwareqcn9000qca8337wcn6856_firmwareqcn9012sd888sdx65qcn9072qcn6122_firmwarewsa8835wcd9380ipq5028_firmwaresd888_5gqca2064_firmwareqca2062wcd9370wcn6855_firmwareqcn6132_firmwareqcn9000_firmwareqcn9012_firmwareipq5018wcn6750wcd9385_firmwareqcn6024_firmwaresd_8_gen1_5g_firmwarewcn6850qca2065qcn6112qcn6100_firmwareqcn6102_firmwareqcn9024wcd9375_firmwareqca8081_firmwareqcn6023_firmwareqca6391ipq5010qca2062_firmwareqcn6102qcn9100sdx65_firmwareqcs6490qcm6490_firmwareipq5028qcn9070_firmwarewcn6851_firmwareqcn6112_firmwareqcn9074qcn9024_firmwareqcn6132wcn6855wcn6851qca8081wcn6856qcn6023wcd9385qcn6122qcc710qca2066_firmwareqca2065_firmwareqcs6490_firmwaresd_8cx_gen3qca6391_firmwarear8035wcd9375qca2064wcd9370_firmwaresd888_firmwareqcc710_firmwareqcn9100_firmwareqcn9022_firmwarewsa8830_firmwareqcn6024qcn9022ipq5010_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewsa8835_firmwareqcn6100qcn9072_firmwareqcn9074_firmwaresm8475wcn6750_firmwarear8035_firmwareSnapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-35114
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.10% / 26.61%
||
7 Day CHG~0.00%
Published-14 Jun, 2022 | 09:40
Updated-04 Aug, 2024 | 00:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer initialization on the backend driver can lead to buffer overflow in Snapdragon Auto

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa8540psa9000psa8540p_firmwaresa9000p_firmwareSnapdragon Auto
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-33072
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.03% / 8.37%
||
7 Day CHG~0.00%
Published-06 Feb, 2024 | 05:47
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer copy without checking size of Input in Core

Memory corruption in Core while processing control functions.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qdx1010_firmwaresnapdragon_8_gen_3_mobile_platform_firmwareqcm8550_firmwaresw5100psd865_5gvision_intelligence_300_platformipq9574qcn9000_firmwareqca6595wcd9335wcd9370qca8081_firmwareqcc711_firmwaresnapdragon_x50_5g_modem-rf_systemqca4004wcd9340_firmwareqca6696wcd9341_firmwarewcd9395_firmwareqcn6024qcc710_firmwareqca6426wcn6740_firmwarefastconnect_6700qcn6422_firmwareqca9984_firmwaresnapdragon_768g_5g_mobile_platform_firmwarewsa8832_firmwaresnapdragon_x35_5g_modem-rf_system_firmwareqca8337qdu1110qca6426_firmwarewcd9395snapdragon_460_mobile_platformsnapdragon_auto_4g_modem9205_lte_modemqca6574au_firmwaresnapdragon_8cx_gen_3_compute_platform_firmwareqcn7606_firmwareqam8295pwcd9341ipq5312qca6574auwcd9390wsa8810_firmwarewsa8845h_firmwareqcc7226_firmwarecsra6640snapdragon_8cx_gen_2_5g_compute_platformsa9000p_firmwaresrv1hqcc7225_firmwareqcc7228fastconnect_6800_firmwareqcn6024_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaresnapdragon_695_5g_mobile_platformsnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_778g\+_5g_mobile_platformsa8770pqcn9000ssg2115pqcc710snapdragon_850_mobile_compute_platformsnapdragon_8cx_compute_platform_firmwaresa8540psnapdragon_480\+_5g_mobile_platform_firmwaresnapdragon_695_5g_mobile_platform_firmwareqsm8250_firmwareqsm8350_firmwarerobotics_rb3_platform315_5g_iot_modem_firmwarefastconnect_6900snapdragon_765g_5g_mobile_platformqcn6402qcn6432qru1032_firmwareipq5332_firmwareqep8111qfw7114wcd9385_firmwareqca6421315_5g_iot_modemipq9574_firmwareqca6310snapdragon_x55_5g_modem-rf_systemqam8255p_firmwaresa8155_firmwarewcd9360snapdragon_888_5g_mobile_platform_firmwaresnapdragon_wear_1300_platform_firmwareqca6335snapdragon_ar2_gen_1_platform_firmwareqcs4490snapdragon_8_gen_1_mobile_platform_firmwareimmersive_home_3210_platform_firmwaresnapdragon_685_4g_mobile_platformsnapdragon_8\+_gen_2_mobile_platform_firmwaresa6155pwsa8845qca6421_firmwareqca6564au_firmwaresnapdragon_768g_5g_mobile_platformwsa8810qca8075qam8650pvideo_collaboration_vc5_platform_firmwaresa9000pqdu1000_firmwareqca8085qsm8250snapdragon_8\+_gen_2_mobile_platformsrv1h_firmwareqca6595ausm7315_firmwareqdu1010wcd9326_firmwaresa6155p_firmwareqcc7228_firmwarewsa8840srv1m_firmwareqcs8550_firmwareqdu1210_firmwareqcc7225snapdragon_870_5g_mobile_platform_firmwareqfw7124_firmwareqca6436_firmwareqcn9012snapdragon_8\+_gen_1_mobile_platformqcs4490_firmwaresnapdragon_8_gen_2_mobile_platformqcf8001snapdragon_7c\+_gen_3_compute_firmwarewcn3910_firmwareqca8084sm4125_firmwaresnapdragon_855\+\/860_mobile_platform_firmwareqca6420snapdragon_8_gen_3_mobile_platformwcn3910sdx65mwcd9370_firmwarecsrb31024snapdragon_x70_modem-rf_system_firmwaresnapdragon_845_mobile_platformsnapdragon_x55_5g_modem-rf_system_firmwaresnapdragon_750g_5g_mobile_platform_firmwareqdu1110_firmwareqdu1000qca6574aipq9570qca6174awcd9340qcs8250_firmwareqcm2290qdu1210snapdragon_auto_5g_modem-rf_gen_2qca6335_firmwareqcm6490ipq5302sa8540p_firmwaresm8550p_firmwareimmersive_home_3210_platformqcm8550wcn3988qcn9274qcn9024snapdragon_460_mobile_platform_firmwareqca6574snapdragon_x75_5g_modem-rf_systemsa8775pipq9570_firmwaresxr2230p_firmwaresd675_firmwaresnapdragon_8cx_compute_platformqcc711qca6430_firmwaresnapdragon_870_5g_mobile_platformqcn9011sa8775p_firmwareqamsrv1hqcn6412_firmwaresdx57mqcn9024_firmwaresnapdragon_8cx_gen_3_compute_platformwsa8845hqca8082wcd9326qcm2290_firmwaresa8155p_firmwareqca6564asa8155pwsa8830snapdragon_675_mobile_platformsnapdragon_wear_1300_platformipq5312_firmwaresm8550pqcf8000_firmwaresa6145psnapdragon_8\+_gen_1_mobile_platform_firmwaresnapdragon_662_mobile_platformqcn9074_firmwarevision_intelligence_400_platform_firmwaresnapdragon_765_5g_mobile_platformsa8255p_firmwareflight_rb5_5g_platform_firmwaresnapdragon_665_mobile_platformar8035qamsrv1m_firmwaresa6155qrb5165m_firmwaresa8650p_firmwaresnapdragon_678_mobile_platform_firmwareqcm4325robotics_rb5_platformqcn6224qca6698aqwcn3950_firmwaressg2125p_firmwareqrb5165nsnapdragon_8c_compute_platform_firmwaresnapdragon_8_gen_1_mobile_platformfastconnect_6200sd670sm7325p_firmwaresd460wcd9360_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_firmwaresnapdragon_888\+_5g_mobile_platformqdx1011smart_audio_400_platformsnapdragon_855\+\/860_mobile_platformsa8150p_firmwaresnapdragon_w5\+_gen_1_wearable_platformfastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwarewcn3990sd670_firmwaresnapdragon_680_4g_mobile_platform_firmwareimmersive_home_326_platform_firmwareqcs6490qcs8250ipq9554_firmwaresnapdragon_750g_5g_mobile_platformfastconnect_6200_firmwarear8031_firmwarewsa8830_firmwareqcn6224_firmwareqca6431qca8386_firmwaresnapdragon_850_mobile_compute_platform_firmwarewsa8845_firmwarewsa8832qca8082_firmwaresnapdragon_auto_4g_modem_firmwaresdx57m_firmwaresxr2130_firmwaresrv1mqcn6432_firmwaresnapdragon_675_mobile_platform_firmwarear8035_firmwareqrb5165msnapdragon_888_5g_mobile_platformsc8380xpsnapdragon_w5\+_gen_1_wearable_platform_firmwareqca0000_firmwaresd888_firmwareipq9008snapdragon_662_mobile_platform_firmwareipq9554wcd9306qca6564auipq9008_firmwareqcn9074wsa8815_firmwareqca8337_firmwareqcm4290ipq5332snapdragon_680_4g_mobile_platformqcn9013ar8031sg8275p_firmwareqca9377_firmwareqcm6490_firmwaresnapdragon_8c_compute_platformsm7250p_firmwarewcn3999sm4125qcm4490_firmwaresnapdragon_855_mobile_platformqru1032robotics_rb3_platform_firmwarewcn3950flight_rb5_5g_platformsnapdragon_xr2_5g_platformsnapdragon_x65_5g_modem-rf_system_firmwareqca6797aq_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_765g_5g_mobile_platform_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_xr2\+_gen_1_platform_firmwaresnapdragon_670_mobile_platform_firmwareqca8085_firmwareqcf8001_firmwaresnapdragon_780g_5g_mobile_platformqca4004_firmwaresa8295p_firmwaresd_675_firmwareqca9984sm7250pcsrb31024_firmwaresa8155sd_8cx_firmwaresnapdragon_780g_5g_mobile_platform_firmwaresnapdragon_845_mobile_platform_firmwareqca6584ausd888qcn6274_firmwareqcn9011_firmwareqru1062_firmwaresd460_firmwaresnapdragon_4_gen_2_mobile_platformsw5100_firmwaresnapdragon_765_5g_mobile_platform_firmwarewcn6740sc8380xp_firmwareqru1062qca6310_firmwarefastconnect_6800qfw7114_firmwareqcs7230snapdragon_685_4g_mobile_platform_firmwareqca6595_firmwarefastconnect_7800_firmwareqcn6422ipq5302_firmwareqcc7226snapdragon_782g_mobile_platform_firmwarefastconnect_6900_firmwarewcd9380sa6145p_firmwareqam8255psa6155_firmwaresxr2230psnapdragon_xr2_5g_platform_firmwaresnapdragon_4_gen_1_mobile_platformsa8150pqca8075_firmwarevision_intelligence_300_platform_firmwaresnapdragon_778g_5g_mobile_platformsnapdragon_665_mobile_platform_firmwareqcf8000snapdragon_x24_lte_modemsnapdragon_auto_5g_modem-rf_firmwaresnapdragon_x35_5g_modem-rf_systemsxr1230psnapdragon_865\+_5g_mobile_platformsd662_firmwaresw5100sdx65m_firmwarevideo_collaboration_vc3_platformaqt1000wcd9306_firmwaresnapdragon_865_5g_mobile_platform_firmwareqam8295p_firmwaresd855qca6431_firmwareqcn6402_firmwarewcn3990_firmware9205_lte_modem_firmwaresm7315qca6698aq_firmwareqcs2290qca6564a_firmwareqcn7606wcd9385qcs2290_firmwareqsm8350wcn3999_firmwareqca8084_firmwaresd662snapdragon_678_mobile_platformsa8255pqcs7230_firmwareqcs4290sxr1230p_firmwarewcd9390_firmwaresnapdragon_778g\+_5g_mobile_platform_firmwaresnapdragon_865\+_5g_mobile_platform_firmwaresnapdragon_690_5g_mobile_platformqep8111_firmwareqca6430sg8275psdx55_firmwareqdx1011_firmwaresnapdragon_auto_5g_modem-rfssg2125pqru1052sxr2130qcm4490csra6640_firmwareqamsrv1msnapdragon_xr2\+_gen_1_platformimmersive_home_326_platformqca6174a_firmwaresm7325pqam8650p_firmwareqcn9013_firmwarevideo_collaboration_vc5_platformsnapdragon_855_mobile_platform_firmwareqca6420_firmwareaqt1000_firmwareqcs6490_firmwaresnapdragon_x65_5g_modem-rf_systemsd855_firmwarewcd9335_firmwareqrb5165n_firmwareqca6436wcn3980_firmwareqca6584au_firmwaresnapdragon_x24_lte_modem_firmwarewsa8835qca6391_firmwarewsa8840_firmwareqcn6274snapdragon_480_5g_mobile_platform_firmwareqdu1010_firmwareqfw7124qca6595au_firmwareqca0000sw5100p_firmwaresnapdragon_ar2_gen_1_platformsnapdragon_782g_mobile_platformqca6696_firmwareqcs4290_firmwaresnapdragon_865_5g_mobile_platformwcd9380_firmwareqca6574_firmwarecsra6620qca8081wsa8815sg4150psd_8_gen1_5gqam8775pqca9377qca6797aqqcm4325_firmwareqcn6412vision_intelligence_400_platformqca6574a_firmwaresdx55qcm4290_firmwaresnapdragon_480\+_5g_mobile_platformsd675sd_8_gen1_5g_firmwarewcd9375_firmwareqca8386qca6391snapdragon_x70_modem-rf_systemqcn9274_firmwaresmart_audio_400_platform_firmwaresnapdragon_778g_5g_mobile_platform_firmwareqcn9012_firmwaresg4150p_firmwaresnapdragon_480_5g_mobile_platformqru1052_firmwaresnapdragon_670_mobile_platformcsra6620_firmwaresa8770p_firmwaresa8295psnapdragon_8_gen_2_mobile_platform_firmwareqcs8550robotics_rb5_platform_firmwaresnapdragon_x50_5g_modem-rf_system_firmwarefastconnect_7800sa8650pqam8775p_firmwaresd865_5g_firmwarewcd9375wcn3988_firmwareqamsrv1h_firmwaresd_675snapdragon_888\+_5g_mobile_platform_firmwaresd_8cxwsa8835_firmwaressg2115p_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewcn3980snapdragon_690_5g_mobile_platform_firmwareqdx1010Snapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-33023
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.06% / 18.61%
||
7 Day CHG~0.00%
Published-01 Apr, 2024 | 15:05
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy without Checking Size of Input (`Classic Buffer Overflow`) in SPS-Applications

Memory corruption while processing finish_sign command to pass a rsp buffer.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qdx1010_firmwaresdm429w_firmwaresd865_5gsnapdragon_632_mobileqca6595qca8081_firmwaresnapdragon_670_mobilewcd9340_firmwarewcd9395_firmwareqcn6024qcc710_firmwareqca6426snapdragon_8\+_gen_1_mobilefastconnect_6700wcn3610sa4150psnapdragon_427_mobile_firmwaresnapdragon_782g_mobile_firmwaresnapdragon_wear_4100\+_firmwarewsa8832_firmwareqca8337qca6426_firmwarewcd9395snapdragon_665_mobile_firmwaresc8180xp-aaabqca6574au_firmwareqcn7606_firmwaresm6370qam8295pwcd9341sd626_firmwaresnapdragon_820_automotivesnapdragon_888\+_5g_mobile_firmware315_5g_iot_firmwaresd730_firmwarewsa8810_firmwarewsa8845h_firmwaresa9000p_firmwaresc8180xp-acafwcn3660_firmwaresnapdragon_820_automotive_firmwarefastconnect_6800_firmwareqcs5430sd835_firmwareqcm5430_firmwarevideo_collaboration_vc1_platform_firmwaresa4155psa8770psnapdragon_678_mobile_firmwaresnapdragon_425_mobilesd821snapdragon_632_mobile_firmwaresa8540pqsm8250_firmwareqsm8350_firmwarevideo_collaboration_vc1_platformqep8111sa7255psnapdragon_730_mobile_firmwarewcd9385_firmwareqca6421vision_intelligence_200qca6310wcd9360sd821_firmwaresnapdragon_680_4g_mobilesa6155pqca6564au_firmwaresd820snapdragon_429_mobile_firmwareqam8650psnapdragon_835_mobilesa9000psnapdragon_888_5g_mobile_firmwaresxr2250p_firmwaresnapdragon_662_mobile_firmwaresa6155p_firmwaresnapdragon_685_4g_mobile_firmwaremdm9640_firmwaresd835snapdragon_x55_5g_modem-rfsnapdragon_4_gen_2_mobile_firmwareqca6436_firmwaresnapdragon_695_5g_mobile_firmwaresnapdragon_x55_5g_modem-rf_firmwaresnapdragon_7c\+_gen_3_compute_firmwaresm4125_firmwareqca6420wcn3910apq8064au_firmwarecsrb31024snapdragon_712_mobilesnapdragon_835_mobile_firmwarewcn3660bqca6574awcn3620_firmwareqca6174awcd9340qcm2290qdu1210talynplussnapdragon_auto_5g_modem-rf_gen_2sm8550p_firmwaresxr2250pqcm8550wcn3988snapdragon_765_5g_mobile_firmwareqcn9024vision_intelligence_300_firmwareqca6574215_mobileqamsrv1hqcs410qcm2290_firmwarevision_intelligence_100sa8155phome_hub_100snapdragon_765g_5g_mobile_firmwarewsa8830smart_display_200_firmwaresm8550psa6145psnapdragon_625_mobile_firmwaresa8255p_firmwaremsm8996ausnapdragon_4_gen_2_mobilesnapdragon_7c_compute_firmwareqrb5165m_firmwaresa8650p_firmwaresnapdragon_820_mobile_firmwarewcn3620snapdragon_865\+_5g_mobile_firmwaresnapdragon_429_mobileapq8064auwcn3950_firmwareqrb5165nfastconnect_6200sm7325p_firmwaresd460wcd9360_firmwaresc8180x-acaf_firmwaresnapdragon_480_5g_mobile_firmwaresnapdragon_660_mobile_firmwareqdx1011snapdragon_710_mobile_firmwarevideo_collaboration_vc3_platform_firmwarerobotics_rb3_firmwaresd670_firmwaresnapdragon_8_gen_3_mobilesnapdragon_855_mobilesc8180xp-acaf_firmwareqcn6224_firmwarevision_intelligence_100_firmwareqca6431sd660_firmwaresnapdragon_480_5g_mobilesnapdragon_750g_5g_mobile_firmwareqca9379_firmwaresxr2130_firmwaresrv1msnapdragon_860_mobile_firmwarear8035_firmwaresnapdragon_778g\+_5g_mobileqrb5165msc8380xpqca6320sd888_firmwareqcs6125_firmwareqcn9074wsa8815_firmwareqca8337_firmwaresnapdragon_665_mobilesm7250p_firmwarewcn3680_firmwarewcn3999wcn3950snapdragon_730g_mobile_firmwareqca6797aq_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaretalynplus_firmwaresnapdragon_778g\+_5g_mobile_firmwareapq8037sa8295p_firmwaresmart_audio_400_firmwaresd_675_firmwaresa4155p_firmwaresnapdragon_720g_mobilesm7250pcsrb31024_firmwaresa8155sc8180x-acafsd888qru1062_firmwaresd460_firmwaresnapdragon_675_mobile_firmwaresnapdragon_768g_5g_mobilesc8380xp_firmwareqru1062qca6310_firmwaresd626fastconnect_6800pm8937snapdragon_865_5g_mobile_firmwarewcd9371fastconnect_6900_firmwarerobotics_rb5_firmwaresc8180x-aaab_firmwarevideo_collaboration_vc3_platformqcm2150_firmware215_mobile_firmwareqca6431_firmwareqca6698aq_firmwareqcs2290qcn7606qcs2290_firmwaresnapdragon_xr2\+_gen_1_firmwarewcn3615wcn3999_firmwarewcn3680sa8255pwcd9390_firmwareqep8111_firmwareqca6430snapdragon_855\+_mobilemdm9650qdx1011_firmwaresnapdragon_765_5g_mobilesnapdragon_860_mobilesc8180xp-ad_firmwaresnapdragon_auto_5g_modem-rfflight_rb5_5g_firmwaressg2125pqru1052snapdragon_x65_5g_modem-rf_firmwarecsra6640_firmwareqamsrv1mqam8650p_firmwareqca6420_firmwareqcs6490_firmwaresd855_firmwarewcd9335_firmwaremdm9640qca6436qrb5165n_firmwarewcn3980_firmwaresnapdragon_x24_lte_modem_firmwarewsa8835qca6391_firmwarewsa8840_firmwareqdu1010_firmwareqcs4290_firmwaresnapdragon_430_mobile_firmwarecsra6620qca8081sd660wsa8815qam8775pqca9377snapdragon_ar2_gen_1_firmwareqcm4325_firmwaresnapdragon_439_mobile_firmwareqcm4290_firmwaresnapdragon_720g_mobile_firmwaresnapdragon_821_mobile_firmwaresnapdragon_710_mobileqcs5430_firmwaresg4150p_firmwareqru1052_firmwarecsra6620_firmwareqcs8550sa8650psnapdragon_626_mobileqam8775p_firmwaresd865_5g_firmwaresnapdragon_xr1wcd9375snapdragon_ar2_gen_1snapdragon_636_mobilesa8145psd_675snapdragon_8\+_gen_1_mobile_firmwaresmart_display_200qdx1010wcn3680b_firmwaresnapdragon_8_gen_1_mobile_firmwareqcm8550_firmwareapq8017qcs410_firmwarerobotics_rb3sa6150p_firmwaresw5100psxr1120qcs610_firmwarewcd9335wcd9370snapdragon_7c_gen_2_compute_firmwareqca6696wcd9341_firmwarewcn6740_firmwaresnapdragon_780g_5g_mobilesnapdragon_750g_5g_mobilevision_intelligence_200_firmwaresnapdragon_685_4g_mobilesnapdragon_x50_5g_modem-rf_firmwareqdu1110snapdragon_auto_4g_modemsnapdragon_690_5g_mobile_firmwareqca6574auwcd9390sa8620p_firmwarepm8937_firmwarecsra6640snapdragon_778g_5g_mobile_firmwaresrv1hwcn3660b_firmwaresd730snapdragon_690_5g_mobileqcn6024_firmwaresnapdragon_636_mobile_firmwareqcm5430snapdragon_712_mobile_firmwaresnapdragon_625_mobileqcm6125_firmwarec-v2x_9150ssg2115pqcc710snapdragon_xr2_5g_firmwaresnapdragon_xr1_firmwaresxr1120_firmwaresnapdragon_wear_4100\+fastconnect_6900snapdragon_w5\+_gen_1_wearable_firmwareqru1032_firmwareqfw7114qam8255p_firmwaresa8155_firmwareqca6335snapdragon_x65_5g_modem-rfqcs4490snapdragon_730_mobilewsa8845snapdragon_626_mobile_firmwareqca6421_firmwareqcm6125sc8180x-adwsa8810qdu1000_firmwareqsm8250srv1h_firmwareqca6595ausnapdragon_888_5g_mobilesm7315_firmwareqdu1010wcd9326_firmwaresnapdragon_845_mobile_firmwarewsa8840srv1m_firmwareqcs8550_firmwaresnapdragon_730g_mobilesnapdragon_782g_mobilesnapdragon_x35_5g_modem-rf_firmwareqdu1210_firmwaresnapdragon_8_gen_2_mobile_firmwareqfw7124_firmwaremdm9650_firmwarewcd9371_firmwareqcs4490_firmwarewcn3910_firmwaresnapdragon_460_mobilesnapdragon_8_gen_2_mobilewcd9370_firmwareqdu1110_firmwareqdu1000sa7255p_firmwaresnapdragon_8\+_gen_2_mobilesa8195pqca6335_firmwareqcm6490sa8540p_firmwaresm6370_firmwaresnapdragon_662_mobileqca9379sa8775psxr2230p_firmwaresd675_firmwaresnapdragon_855_mobile_firmwareqca6430_firmwaresa8775p_firmwaresmart_audio_400qcn9024_firmwarewsa8845hsa6150pwcd9326sa8155p_firmwaresnapdragon_630_mobileqca6564aqcn9074_firmwaresnapdragon_768g_5g_mobile_firmwaresnapdragon_7c_gen_2_computesc8180x\+sdx55_firmwarear8035qamsrv1m_firmwaresa6155qcm4325qcn6224snapdragon_435_mobile_firmwaresc8180x\+sdx55qca6698aqssg2125p_firmwaresm6250snapdragon_480\+_5g_mobilesd670wcn3680bsa8145p_firmwaresa8150p_firmwarefastconnect_6700_firmwarewcn3990snapdragon_x75_5g_modem-rf_firmwareqcs6490snapdragon_695_5g_mobilesnapdragon_778g_5g_mobilefastconnect_6200_firmwarear8031_firmwarehome_hub_100_firmwaresnapdragon_460_mobile_firmwarewsa8830_firmwareqca6678aq_firmwarewsa8845_firmwarewsa8832snapdragon_auto_4g_modem_firmwareqca6678aqsnapdragon_x35_5g_modem-rfsc8180xp-aaab_firmwaresa4150p_firmwareqca6564ausnapdragon_820_mobilesnapdragon_425_mobile_firmwaresm6250p_firmwaresc8180xp-adsc8280xp-abbbsa8195p_firmwareqcm4290sd_455_firmwarear8031sg8275p_firmwareqca9377_firmwareqcm6490_firmwaresnapdragon_xr2\+_gen_1sm4125qcm4490_firmwareqru1032vision_intelligence_400_firmwareqcs6125flight_rb5_5gsnapdragon_870_5g_mobile_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_732g_mobilesnapdragon_870_5g_mobilesnapdragon_678_mobilesd_455sm6250_firmwaresc8180x-ad_firmwaresnapdragon_7c_computeqca6584auqca6320_firmwareqcn6274_firmwaresnapdragon_435_mobilesw5100_firmwarewcn6740snapdragon_780g_5g_mobile_firmwaresnapdragon_845_mobilesnapdragon_8_gen_3_mobile_firmwareqfw7114_firmwareqca6595_firmwarefastconnect_7800_firmwaresnapdragon_675_mobileapq8017_firmwarewcd9380sa6145p_firmwareqam8255psa6155_firmwaresxr2230psnapdragon_450_mobile_firmwaresnapdragon_xr2_5gsa8150psnapdragon_x24_lte_modemmsm8996au_firmwaresnapdragon_auto_5g_modem-rf_firmwaresc8180x-aaabsxr1230psd662_firmwarewcn3660sw5100aqt1000snapdragon_4_gen_1_mobile_firmwareqca6234c-v2x_9150_firmwareqam8295p_firmwaresd855wcn3990_firmwaresm7315snapdragon_660_mobileqca6564a_firmwarewcd9385snapdragon_888\+_5g_mobileqsm8350qca6234_firmwaresnapdragon_8_gen_1_mobilesnapdragon_630_mobile_firmwaresd662snapdragon_680_4g_mobile_firmwarewcn3610_firmwareqcs4290sxr1230p_firmwaresnapdragon_821_mobilesnapdragon_865\+_5g_mobilesd820_firmwaresg8275psm6250psdx55_firmwarewcn3615_firmwaresxr2130qcm4490snapdragon_480\+_5g_mobile_firmwarerobotics_rb5qca6174a_firmwaresm7325psnapdragon_732g_mobile_firmwaresnapdragon_x50_5g_modem-rfapq8037_firmwaresnapdragon_670_mobile_firmwareaqt1000_firmwaresdm429wqca6584au_firmwareqcn6274qfw7124qca6595au_firmwaresw5100p_firmwareqca6696_firmwarewcd9380_firmwareqca6574_firmwaresg4150psd_8_gen1_5gqca6797aqsnapdragon_x75_5g_modem-rfsnapdragon_427_mobilesa8620pqca6574a_firmwaresdx55snapdragon_4_gen_1_mobilesnapdragon_450_mobilesnapdragon_865_5g_mobilesnapdragon_855\+_mobile_firmwaresd675sd_8_gen1_5g_firmwarewcd9375_firmwareqca6391snapdragon_439_mobilesa8770p_firmwaresa8295psc8280xp-abbb_firmwarefastconnect_7800snapdragon_8\+_gen_2_mobile_firmwarevision_intelligence_300snapdragon_765g_5g_mobilewcn3988_firmware315_5g_iotqamsrv1h_firmwaresnapdragon_430_mobilevision_intelligence_400wsa8835_firmwaressg2115p_firmwarewcn3980qcm2150snapdragon_w5\+_gen_1_wearableqcs610Snapdragonqca6574a_firmwaresnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_720g_mobile_platform_firmwarequalcomm_video_collaboration_vc1_platform_firmwarewsa8832_firmwaresd_455_firmwareqcs4490_firmwareqca6431_firmwaresnapdragon_x35_5g_modem-rf_system_firmwareflight_rb5_5g_platform_firmwaresa8150p_firmwaresd888_firmwareqcn9024_firmwareqca6234_firmwaresd820_firmwaresd821_firmwaresrv1h_firmwaresd855_firmwaresd670_firmwaresnapdragon_780g_5g_mobile_platform_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewcn3660_firmwaresa8255p_firmwarewsa8835_firmwaresm7325p_firmwarewcn3988_firmwarefastconnect_6700_firmwaresnapdragon_660_mobile_platform_firmwaresnapdragon_855_mobile_platform_firmwareqcm6490_firmwaresxr2250p_firmwaresa8155p_firmwarefastconnect_6200_firmwaresnapdragon_820_mobile_platform_firmwaresa4155p_firmwareqcn6224_firmwaresm6250_firmwareqca6420_firmwarecsrb31024_firmwaresa6155_firmwaresd626_firmwareqca9377_firmwaresm7250p_firmwaresnapdragon_675_mobile_platform_firmwaresm7315_firmwareqca6698aq_firmwareqca8081_firmwaresnapdragon_680_4g_mobile_platform_firmwaresnapdragon_820_automotive_platform_firmwaresa8770p_firmwaresd835_firmwarevision_intelligence_400_platform_firmwarewcd9385_firmwaresnapdragon_710_mobile_platform_firmwaresnapdragon_636_mobile_platform_firmwarewcn3610_firmwarefastconnect_7800_firmwarecsra6640_firmwaresxr1120_firmwarewcd9341_firmwarewsa8845h_firmwareqcm8550_firmwareqdu1110_firmwaressg2125p_firmwarewcd9360_firmwarecsra6620_firmwaresa8155_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareqcn6024_firmwareqamsrv1m_firmwaresa8620p_firmwareqca6436_firmwaresd662_firmwareqca6595_firmwareqcn6274_firmwaresa7255p_firmwarewcd9326_firmwareqam8650p_firmwaremdm9650_firmwarec-v2x_9150_firmwareqsm8250_firmwarewcn3950_firmwaresnapdragon_670_mobile_platform_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaresnapdragon_439_mobile_platform_firmwaresnapdragon_778g_5g_mobile_platform_firmwarevision_intelligence_300_platform_firmwaresnapdragon_x55_5g_modem-rf_system_firmwareqca6564a_firmwaresrv1m_firmwareqca6335_firmwareqrb5165n_firmwaresnapdragon_8_gen_2_mobile_platform_firmwaresa8195p_firmwarewcn3910_firmwareqcn7606_firmwareqcs5430_firmwaresnapdragon_625_mobile_platform_firmwaresnapdragon_690_5g_mobile_platform_firmwareqdx1011_firmwaresw5100_firmwaresa9000p_firmwarewcd9340_firmwarear8035_firmwaresnapdragon_695_5g_mobile_platform_firmware315_5g_iot_modem_firmwarefastconnect_6800_firmwaresnapdragon_x24_lte_modem_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewsa8845_firmwaresd660_firmwareqcs6125_firmwaresnapdragon_429_mobile_platform_firmwaremdm9640_firmwareqcc710_firmwareqca6574au_firmwareapq8017_firmwaresa6155p_firmwareqcn9074_firmwareqca6678aq_firmwarewcn6740_firmwaresd_8_gen1_5g_firmwareqcs8550_firmwaresa8540p_firmwaresm4125_firmwaresnapdragon_425_mobile_platform_firmwareqca6564au_firmwarewcn3980_firmwaresnapdragon_xr2_5g_platform_firmwarewcn3680_firmwaresnapdragon_626_mobile_platform_firmwaresm6250p_firmwareqcm6125_firmwareqep8111_firmwarewcn3660b_firmwareqca6696_firmwaresa8775p_firmwaresnapdragon_430_mobile_platform_firmwareqsm8350_firmwareapq8064au_firmwaresnapdragon_xr1_platform_firmwareqca8337_firmwarewcn3615_firmwareqca6595au_firmwarewcd9390_firmwareaqt1000_firmwareqamsrv1h_firmwaresdm429w_firmwaresm8550p_firmwarewcn3999_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqcs6490_firmwaresnapdragon_632_mobile_platform_firmwareqcm5430_firmwaresnapdragon_ar2_gen_1_platform_firmwaresnapdragon_821_mobile_platform_firmwaresd675_firmwarepm8937_firmwarewcd9395_firmwaresa6145p_firmwareqdu1010_firmwaresa8295p_firmwaresnapdragon_835_mobile_pc_platform_firmwaresnapdragon_845_mobile_platform_firmwaresa4150p_firmwaresg4150p_firmwaresnapdragon_888_5g_mobile_platform_firmwaresa6150p_firmwareqca6174a_firmwaresxr1230p_firmwareqfw7124_firmwareqca6391_firmwarefastconnect_6900_firmwareqdu1000_firmwarewcd9370_firmwarewsa8840_firmwaretalynplus_firmwaresxr2130_firmwaresnapdragon_427_mobile_platform_firmwareqca6584au_firmwareqam8775p_firmwaresnapdragon_8_gen_1_mobile_platform_firmwarewcd9380_firmwarewsa8810_firmwarewcd9371_firmwarerobotics_rb3_platform_firmwaresw5100p_firmwareqcm4325_firmwareqfw7114_firmwaresd730_firmwaresnapdragon_865_5g_mobile_platform_firmwarewsa8830_firmwaresxr2230p_firmwaremsm8996au_firmwareqam8295p_firmwaressg2115p_firmwareqca6320_firmwareqca6574_firmwaresd_675_firmwaresg8275p_firmwarewcd9335_firmwaresnapdragon_630_mobile_platform_firmwaresnapdragon_x50_5g_modem-rf_system_firmwaresa8145p_firmwaresd460_firmwarear8031_firmwareqcm4490_firmwareqru1052_firmwarequalcomm_215_mobile_platform_firmwareqcm2290_firmwarequalcomm_video_collaboration_vc3_platform_firmwareqdu1210_firmwarerobotics_rb5_platform_firmwareqdx1010_firmwareqcs4290_firmwaresnapdragon_480_5g_mobile_platform_firmwareqcs610_firmwarehome_hub_100_platform_firmwaresnapdragon_662_mobile_platform_firmwareqru1062_firmwarewsa8815_firmwareqcs2290_firmwaresnapdragon_460_mobile_platform_firmwarewcn3990_firmwareqca6797aq_firmwareapq8037_firmwarewcn3680b_firmwaresm6370_firmwaresnapdragon_712_mobile_platform_firmwaresnapdragon_450_mobile_platform_firmwareqca9379_firmwareqrb5165m_firmwareqca6430_firmwaresd865_5g_firmwareqcm2150_firmwarewcn3620_firmwaresnapdragon_665_mobile_platform_firmwaresnapdragon_750g_5g_mobile_platform_firmwareqca6426_firmwaresnapdragon_auto_4g_modem_firmwaresc8380xp_firmwaresdx55_firmwareqru1032_firmwaresmart_audio_400_platform_firmwareqca6421_firmwareqam8255p_firmwareqcs410_firmwareqca6310_firmwareqcm4290_firmwaresnapdragon_auto_5g_modem-rf_firmwaresa8650p_firmwaresnapdragon_435_mobile_platform_firmwarewcd9375_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-35102
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.10% / 26.61%
||
7 Day CHG-0.01%
Published-14 Jun, 2022 | 09:40
Updated-04 Aug, 2024 | 00:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible buffer overflow due to lack of validation for the length of NAI string read from EFS in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewsa8830sd678sm6250p_firmwareqca8337qca6431_firmwarewcd9360_firmwaresdx65wcn3950_firmwaresd765g_firmwareqca6595au_firmwareqca6390_firmwaresd690_5gsd730_firmwarewcd9370sd_675_firmwaresd675_firmwareqca6426wcn3990_firmwarewcn3998wcd9385_firmwaresdxr2_5g_firmwarewcn3950sd720gsd_8_gen1_5g_firmwaresm7315_firmwareqca6574au_firmwaresdx55_firmwareqca6595auqca8081_firmwarewcd9375_firmwarewcn3998_firmwaresm7250p_firmwarewcd9360qca6436_firmwaresm7450_firmwaresd778gsa515m_firmwarewcn7851sdxr2_5gwcn3988_firmwareqca6421sd778g_firmwaresm6250wsa8810_firmwaresd765gsd765_firmwareqca6436wcn6851qca8081wcn7851_firmwarewcd9385wcd9341qca6431qca6696_firmwaresd750gsd870_firmwareqca6390ar8035sd750g_firmwarewcd9375sm6250_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3988sd888_5g_firmwarewcn6850_firmwarewsa8815_firmwaresm7450sm8475wcn6750_firmwarewcn3991qca8337_firmwarewcd9380_firmwarewcn3990sd_675sd780gsd865_5gsdx55m_firmwarewcn6856_firmwaresd888wcd9380sd888_5gsm6250pqca6574asd690_5g_firmwarewcn6855_firmwarewcn3980wcn6750sa515msd855wsa8815wcn6850sd765qca6426_firmwareqca6574a_firmwaresd695sd768g_firmwarewcn3980_firmwaresm7315sd730qca6391sdx55mqca6421_firmwaresm8475_firmwarewcn6740_firmwaresdx65_firmwaresd678_firmwarewsa8832_firmwaresd480_firmwarewcn6851_firmwareqca6574auwcd9341_firmwaresd480sd870wsa8810wcn6855wsa8832wcn6856sd695_firmwaresd768gwcn6740qca6696qca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55sd888_firmwaresd675sm7250psd720g_firmwaresm8475p_firmwarear8035_firmwaresm8475pSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Mobile
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-33068
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 5.54%
||
7 Day CHG~0.00%
Published-06 Feb, 2024 | 05:47
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in Audio

Memory corruption in Audio while processing IIR config data from AFE calibration block.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sdm429w_firmwareqcs410_firmwaresa6150p_firmwaresd865_5gsnapdragon_429_mobile_platform_firmwareqcs610_firmwarewcd9335sxr2130_firmwaresrv1mqca8081_firmwarewcd9370ar8035_firmwareqca6696wcd9340_firmwaresnapdragon_888_5g_mobile_platformwcd9341_firmwareqca6320sd888_firmwareqcc710_firmwareqca6426wcn6740_firmwarefastconnect_6700qca6564auwcn3610qcn9074wsa8815_firmwaresa8195p_firmwareqca8337_firmwareqca8337qca6426_firmwaresnapdragon_1200_wearable_platform_firmwareqca9377_firmwareqca6574au_firmwareqam8295pwcd9341qca6574ausnapdragon_855_mobile_platformwcn3950wsa8810_firmwaresnapdragon_xr2_5g_platformsnapdragon_429_mobile_platformsa9000p_firmwaresrv1hsnapdragon_835_mobile_pc_platform_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_7c\+_gen_3_computewcn3660b_firmwaresnapdragon_780g_5g_mobile_platformfastconnect_6800_firmwaresa8295p_firmwaresd835_firmwarevideo_collaboration_vc1_platform_firmwaresnapdragon_778g\+_5g_mobile_platformsa8770psnapdragon_780g_5g_mobile_platform_firmwarec-v2x_9150qca6584auqca6320_firmwareqcn6274_firmwaresd888qcc710wcn6740qca6310_firmwarefastconnect_6800qfw7114_firmwaresnapdragon_x5_lte_modem_firmwarefastconnect_7800_firmwarefastconnect_6900video_collaboration_vc1_platformqfw7114snapdragon_782g_mobile_platform_firmwarewcd9385_firmwaresnapdragon_x55_5g_modem-rf_systemfastconnect_6900_firmwareqca6310qam8255p_firmwarewcd9380sa6145p_firmwareqam8255psnapdragon_888_5g_mobile_platform_firmwaresnapdragon_xr2_5g_platform_firmwaresa8150psnapdragon_778g_5g_mobile_platformmsm8996au_firmwaresa6155psnapdragon_835_mobile_pc_platformqca6564au_firmwarewsa8810qam8650psnapdragon_865\+_5g_mobile_platformsa9000psrv1h_firmwarevideo_collaboration_vc3_platformaqt1000sm7315_firmwaresnapdragon_865_5g_mobile_platform_firmwarec-v2x_9150_firmwaresa6155p_firmwarewcd9326_firmwareqam8295p_firmwaresrv1m_firmwaresd855sd835wcd9330_firmwarewcn3990_firmwaresm7315snapdragon_870_5g_mobile_platform_firmwareqfw7124_firmwareqca6564a_firmwareqca6436_firmwareqca6698aq_firmwaresnapdragon_wear_4100\+_platform_firmwarewcd9385mdm9650_firmwareqca9367_firmwarewcd9330snapdragon_7c\+_gen_3_compute_firmwarewcn3610_firmwaresa8255psnapdragon_855\+\/860_mobile_platform_firmwaresnapdragon_778g\+_5g_mobile_platform_firmwareqca6420snapdragon_865\+_5g_mobile_platform_firmwareqca6430wcd9370_firmwaremdm9650qca9367snapdragon_x55_5g_modem-rf_system_firmwarewcn3660bqca6574asxr2130wcn3620_firmware9206_lte_modem_firmwaresa8195pwcd9340qamsrv1msnapdragon_820_automotive_platform_firmwaresnapdragon_auto_5g_modem-rf_gen_2sm7325pqam8650p_firmwaresnapdragon_855_mobile_platform_firmwareqca6420_firmwareaqt1000_firmwaresdm429wqca6584au_firmwaresd855_firmwareqcn6274qca6436qfw7124sa8775psnapdragon_1200_wearable_platformsnapdragon_x75_5g_modem-rf_systemqca6391_firmwarewcd9335_firmwarewsa8835qca6430_firmwaresnapdragon_870_5g_mobile_platformsa8775p_firmwaresnapdragon_782g_mobile_platformqamsrv1hqca6696_firmwaresnapdragon_865_5g_mobile_platformwcd9380_firmwaresa6150pwcd9326qcs410sa8155p_firmwareqca8081qca6564awsa8815mdm9628sa8155pwcn3980_firmwareqam8775pqca9377mdm9628_firmwarewsa8830sa6145pqcn9074_firmwaresa8255p_firmware9206_lte_modemsmart_audio_200_platform_firmwarear8035qca6574a_firmwareqamsrv1m_firmwaremsm8996ausa8650p_firmwarewcn3620wcd9375_firmwareqca6391qcn6224snapdragon_x5_lte_modemsnapdragon_778g_5g_mobile_platform_firmwareqca6698aqwcn3950_firmwaresa8770p_firmwaresa8295psmart_audio_200_platformfastconnect_6200fastconnect_7800sa8145p_firmwaresa8650pqam8775p_firmwaresd865_5g_firmwaresm7325p_firmwarewcn3680bsnapdragon_888\+_5g_mobile_platformwcd9375sa8150p_firmwaresnapdragon_855\+\/860_mobile_platformfastconnect_6700_firmwareqamsrv1h_firmwarevideo_collaboration_vc3_platform_firmwaresa8145pwcn3990snapdragon_wear_4100\+_platformsnapdragon_888\+_5g_mobile_platform_firmwarewsa8835_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewcn3980snapdragon_820_automotive_platformfastconnect_6200_firmwarewsa8830_firmwarewcn3680b_firmwareqcn6224_firmwareqcs610Snapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-33973
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.19% / 40.68%
||
7 Day CHG+0.06%
Published-19 Apr, 2023 | 00:00
Updated-05 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer Overflow vulnerability in Qihoo 360 Safe guard v12.1.0.1004, v12.1.0.1005, v13.1.0.1001 allows attacker to escalate priveleges.

Action-Not Available
Vendor-360totalsecurityn/a
Product-360_total_securityn/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-33030
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.06% / 18.53%
||
7 Day CHG~0.00%
Published-02 Jan, 2024 | 05:38
Updated-03 Jun, 2025 | 14:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy without Checking Size of Input in HLOS

Memory corruption in HLOS while running playready use-case.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresnapdragon_850_mobile_compute_platform_firmwaremdm9640_firmwaresm6250p_firmwareqca8337qam8775psnapdragon_888_5g_mobile_platformwcn3950_firmwaresc8180x\+sdx55sm4450_firmwareqca6595au_firmwaresa6155snapdragon_427_mobile_platformsnapdragon_480_5g_mobile_platformsd_455_firmwarehome_hub_100_platformsnapdragon_460_mobile_platform_firmwareqcs6125_firmwaresnapdragon_480_5g_mobile_platform_firmwaremsm8108wcd9371_firmwaremsm8108_firmwarewcn3950qcn6024_firmwaresm4125qsw8573_firmwarewcn3660bqsm8350_firmwaresnapdragon_460_mobile_platformqsm8350sd460_firmwaresnapdragon_660_mobile_platform_firmwaresm7315_firmwaresnapdragon_429_mobile_platform_firmwaresnapdragon_695_5g_mobile_platform_firmwaresnapdragon_636_mobile_platformqca8081_firmwareqca6420snapdragon_auto_5g_modem-rf_firmwareqca9367_firmwaremdm8207sa8155_firmwarerobotics_rb3_platform_firmwareqca4004_firmwareqca6430snapdragon_630_mobile_platformsnapdragon_678_mobile_platform_firmwareqts110wcd9306_firmwarewcd9340snapdragon_8cx_compute_platformvision_intelligence_200_platform_firmwaresnapdragon_765_5g_mobile_platform_firmwareqca6698aq_firmwaremsm8209_firmwaresnapdragon_690_5g_mobile_platformmdm9250_firmwarequalcomm_205_mobile_platform_firmwaresnapdragon_wear_2500_platformqca6696_firmwarewcd9371sd_8cxsa8150psnapdragon_430_mobile_platformqca4004sd660sd865_5g_firmwaresd660_firmwareqcn5121snapdragon_865_5g_mobile_platform_firmwarefastconnect_6800_firmwareqcn5022_firmwareqcn7606_firmwaresnapdragon_7c_gen_2_compute_platform_firmwaresnapdragon_730_mobile_platform_firmwaresnapdragon_750g_5g_mobile_platform_firmwaresnapdragon_675_mobile_platform_firmwaresnapdragon_778g_5g_mobile_platform_firmwaressg2125psdm429w9205_lte_modemsnapdragon_670_mobile_platform_firmwaresd670_firmwareqca6574csr8811_firmwaresnapdragon_7c\+_gen_3_computewcd9380qcs410snapdragon_210_processorsnapdragon_430_mobile_platform_firmwareqca9379_firmwaresxr1230pc-v2x_9150_firmwareqcn9012_firmwaresd626ipq6018_firmwareqcm4325_firmwarewcd9340_firmwarewsa8815snapdragon_865\+_5g_mobile_platformqca6584_firmwaresnapdragon_630_mobile_platform_firmwareqcs8250ipq6028sd835snapdragon_821_mobile_platformwcn3980_firmwaresd730sa8295p9205_lte_modem_firmwarewcn6740_firmwaresnapdragon_8cx_compute_platform_firmwareqcs4490_firmwaresnapdragon_x65_5g_modem-rf_systemapq8064au_firmwarefastconnect_6900qca6234fastconnect_6900_firmwaresnapdragon_660_mobile_platformsd670smart_audio_200_platform_firmwareqcn9024_firmwaresdx57mqcm4290_firmwaresw5100p_firmwareqcs610_firmwaresa6145pqualcomm_215_mobile_platform_firmwarear8031mdm8207_firmwaresnapdragon_750g_5g_mobile_platformsd820_firmwareqca6391_firmwaresa4150p_firmwareqca4024wcd9370_firmwaresdx55qcn5021_firmwarecsra6640snapdragon_695_5g_mobile_platformssg2115p_firmwaresnapdragon_1200_wearable_platformwcn3660qca9379qam8255psa4155pqca6234_firmwareqsm8250_firmwareqcn7606snapdragon_480\+_5g_mobile_platformwsa8830sxr2230p_firmware9207_lte_modemsnapdragon_850_mobile_compute_platformsnapdragon_x24_lte_modem_firmwareqam8650pcsrb31024mdm9628_firmwareflight_rb5_5g_platformmdm9650snapdragon_865_5g_mobile_platformflight_rb5_5g_platform_firmwareqcs4290mdm9250qca6420_firmwaresnapdragon_450_mobile_platform_firmwaresnapdragon_auto_4g_modem_firmwaresd675_firmwareqca6564qca6426wcn3990_firmwareqrb5165n_firmwareqca9984_firmwareqca9377wcd9385_firmwarewcd9326_firmwarefastconnect_6200wcn3615_firmwaresnapdragon_7c_gen_2_compute_platformqcn9011_firmwaresa8155snapdragon_x55_5g_modem-rf_systemqca6584snapdragon_835_mobile_pc_platform_firmwareqcn5122_firmwaresdx55_firmwaresnapdragon_208_processor_firmwarewcn3615qcn6023_firmwaresm7250p_firmwarewcn3610_firmwareqrb5165nwcd9306qca6584ausnapdragon_x65_5g_modem-rf_system_firmwaresnapdragon_870_5g_mobile_platformsnapdragon_208_processorsnapdragon_439_mobile_platformqcn50529206_lte_modemqca9367snapdragon_wear_3100_platformwcn3988_firmware315_5g_iot_modemqcn9074qca6421fastconnect_6700_firmwaresa8195psxr1120snapdragon_626_mobile_platform_firmwarewcd9326wcd9335qcm4490qcn6023snapdragon_888\+_5g_mobile_platformqcs4290_firmwaresxr2130_firmwareqcs6490_firmwarewcd9375aqt1000snapdragon_210_processor_firmwaresc8180x\+sdx55_firmwaresm6250_firmwaresnapdragon_712_mobile_platform_firmwaresnapdragon_662_mobile_platformsnapdragon_685_4g_mobile_platformwsa8815_firmwaresnapdragon_636_mobile_platform_firmwareapq8017sxr1120_firmwareqcm6125_firmwaresnapdragon_x5_lte_modemsnapdragon_855\+\/860_mobile_platform_firmwarerobotics_rb5_platform_firmwaresnapdragon_1100_wearable_platformsd865_5gqca6595qualcomm_205_mobile_platformsxr1230p_firmwaresa8540p_firmwareqca8075_firmwaresxr2130snapdragon_wear_4100\+_platformsmart_audio_400_platformipq6005_firmwareqca6310_firmwaresa9000pqca6574_firmwaresm7325p_firmwaresxr2230psnapdragon_xr2_5g_platform_firmwareqca6574a_firmwaresnapdragon_665_mobile_platformsnapdragon_730g_mobile_platformqrb5165msm7315snapdragon_x55_5g_modem-rf_system_firmwaresnapdragon_8cx_gen_3_compute_platform_firmwaresnapdragon_7c_compute_platform_firmwaresnapdragon_865\+_5g_mobile_platform_firmwaresnapdragon_690_5g_mobile_platform_firmwaresnapdragon_auto_4g_modemsnapdragon_632_mobile_platform_firmwarecsrb31024_firmwareqcm6490_firmwarewsa8832_firmwaresnapdragon_xr1_platformqcn9070_firmwareipq6028_firmwareqcn5122qcs8250_firmwaresnapdragon_765g_5g_mobile_platform_firmwaresnapdragon_712_mobile_platformsnapdragon_8_gen_1_mobile_platform_firmwareqcn5022snapdragon_8c_compute_platform_firmwareqca6564_firmwarewcn6740snapdragon_732g_mobile_platformqcs8550snapdragon_x50_5g_modem-rf_systemqca8075qcn6024qcn9022ipq6000_firmwareqcs410_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_firmwaresnapdragon_wear_1300_platformsnapdragon_7c_compute_platformqts110_firmwareqam8255p_firmwaresnapdragon_8_gen_1_mobile_platformsa6150p_firmwareqcs610315_5g_iot_modem_firmwareqca6431_firmwaresnapdragon_778g\+_5g_mobile_platformsnapdragon_870_5g_mobile_platform_firmwaresnapdragon_820_automotive_platform_firmwarewcd9360_firmwarevision_intelligence_100_platform_firmwareqca4024_firmwaresnapdragon_wear_2100_platform_firmwaresnapdragon_212_mobile_platformsa8150p_firmwareqcs2290snapdragon_x70_modem-rf_systemqca6335csra6620_firmwaresd_675_firmwarecsra6640_firmwareqam8295pmdm9628sd_8_gen1_5g_firmwareqca6574au_firmwaresnapdragon_778g\+_5g_mobile_platform_firmwaresa6155_firmwarewcd9375_firmwaremsm8909wwcd9360snapdragon_xr2\+_gen_1_platformsnapdragon_782g_mobile_platform_firmwaresnapdragon_427_mobile_platform_firmwaresmart_audio_400_platform_firmwarewcn3999qrb5165m_firmwareqca6698aqqcs6125sa4155p_firmwareipq6010sd662_firmwaresnapdragon_765g_5g_mobile_platformrobotics_rb3_platformsnapdragon_8\+_gen_1_mobile_platformsnapdragon_720g_mobile_platformsd626_firmwaresnapdragon_820_mobile_platformsnapdragon_780g_5g_mobile_platformhome_hub_100_platform_firmwarefsm10056_firmwareqca6436sw5100sa6155pwcn3660_firmwarewcd9341qam8775p_firmwaresa8255ppm8937_firmwareqca6431snapdragon_x12_lte_modemqca6797aqwcn3910_firmwaresnapdragon_855_mobile_platform_firmwarerobotics_rb5_platformwsa8830_firmwaresd855_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewcn3988snapdragon_780g_5g_mobile_platform_firmwaresnapdragon_685_4g_mobile_platform_firmwaresa8195p_firmwaresa8295p_firmwarewcn3610msm8608mdm9640qca8337_firmwarewcd9380_firmwaresw5100pmsm8996au_firmwaresnapdragon_8cx_gen_2_5g_compute_platformwcd9330snapdragon_w5\+_gen_1_wearable_platformqca6564auqualcomm_215_mobile_platformqet4101_firmwaresnapdragon_782g_mobile_platformsnapdragon_wear_4100\+_platform_firmwarefastconnect_6700qca8072_firmwareqca6430_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980snapdragon_732g_mobile_platform_firmwareqca6335_firmwareqsw8573wcn3910qca6320mdm9650_firmwaresnapdragon_4_gen_1_mobile_platformqca6426_firmwaresm4450snapdragon_435_mobile_platformwcn3660b_firmwareqca9984snapdragon_670_mobile_platformwcn3680qcn9024snapdragon_xr2\+_gen_1_platform_firmwarewcd9330_firmwaresnapdragon_x50_5g_modem-rf_system_firmwaresnapdragon_820_automotive_platformqca6421_firmwaresmart_audio_200_platformsd821_firmwarevision_intelligence_100_platformsnapdragon_xr2_5g_platformar8031_firmwarewcn3680_firmware9206_lte_modem_firmwareqca6797aq_firmwareqca6564a_firmwaresnapdragon_x24_lte_modemqcn5121_firmwarewsa8832sa8540psnapdragon_8cx_gen_3_compute_platformqsm8250smart_display_200_platform_firmwareipq6018snapdragon_730_mobile_platform9207_lte_modem_firmwareqcs4490qca6595_firmwaresa8145psnapdragon_888\+_5g_mobile_platform_firmwaresnapdragon_710_mobile_platform_firmwaresd888_firmwaresa8155psd675qet4101qcs8155_firmwaresnapdragon_720g_mobile_platform_firmwarear8035_firmwareqcm2290snapdragon_632_mobile_platformsnapdragon_625_mobile_platform_firmwaresnapdragon_855_mobile_platformsnapdragon_wear_2100_platformsnapdragon_662_mobile_platform_firmwareqcn9070sa8145p_firmwareqcs2290_firmwarefsm10056csra6620qcn9072smart_display_200_platformsnapdragon_888_5g_mobile_platform_firmwaresnapdragon_450_mobile_platformipq6000sd730_firmwarewcd9370ssg2115pqcn5152_firmwaresnapdragon_480\+_5g_mobile_platform_firmwareqca6584au_firmwareqcn9000_firmwaresd_8cx_firmwaresnapdragon_1200_wearable_platform_firmwaresd662qam8295p_firmwareapq8037snapdragon_435_mobile_platform_firmwarevision_intelligence_200_platformsa9000p_firmwareqca6320_firmwarewcn3680b_firmwaresnapdragon_778g_5g_mobile_platformsnapdragon_212_mobile_platform_firmwareqca6595auwcn3999_firmwaresnapdragon_425_mobile_platformsnapdragon_429_mobile_platformqca6436_firmwaresnapdragon_680_4g_mobile_platform_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwareqca6564au_firmwaresa6155p_firmwareqca6310snapdragon_821_mobile_platform_firmwareqcs8155pm8937snapdragon_x70_modem-rf_system_firmwareqcs6490snapdragon_x5_lte_modem_firmwaresnapdragon_625_mobile_platformqcs8550_firmwaresd821vision_intelligence_300_platform_firmwaresa6145p_firmwaresm6250c-v2x_9150apq8017_firmwarewsa8810_firmwarevision_intelligence_400_platformsnapdragon_ar2_gen_1_platform_firmwaresa8255p_firmwaresg4150pqca8081qca6174a_firmwaresnapdragon_wear_1300_platform_firmwarewcd9385snapdragon_x12_lte_modem_firmwaresnapdragon_665_mobile_platform_firmwarear8035csr8811apq8064auvision_intelligence_400_platform_firmwaresnapdragon_768g_5g_mobile_platform_firmwarewcn3620_firmwaresd820qcm6490wsa8835_firmwarewcn3620qca6564asa4150psg4150p_firmwareqcm4325qca8072qcm2290_firmwaresnapdragon_626_mobile_platformsnapdragon_845_mobile_platformwcn3990qcn9000sd_675fastconnect_6800snapdragon_835_mobile_pc_platformqcn9012snapdragon_8c_compute_platformsd888msm8909w_firmwarewsa8835msm8996ausdm429w_firmwaresnapdragon_auto_5g_modem-rfsd_8_gen1_5gsm6250psnapdragon_678_mobile_platformsnapdragon_855\+\/860_mobile_platformsnapdragon_4_gen_1_mobile_platform_firmwaressg2125p_firmwaresnapdragon_425_mobile_platform_firmwareqca6574aqca6174asm7325psd855sm4125_firmwaresdx57m_firmwaresnapdragon_439_mobile_platform_firmwarefastconnect_6200_firmwareqcn5021qcn5152msm8209vision_intelligence_300_platformsd460qca6391snapdragon_710_mobile_platformfastconnect_7800aqt1000_firmwareipq6005qcm4490_firmwaresnapdragon_845_mobile_platform_firmwareqcm4290qcn9011sd_455qca6574ausa8155p_firmwarewcd9341_firmwarefastconnect_7800_firmwareqcm6125wsa8810snapdragon_730g_mobile_platform_firmwaresnapdragon_680_4g_mobile_platformsnapdragon_ar2_gen_1_platformwcn3680bsd835_firmwareqam8650p_firmwaresnapdragon_675_mobile_platformipq6010_firmwaresnapdragon_wear_2500_platform_firmwareqca6696msm8608_firmwaresa6150psnapdragon_1100_wearable_platform_firmwareqcn9022_firmwaresnapdragon_768g_5g_mobile_platformapq8037_firmwaresnapdragon_765_5g_mobile_platformqcn9072_firmwaresnapdragon_820_mobile_platform_firmwaresm7250psnapdragon_8\+_gen_1_mobile_platform_firmwaresnapdragon_wear_3100_platform_firmwaresw5100_firmwareqcn9074_firmwaresnapdragon_xr1_platform_firmwareSnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-3438
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-7.8||HIGH
EPSS-0.55% / 67.87%
||
7 Day CHG~0.00%
Published-20 May, 2021 | 13:32
Updated-03 Aug, 2024 | 16:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential buffer overflow in the software drivers for certain HP LaserJet products and Samsung product printers could lead to an escalation of privilege.

Action-Not Available
Vendor-n/aSamsungHP Inc.
Product-proxpress_sl-c3060_ss211alaserjet_mfp_m438_8af44aproxpress_sl-c3010_ss210jxpress_sl-m2826_ss344aproxpress_sl-m3870_ss377aproxpress_sl-m4020_ss383yxpress_sl-m2621_ss325asf-760_ss199aproxpress_sl-m3375fd_ss368fmultixpress_sl-m5360_ss403ascx-5637_ss182ascx-4833_ss181axpress_sl-m2885_ss359aclx-3305_ss095aml-5510_ss152acolor_laser_mfp_170_4zb96alaser_mfp_130_4zb90ascx-5737_sw045axpress_sl-m2020_ss272acolor_laser_mfp_170_6hu08aproxpress_sl-c4010_ss216sxpress_sl-m2625_ss326alaserjet_mfp_m443_8af72axpress_sl-m2825_ss342axpress_sl-m2676_ss337axpress_sl-m2875_ss353ascx-3405_sv943ascx-3405_sw314aproxpress_sl-m3375fd_ss369cxpress_sl-c480_ss255ascx-3401_ss158aproxpress_sl-m3820_ss372csf-760_ss196ascx-4650_sb983acolor_laser_mfp_170_6hu09aml-3750_ss138alaser_100_4zb81axpress_sl-c1860_ss205axpress_sl-m2070_ss297amultixpress_clx-9301_ss007axpress_sl-m2875_ss352aml-5510_sv897aproxpress_sl-c3060_ss213fmultixpress_clx-9301_sw179aproxpress_sl-m4075_ss394aproxpress_sl-c4010_ss216bml-6510_ss154amultixpress_sl-x7500_ss055alaser_mfp_130_4zb84aproxpress_sl-c3010_ss210flaserjet_mfp_m440_8af46alaser_408_7uq75alaser_mfp_130_4zb91aproxpress_sl-m4580_ss402aproxpress_sl-c4010_ss216fproxpress_sl-c4010_ss216kclp-365_ss066aproxpress_sl-m3375fd_ss369dproxpress_sl-c4010_ss216vproxpress_sl-m3875_ss382amultixpress_scx-8128_ss018amultixpress_sl-k7500_ss040aclx-3305_ss096asf-760_ss197ascx-3401_ss157aproxpress_sl-m3325_ss367aml-6510_sv901aproxpress_sl-m4024_ss385axpress_sl-m2676_ss338ascx-3401_sv393aclp-680_ss075axpress_sl-c480_ss254aproxpress_sl-c3060_ss213dmultixpress_sl-k7500_ss039axpress_sl-m2880_ss358aproxpress_sl-m3820_ss373wproxpress_sl-c3060_ss211lclp-775_ss079aproxpress_sl-c4010_ss216eproxpress_sl-c3060_ss213gxpress_sl-m2820_ss339aproxpress_sl-m3370_ss378ascx-3400_sv938alaserjet_mfp_m42625_8af52axpress_sl-m2675_sw112aproxpress_sl-c4060_ss218alaser_mfp_130_4zb82amultixpress_sl-k7600_ss042aproxpress_sl-m4530_ss398dproxpress_sl-m4025_ss387aml-5017_ss148aclx-3300_ss088aproxpress_sl-c3010_ss210hscx-4021_ss165aproxpress_sl-c4012_ss217aproxpress_sl-m3321_ss366aproxpress_sl-c4010_ss216pproxpress_sl-m3320nd_ss365amultixpress_sl-x4300_ss049axpress_sl-m2620_ss324aproxpress_sl-c4010_ss216dscx-4521_ss168aproxpress_sl-m3820_ss373dproxpress_sl-c3010_ss210aproxpress_sl-c3010_ss210gproxpress_sl-c3060_ss211nproxpress_sl-m3820_ss373sproxpress_sl-m4072_ss391acolor_laser_150_4zb95aclp-680_ss076aclx-3305_ss094aproxpress_sl-m3820_ss371bsf-760_ss195amultixpress_sl-x7600_ss058aproxpress_sl-m4070_ss390cmultixpress_scx-8230_ss021aproxpress_sl-m3820_ss373uscx-5639_st676alaser_100_4zb79ascx-3405_ss162aproxpress_sl-c3010_ss201claserjet_mfp_m42523_7ab26axpress_sl-m2620_ss322alaser_mfp_432_7uq76amultixpress_scx-8128_ss020axpress_sl-m2625_ss327aproxpress_sl-m4025_ss386alaserjet_mfp_m442_8af71axpress_sl-m2821_ss341aproxpress_sl-m4020_ss383cproxpress_sl-m3820_ss373qlaserjet_mfp_m438_8af45axpress_sl-m2675_ss336aproxpress_sl-m3820_ss373lxpress_sl-m2876_ss355axpress_sl-m2070_ss294aproxpress_sl-m3825_ss375aproxpress_sl-m4070_ss389jlaser_mfp_130_4zb87amultixpress_sl-x4220_ss047aclx-6260_ss105aproxpress_sl-c4062_ss219alaserjet_mfp_m72625-m72630_2zn50aproxpress_sl-m4075_ss393aproxpress_sl-m3875_ss380amultixpress_sl-x7600_ss059aproxpress_sl-c3060_ss211eproxpress_sl-m3820_ss373mproxpress_sl-c3060_ss211pml-6510_sv899cmultixpress_sl-k7400_ss038ascx-3405_sw313ascx-5737_ss183axpress_sl-m2871_ss350amultixpress_sl-x7500_ss056aml-5015_ss147axpress_sl-m2875_ss354aclp-775_ss078aproxpress_sl-m3820_ss373jproxpress_sl-c4010_ss216jproxpress_sl-m3375fd_ss369elaserjet_mfp_m436_w7u01amultixpress_scx-8240_ss022alaser_mfp_130_6hu10amultixpress_sl-m4370_ss396axpress_sl-m2825_ss343ascx-3400_ss155ascx-4521_sv968aclx-6260_ss106axpress_sl-m2626_ss328ascx-4521_sv967aproxpress_sl-m3870_ss378ascx-5635_sw041amultixpress_clx-9301_sw152ascx-4655_ss174aproxpress_sl-m3820_ss373tproxpress_sl-c3060_ss211qproxpress_sl-c3060_ss211dproxpress_sl-m4530_ss397escx-4650_ss171ascx-3406_ss164alaser_mfp_130_4zb85axpress_sl-m2671_ss333axpress_sl-m2620_ss323amultixpress_sl-k4250_ss030ascx-4655_sv989amultixpress_sl-x4250_ss048aproxpress_sl-c3010_ss210kxpress_sl-m2870_ss349aproxpress_sl-m4560_ss400aproxpress_sl-c3010_ss210eproxpress_sl-c3010_ss210mproxpress_sl-c4010_ss216claserjet_mfp_m437_7zb19aproxpress_sl-m3820_ss373gproxpress_sl-c3060_ss211mlaser_mfp_130_4zb83aproxpress_sl-c3060_ss211gproxpress_sl-c3060_ss211cxpress_sl-m2070_ss295axpress_sl-m2070_ss298aproxpress_sl-c3060_s221bxpress_sl-m2070_ss293aproxpress_sl-m3820_ss373fproxpress_sl-c3060_ss213axpress_sl-c430_ss229aclp-560_sv611ascx-3400_ss156aclp-560_sv612alaser_mfp_130_4zb86ascx-4835_sw020ascx-3405_ss161axpress_sl-c480_ss257amultixpress_sl-k4300_ss032amultixpress_sl-m5370_sw121alaserjet_mfp_m42625_8af50aproxpress_sl-m4080_ss395amultixpress_clx-9251_sv719aproxpress_sl-m3820_ss373aclp-360_ss062amultixpress_sl-m4370_sw117aproxpress_sl-c3060_ss211hscx-3405_ss159acolor_laser_150_4zb94aproxpress_sl-m3820_ss373nproxpress_sl-c3060_ss211flaser_mfp_130_5ue15alaserjet_mfp_m433_1vr14aclp-366_ss068aclx-3305_ss093ascx-3405_ss163aproxpress_sl-m4560_ss399aproxpress_sl-m3375fd_ss369bproxpress_sl-m4020_ss383kproxpress_sl-m3820_ss371aproxpress_sl-m3875_ss381aclp-368_sv601aproxpress_sl-m3820_ss371dlaserjet_mfp_m439_7zb22ascx-4833_sw019aclx-6260_ss108aproxpress_sl-m3820_ss373pml-6510_sv900aproxpress_sl-c4010_ss216hml-5010_ss145amultixpress_sl-m5370_ss404aclp-365_sw139ascx-4521_sv530ascx-5637_sw043amultixpress_sl-k4250_ss031aml-4510_ss141aproxpress_sl-m3820_ss373vproxpress_sl-m4020_4pt87amultixpress_clx-9251_ss005ascx-5635_sw093axpress_sl-m2876_ss357ascx-5635_sw040amultixpress_sl-k3250_ss027eproxpress_sl-c3010_ss210plaserjet_mfp_m440_8af48ascx-4835_sw021aproxpress_sl-m4030_ss388aproxpress_sl-c3010_ss209alaser_100_4zb80aproxpress_sl-c3060_ss213hproxpress_sl-c4010_ss216qxpress_sl-m2820_ss340ascx-3406_sw127axpress_sl-m2676_sw113alaserjet_mfp_m42523_7zb72aml-5012_ss146aproxpress_sl-c3060_ss213blaserjet_mfp_m437_7zb20amultixpress_sl-k2200_ss025axpress_sl-m2835_ss346axpress_sl-m2670_ss331amultixpress_sl-k3300_ss028aproxpress_sl-c4010_ss216mmultixpress_sl-x7400_ss054alaserjet_mfp_m439_7zb23aproxpress_sl-m3820_ss373hproxpress_sl-m3820_ss373zxpress_sl-m2626_ss329ascx-4650_ss172axpress_sl-m2671_ss332aproxpress_sl-c4010_ss216zproxpress_sl-m3825_ss376aproxpress_sl-m3820_ss373bml-6510_ss153amultixpress_sl-x3280_ss044ascx-5737_sw046aclx-6260_ss107aproxpress_sl-c3060_ss211jlaserjet_mfp_m439_7zb24alaserjet_mfp_m436_w7u02ascx-4521_sw129aclx-3300_sv677alaserjet_mfp_m440_8af47aproxpress_sl-c4010_ss215acolor_laser_mfp_170_4zb97aproxpress_sl-c3060_ss211kmultixpress_sl-k2200_ss024aclx-6260_sw177alaser_mfp_130_4zb88aml-5510_sv898aproxpress_sl-m3820_ss373cxpress_sl-m2876_ss356amultixpress_sl-x3220nr_ss043eclp-366_sv600alaser_mfp_130_6hu11axpress_sl-c480_ss256amultixpress_scx-8128_sw172ascx-4655_sv988alaserjet_mfp_m42523_7zb25ascx-3406_sv946ascx-4521_ss167axpress_sl-m2670_ss330aproxpress_sl-m3375fd_ss369amultixpress_scx-8128_ss019aproxpress_sl-c4010_ss216nproxpress_sl-c4010_ss216gproxpress_sl-m3820_ss373eproxpress_sl-m4020_ss383xproxpress_sl-m4075_ss392aproxpress_sl-c4010_ss216llaserjet_mfp_m436_2ky38ascx-3405_ss160axpress_sl-m2070_ss296aproxpress_sl-c4010_ss216uproxpress_sl-m3825_ss374alaserjet_mfp_m42625_8af49alaser_mfp_130_4zb93aproxpress_sl-m3820_ss371cmultixpress_sl-x7400_ss053asf-760_ss198aclp-365_ss067alaser_100_5ue14axpress_sl-m2675_ss335alaser_mfp_130_9vv52aproxpress_sl-m4020_4pt7blaser_mfp_130_6hu12amultixpress_sl-k7400_ss037aproxpress_sl-c3060_ss213cmultixpress_scx-8240_st717alaser_mfp_130_4zb92aproxpress_sl-m3820_ss373kscx-4833_ss180axpress_sl-c430_ss230ascx-4521_sv966aproxpress_sl-m3875_ss379alaser_mfp_130_4zb89alaserjet_mfp_m42625_8af51aproxpress_sl-m4020_ss383lproxpress_sl-m3820_ss375bproxpress_sl-c3010_ss210lmultixpress_sl-k7600_ss041aml-4512_ss142axpress_sl-m2675_ss334aml-5510_ss151amultixpress_scx-8240_sw185alaserjet_mfp_m437_7zb21ascx-3406_sv298aproxpress_sl-c4010_ss216tproxpress_sl-c3010_ss210bxpress_sl-m3015_ss360axpress_sl-m2870_ss348alaser_100_209u7aml-5510_ss150alaserjet_mfp_m438_8af43alaserjet_mfp_m72625-m72630_2zn49aproxpress_sl-m4530_ss397gxpress_sl-m2875_ss351aproxpress_sl-m4580_ss401aproxpress_sl-c3060_ss213escx-4521_sv969aml-5510_ss149aproxpress_sl-c3010_ss210dscx-3406_sv945amultixpress_sl-k4350_ss033aproxpress_sl-c4010_ss216ascx-3406_sv947axpress_sl-m2020_ss271aCertain HP LaserJet products and Samsung product printers, see Security Bulletin
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-33024
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 12.21%
||
7 Day CHG~0.00%
Published-05 Dec, 2023 | 03:04
Updated-25 Feb, 2026 | 16:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Radio Interface Layer

Memory corruption while sending SMS from AP firmware.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewsa8830sa6150p_firmware8998sa8145p_firmwareqca83378098qfw7124wcn785x-5qcn6224_firmwaresa8150p_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwareqca6426wcn685x-1wcn3990_firmwaresm8250-abwcn3998qam8295pwcn3660bqam8295p_firmware8998_firmwareqca6320_firmwaresnapdragon_x55_5g_modem-rf_systemqca6574au_firmwarewcn3680b_firmwareqca6595auwcn3998_firmwareqca8081_firmwareqfw7114wcn3610_firmwareqca6420qca6436_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwaresnapdragon_auto_5g_modem-rf_firmwaresa6155p_firmwareqca6310qca6698aqsa4155p_firmwaresm8250_firmwaresm8250-acwcn3988_firmwareqca6430sa6145p_firmwarewcd9340sa8195pwsa8810_firmwareqcn6224sw5100qca6436snapdragon_x75_5g_modem-rf_systemsa6155pwcd9335qca8081qca6698aq_firmwarewcn685x-1_firmwaresm8150_firmwaresxr2130_firmwarewcd9341qca6696_firmwareqca6390ar8035aqt1000sa8150pqcc710_firmwaresm8250-ac_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwaresm8150wcn3988wsa8815_firmwarewsa8835_firmwaresa8195p_firmwaresa8295p_firmwaresa4150pwcn785x-1wcn3610wcn3991qca8337_firmwarewcd9380_firmwarewcn3990sw5100psd865_5gsnapdragon_w5\+_gen_1_wearable_platformsm8150-acwsa8835snapdragon_auto_5g_modem-rfqcn6274wcd9380snapdragon_wear_4100\+_platform_firmwaresxr2130snapdragon_wear_4100\+_platformwcn685x-5_firmwareqca6310_firmwareqca6430_firmwarewcd9335_firmwareqfw7114_firmwarewcn3980wcd9340_firmwaresd855wsa8815qca6320snapdragon_xr2_5g_platform_firmwareqca6426_firmwarewcn3660b_firmwaresd835wcn785x-5_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresm8250-ab_firmwareqca6391wcn3980_firmwaresa8295paqt1000_firmwareqcn6274_firmwaresnapdragon_xr2_5g_platformsnapdragon_x75_5g_modem-rf_system_firmware8098_firmwarewcn685x-5wcn785x-1_firmwareqca6574ausa8155p_firmwarewcd9341_firmwarewsa8810sw5100p_firmwaresm8150-ac_firmwaresa6145pwcn3680bsd835_firmwareqcc710sa8145pqca6696qca6391_firmwaresa4150p_firmwaresa6150psa8155psm8250sw5100_firmwareqfw7124_firmwaresa4155par8035_firmwareSnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-33113
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.11% / 28.94%
||
7 Day CHG~0.00%
Published-02 Jan, 2024 | 05:38
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Kernel

Memory corruption when resource manager sends the host kernel a reply message with multiple fragments.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qdx1010_firmwareqcm8550_firmwareqcs410_firmwaresa6150p_firmwaresw5100pwsa8832wsa8845_firmwareqca6595qcs610_firmwarewcd9335wcd9370qca8081_firmwaressg2125p_firmwarear8035_firmwareqca6696wsa8830_firmwareqrb5165msnapdragon_888_5g_mobile_platformwcd9341_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwaresa4150p_firmwarewcd9395_firmwareqcn6024sd888_firmwarewcn6740_firmwarefastconnect_6700qca6564ausa4150pwsa8815_firmwarewsa8832_firmwaresa8195p_firmwareqca8337_firmwaresnapdragon_x12_lte_modem_firmwareqca8337qdu1110wcd9395snapdragon_680_4g_mobile_platformsg8275p_firmwareqca9377_firmwareqcm6490_firmwareqca6574au_firmwareqam8295pwcd9341qcm4490_firmwareqca6574auqru1032snapdragon_x12_lte_modemflight_rb5_5g_platformwcd9390wcn3950wsa8810_firmwarewsa8845h_firmwarecsra6640snapdragon_x65_5g_modem-rf_system_firmwareqca6797aq_firmwaresnapdragon_7c\+_gen_3_computeqca6554asnapdragon_780g_5g_mobile_platformsa8295p_firmwareqcn6024_firmwaresa4155p_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaresnapdragon_695_5g_mobile_platformsnapdragon_4_gen_1_mobile_platform_firmwarevideo_collaboration_vc1_platform_firmwaresa4155psnapdragon_778g\+_5g_mobile_platformsnapdragon_780g_5g_mobile_platform_firmwareqca6584ausd888ssg2115pqcn9011_firmwareqru1062_firmwaresnapdragon_4_gen_2_mobile_platformsw5100_firmwarewcn6740snapdragon_480\+_5g_mobile_platform_firmwareqru1062snapdragon_695_5g_mobile_platform_firmwareqca6595_firmwareqcs7230fastconnect_7800_firmwarefastconnect_6900snapdragon_685_4g_mobile_platform_firmwarevideo_collaboration_vc1_platformqru1032_firmwaresnapdragon_782g_mobile_platform_firmwarewcd9385_firmwarefastconnect_6900_firmwareqam8255p_firmwarewcd9380sa6145p_firmwareqam8255psxr2230psnapdragon_888_5g_mobile_platform_firmwaresnapdragon_4_gen_1_mobile_platformsa8150psnapdragon_ar2_gen_1_platform_firmwareqcs4490snapdragon_8_gen_1_mobile_platform_firmwaresnapdragon_778g_5g_mobile_platformsnapdragon_685_4g_mobile_platformsnapdragon_8\+_gen_2_mobile_platform_firmwarewsa8845sa6155psnapdragon_auto_5g_modem-rf_firmwareqca6564au_firmwaresxr1230pwsa8810qam8650pqdu1000_firmwarevideo_collaboration_vc5_platform_firmwaresnapdragon_8\+_gen_2_mobile_platformwcn3950_firmwaresw5100qca6595auvideo_collaboration_vc3_platformsm7315_firmwareqdu1010sa6155p_firmwarewsa8840qam8295p_firmwareqcs8550_firmwareqdu1210_firmwaresm7315qca6698aq_firmwarewcd9385qcn9012snapdragon_8\+_gen_1_mobile_platformmdm9650_firmwareqcs4490_firmwaresnapdragon_8_gen_2_mobile_platformsnapdragon_7c\+_gen_3_compute_firmwaresa8255pqcs7230_firmwaresxr1230p_firmwarewcd9390_firmwaresnapdragon_778g\+_5g_mobile_platform_firmwaresg8275pwcd9370_firmwaremdm9650qdx1011_firmwaresnapdragon_auto_5g_modem-rfqdu1110_firmwareqdu1000qca6554a_firmwaressg2125pqca6574aqru1052qcm4490qca6174asa8195pcsra6640_firmwareqcs8250_firmwareqdu1210snapdragon_820_automotive_platform_firmwareqca6174a_firmwareqcm6490sm7325pqam8650p_firmwarevideo_collaboration_vc5_platformsm8550p_firmwareqcm8550wcn3988qcs6490_firmwaresnapdragon_x65_5g_modem-rf_systemqcn9024qca6584au_firmwarewcd9335_firmwareqrb5165n_firmwareqca6574snapdragon_480_5g_mobile_platform_firmwarewcn3980_firmwarewsa8835qca6595au_firmwareqca6391_firmwaresxr2230p_firmwarewsa8840_firmwareqdu1010_firmwaresw5100p_firmwareqcn9011snapdragon_ar2_gen_1_platformsnapdragon_782g_mobile_platformqca6696_firmwareqcn9024_firmwarewsa8845hwcd9380_firmwaresa6150pqca6574_firmwareqcs410sa8155p_firmwarecsra6620qca8081wsa8815sa8155psd_8_gen1_5gwsa8830qam8775pqca6797aqqca9377sm8550psa6145psnapdragon_8\+_gen_1_mobile_platform_firmwareqcm4325_firmwaresa8255p_firmwareflight_rb5_5g_platform_firmwarear8035qca6574a_firmwaresnapdragon_480\+_5g_mobile_platformqrb5165m_firmwareqcm4325sd_8_gen1_5g_firmwarerobotics_rb5_platformwcd9375_firmwareqca6391qcn9012_firmwaresmart_audio_400_platform_firmwareqca6698aqsnapdragon_778g_5g_mobile_platform_firmwaresnapdragon_480_5g_mobile_platformqru1052_firmwareqrb5165ncsra6620_firmwaresa8295psnapdragon_8_gen_1_mobile_platformrobotics_rb5_platform_firmwareqcs8550snapdragon_8_gen_2_mobile_platform_firmwarefastconnect_6200fastconnect_7800sa8145p_firmwaresm7325p_firmwareqam8775p_firmwaresnapdragon_888\+_5g_mobile_platformqdx1011wcd9375sa8150p_firmwaresmart_audio_400_platformsnapdragon_w5\+_gen_1_wearable_platformwcn3988_firmwarefastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwaresa8145psnapdragon_888\+_5g_mobile_platform_firmwarewsa8835_firmwaressg2115p_firmwaresnapdragon_680_4g_mobile_platform_firmwareqcs6490qcs8250snapdragon_820_automotive_platformwcn3980fastconnect_6200_firmwareqdx1010qcs610Snapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-33085
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 18.53%
||
7 Day CHG~0.00%
Published-02 Jan, 2024 | 05:38
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (Classic Buffer Overflow) in Wearables

Memory corruption in wearables while processing data from AON.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qdx1010_firmwaresw5100pqcs410_firmwaresa6150p_firmwarewsa8845_firmwareqca6595qcs610_firmwarewcd9335wcd9370qca8081_firmwarear8035_firmwareqca6696wsa8830_firmwareqrb5165msnapdragon_888_5g_mobile_platformwcd9341_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwaresa4150p_firmwarewcd9395_firmwareqcn6024sd888_firmwarewcn6740_firmwarefastconnect_6700sa4150pwsa8815_firmwaresa8195p_firmwareqca8337_firmwaresnapdragon_x12_lte_modem_firmwareqca8337qdu1110wcd9395snapdragon_680_4g_mobile_platformsg8275p_firmwareqca9377_firmwareqcm6490_firmwareqca6574au_firmwareqam8295pwcd9341qca6574auqru1032snapdragon_x12_lte_modemflight_rb5_5g_platformwcd9390wcn3950wsa8810_firmwarewsa8845h_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareqca6797aq_firmwaresnapdragon_7c\+_gen_3_computewcn3660b_firmwaresnapdragon_780g_5g_mobile_platformsa8295p_firmwareqcn6024_firmwaresa4155p_firmwaresnapdragon_695_5g_mobile_platformsnapdragon_4_gen_1_mobile_platform_firmwarevideo_collaboration_vc1_platform_firmwaresa4155psnapdragon_778g\+_5g_mobile_platformsnapdragon_780g_5g_mobile_platform_firmwaresd888qcn9011_firmwareqru1062_firmwaresw5100_firmwarewcn6740snapdragon_480\+_5g_mobile_platform_firmwareqru1062snapdragon_695_5g_mobile_platform_firmwareqca6595_firmwaresnapdragon_685_4g_mobile_platform_firmwarefastconnect_7800_firmwarefastconnect_6900video_collaboration_vc1_platformqru1032_firmwaresnapdragon_782g_mobile_platform_firmwarewcd9385_firmwarefastconnect_6900_firmwareqam8255p_firmwarewcd9380sa6145p_firmwareqam8255psnapdragon_888_5g_mobile_platform_firmwarewcd9360snapdragon_4_gen_1_mobile_platformsa8150psnapdragon_8_gen_1_mobile_platform_firmwaresnapdragon_778g_5g_mobile_platformsnapdragon_685_4g_mobile_platformwsa8845sa6155psnapdragon_auto_5g_modem-rf_firmwarewsa8810qam8650pqdu1000_firmwaresw5100qca6595auvideo_collaboration_vc3_platformsm7315_firmwareqdu1010sa6155p_firmwarewsa8840qam8295p_firmwareqcs8550_firmwareqdu1210_firmwaresm7315qca6698aq_firmwarewcd9385qcn9012snapdragon_7c\+_gen_3_compute_firmwaresa8255pwcd9390_firmwaresnapdragon_778g\+_5g_mobile_platform_firmwaresg8275pwcd9370_firmwaresdx55_firmwareqdx1011_firmwaresnapdragon_auto_5g_modem-rfqdu1110_firmwareqdu1000wcn3660bqca6574aqru1052qca6174asa8195pqdu1210qca6174a_firmwareqcm6490sm7325pqam8650p_firmwarewcn3988qcs6490_firmwaresnapdragon_x65_5g_modem-rf_systemqcn9024wcd9335_firmwarewcn3980_firmwareqrb5165n_firmwareqca6574snapdragon_480_5g_mobile_platform_firmwarewsa8835qca6595au_firmwareqca6391_firmwarewsa8840_firmwareqdu1010_firmwaresw5100p_firmwareqcn9011snapdragon_782g_mobile_platformqca6696_firmwareqcn9024_firmwarewsa8845hwcd9380_firmwaresa6150pqca6574_firmwareqcs410sa8155p_firmwareqca8081wsa8815sa8155pwsa8830qam8775pqca6797aqqca9377sa6145pqcm4325_firmwaresa8255p_firmwareflight_rb5_5g_platform_firmwarear8035qca6574a_firmwaresdx55snapdragon_480\+_5g_mobile_platformqrb5165m_firmwareqcm4325wcd9375_firmwarerobotics_rb5_platformqca6391qcn9012_firmwaresnapdragon_778g_5g_mobile_platform_firmwareqca6698aqwcn3950_firmwaresnapdragon_480_5g_mobile_platformqru1052_firmwareqrb5165nsa8295psnapdragon_8_gen_1_mobile_platformrobotics_rb5_platform_firmwareqcs8550fastconnect_6200fastconnect_7800sa8145p_firmwaresm7325p_firmwareqam8775p_firmwarewcd9360_firmwarewcn3680bsnapdragon_888\+_5g_mobile_platformqdx1011wcd9375sa8150p_firmwaresnapdragon_w5\+_gen_1_wearable_platformwcn3988_firmwarefastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwaresa8145psnapdragon_888\+_5g_mobile_platform_firmwarewsa8835_firmwaresnapdragon_680_4g_mobile_platform_firmwareqcs6490wcn3980fastconnect_6200_firmwareqdx1010wcn3680b_firmwareqcs610Snapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-31979
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 22.36%
||
7 Day CHG~0.00%
Published-09 May, 2023 | 00:00
Updated-18 Feb, 2026 | 14:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Catdoc v0.95 was discovered to contain a global buffer overflow via the function process_file at /src/reader.c.

Action-Not Available
Vendor-fossiesn/a
Product-catdocn/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2004-0210
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-6.79% / 91.38%
||
7 Day CHG~0.00%
Published-14 Jul, 2004 | 04:00
Updated-16 Apr, 2026 | 14:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-03-24||Apply updates per vendor instructions.

The POSIX component of Microsoft Windows NT and Windows 2000 allows local users to execute arbitrary code via certain parameters, possibly by modifying message length values and causing a buffer overflow.

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-interixwindows_ntwindows_2000n/aWindows
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2018-13916
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.09% / 26.00%
||
7 Day CHG~0.00%
Published-21 Nov, 2019 | 14:38
Updated-05 Aug, 2024 | 09:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds memory access in Qurt kernel function when using the identifier to access Qurt kernel buffer to retrieve thread data. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096, APQ8096AU, APQ8098, IPQ8074, MDM9150, MDM9206, MDM9607, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8976, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA8081, QCM2150, QCN7605, QCS404, QCS405, QCS605, QM215, SC8180X, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX55, SM8150, SM8250, Snapdragon_High_Med_2016, SXR1130, SXR2130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-mdm9150_firmwaremdm9635m_firmwareapq8096_firmwaremdm9640_firmwareqcm2150_firmwaresdm632_firmwaremsm8996au_firmwaresdm845sdm450_firmwaresdm632apq8096sdm439qcs404_firmwaremdm9650sdm429msm8940_firmwaresnapdragon_high_med_2016_firmwaremsm8909w_firmwaremsm8976_firmwaremsm8996auapq8009_firmwaremsm8917sdm670sxr2130qcs605_firmwaresc8180xmdm9206sdm670_firmwareqcs404ipq8074sdm636sda845_firmwaremdm9635mapq8098qcn7605mdm9206_firmwareqcs605msm8937_firmwaremdm9650_firmwaresdm429_firmwaremsm8905_firmwaresda660sdx55_firmwaresxr1130_firmwareqca8081_firmwaresxr1130msm8909wapq8009msm8909_firmwareapq8053_firmwaresda845nicobarsdm850_firmwaremsm8920msm8953sdm450sdm636_firmwaresdm845_firmwareapq8098_firmwaresdx20msm8998_firmwareqcm2150msm8920_firmwaresdm630mdm9607_firmwaresm8250_firmwaremdm9655_firmwaresdm660sc8180x_firmwareqcs405ipq8074_firmwaresdm710qm215mdm9607apq8017_firmwaresdm710_firmwareqcn7605_firmwareqca8081mdm9150msm8937msm8996_firmwaremsm8905snapdragon_high_med_2016sm8150_firmwaremsm8909sxr2130_firmwaremdm9655apq8096ausdm439_firmwareqcs405_firmwaresdm630_firmwaresda660_firmwareqm215_firmwaremsm8976sdx55msm8953_firmwaremsm8940apq8053apq8096au_firmwaresm8250msm8917_firmwaremsm8998sm8150sdx20_firmwaresdm850apq8017msm8996nicobar_firmwaresdm660_firmwaremdm9640Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2018-11980
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 10.33%
||
7 Day CHG~0.00%
Published-18 Dec, 2019 | 05:25
Updated-05 Aug, 2024 | 08:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When a fake broadcast/multicast 11w rmf without mmie received, since no proper length check in wma_process_bip, buffer overflow will happen in both cds_is_mmie_valid and qdf_nbuf_trim_tail in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in APQ8009, APQ8017, APQ8053, APQ8064, APQ8096AU, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8937, MSM8996AU, MSM8998, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCN7605, QCS605, SDM630, SDM636, SDM660, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaremdm9640_firmwaresdm636_firmwareapq8064msm8996au_firmwaresdx20msm8998_firmwaresdm660sdx24sdm630mdm9607_firmwaremdm9650sm7150_firmwareqca6574ausm6150mdm9607msm8996auapq8017_firmwaresm7150apq8009_firmwareqcn7605_firmwaremsm8937mdm9207c_firmwareqcs605_firmwaremdm9206mdm9207cqca6174a_firmwareqca6174aqca9379_firmwaresm8150_firmwaresdx24_firmwareapq8096ausdm636qca9377sdm630_firmwareqcn7605mdm9206_firmwareqcs605sdx55apq8053apq8096au_firmwaresm6150_firmwaremsm8937_firmwaremdm9650_firmwaremsm8998sdx20_firmwaresm8150qca6574au_firmwaresdx55_firmwaresxr1130_firmwareapq8017apq8064_firmwaresxr1130apq8009qca9379apq8053_firmwaresdm660_firmwaremdm9640Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-31893
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-7.8||HIGH
EPSS-0.16% / 36.63%
||
7 Day CHG~0.00%
Published-13 Jul, 2021 | 11:02
Updated-03 Aug, 2024 | 23:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SIMATIC PCS 7 V8.2 and earlier (All versions), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP3), SIMATIC PDM (All versions < V9.2), SIMATIC STEP 7 V5.X (All versions < V5.6 SP2 HF3), SINAMICS STARTER (containing STEP 7 OEM version) (All versions < V5.4 HF2). The affected software contains a buffer overflow vulnerability while handling certain files that could allow a local attacker to trigger a denial-of-service condition or potentially lead to remote code execution.

Action-Not Available
Vendor-Siemens AG
Product-simatic_pcs_firmwaresimatic_step_7simatic_pdmsinamics_startersimatic_step_7_firmwaresimatic_pcssinamics_starter_firmwaresimatic_pdm_firmwareSIMATIC STEP 7 V5.XSIMATIC PCS 7 V8.2 and earlierSINAMICS STARTER (containing STEP 7 OEM version)SIMATIC PCS 7 V9.0SIMATIC PDM
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-30257
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.36%
||
7 Day CHG~0.00%
Published-08 May, 2023 | 00:00
Updated-29 Jan, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A buffer overflow in the component /proc/ftxxxx-debug of FiiO M6 Build Number v1.0.4 allows attackers to escalate privileges to root.

Action-Not Available
Vendor-fiion/a
Product-m6m6_firmwaren/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 7
  • 8
  • Next
Details not found