Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-47369

Summary
Assigner-qualcomm
Assigner Org ID-2cfc7d3e-20d3-47ac-8db7-1b7285aff15f
Published At-06 Jan, 2026 | 22:48
Updated At-07 Jan, 2026 | 16:15
Rejected At-
Credits

Information Exposure in Computer Vision

Information disclosure when a weak hashed value is returned to userland code in response to a IOCTL call to obtain a session ID.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:qualcomm
Assigner Org ID:2cfc7d3e-20d3-47ac-8db7-1b7285aff15f
Published At:06 Jan, 2026 | 22:48
Updated At:07 Jan, 2026 | 16:15
Rejected At:
â–¼CVE Numbering Authority (CNA)
Information Exposure in Computer Vision

Information disclosure when a weak hashed value is returned to userland code in response to a IOCTL call to obtain a session ID.

Affected Products
Vendor
Qualcomm Technologies, Inc.Qualcomm, Inc.
Product
Snapdragon
Platforms
  • Snapdragon Auto
  • Snapdragon CCW
  • Snapdragon Compute
  • Snapdragon Connectivity
  • Snapdragon Consumer IOT
  • Snapdragon Industrial IOT
  • Snapdragon Mobile
  • Snapdragon WBC
  • Snapdragon Wearables
Default Status
unaffected
Versions
Affected
  • AR8035
  • CSRA6620
  • CSRA6640
  • FastConnect 6200
  • FastConnect 6700
  • FastConnect 6800
  • FastConnect 6900
  • FastConnect 7800
  • Flight RB5 5G Platform
  • MDM9628
  • QAM8295P
  • QCA6174A
  • QCA6391
  • QCA6564A
  • QCA6564AU
  • QCA6574
  • QCA6574A
  • QCA6574AU
  • QCA6595AU
  • QCA6696
  • QCA6698AQ
  • QCA6698AU
  • QCA6797AQ
  • QCA8081
  • QCA8337
  • QCA9377
  • QCM2290
  • QCM4490
  • QCM5430
  • QCM6490
  • QCN6024
  • QCN9011
  • QCN9012
  • QCN9024
  • QCS2290
  • QCS410
  • QCS4490
  • QCS5430
  • QCS610
  • QCS615
  • QCS6490
  • QCS7230
  • QCS8550
  • QCS9100
  • QMP1000
  • QRB5165M
  • QRB5165N
  • Qualcomm 215 Mobile Platform
  • Qualcomm Video Collaboration VC1 Platform
  • Qualcomm Video Collaboration VC3 Platform
  • Qualcomm Video Collaboration VC5 Platform
  • Robotics RB2 Platform
  • Robotics RB5 Platform
  • SA4150P
  • SA4155P
  • SA6145P
  • SA6150P
  • SA6155P
  • SA8145P
  • SA8150P
  • SA8155P
  • SA8195P
  • SA8295P
  • SD 8 Gen1 5G
  • SD660
  • SD865 5G
  • SDX61
  • SG8275
  • SG8275P
  • SM6225P
  • SM6650
  • SM6650P
  • SM7250P
  • SM7325P
  • SM7435
  • SM7550
  • SM7550P
  • SM7635
  • SM7635P
  • SM7675
  • SM7675P
  • SM8475P
  • SM8550P
  • SM8635
  • SM8635P
  • SM8650Q
  • SM8735
  • SM8750
  • SM8750P
  • Smart Audio 400 Platform
  • Snapdragon 4 Gen 1 Mobile Platform
  • Snapdragon 4 Gen 2 Mobile Platform
  • Snapdragon 460 Mobile Platform
  • Snapdragon 480 5G Mobile Platform
  • Snapdragon 480+ 5G Mobile Platform (SM4350-AC)
  • Snapdragon 6 Gen 1 Mobile Platform
  • Snapdragon 660 Mobile Platform
  • Snapdragon 662 Mobile Platform
  • Snapdragon 680 4G Mobile Platform
  • Snapdragon 685 4G Mobile Platform (SM6225-AD)
  • Snapdragon 690 5G Mobile Platform
  • Snapdragon 695 5G Mobile Platform
  • Snapdragon 7 Gen 1 Mobile Platform
  • Snapdragon 7+ Gen 2 Mobile Platform
  • Snapdragon 765 5G Mobile Platform (SM7250-AA)
  • Snapdragon 765G 5G Mobile Platform (SM7250-AB)
  • Snapdragon 768G 5G Mobile Platform (SM7250-AC)
  • Snapdragon 778G 5G Mobile Platform
  • Snapdragon 778G+ 5G Mobile Platform (SM7325-AE)
  • Snapdragon 782G Mobile Platform (SM7325-AF)
  • Snapdragon 7c+ Gen 3 Compute
  • Snapdragon 8 Gen 1 Mobile Platform
  • Snapdragon 8 Gen 2 Mobile Platform
  • Snapdragon 8 Gen 3 Mobile Platform
  • Snapdragon 8+ Gen 1 Mobile Platform
  • Snapdragon 8+ Gen 2 Mobile Platform
  • Snapdragon 865 5G Mobile Platform
  • Snapdragon 865+ 5G Mobile Platform (SM8250-AB)
  • Snapdragon 870 5G Mobile Platform (SM8250-AC)
  • Snapdragon 888 5G Mobile Platform
  • Snapdragon 888+ 5G Mobile Platform (SM8350-AC)
  • Snapdragon AR1 Gen 1 Platform
  • Snapdragon AR1 Gen 1 Platform "Luna1"
  • Snapdragon AR2 Gen 1 Platform
  • Snapdragon Auto 5G Modem-RF
  • Snapdragon W5+ Gen 1 Wearable Platform
  • Snapdragon X12 LTE Modem
  • Snapdragon X55 5G Modem-RF System
  • Snapdragon X65 5G Modem-RF System
  • Snapdragon XR2 5G Platform
  • Snapdragon XR2+ Gen 1 Platform
  • SSG2115P
  • SSG2125P
  • SW5100
  • SW5100P
  • SXR1230P
  • SXR2230P
  • SXR2250P
  • SXR2330P
  • SXR2350P
  • WCD9326
  • WCD9335
  • WCD9341
  • WCD9370
  • WCD9371
  • WCD9375
  • WCD9378
  • WCD9380
  • WCD9385
  • WCD9390
  • WCD9395
  • WCN3615
  • WCN3660B
  • WCN3680B
  • WCN3910
  • WCN3950
  • WCN3980
  • WCN3988
  • WCN3990
  • WCN6650
  • WCN6740
  • WCN6755
  • WCN7750
  • WCN7860
  • WCN7861
  • WCN7880
  • WCN7881
  • WSA8810
  • WSA8815
  • WSA8830
  • WSA8832
  • WSA8835
  • WSA8840
  • WSA8845
  • WSA8845H
Problem Types
TypeCWE IDDescription
CWECWE-200CWE-200 Information Exposure
Type: CWE
CWE ID: CWE-200
Description: CWE-200 Information Exposure
Metrics
VersionBase scoreBase severityVector
3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2026-bulletin.html
N/A
Hyperlink: https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2026-bulletin.html
Resource: N/A
â–¼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:product-security@qualcomm.com
Published At:07 Jan, 2026 | 12:17
Updated At:27 Jan, 2026 | 19:27

Information disclosure when a weak hashed value is returned to userland code in response to a IOCTL call to obtain a session ID.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CPE Matches

Qualcomm Technologies, Inc.
qualcomm
>>ar8035_firmware>>-
cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>ar8035>>-
cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>csra6620_firmware>>-
cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>csra6620>>-
cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>csra6640_firmware>>-
cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>csra6640>>-
cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_6200_firmware>>-
cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_6200>>-
cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_6700_firmware>>-
cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_6700>>-
cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>snapdragon_w5\+_gen_1_wearable_platform_firmware>>-
cpe:2.3:o:qualcomm:snapdragon_w5\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>snapdragon_w5\+_gen_1_wearable_platform>>-
cpe:2.3:h:qualcomm:snapdragon_w5\+_gen_1_wearable_platform:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>snapdragon_x12_lte_modem_firmware>>-
cpe:2.3:o:qualcomm:snapdragon_x12_lte_modem_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>snapdragon_x12_lte_modem>>-
cpe:2.3:h:qualcomm:snapdragon_x12_lte_modem:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>snapdragon_x55_5g_modem-rf_system_firmware>>-
cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>snapdragon_x55_5g_modem-rf_system>>-
cpe:2.3:h:qualcomm:snapdragon_x55_5g_modem-rf_system:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>snapdragon_x65_5g_modem-rf_system_firmware>>-
cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>snapdragon_x65_5g_modem-rf_system>>-
cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>snapdragon_xr2_5g_platform_firmware>>-
cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>snapdragon_xr2_5g_platform>>-
cpe:2.3:h:qualcomm:snapdragon_xr2_5g_platform:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>snapdragon_xr2\+_gen_1_platform_firmware>>-
cpe:2.3:o:qualcomm:snapdragon_xr2\+_gen_1_platform_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>snapdragon_xr2\+_gen_1_platform>>-
cpe:2.3:h:qualcomm:snapdragon_xr2\+_gen_1_platform:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>ssg2115p_firmware>>-
cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>ssg2115p>>-
cpe:2.3:h:qualcomm:ssg2115p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>ssg2125p_firmware>>-
cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>ssg2125p>>-
cpe:2.3:h:qualcomm:ssg2125p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sw5100_firmware>>-
cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sw5100>>-
cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sw5100p_firmware>>-
cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sw5100p>>-
cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sxr1230p_firmware>>-
cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sxr1230p>>-
cpe:2.3:h:qualcomm:sxr1230p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sxr2230p_firmware>>-
cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sxr2230p>>-
cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sxr2250p_firmware>>-
cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sxr2250p>>-
cpe:2.3:h:qualcomm:sxr2250p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sxr2330p_firmware>>-
cpe:2.3:o:qualcomm:sxr2330p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sxr2330p>>-
cpe:2.3:h:qualcomm:sxr2330p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sxr2350p_firmware>>-
cpe:2.3:o:qualcomm:sxr2350p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sxr2350p>>-
cpe:2.3:h:qualcomm:sxr2350p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcd9326_firmware>>-
cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcd9326>>-
cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcd9335_firmware>>-
cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcd9335>>-
cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcd9341_firmware>>-
cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcd9341>>-
cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcd9370_firmware>>-
cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcd9370>>-
cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcd9371_firmware>>-
cpe:2.3:o:qualcomm:wcd9371_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcd9371>>-
cpe:2.3:h:qualcomm:wcd9371:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-200Secondaryproduct-security@qualcomm.com
CWE ID: CWE-200
Type: Secondary
Source: product-security@qualcomm.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2026-bulletin.htmlproduct-security@qualcomm.com
Patch
Vendor Advisory
Hyperlink: https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2026-bulletin.html
Source: product-security@qualcomm.com
Resource:
Patch
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

441Records found

CVE-2019-20775
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 0.54%
||
7 Day CHG~0.00%
Published-17 Apr, 2020 | 13:38
Updated-05 Aug, 2024 | 02:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on LG mobile devices with Android OS 9.0 (Qualcomm SDM450, SDM845, SM6150, and SM8150 chipsets) software. Weak encryption leads to local information disclosure. The LG ID is LVE-SMP-190010 (August 2019).

Action-Not Available
Vendor-n/aQualcomm Technologies, Inc.Google LLC
Product-sm6150sm8150androidsdm450sdm845n/a
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2023-43528
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.06% / 17.45%
||
7 Day CHG~0.00%
Published-06 May, 2024 | 14:32
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in Audio

Information disclosure when the ADSP payload size received in HLOS in response to Audio Stream Manager matrix session is less than this expected size.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sdm429w_firmwareqcs410_firmwaresa6150p_firmwaresd660_firmwaresd865_5gsnapdragon_auto_4g_modem_firmwareqcs610_firmwarewcd9335sxr2130_firmwaresrv1mqca8081_firmwarewcd9370ar8035_firmwareqca6696wcd9340_firmwarewcd9341_firmwareqca6320qcc710_firmwareqca6426qca6564auwcn3610qcn9074wsa8815_firmwaresnapdragon_wear_4100\+_firmwaresa8195p_firmwareqca8337_firmwareqca8337qca6426_firmwaresnapdragon_auto_4g_modemqca9377_firmwareqca6574au_firmwaresnapdragon_x72_5g_modem-rfqam8295pwcd9341qca6574ausnapdragon_820_automotivesa8620p_firmwarewcn3950wsa8810_firmwaresnapdragon_870_5g_mobile_firmwaresa9000p_firmwaresrv1hsnapdragon_auto_5g_modem-rf_gen_2_firmwarewcn3660b_firmwaresnapdragon_820_automotive_firmwarefastconnect_6800_firmwaresa8295p_firmwaresnapdragon_870_5g_mobilesd835_firmwarecsrb31024_firmwarevideo_collaboration_vc1_platform_firmwaresa8770pc-v2x_9150qca6584auqca6320_firmwareqcn6274_firmwareqcc710snapdragon_xr2_5g_firmwareqca6310_firmwarefastconnect_6800qfw7114_firmwaresnapdragon_wear_4100\+fastconnect_7800_firmwarefastconnect_6900video_collaboration_vc1_platformsnapdragon_865_5g_mobile_firmwaresa7255pqfw7114fastconnect_6900_firmwareqca6310qam8255p_firmwarewcd9380sa6145p_firmwareqam8255psnapdragon_xr2_5gsa8150pmsm8996au_firmwaresa6155psnapdragon_auto_5g_modem-rf_firmwareqca6564au_firmwaresnapdragon_429_mobile_firmwarewsa8810qam8650psa9000psrv1h_firmwareqca6595auvideo_collaboration_vc3_platformc-v2x_9150_firmwaresa6155p_firmwareqam8295p_firmwaresrv1m_firmwaresd835wcn3990_firmwaresnapdragon_660_mobilesnapdragon_x55_5g_modem-rfqfw7124_firmwareqca6564a_firmwareqca6436_firmwareqca6698aq_firmwareqca9367_firmwaresnapdragon_x55_5g_modem-rf_firmwarewcn3610_firmwaresa8255psnapdragon_865\+_5g_mobilewcd9370_firmwarecsrb31024qca9367snapdragon_auto_5g_modem-rfsa7255p_firmwareqca6574asnapdragon_x72_5g_modem-rf_firmwaresxr2130wcn3620_firmwarewcn3660bsa8195pwcd9340qamsrv1msnapdragon_auto_5g_modem-rf_gen_2snapdragon_835_mobile_pc_firmwareqam8650p_firmwaresdm429wqca6584au_firmwarewcd9335_firmwareqcn6274qca6436qfw7124sa8775pwcn3980_firmwareqca6595au_firmwareqca6391_firmwaresa8775p_firmwareqamsrv1hqca6696_firmwarewcd9380_firmwaresa6150pqcs410sa8155p_firmwareqca8081qca6564asd660sa8155pwsa8815qam8775pqca9377sa6145psnapdragon_x75_5g_modem-rfqcn9074_firmwaresa8620psa8255p_firmwarear8035qca6574a_firmwareqamsrv1m_firmwaremsm8996ausa8650p_firmwaresnapdragon_865_5g_mobilewcn3620snapdragon_835_mobile_pcqca6391qcn6224snapdragon_865\+_5g_mobile_firmwaresnapdragon_429_mobileqca6698aqwcn3950_firmwaresa8770p_firmwaresa8295pfastconnect_7800sa8145p_firmwaresa8650pqam8775p_firmwaresd865_5g_firmwarewcn3680bsnapdragon_660_mobile_firmwaresa8150p_firmwareqamsrv1h_firmwarevideo_collaboration_vc3_platform_firmwaresa8145pwcn3990snapdragon_x75_5g_modem-rf_firmwarewcn3980wcn3680b_firmwareqcn6224_firmwareqcs610Snapdragon-snapdragon
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-126
Buffer Over-read
CVE-2022-25664
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.2||MEDIUM
EPSS-0.19% / 40.71%
||
7 Day CHG~0.00%
Published-12 Oct, 2022 | 00:00
Updated-15 May, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Information disclosure due to exposure of information while GPU reads the data in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcs605msm8208_firmwarewcn6855_firmwaremdm9650msm8953_firmwaremsm8956qca6391_firmwaresd888_5g_firmwareqcs8155sd429wcn3620msm8209_firmwareqca6574_firmwaresdx50m_firmwaresw5100_firmwaresd205_firmwareqca6430sa8155sd210wcn7850_firmwaresd855_firmwaresd820_firmwaresdxr1wcn3990qca6174a_firmwarewsa8835_firmwareqca6696_firmwareqca8337qcs410sa6145pmsm8108qca6431_firmwarewcn6855qam8295pwsa8830qca6696sm8475sa6155pqca6420wcn3998_firmwareapq8009_firmwaresdx55qca6390_firmwaresdx55_firmwareapq8056qca6574a_firmwarewcd9385_firmwaresa8195p_firmwareapq8053_firmwareapq8052_firmwarewcn3950_firmwareqcs605_firmwaresdxr2_5g_firmwaremsm8108_firmwareqca6436_firmwarewsa8815_firmwaremsm8952apq8076_firmwareqcs410_firmwaresd660_firmwaresd660qcs6125sa6145p_firmwarewcd9335qca6430_firmwaresd835wcd9370_firmwareaqt1000qca6391wcn3680_firmwaresa8295pqca6174aqcs610_firmwaresa8295p_firmwaresdxr1_firmwarewsa8835sa8195psd821_firmwarewcn6851_firmwarequalcomm215wcn3980_firmwaresdm429wqca6574aqcs610qca6564aqca6595auwcn3615_firmwarewcn6851wcn6850_firmwaresd865_5gwcd9340_firmwaresd865_5g_firmwareapq8096au_firmwareqca6564au_firmwarewcn3660b_firmwarewsa8830_firmwarewcd9341wcn3660bqsm8250_firmwaresd845_firmwarewcn3998wcn6856_firmwareqca6574aumdm9150_firmwaremsm8996au_firmwarewcn3990_firmwaresdx55mmsm8608_firmwareqcm6125_firmwarewcd9341_firmwaremsm8956_firmwareqcc5100wcn3615qca6420_firmwareqca6564auwcd9335_firmwarewsa8815sd205wcn3620_firmwarewcd9326msm8996ausw5100p_firmwaresda429wwcn6856qca6564a_firmwarewcn7850mdm9150sda429w_firmwaresd821sd_8_gen1_5g_firmwareqca6426msm8953wcd9380qca6320_firmwarewcn3988qca6564apq8053qcm6125sa8155p_firmwareqca6320qca8337_firmwaresd870_firmwareapq8056_firmwarewcd9326_firmwarewcn3988_firmwareqca6574qualcomm215_firmwaresd870wcn7851_firmwareqca6426_firmwareapq8052sd845msm8976_firmwaresa6150p_firmwaresd429_firmwareqam8295p_firmwareqca6564_firmwaresw5100wcn3680bqcs6125_firmwarewcn3610_firmwareqca6335wcn6850wsa8810sd855sa8145pmsm8952_firmwareapq8096auqca6310_firmwareqcc5100_firmwaremsm8209wcd9380_firmwaresd835_firmwaresa8145p_firmwaresd888_5gsa8155_firmwaremsm8976sgqca6335_firmwareqca6390qca6421msm8208apq8076msm8976sa6155sa6150pqca6595au_firmwareqcs8155_firmwarewcn3610sd210_firmwarewsa8810_firmwareqca6310qsm8250sdx55m_firmwarewcd9370sa8150p_firmwarewcn3680wcn7851apq8009sd820wcd9340qca6436wcd9385sa6155p_firmwaresa8150pwcn3950sw5100psdxr2_5gsdm429w_firmwaresa6155_firmwareaqt1000_firmwaresdx50mqca6431msm8976sg_firmwarewcn3680b_firmwarewcn3980mdm9650_firmwaremsm8608qca6574au_firmwaresa8155pqca6421_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
CWE ID-CWE-459
Incomplete Cleanup
CVE-2022-25676
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.10% / 28.26%
||
7 Day CHG~0.00%
Published-15 Nov, 2022 | 00:00
Updated-22 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Information disclosure in video due to buffer over-read while parsing avi files in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380_firmwarewcn3615_firmwareqca6595au_firmwaresd730qcn7606_firmwaresd_675_firmwaresd855_firmwaresd662_firmwaresdx50mqcs6490sdx55sd460_firmwareqca6696wcn3610_firmwarewcn7850qca6426_firmwareqcm4290_firmwarewcn3660bsd720gsm4375wcn3660b_firmwaresa6150psd460sd665_firmwaresa6145p_firmwaresd626wsa8830sd768gsm4125wcn6740_firmwaresd626_firmwareqca6390sda429w_firmwaresdx50m_firmwarewcn3680bsa6155pwcn6856sa8150p_firmwaresd480qca6430sa8145p_firmwaresw5100sd855wcn7851_firmwareqcs6490_firmwarewcn6850sa8145psdx55_firmwarewcn3950sxr2150p_firmwaresdxr2_5g_firmwareqcm6490sa4155p_firmwarewcd9335sd765g_firmwarewcn3680b_firmwareqca6574asd865_5g_firmwareqcm6125_firmwareqca6574au_firmwaresd662qam8295p_firmwaresa8295pwcn6750qcs610_firmwaresa8295p_firmwaresm7325psd695_firmwareqcm2290_firmwareqcc5100wcd9380sd_675qcm4290sd625_firmwaresd695sd660_firmwaresd730_firmwaresd480_firmwareqca6430_firmwaresa6150p_firmwaresd888wcd9375_firmwaresm7315_firmwaresm7325p_firmwarewcn6856_firmwaresd870aqt1000qca6390_firmwarewcn6855_firmwareqca6420sd780g_firmwarewcn6855qcm2290wcn3910sd870_firmwareqcm6490_firmwaresm6250qca6595auwcd9370sd888_firmwareqcs4290_firmwarewcn3990wcn3980sm4125_firmwaresd439_firmwaresd690_5gsm7315sd765_firmwaresd720g_firmwaresd765gwsa8815wsa8835sdx55mqam8295pwcn3998wcn6850_firmwarewsa8810_firmwarewsa8815_firmwaresd625wcn3991_firmwaresa8150pqcs2290wcn6740wcd9385qca6436sd678qca6574auwcn7850_firmwarewcd9385_firmwarewcn6750_firmwareqcs410_firmwaresa8155pwsa8810sd680sd888_5gsw5100p_firmwareaqt1000_firmwarewsa8835_firmwaresd678_firmwarewcd9335_firmwareqcs6125sm4375_firmwaresm7250p_firmwareqca6391wcn3991qca6574wcn3998_firmwareqca6574_firmwarewcn6851sd778g_firmwarewcd9370_firmwaresd675qca6420_firmwaresa8195pqca6574a_firmwaresd439sd665sd675_firmwaresda429wqcc5100_firmwaresd888_5g_firmwarewsa8830_firmwareqcm6125sm6250_firmwaresd_8_gen1_5g_firmwaresdxr2_5gwcd9341wcn3980_firmwareqcs2290_firmwaresd660wcn6851_firmwaresa4150p_firmwarewcd9326qcs610sa6155p_firmwaresd680_firmwareqca6391_firmwaresa4150pwcd9326_firmwaresm7250psa8155p_firmwaresa6145pwcn3610wcn3910_firmwaresw5100_firmwarewcd9375sd750g_firmwareqca6696_firmwaresxr2150psd865_5gsd780gqca6426sdx55m_firmwaresd690_5g_firmwareqcs6125_firmwaresm8475sd778gwcn3950_firmwarewcn3988wcn3990_firmwarewcn3615sd750gsd765sd768g_firmwarewcn3988_firmwarewcn7851qcs4290sa4155pqcn7606sw5100pqca6436_firmwaresa8195p_firmwarewcd9341_firmwareqcs410Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-25653
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.10% / 28.26%
||
7 Day CHG~0.00%
Published-16 Sep, 2022 | 05:25
Updated-03 Aug, 2024 | 04:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Information disclosure in video due to buffer over-read while processing avi file in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewsa8830sd678qcs610qcs4290wcn3950_firmwaresd765g_firmwareqca6420_firmwareqca6390_firmwaresd690_5gsd730_firmwarewcd9370qcs605_firmwaresd_675_firmwaresd675_firmwareqca6426wcn3990_firmwarewcn3998wcd9385_firmwaresdxr2_5g_firmwarewcn3950sm4125sd720gwcd9326_firmwarewcn3615_firmwaresd_8_gen1_5g_firmwarewcn3660bsd662sd460_firmwaresm7315_firmwarewcn7850wcn3680b_firmwaresdx55_firmwarewcd9375_firmwarewcn3615wcn3998_firmwaresm7250p_firmwareqca6420apq8053_firmwareqca6436_firmwaresm7450_firmwaresd680_firmwaresd778gwcn7851qcs6490sd429sdxr2_5gsd662_firmwarewcn3988_firmwareqca6430sd429_firmwaresm6250sd778g_firmwarewsa8810_firmwarequalcomm215_firmwaresd765gsw5100sd765_firmwareqca6436sd680wcd9326wcd9335wcn6851qcs603_firmwarewcn7851_firmwareqcs4290_firmwarewcd9385wcd9341qcs6490_firmwaresd750gsd870_firmwareqca6390wcd9375sd750g_firmwareaqt1000wcn3910_firmwaresm6250_firmwaremsm8953_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3620_firmwareqcm6490sd888_5g_firmwarewcn3988wcn3620wcn6850_firmwarewcn7850_firmwarewsa8815_firmwaresm7450wsa8835_firmwaresm8475wcn6750_firmwarewcn3991wcd9380_firmwarewcn3990sd_675sdm429wsd780gsw5100psd865_5gsdx55m_firmwarewcn6856_firmwaresd888wsa8835sdm429w_firmwaresd665_firmwarewcd9380sd888_5gqualcomm215qcs410sd690_5g_firmwaresdx50m_firmwarewcn6855_firmwaresm7325pqca6430_firmwarewcd9335_firmwarewcn3980wcn6750qcs605sd855sm4125_firmwaresm7325p_firmwaresd665wcn3910wcn6850wsa8815sd765qca6426_firmwarewcn3660b_firmwarewcn3680sd695sd768g_firmwarewcn3980_firmwaresm7315sd730sd460qca6391sdx55msm8475_firmwareaqt1000_firmwarewcn6740_firmwaremsm8953sd678_firmwareqcm4290qcm6490_firmwaresdx50mwcn3680_firmwarewsa8832_firmwaresd480_firmwareqcs603wcn6851_firmwarewcd9341_firmwareqcm4290_firmwaresd480sd870wcn6855wsa8810wsa8832sw5100p_firmwareqcs610_firmwarewcn6856wcn3680bsd695_firmwaresd768gwcn6740qca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55sd888_firmwareapq8053sd675sm7250psd720g_firmwaresw5100_firmwareqcs410_firmwaresm8475p_firmwaresm8475pSnapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-22076
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.1||HIGH
EPSS-0.05% / 16.93%
||
7 Day CHG~0.00%
Published-06 Jun, 2023 | 07:38
Updated-03 Aug, 2024 | 03:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cryptographic issue in Core

information disclosure due to cryptographic issue in Core during RPMB read request.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresnapdragon_850_mobile_compute_platform_firmwaresm7325-ae_firmwaremdm9640_firmwaresm6250p_firmwareqca8337ipq8173_firmwareqam8775pqcn5124wcn3950_firmwaresc8180x\+sdx55sm4450_firmwareqca6595au_firmwaresa6155snapdragon_427_mobile_platformsd_455_firmwarehome_hub_100_platformqcs6125_firmwaremsm8108sm4375wcn3998sc8180xp-adwcd9371_firmwaremsm8108_firmwarewcn3950qcn6024_firmwaresm4125immersive_home_316_platform_firmwaresm6375_firmwarewcn3660bqsm8350_firmwareqsm8350sd460_firmwaresm7315_firmwaresm4250-aasnapdragon_636_mobile_platformwcn3998_firmwareqca8081_firmwareqca6420qcn9002snapdragon_auto_5g_modem-rf_firmwareipq8070_firmwareqca9367_firmwareipq8078a_firmwaremdm8207sdm450ipq8072_firmwaresc8180xp-aa_firmwaresa8155_firmwarerobotics_rb3_platform_firmwareqca4004_firmwareqca6430snapdragon_630_mobile_platformqts110wcd9306_firmwarewcd9340qca6698aq_firmwaremsm8209_firmwarewcn685x-1_firmwaremdm9250_firmwareqca9888_firmwareqcn6122sm8150_firmwareqca6696_firmwarewcd9371sc8180x-abqcn5154_firmwaresm4350_firmwaresd_8cxsa8150psnapdragon_430_mobile_platformqca4004sd660sd865_5g_firmwaresm7225_firmwaresd660_firmwareqcn5121sm8475qcn5022_firmwarewcn6750_firmwareqcn7606_firmwaresm6125_firmwareimmersive_home_216_platform_firmwaresnapdragon_675_mobile_platform_firmwareqca6428_firmwaresm6375wcn3991ssg2125psdm429wipq8078qca8084qcn9001_firmwareipq81739205_lte_modemsd670_firmwareqca6574apq8053-accsr8811_firmwaresnapdragon_7c\+_gen_3_computewcd9380qcs410snapdragon_210_processorqcn5024snapdragon_430_mobile_platform_firmwareqca9379_firmwaresxr1230pc-v2x_9150_firmwaresc8180xp-ad_firmwareqcn9012_firmwaresd626qcn9274_firmwareipq6018_firmwareqcm4325_firmwarewcd9340_firmwarewsa8815sm6150-ac_firmwarepmp8074_firmwareqcn6112sdm429_firmwaresnapdragon_630_mobile_platform_firmwareqcs8250ipq6028sd835snapdragon_821_mobile_platformpmp8074ipq9574_firmwarewcn3980_firmwaresd730sc7180-ac_firmwaresa8295p9205_lte_modem_firmwaresm6350sm8475_firmwarewcn6740_firmwareqcn5064_firmwareqcs4490_firmwaresnapdragon_x65_5g_modem-rf_systemapq8064au_firmwareipq8078_firmwareqca6234qcn5054sm6350_firmwarewcn785x-1_firmwaresd670smart_audio_200_platform_firmwareqcn9024_firmwareipq8174_firmwaresdx57mqcm4290_firmwaresw5100p_firmwareqcs610_firmwaresa6145par8031immersive_home_214_platformmdm8207_firmwaresc8280xp-bbsd820_firmwareqca6391_firmwaresa4150p_firmwareqca4024wcd9370_firmwaresdx55qcn5021_firmwaresm8250csra6640ssg2115p_firmwaresnapdragon_1200_wearable_platformwcn3660qca9379qam8255psa4155pqca6234_firmwareqcn7606qsm8250_firmwarewsa88309207_lte_modemsdm712_firmwaresnapdragon_850_mobile_compute_platformsnapdragon_x24_lte_modem_firmwareqam8650pcsrb31024mdm9628_firmwaremdm9650qca8082qcs4290mdm9250qca6420_firmwaresc7180-acsnapdragon_auto_4g_modem_firmwaresd675_firmwareipq8072qca6564qca6426sc8280xp-abwcn3990_firmwareqrb5165n_firmwareqca9984_firmwareqca9377wcd9385_firmwarewcd9326_firmwarewcn3615_firmwareipq8074asm7325-afqcn6102_firmwareqcn9011_firmwaresa8155snapdragon_x55_5g_modem-rf_systemmsm8905_firmwaresnapdragon_835_mobile_pc_platform_firmwareqcn5122_firmwaresdx55_firmwaresnapdragon_208_processor_firmwarewcn3615qcn6023_firmwaresm7250p_firmwarewcn3610_firmwareqrb5165nwcd9306qca6584ausnapdragon_x65_5g_modem-rf_system_firmwareapq8053-aa_firmwaresm6225snapdragon_208_processoripq8174qcn50529206_lte_modemqca9367sm8250_firmwareqcn6112_firmwaresm8250-acwcn3988_firmware315_5g_iot_modemqcn9074qm215qca6421qca8085sm7250-aasa8195psxr1120sdm710_firmwareqca6694sm4375_firmwarewcd9326wcd9335qcm4490qcn6023apq8053-aaqcs4290_firmwareqca8085_firmwaresxr2130_firmwareqcs6490_firmwaresm7150-abqca6390wcd9375aqt1000snapdragon_210_processor_firmwaresc8180x\+sdx55_firmwaresm6250_firmwaresnapdragon_662_mobile_platformsm8150ipq5010_firmwareipq8074a_firmwarewsa8815_firmwaresnapdragon_636_mobile_platform_firmwareapq8017sxr1120_firmwareqcm6125_firmwaresnapdragon_x5_lte_modemsnapdragon_1100_wearable_platformsd865_5g8953proqca6595sxr1230p_firmwaresa8540p_firmwareqcn5154qca8075_firmwaresc8180xp-acsnapdragon_wear_4100\+_platformsmart_audio_400_platformipq6005_firmwaresxr2130wcn685x-5_firmwareqcn6132_firmwareqcn9003_firmwaresdm670_firmwareqca9888qca6310_firmwaresm7325ipq8070a_firmwaresa9000pqca6574_firmwaresm7325p_firmwaresnapdragon_xr2_5g_platform_firmwareqca6574a_firmware8953pro_firmwareqrb5165msm7315snapdragon_x55_5g_modem-rf_system_firmwaresc8280xp-ab_firmwareqcn6102snapdragon_auto_4g_modemsnapdragon_632_mobile_platform_firmwarecsrb31024_firmwareqcm6490_firmwarewsa8832_firmwaresnapdragon_xr1_platformqcn9070_firmwarewcn685x-5ipq6028_firmwareipq8072a_firmwaresc8180xp-af_firmwareqca9889_firmwareqcn5122qcs8250_firmwaresm7250-aa_firmwaresc8180x-aa_firmwaresm8150-ac_firmwareqcn5022sc8180x-aasm8350-acqca6564_firmwaresc8180x-af_firmwarewcn6740sm6150-acsnapdragon_x50_5g_modem-rf_systemqca8075qcn6024qcn9022qcn9002_firmwareipq6000_firmwareqcs410_firmwaresnapdragon_wear_1300_platformsdm660_firmwareqts110_firmwaresm7325_firmwareqam8255p_firmwaresa6150p_firmwareqcs610qcn5550315_5g_iot_modem_firmwaresc8180x-ab_firmwareqca6431_firmwarewcd9360_firmwaresnapdragon_820_automotive_platform_firmwareqca4024_firmwaresnapdragon_212_mobile_platformimmersive_home_318_platform_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqcs2290snapdragon_x70_modem-rf_systemqca6335sdm712qcn5064sdm670sm8350csra6620_firmwaresd_675_firmwarecsra6640_firmwareapq5053-aa_firmwarewcn685x-1sm7350-ab_firmwareqam8295pipq8076amdm9628qca8386_firmwaresd_8_gen1_5g_firmwareqca8084_firmwaresm7150-acqca6428sm7325-aeqca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwaresa6155_firmwaresm6225-adwcd9360snapdragon_xr2\+_gen_1_platformqca6438_firmwaresnapdragon_427_mobile_platform_firmwaresc8180xp-afsmart_audio_400_platform_firmwarewcn3999sm6225-ad_firmwareqrb5165_firmwareipq5028qrb5165m_firmwareqca6698aqqcs6125sa4155p_firmwareipq6010sd662_firmwaresm7250-ab_firmwarerobotics_rb3_platformqcn6132sd626_firmwaresnapdragon_820_mobile_platformsw5100home_hub_100_platform_firmwarefsm10056_firmwareqca6436sa6155pmsm8905wcn3660_firmwarewcd9341qam8775p_firmwaresa8255ppm8937_firmwareqca6431sc8180xp-ab_firmwareipq9008_firmwaresnapdragon_x12_lte_modemqca6797aqwcn3910_firmwaresm8250-ac_firmwarewsa8830_firmwaresd855_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewcn3988qca6438sm4250-aa_firmwaresa8195p_firmwaresa8295p_firmwarewcn3610mdm9640msm8608qca8337_firmwarewcd9380_firmwareipq8072asw5100pmsm8996au_firmwarewcd9330ipq8076a_firmwaresnapdragon_w5\+_gen_1_wearable_platformqca6564auipq9008qcn5164sdm429sc8180xp-aasnapdragon_wear_4100\+_platform_firmwareqcn5054_firmwareapq8053-ac_firmwaresm7150-aa_firmwareqca8072_firmwaresc8180x-ac_firmwareqca6430_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980qca6335_firmwaresm7225wcn3910qca6320mdm9650_firmwareqca6426_firmwaresm4450snapdragon_435_mobile_platformwcn3660b_firmwareqca9984wcn3680sc8180x-adqcn9024qcn5550_firmwaresnapdragon_xr2\+_gen_1_platform_firmwarewcd9330_firmwaresnapdragon_x50_5g_modem-rf_system_firmwaresm7150-aasnapdragon_820_automotive_platformqca6421_firmwaresm7125smart_audio_200_platformsd821_firmwaresnapdragon_xr2_5g_platformar8031_firmwarewcn3680_firmwaresm7150-ab_firmwareqrb5165sm8350_firmwareipq8070sdm6609206_lte_modem_firmwareqca6797aq_firmwaresdm710qca6564a_firmwaresnapdragon_x24_lte_modemqcn5121_firmwaresc8180xp-ac_firmwarewsa8832sa8540pqsm8250ipq60189207_lte_modem_firmwareqcs4490sdm439_firmwareqca6595_firmwaresa8145pimmersive_home_214_platform_firmwareqm215_firmwaresm4350-ac_firmwaresd888_firmwaresa8155psd675qcs8155_firmwarear8035_firmwareqcm2290snapdragon_632_mobile_platformsnapdragon_625_mobile_platform_firmwareqcn5024_firmwarewcn3991_firmwaresnapdragon_662_mobile_platform_firmwareqcn9070sa8145p_firmwaresm6125qcs2290_firmwarefsm10056sdm450_firmwarewcn785x-5csra6620qcn9072sm7250-ac_firmwareqca8386sc8280xp-bb_firmwareqca6390_firmwareipq6000sd730_firmwarewcd9370ssg2115pqcn5152_firmwareqca6584au_firmwareqcn9000_firmwaresm8450sm8250-absd_8cx_firmwareimmersive_home_216_platformimmersive_home_316_platformsnapdragon_1200_wearable_platform_firmwareimmersive_home_318_platformsd662qcn5124_firmwareqam8295p_firmwareapq8037qcn6100_firmwaresnapdragon_435_mobile_platform_firmwareqca8082_firmwareqca6320_firmwaresa9000p_firmwarewcn3680b_firmwaresnapdragon_212_mobile_platform_firmwareqca6595ausm7325-af_firmwarewcn3999_firmwaresnapdragon_425_mobile_platformqca6436_firmwaresm4350-acsnapdragon_w5\+_gen_1_wearable_platform_firmwareipq5010qca6564au_firmwaresa6155p_firmwareqca6310snapdragon_821_mobile_platform_firmwareqcn9274pm8937qcs8155snapdragon_x70_modem-rf_system_firmwareqcn9001qcs6490snapdragon_x5_lte_modem_firmwaresnapdragon_625_mobile_platformsd821vision_intelligence_300_platform_firmwaresa6145p_firmwaresm6250c-v2x_9150apq8017_firmwarewsa8810_firmwarevision_intelligence_400_platformsm8450_firmwaresc7180-adsnapdragon_ar2_gen_1_platform_firmwaresa8255p_firmwaresg4150pqca8081ipq8071aqca6174a_firmwareipq8071a_firmwaresnapdragon_wear_1300_platform_firmwarewcd9385snapdragon_x12_lte_modem_firmwaresc8180x-acar8035csr8811apq8064auqca6694_firmwareqcn9100_firmwarevision_intelligence_400_platform_firmwarewcn3620_firmwaresd820qcm6490wsa8835_firmwarewcn3620sm7350-abqca6564asa4150psg4150p_firmwarewcn785x-1qcm4325qca8072qcm2290_firmwaresnapdragon_845_mobile_platformapq5053-aawcn3990qcn9000sd_675sm8350-ac_firmwaresdm439snapdragon_835_mobile_pc_platformqcn9012sm8150-acsd888qcn6122_firmwarewsa8835msm8996ausdm429w_firmwaresc7180-ad_firmwaresnapdragon_auto_5g_modem-rfsd_8_gen1_5gsm6250pssg2125p_firmwaresnapdragon_425_mobile_platform_firmwareqca6574aqca9889qca6174asm7325psc8180x-afipq8074wcn6750qcn9003ipq8076_firmwaresm7150-ac_firmwaresm7250-absd855sm4125_firmwareipq8076sdx57m_firmwareqcn5021qcn5152msm8209wcn785x-5_firmwarevision_intelligence_300_platformsd460qca6391sm8250-ab_firmwareipq6005aqt1000_firmwareqcn9100qcm4490_firmwaresnapdragon_845_mobile_platform_firmwareqcm4290qcn9011sd_455sm6225_firmwareipq8074_firmwareqca6574ausa8155p_firmwareipq9574wcd9341_firmwareqcm6125wsa8810sm7250-acsnapdragon_ar2_gen_1_platformwcn3680bsd835_firmwareqam8650p_firmwaresnapdragon_675_mobile_platformipq6010_firmwareqca6696sm4350msm8608_firmwaresm7125_firmwaresa6150psnapdragon_1100_wearable_platform_firmwareqcn9022_firmwaresc8180xp-abapq8037_firmwareipq8070aqcn6100qcn9072_firmwaresnapdragon_820_mobile_platform_firmwaresm7250psc8180x-ad_firmwareipq8071_firmwareqcn9074_firmwaresw5100_firmwaresnapdragon_xr1_platform_firmwareSnapdragon
CWE ID-CWE-310
Not Available
CVE-2025-47325
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.01% / 1.50%
||
7 Day CHG~0.00%
Published-18 Dec, 2025 | 05:29
Updated-23 Dec, 2025 | 21:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Untrusted Pointer Dereference in TZ Firmware

Information disclosure while processing system calls with invalid parameters.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-ipq8174_firmwareipq8072_firmwarepmp8074_firmwareqcn9000_firmwareqcn9022ipq8072aqca6438_firmwareipq8071aqca8081_firmwareqcn6023qcn9074_firmwareqca8072ipq8074_firmwareqcn9074qcn9024_firmwareqca8072_firmwareqcn5022_firmwareqcn9022_firmwaresdx55_firmwareqcn5154_firmwareipq8071_firmwareqcn5024_firmwareqcn6023_firmwareqcn9070qca8075_firmwareqca4024_firmwareqcn5164qcn5052qcn5550_firmwareipq8173qcn5024ipq8174ipq8072qcn5152_firmwareqcn5054qca6438qca8075qcn5054_firmwareipq8076_firmwareqca6428ipq8076ipq8173_firmwareqcn5124qca9888ipq8074qcn9070_firmwareipq8078a_firmwareipq8078_firmwareqcn5550qcn5064ipq8070_firmwareqcn6024qca9888_firmwareipq8078aqcn5154csr8811ipq8071ipq8072a_firmwareqcn9072pmp8074qcn5022qcn9000qca4024qcn5122_firmwareipq8078qcn6024_firmwareipq8070sdx55qcn9024ipq8071a_firmwareqcn5052_firmwarecsr8811_firmwareqcn5064_firmwareipq8076a_firmwareqca6428_firmwareqca8081qcn5164_firmwareipq8074aqcn5124_firmwareqca9889qcn9072_firmwareqca9889_firmwareipq8070a_firmwareqcn5122ipq8074a_firmwareqcn5152ipq8076aipq8070aSnapdragon
CWE ID-CWE-822
Untrusted Pointer Dereference
CVE-2021-30331
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 14.46%
||
7 Day CHG~0.00%
Published-01 Apr, 2022 | 04:40
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible buffer overflow due to improper data validation of external commands sent via DIAG interface in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055qca9377_firmwaremdm9150_firmwarewcn3991_firmwaresd678wsa8830sm6250p_firmwareqcs610qcs2290_firmwarefsm10056qca8337mdm9650sdx65fsm10055_firmwareqcs4290wcn3950_firmwaresd765g_firmwareqcs2290qca6390_firmwaresd690_5gsd730_firmwarewcd9370sd_675_firmwaresd675_firmwareqcs6125_firmwareqca6426wcn3990_firmwareqca9377wcn3998wcd9385_firmwaresdxr2_5g_firmwarewcn3950sd720gsd_8_gen1_5g_firmwaresm6375_firmwaresd662sd460_firmwaresdx55_firmwarewcd9375_firmwareqca8081_firmwarewcn3998_firmwaresm7250p_firmwareqca6436_firmwaresd778gsm6225qcs6490sdxr2_5gqcs6125sd662_firmwarewcn3988_firmwaresm6250sd778g_firmwarewsa8810_firmwaresd765gsw5100sd765_firmwarefsm10056_firmwareqca6436wcn6851wcd9335qca8081qca6174a_firmwareqcs4290_firmwarewcd9385wcd9341qcs6490_firmwaresd750gsd870_firmwareqca6390ar8035sd750g_firmwarewcd9375wcn3910_firmwaresm6250_firmwarewsa8830_firmwaresd865_5g_firmwareqcm6490sd888_5g_firmwarewcn3988wcn6850_firmwarewsa8815_firmwarewsa8835_firmwareqcx315sm8475wcn6750_firmwareqcm6125_firmwareqcm2290_firmwaresm6375wcn3991qca8337_firmwarewcd9380_firmwarewcn3990sd_675sw5100psd865_5gsdx55m_firmwarewcn6856_firmwarewsa8835qcx315_firmwaresd665_firmwarewcd9380sd888_5gsm6250pqcs410sd690_5g_firmwarewcn6855_firmwareqca6174asm7325pwcd9335_firmwarewcn3980wcn6750wsa8815sm7325p_firmwaresd665wcn3910wcn6850mdm9650_firmwaresd765qca6426_firmwaresd768g_firmwarewcn3980_firmwaresd460sd730qca6391sdx55msdx65_firmwaresd678_firmwareqcm4290qcm6490_firmwaresd480_firmwarewcn6851_firmwaresm6225_firmwarewcd9341_firmwareqcm6125qcm4290_firmwaresd480sd870wcn6855wsa8810sw5100p_firmwareqcs610_firmwaremdm9150wcn6856sd768gqca6391_firmwarewcd9370_firmwaresdx55sd675sm7250psd720g_firmwaresw5100_firmwareqcs410_firmwarear8035_firmwareqcm2290Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-27072
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 1.69%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 07:26
Updated-18 Aug, 2025 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in Automotive Vehicle Networks

Information disclosure while processing a packet at EAVB BE side with invalid header length.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qam8295p_firmwaresa8255p_firmwareqca6698aqsa8770p_firmwareqca6688aq_firmwaresa8770psrv1msa8155pqca6688aqqam8255psa6155_firmwaresa7775p_firmwareqam8620pqca6574asrv1h_firmwaresa8150psa8650pqamsrv1m_firmwaresa6150p_firmwaresa8620psa8155p_firmwaresa7775pqam8255p_firmwaresa9000pqca6696sa8145p_firmwaresa6145pqam8775psrv1hsa6150psa8195psa9000p_firmwareqamsrv1hqca6696_firmwaresrv1lqca6574au_firmwareqca6698aq_firmwaresa8540psa8540p_firmwaresa8650p_firmwaresrv1m_firmwareqam8650pqamsrv1h_firmwaresa6145p_firmwareqam8650p_firmwareqca6574ausa8155srv1l_firmwareqca6574a_firmwareqca6595_firmwaresa6155qam8775p_firmwareqca6595ausa8775psa8255psa6155p_firmwareqca6595au_firmwaresa8150p_firmwaresa8145pqam8295psa7255psa8295psa8295p_firmwareqam8620p_firmwaresa7255p_firmwareqca6595sa8195p_firmwaresa8155_firmwareqamsrv1msa8620p_firmwaresa6155psa8775p_firmwareSnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-21431
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 10.24%
||
7 Day CHG~0.00%
Published-07 Apr, 2025 | 10:15
Updated-19 Aug, 2025 | 16:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Automotive OS Platform

Information disclosure may be there when a guest VM is connected.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa7775psa8620psrv1h_firmwaresa7255pqca6595au_firmwaresa8540p_firmwareqamsrv1m_firmwaresa6145p_firmwaresa8255psa6155p_firmwaresa8195pqca6698aqsa8295psa8145p_firmwaresa8155_firmwaresa8295p_firmwaresa8150psa8775psa6150p_firmwareqam8295p_firmwareqam8620pqca6574au_firmwaresa8145pqamsrv1msa6155_firmwaresa8540psa8770psa6150psrv1m_firmwareqca6696qamsrv1h_firmwareqca6574ausa8775p_firmwareqca6595_firmwareqca6688aq_firmwareqam8295psa6155srv1l_firmwareqca6696_firmwaresa8770p_firmwaresa6155psa8155qca6595auqca6574a_firmwaresrv1hqca6688aqsa6145pqca6574aqamsrv1hqca6595qam8775pqam8255pqam8650p_firmwaresa8255p_firmwareqam8620p_firmwaresa9000psa7255p_firmwaresa8620p_firmwaresrv1lsa8650psa8155p_firmwaresa9000p_firmwaresa8155pqam8775p_firmwaresa8650p_firmwareqam8255p_firmwaresa7775p_firmwareqca6698aq_firmwaresa8150p_firmwaresrv1mqam8650psa8195p_firmwareSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2025-21472
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 1.69%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 07:25
Updated-18 Aug, 2025 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Leftover Debug Code in Secure Element

Information disclosure while capturing logs as eSE debug messages are logged.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_6900_firmwareqcs8550sa8530p_firmwarewsa8835_firmwarefastconnect_6900fastconnect_7800_firmwareqca9367wsa8830fastconnect_7800qca9377_firmwaresnapdragon_8_gen_1_mobile_platform_firmwaresa9000p_firmwaresa8530pwcd9380wcd9380_firmwarewsa8830_firmwareqcs8550_firmwareqca9367_firmwarewsa8835sa8540psa8540p_firmwaresa9000pqca9377snapdragon_8_gen_1_mobile_platformSnapdragon
CWE ID-CWE-489
Active Debug Code
CVE-2021-1924
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-9||CRITICAL
EPSS-0.04% / 13.47%
||
7 Day CHG~0.00%
Published-12 Nov, 2021 | 06:15
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Information disclosure through timing and power side-channels during mod exponentiation for RSA-CRT in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresm7250mdm9640_firmwaresm6250p_firmwareipq4028_firmwareqca8337ar9380ipq8173_firmwareqcn5124fsm9950mdm9645wcn3950_firmwaresc8180x\+sdx55qca6595au_firmwaresa6155sd_455_firmwareapq8076fsm9905_firmwareqcs6125_firmwaremsm8108sa415mwcd9371_firmwaremsm8108_firmwarewcn3950qcn6024_firmwaresd720gsm4125mdm9206_firmwareqsw8573_firmwaresm6375_firmwarewcn3660bsd450_firmwareqsm8350_firmwareqsm8350sd460_firmwaremdm9230_firmwarewcn7850ipq8062qca8081_firmwareapq8009w_firmwareipq8070_firmwareqca9367_firmwareipq8065ipq8078a_firmwaremdm8207ipq8072_firmwaresa8155_firmwareqca4004_firmwareipq8068wcd9306_firmwaresdm830_firmwaremdm9625_firmwaresd765gar3012_firmwarewcn7851_firmwareapq8052msm8209_firmwaremdm9250_firmwareqca9888_firmwareqcn6122qca6696_firmwarewcd9371sd870_firmwareqcn5154_firmwaresd_8cxsa8150par7420_firmwareqca4004mdm9330_firmwareqca9992_firmwaresd865_5g_firmwaresd712qcn5121qcn5022_firmwarewcn6750_firmwaresd450qca6428_firmwaresm6375qca9985_firmwarewcn3991ipq4018_firmwareqca9980_firmwaresdm429wipq8078sdx55m_firmwareipq8173msm8976_firmwareqca6574sd632_firmwarecsr8811_firmwarewcd9380qualcomm215qcs410qcn5024sd690_5g_firmwareqca9379_firmwaresdx24_firmwareqca9985qcn9012_firmwaresd439_firmwareipq6018_firmwareqca9890_firmwarewcn6850pmp8074_firmwaremsm8956_firmwareqca6584_firmwaremsm8937_firmwaresd_8c_firmwareipq6028ipq8064pmp8074qca1990sd730wcn6740_firmwaremdm9225qcn5064_firmwaresd678_firmwareapq8064au_firmwaremdm9225mipq8078_firmwareqca9890qca6234qcn5054qcs603fsm9900_firmwareqca9994qca6164_firmwareqca9980qcn9024_firmwareipq8174_firmwareapq8009wsdx57mqcm4290_firmwarewcn6855qcs610_firmwareapq8084_firmwaresa6145pqca9886_firmwarear8031mdm8207_firmwareqca6164sdm630_firmwaremdm9205_firmwareqca6391_firmwaresd820_firmwareqca4024wcd9370_firmwaresdx55qcn5021_firmwarecsra6640wcn3660qca9379qca6234_firmwareqsm8250_firmwaremdm9150_firmwarewsa8830qca9561fsm9915_firmwarecsrb31024mdm9628_firmwaremdm9650fsm9916_firmwaresd_636fsm10055_firmwareqca9992qcs4290mdm9250pmd9635_firmwareapq8009_firmwaresd690_5gfsm9915msm8916_firmwaresd675_firmwareipq8072qca6564qca6426qrb5165n_firmwareqca9984_firmwareqca9377fsm9905sdw2500_firmwarewcd9385_firmwaresdxr2_5g_firmwarewhs9410ipq8074aqca9982mdm8635msa8155qca6584qcn5122_firmwaresdx55_firmwareqcn6023_firmwarewcn3610_firmwareqrb5165nmdm9207wcd9306qca6584ausd778gqfe1952msm8208sm6225ipq8174sd429wcn7851msm8962qca9367qcn5052mdm9235m_firmwaresdm630mdm9607_firmwaremdm9655_firmwaremsm8976sgsa415m_firmwarewcn3988_firmwareqcn9074sd205sd429_firmwareqca6421sd778g_firmwaresa8195pqca6694qca7550wcn3660aqca9982_firmwareqcn6023qcs4290_firmwareqcs6490_firmwaremdm8635m_firmwaremdm9625qca6390qca9898_firmwaresd750g_firmwarewcd9375msm8956msm8976sc8180x\+sdx55_firmwaresm6250_firmwareapq8056msm8917_firmwareipq5010_firmwareipq8074a_firmwaremdm9625msd888_5g_firmwaresdx20_firmwaremsm8916apq8017qcx315mdm9235mmdm9630_firmwareqcm6125_firmwareqca9882sd780gsd865_5gqca6595ipq8065_firmwareqcx315_firmwareqca10901sd665_firmwareqcn5154qca8075_firmwareipq6005_firmwaremdm9206wcn6855_firmwareqca9888qca6310_firmwaresm7325ipq8070a_firmwareqca6574_firmwareqca9886sd665qca6175asd765wtr3925lqca6574a_firmwaresd850_firmwarewcn3660a_firmwareapq8009csrb31024_firmwareqcm6490_firmwareqcn9070_firmwaresd480_firmwareipq6028_firmwareipq8072a_firmwaremdm9626_firmwareqca9531qca9889_firmwaremdm9607qcn5122mdm9645_firmwaresdx20m_firmwareqcn5022qca6564_firmwaresd768gwcn6740sdw2500msm8940qca8075apq8096au_firmwareqcn6024qcn9022msm8962_firmwaresdm830ipq6000_firmwaresdx12qcs410_firmwaremdm9330qca6175a_firmwaresm7325_firmwareipq8062_firmwarefsm10055sa6150p_firmwareqcs610qcn5550fsm9955_firmwareqca6431_firmwarewcd9360_firmwareqca9561_firmwareqca4024_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqcs2290qca6335msm8917qcn5064csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwarefsm9916qca9987_firmwaresd632ipq8076amdm9628qca4020qca6428qca6574au_firmwareqcn5164_firmwareipq8071mdm9630wcd9375_firmwaresa6155_firmwaresdx12_firmwaremsm8909wwcd9360qca10901_firmwaresdx20mqca6438_firmwarewhs9410_firmwarewcn3999qrb5165_firmwareipq5028qca7500ipq4029_firmwareqcs6125apq8056_firmwareapq8016_firmwareipq6010apq8062_firmwaresd662_firmwareqcs405sc8280xp_firmwareqca1990_firmwarequalcomm215_firmwarefsm10056_firmwareqca4020_firmwareqca6436fsm9910_firmwareqcn3018_firmwaresa6155pwcn6851qcs603_firmwaremsm8937ipq8066_firmwarewcn3660_firmwareipq8068_firmwaremdm9655pm8937_firmwareqca6431sd750gwcn3910_firmwaremdm9207_firmwareqfe1922wsa8830_firmwarewcn3988qca6438wcn7850_firmwaresa8195p_firmwaremsm8208_firmwareqca9898ipq4028wcn3610mdm9640msm8608ipq5018_firmwarear9580_firmwareqca8337_firmwaresda429w_firmwarewcd9380_firmwareipq8072aqca7500_firmwarewcd9330msm8996au_firmwarecsr6030ipq8076a_firmwareqca7550_firmwaremdm9225m_firmwareqca6564auwcn6856_firmwareqcn5164msm8940_firmwareqca9558qca7520_firmwaremdm9230qcn5054_firmwareipq4019_firmwaresdx50m_firmwareipq8066qca8072_firmwareqca6174qcn5052_firmwareqca6335_firmwareqsw8573qcs605sd7cmdm9225_firmwareqca6320wcn3910mdm9650_firmwareqca6426_firmwarewcn3660b_firmwarewcn3680qca9984qcn9024qcn5550_firmwarewcd9330_firmwaresdx55mipq8064_firmwareqca6421_firmwaresd821_firmwarear8031_firmwarewcn3680_firmwareqrb5165wcn6851_firmwareipq8070pmd9635qca9887_firmwarewtr3925l_firmwaresd_636_firmwareqca6564a_firmwareqca6694au_firmwareqca9880msm8976sg_firmwaresd480sd870qcn5121_firmwarear3012sd210_firmwareqsm8250ipq6018qcn3018sdxr1apq8096auqca6595_firmwareqcs405_firmwaresa8145par9580sd780g_firmwaresc8280xpsa8155psd675sd439qca9531_firmwarear8035_firmwareqcm2290qcn5024_firmwarewcn3991_firmwaresd678qcn9070sa8145p_firmwareqca7520qcs2290_firmwarefsm10056sm7250_firmwaresd7c_firmwarecsra6620qca9987qfe1100_firmwareqcn9072qca9880_firmwaresd765g_firmwareipq8069_firmwareqca6390_firmwareipq6000qca6174_firmwaresd730_firmwarewcd9370qcn5152_firmwareqca6584au_firmwareapq8076_firmwareqcn9000_firmwareipq5018sd_8cx_firmwarefsm9950_firmwaresd662qcn5124_firmwareqfe1952_firmwareapq8037qca6320_firmwareqca6595auwcn3999_firmwareqca6436_firmwareipq5010qca6564au_firmwaresa6155p_firmwareqca6310pm8937sa515m_firmwareqca9990qcs6490sdxr2_5gapq8084sd821apq8062sa6145p_firmwaresm6250sd712_firmwareapq8017_firmwareqfe1100sd765_firmwareqca8081ipq8071aqca6174a_firmwareipq8071a_firmwarewcd9385ar8035csr8811apq8064auipq4019qca6694_firmwareqcn9100_firmwareqca6694aumsm8952sda429wsd210wcn3620_firmwaresd820qcm6490wcn6850_firmwarewsa8835_firmwarewcn3620csr6030_firmwareqca6564aqca8072qcm2290_firmwaremdm9635m_firmwareqcn9000sd_675mdm9625m_firmwarear9380_firmwaresdx24qcn9012qca9558_firmwaremsm8952_firmwaremsm8909w_firmwareqcn6122_firmwaremsm8996ausdm429w_firmwarewsa8835sd888_5gsm6250pipq4018qca6574aqca9889qca6174aipq8074qca9994_firmwarewcn6750mdm9635mapq8052_firmwarefsm9910ipq8076_firmwaremdm9205sa515mar7420sm4125_firmwareipq8076qfe1922_firmwaresdx57m_firmwareqca9887qcn5021ipq8069qcn5152sd768g_firmwaremsm8209sd460qca6391sdxr1_firmwareipq6005msm8920qcn9100mdm9626qcm4290sdx50mqca9882_firmwaresdx20msm8920_firmwaresd_455sm6225_firmwareipq8074_firmwareqca6574ausa8155p_firmwaresd205_firmwareqcm6125mdm9150wcn6856sd_8cipq6010_firmwareqca6696fsm9955apq8016msm8608_firmwaresa6150pqcn9022_firmwarefsm9900qca9990_firmwareapq8037_firmwareipq8070aqcn9072_firmwaresd720g_firmwareipq8071_firmwareqcn9074_firmwareipq4029sd850Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-1929
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.2||MEDIUM
EPSS-0.04% / 13.47%
||
7 Day CHG~0.00%
Published-08 Sep, 2021 | 11:25
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Lack of strict validation of bootmode can lead to information disclosure in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewsa8830sd678sa6150p_firmwaresm7250sa8145p_firmwareqcs610qcs2290_firmwaresm7250_firmwareqca6431_firmwareqcs4290wcn3950_firmwaresa8150p_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqcs2290qca6390_firmwaresd730_firmwarewcd9370qcs605_firmwaresd_675_firmwaresd675_firmwareqcs6125_firmwareqca6426wcn3990_firmwarewcn3998wcd9385_firmwaresdxr2_5g_firmwarewcn3950wcd9326_firmwaresd720gwcn3615_firmwarewcn3660bsd662sd460_firmwaresa8155qca6574au_firmwaresdx55_firmwareqca6595auwcd9375_firmwarewcn3615wcn3998_firmwarewcn3610_firmwareqca6420qca6436_firmwareqca6564au_firmwaresd778gsa6155p_firmwaresdxr2_5gqcs6125sa8155_firmwaresd662_firmwarewcn3988_firmwareqca6430sa6145p_firmwaresd205qca6421sd778g_firmwaresm6250wcd9340sa8195psdm830_firmwarewsa8810_firmwarequalcomm215_firmwaresd765gsd765_firmwareqca6436wcd9326wcn6851sa6155pqcs603_firmwareqcs4290_firmwarewcd9385wcd9341qca6431qca6696_firmwaresd870_firmwareqca6390wcd9375wcn3910_firmwareaqt1000sa8150psm6250_firmwarewsa8830_firmwaresda429wsd210sd855_firmwaresd865_5g_firmwarewcn3620_firmwarewcn3988sd888_5g_firmwarewcn6850_firmwarewcn3620wsa8815_firmwarewsa8835_firmwaresa8195p_firmwareqca6564awcn6750_firmwarewcn3610qcm6125_firmwareqcm2290_firmwarewcn3991sda429w_firmwarewcd9380_firmwarewcn3990sd_675msm8996au_firmwaresd780gsd865_5gqca6595qca6564ausdx55m_firmwarewcn6856_firmwarewsa8835msm8996ausd665_firmwarewcd9380sd888_5gqualcomm215qca6574asdx50m_firmwaresm7325qca6430_firmwarewcn3980wcn6750qcs605wcd9340_firmwaresd855wsa8815wcn6850sd665wcn3910sd765qca6426_firmwarewcn3660b_firmwarewcn3680qca6574a_firmwaresd768g_firmwarewcn3980_firmwaresd460qca6391sd730sdx55mqca6421_firmwareaqt1000_firmwarewcn6740_firmwaresd678_firmwareqcm4290sdx50mwcn3680_firmwaresd480_firmwareqcs603wcn6851_firmwareqca6574ausa8155p_firmwaresd205_firmwareqca6564a_firmwarewcd9341_firmwareqcm6125qcm4290_firmwaresd480sd870wsa8810sd210_firmwareqcs610_firmwarewcn6856sa6145psd768gapq8096auqca6595_firmwaresa8145pwcn6740qca6696qca6391_firmwaresd780g_firmwarewcd9370_firmwaresa6150psdx55apq8096au_firmwaresa8155psd675sdm830sd720g_firmwareqcm2290sm7325_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
CVE-2021-1969
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.2||MEDIUM
EPSS-0.03% / 10.11%
||
7 Day CHG~0.00%
Published-20 Oct, 2021 | 00:00
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper validation of kernel buffer address while copying information back to user buffer can lead to kernel memory information exposure to user space in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055wcn3991_firmwaremdm9150_firmwarewcn3991sd678sa6150p_firmwareqca8337_firmwaresa8145p_firmwareqcs610sda429w_firmwarewcd9380_firmwaresd_675fsm10056qca8337qca6595sdx55m_firmwarecsra6620fsm10055_firmwareqca6574wcn3950_firmwaresd665_firmwarewcd9380sa8150p_firmwareqca6420_firmwareqca6595au_firmwaresa6155qcs410wcd9370csra6620_firmwaresd_675_firmwaresd675_firmwareqca6574acsra6640_firmwareqcs6125_firmwareqca6584au_firmwareqca6430_firmwarewcd9335_firmwarewcn3980wcn3998sd_8cx_firmwarewcn3950sd720gqca6574_firmwarewcd9340_firmwarewcn3660bsd855wsa8815sd665sd_8c_firmwarewcn3660b_firmwaresa8155qca6574a_firmwareqca6574au_firmwaresdx55_firmwareqca6595ausa6155_firmwarewcd9375_firmwarewcn3998_firmwarewcn3999_firmwarewcn3980_firmwarewcn3610_firmwareqca6420qca6391sdx55maqt1000_firmwareqca6584ausa6155p_firmwarewcn3999sd678_firmwarear8031_firmwareqcs6125sa8155_firmwareqcs405qca6430wcn3988_firmwareqca6574ausa6145p_firmwaresa8155p_firmwaresm6250wcd9340sa8195pwsa8810_firmwarewcd9341_firmwareqcm6125wsa8810fsm10056_firmwarewcd9335sa6155pqcs610_firmwaremdm9150sd_8csa6145pwcd9341ar8031qca6696_firmwareqca6595_firmwareqcs405_firmwaresa8145pqca6696qca6391_firmwarear8035wcd9375sd_8cxaqt1000sa8150pwcd9370_firmwaresm6250_firmwaresa6150psdx55sa8155pcsra6640sda429wsd675sd855_firmwarewcn3620_firmwarewcn3988wsa8815_firmwarewcn3620sd720g_firmwaresa8195p_firmwareqcs410_firmwarear8035_firmwarewcn3610qcm6125_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-20
Improper Input Validation
CVE-2021-1904
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.2||MEDIUM
EPSS-0.13% / 32.90%
||
7 Day CHG~0.00%
Published-08 Sep, 2021 | 11:25
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Child process can leak information from parent process due to numeric pids are getting compared and these pid can be reused in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarefsm10055sm7250mdm9640_firmwaresm6250p_firmwaresa6150p_firmwareqcs610qca8337qca6431_firmwarewcn3950_firmwaresa8150p_firmwareqcs2290qca6595au_firmwaresa6155qca6335msm8917sd_455_firmwarecsra6620_firmwareqcs605_firmwareapq8076sd_675_firmwarecsra6640_firmwareqcs6125_firmwaresd632sa415mwcn3998wcd9371_firmwarewcn3950sm4125sd720gmdm9628mdm9206_firmwareqsw8573_firmwarewcn3660bsd450_firmwaresd710_firmwaresd460_firmwareqca4020qca6574au_firmwarewcd9375_firmwarewcn3998_firmwaresa6155_firmwaresdx12_firmwaremsm8909wapq8009w_firmwareqca6420apq8053_firmwaresdx20mqca9367_firmwarewcn3999qrb5165_firmwareqcs6125sa8155_firmwaresd662_firmwareqcs405qca6430wcd9306_firmwarewcd9340sdm830_firmwaresd765gqualcomm215_firmwarefsm10056_firmwareqca4020_firmwareqca6436wcn6851sa6155pqcs603_firmwaremdm9250_firmwarewcn3660_firmwarewcd9341qca6431qca6696_firmwarewcd9371sd870_firmwaresd750gwcn3910_firmwaresd_8cxsa8150pwsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwarewcn3988sd660_firmwaresa8195p_firmwarewcn6750_firmwaresd450wcn3610mdm9640wcn3991qca8337_firmwaresda429w_firmwarewcd9380_firmwaresdm429wwcd9330msm8996au_firmwarecsr6030qca6564ausdx55m_firmwarewcn6856_firmwareqet4101_firmwaresd670_firmwareqca6574sd632_firmwarewcd9380qualcomm215qcs410sd690_5g_firmwaresdx50m_firmwareqca9379_firmwaresdx24_firmwareqca6174qca6430_firmwarewcd9335_firmwaresd439_firmwarewcn3980qca6335_firmwareqsw8573qcs605wcd9340_firmwarewsa8815wcn6850wcn3910qca6320qca6584_firmwaremdm9650_firmwaresd_8c_firmwareqca6426_firmwarewcn3660b_firmwarewcn3680sd835wcn3980_firmwaresd730wcd9330_firmwaresdx55mqca6421_firmwarewcn6740_firmwaremsm8953sd678_firmwareapq8064au_firmwarear8031_firmwarewcn3680_firmwareqrb5165wcn6851_firmwareqcs603sd670sd_636_firmwareqca6564a_firmwareapq8009wqcm4290_firmwaresd480sd870wcn6855sd210_firmwareqcs610_firmwareqsm8250sa6145psdxr1ar8031apq8096auqca6595_firmwareqcs405_firmwaresa8145psdm630_firmwareqca6391_firmwarewcd9370_firmwaresd780g_firmwaresdx55sd888_firmwareapq8053sa8155pcsra6640sd675sd439qet4101wcn3660qca9379ar8035_firmwareqcm2290qsm8250_firmwarewcn3991_firmwaremdm9150_firmwarewsa8830sd678sa8145p_firmwareqcs2290_firmwarefsm10056sm7250_firmwarecsrb31024mdm9628_firmwaremdm9650sd_636csra6620fsm10055_firmwareqcs4290mdm9250sd765g_firmwareqca6420_firmwareqca6390_firmwareapq8009_firmwaresd690_5gqca6174_firmwaresd730_firmwarewcd9370sd675_firmwareqca6564qca6426qca6584au_firmwarewcn3990_firmwareapq8076_firmwareqca9377sdw2500_firmwaresd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwarewcn3615_firmwaresd662sa8155qca6320_firmwareqca6584wcn3680b_firmwaresdx55_firmwarewcn3615qca6595auwcn3999_firmwarewcn3610_firmwareqca6436_firmwarewcd9306qca6584ausd778gqca6564au_firmwaresa6155p_firmwareqca6310sd429sdxr2_5gqca9367sdm630mdm9607_firmwaresa415m_firmwarewcn3988_firmwaresd205sd429_firmwareqca6421sd778g_firmwaresa6145p_firmwaresm6250sa8195papq8017_firmwarewsa8810_firmwaresd765_firmwarewcd9326wcd9335qca6174a_firmwareqcs4290_firmwarewcd9385qca6390wcd9375sd750g_firmwareaqt1000ar8035apq8064ausm6250_firmwaremsm8953_firmwaresda429wmsm8917_firmwaresd210wcn3620_firmwaresdx20_firmwarewsa8815_firmwaresd888_5g_firmwarewcn6850_firmwarewsa8835_firmwarewcn3620apq8017qcx315csr6030_firmwareqca6564aqcm6125_firmwareqcm2290_firmwarewcn3990sd_675sd780gsd865_5gqca6595sdx24sd888msm8909w_firmwareqcx315_firmwarewsa8835msm8996ausdm429w_firmwaresd665_firmwaresd888_5gsm6250pqca6574amdm9206wcn6855_firmwareqca6174aqca6310_firmwaresm7325wcn6750qca6574_firmwaresd855sm4125_firmwaresd665sd765qca6574a_firmwaresd768g_firmwareapq8009sd460qca6391sdxr1_firmwareaqt1000_firmwaremdm9626qcm4290csrb31024_firmwaresdx50msdx20sd480_firmwaresd_455mdm9626_firmwareqca6574ausd710sa8155p_firmwaremdm9607sd205_firmwarewcd9341_firmwaresdx20m_firmwareqcm6125wsa8810mdm9150wcn6856sd_8cwcn3680bsd835_firmwareqca6564_firmwaresd768gwcn6740qca6696sd845_firmwaresdw2500sa6150papq8096au_firmwaresd845sdm830sd720g_firmwaresdx12qcs410_firmwaresm7325_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-697
Incorrect Comparison
CVE-2021-1930
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 12.22%
||
7 Day CHG~0.00%
Published-08 Sep, 2021 | 11:25
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible out of bounds read due to incorrect validation of incoming buffer length in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarewcn3991_firmwarewsa8830sd678sa6150p_firmwaresm6250p_firmwaresa8145p_firmwareqcs610sm7250qcs2290_firmwaresm7250_firmwareqca6431_firmwaresd7c_firmwarecsrb31024qcs4290wcn3950_firmwaresa8150p_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqcs2290qca6390_firmwaresa6155sd690_5gsd730_firmwarewcd9370sd_675_firmwaresd675_firmwareqcs6125_firmwareqca6426qca6584au_firmwarewcn3990_firmwareqca9377sa415mwcn3998wcd9371_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcn3950sm4125sd720gwcd9326_firmwareqsm8350_firmwaresd662sd710_firmwareqsm8350sd460_firmwaresa8155qca6574au_firmwaresdx55_firmwareqca6595ausa6155_firmwarewcd9375_firmwarewcn3998_firmwareqca6420qca6436_firmwareqca6564au_firmwareqca6584ausa6155p_firmwaresd778gqrb5165_firmwaresdxr2_5gqcs6125sa8155_firmwaresd662_firmwaresa415m_firmwarewcn3988_firmwareqca6430sa6145p_firmwareqca6421sd778g_firmwaresm6250sa8195pwsa8810_firmwaresd765gsd765_firmwareqca6436wcd9326wcn6851sa6155pqca6174a_firmwareqcs4290_firmwarewcd9385wcd9341qca6431qca6696_firmwarewcd9371sd750gsd870_firmwareqca6390wcd9375sd750g_firmwareaqt1000sa8150pwcn3910_firmwaresm6250_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3988sd888_5g_firmwarewcn6850_firmwarewsa8815_firmwarewsa8835_firmwaresa8195p_firmwarewcn6750_firmwareqcm6125_firmwareqcm2290_firmwarewcn3991wcd9380_firmwarewcn3990sd_675sd780gsd865_5gqca6564ausdx24sdx55m_firmwarewcn6856_firmwaresd670_firmwareqca6574wsa8835sd665_firmwarewcd9380sd888_5gsm6250pqcs410qca6574asd690_5g_firmwaresdx50m_firmwarewcn6855_firmwareqca6174asdx24_firmwaresm7325qca6430_firmwarewcn3980wcn6750qca6574_firmwaresd855sm4125_firmwarewcn6850sd665sd7cwcn3910wsa8815sd765qca6426_firmwareqca6574a_firmwaresd768g_firmwarewcn3980_firmwaresd460qca6391sd730sdx55mqca6421_firmwareaqt1000_firmwarewcn6740_firmwaresd678_firmwareqcm4290csrb31024_firmwaresdx50mqrb5165sd480_firmwarewcn6851_firmwareqca6574ausa8155p_firmwaresd710sd670wcd9341_firmwareqcm6125qcm4290_firmwaresd480sd870wcn6855wsa8810qcs610_firmwarewcn6856qsm8250sa6145psd768gsa8145pwcn6740qca6696qca6391_firmwaresd780g_firmwarewcd9370_firmwaresa6150psdx55sa8155psd675sd720g_firmwareqcs410_firmwareqcm2290qsm8250_firmwaresm7325_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-3674
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.10% / 26.78%
||
7 Day CHG~0.00%
Published-09 Sep, 2020 | 06:25
Updated-04 Aug, 2024 | 07:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Information can leak into userspace due to improper transfer of data from kernel to userspace in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in Nicobar, QCS405, Saipan, SC8180X, SDX55, SM8150, SM8250, SXR2130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sm8150_firmwaresxr2130_firmwareqcs405_firmwaresm8250_firmwaresdx55sc8180x_firmwareqcs405saipan_firmwaresm8250sm8150sdx55_firmwarenicobar_firmwaresaipansxr2130sc8180xnicobarSnapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-3679
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.25% / 48.06%
||
7 Day CHG~0.00%
Published-09 Sep, 2020 | 06:25
Updated-04 Aug, 2024 | 07:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

u'During execution after Address Space Layout Randomization is turned on for QTEE, part of code is still mapped at known address including code segments' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in Bitra, Kamorta, Nicobar, QCS404, QCS610, Rennell, SA6155P, SA8155P, Saipan, SC7180, SC8180X, SDX55, SM6150, SM7150, SM8150, SM8250, SXR2130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-kamorta_firmwaresa6155p_firmwareqcs610qcs404_firmwaresm8250_firmwaresc8180x_firmwaresm7150_firmwaresa8155p_firmwaresc7180_firmwaresm6150sm7150sa6155pqcs610_firmwaresxr2130sc8180xqcs404sm8150_firmwaresxr2130_firmwarerennellsc7180bitrarennell_firmwaresdx55sa8155psaipan_firmwaresm6150_firmwaresm8250bitra_firmwaresm8150kamortasdx55_firmwarenicobar_firmwaresaipannicobarSnapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
CVE-2020-3621
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.11% / 30.06%
||
7 Day CHG~0.00%
Published-08 Sep, 2020 | 09:31
Updated-04 Aug, 2024 | 07:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

u'Lack of check to ensure that the TX read index & RX write index that are read from shared memory are less than the FIFO size results into memory corruption and potential information leakage' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, Bitra, IPQ6018, IPQ8074, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA8081, QCM2150, QCN7605, QCS404, QCS405, QCS605, QCS610, QM215, Rennell, SA415M, SA6155P, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-mdm9150_firmwarekamorta_firmwareqcm2150_firmwaremdm9640_firmwareqcs610sdm429wmsm8996au_firmwaresdm632_firmwaresdm845sdm450_firmwaresdm632sdx24sdm439qcs404_firmwaremdm9650sdm429msm8940_firmwaresm7150_firmwaresm6150msm8996aumdm9645sdm429w_firmwaresm7150apq8009_firmwaremsm8917sdm670sxr2130qcs605_firmwaresc8180xmdm9206sdm670_firmwareqcs404sdx24_firmwareipq8074sdm636sda845_firmwaresa415mbitraapq8098qcn7605mdm9205mdm9206_firmwareqcs605bitra_firmwaremsm8937_firmwaremdm9650_firmwaresdm429_firmwaremsm8905_firmwaresda660sdx55_firmwaresxr1130_firmwareqca8081_firmwaresxr1130apq8009msm8909_firmwareapq8053_firmwaresda845nicobarsdm850_firmwaresa6155p_firmwaremsm8920msm8953sdm450sdm636_firmwaresdm845_firmwareapq8098_firmwaresdx20msm8998_firmwareqcm2150msm8920_firmwaresdm630mdm9607_firmwaresm8250_firmwaremdm9655_firmwaresdm660sa415m_firmwareqcs405sc8180x_firmwareipq8074_firmwaresdm710qm215sc7180_firmwaremdm9607mdm9645_firmwaresdm710_firmwareqcn7605_firmwaresa6155pqca8081qcs610_firmwaremsm8937mdm9150msm8996_firmwaremsm8905sm8150_firmwaremsm8909sxr2130_firmwaremdm9655apq8096ausdm439_firmwarerennellsc7180qcs405_firmwaresdm630_firmwaremdm9205_firmwaresda660_firmwarerennell_firmwareqm215_firmwaresdx55msm8953_firmwaremsm8940saipan_firmwaresm6150_firmwareapq8053msm8917_firmwareapq8096au_firmwaremsm8998sm8150sdx20_firmwaresdm850sm8250kamortamsm8996saipannicobar_firmwaresdm660_firmwaremdm9640Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-20
Improper Input Validation
CVE-2020-11265
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 13.47%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 05:00
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Information disclosure issue due to lack of validation of pointer arguments passed to TZ BSP in Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-ar9580_firmwareipq4018_firmwareqfe1952ipq4028_firmwareqca7500_firmwareqca7520qca7500ipq4029_firmwareqca7550_firmwareqca9994qca4024_firmwareqca9889_firmwareqca9880_firmwareqca10901qca9992wcd9340csr8811_firmwareqca7520_firmwareqca9880wsa8810_firmwareqca7550wsa8810qcn3018_firmwareqca8075_firmwareipq4019_firmwareipq4018qcn3018qca9886_firmwareqca9889qca9888_firmwareqca9888qca9984_firmwareqca9994_firmwarear9580qca9898_firmwareqca4024csr8811ipq4019ar7420qca9886wcd9340_firmwarear7420_firmwareqca8075qfe1922qfe1922_firmwareqca9992_firmwareqfe1952_firmwareqca9984qca9898ipq4029ipq4028qca10901_firmwareSnapdragon Wired Infrastructure and Networking
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-43063
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.03% / 8.80%
||
7 Day CHG~0.00%
Published-06 Jan, 2025 | 10:33
Updated-10 Jan, 2025 | 15:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in Automotive Autonomy

information disclosure while invoking the mailbox read API.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa9000p_firmwareqam8775psa8775p_firmwareqam8650pqca6595_firmwaresa8770p_firmwareqca6698aqsa8650p_firmwaresa8770psa8255p_firmwareqam8255psa8295pqamsrv1hsa8775pqam8775p_firmwareqca6595sa8540pqam8295pqca6698aq_firmwaresa8295p_firmwaresa9000pqam8650p_firmwaresrv1h_firmwaresa8540p_firmwareqca6595au_firmwaresa8255pqamsrv1h_firmwareqam8295p_firmwareqca6595auqca6696srv1hqca6696_firmwareqam8255p_firmwaresa8650pSnapdragon
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-43051
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 5.25%
||
7 Day CHG~0.00%
Published-03 Mar, 2025 | 10:07
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Authorization in SPS-HLOS

Information disclosure while deriving keys for a session for any Widevine use case.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qdx1010_firmwareqcm8550_firmwaresa6150p_firmwaresw5100psd865_5gsxr1120wcn6650qca6595wcd9335snapdragon_8\+_gen_1wcd9370qca8081_firmwaresnapdragon_730gqca6696qam8620p_firmwarewcd9340_firmwaresa8530pwcd9341_firmwaresxr2330p_firmwarewcd9395_firmwarewcn7881_firmwareqcn6024wcn6450qcc710_firmwareqca6426snapdragon_auto_4gwcn6740_firmwaresnapdragon_720g_firmwarefastconnect_6700snapdragon_695_5gsa4150psnapdragon_888_5gwsa8832_firmwareqca8337qdu1110qca6426_firmwarewcd9395snapdragon_4_gen_2_firmwareqca6574au_firmwareqcn7606_firmwaresm6370qam8295pwcd9341qca6574auwcd9390sa8620p_firmwarewsa8810_firmwaresd730_firmwarewsa8845h_firmwarecsra6640sa9000p_firmwaresnapdragon_690_5gsnapdragon_778g\+_5g_firmwaresnapdragon_865\+_5gsrv1hsm8650q_firmwaresnapdragon_765_5gqcs9100sd730snapdragon_8\+_gen_2fastconnect_6800_firmwareqcs5430snapdragon_865\+_5g_firmwareqcn6024_firmwaresnapdragon_x65_5gqcm5430qcm5430_firmwarevideo_collaboration_vc1_platform_firmwaresa4155psnapdragon_888\+_5g_firmwaresa8770pqcm6125_firmwarec-v2x_9150ssg2115pqcc710snapdragon_x50_5gsnapdragon_xr2_5g_firmwaresnapdragon_xr1_firmwaresa8540psxr1120_firmwaresnapdragon_710qsm8250_firmwaresnapdragon_730qsm8350_firmwaresnapdragon_765g_5g_firmwaresnapdragon_4_gen_2fastconnect_6900robotics_rb2snapdragon_8_gen_2_firmwarevideo_collaboration_vc1_platformsnapdragon_x72_5gqru1032_firmwareqep8111sa7255psm8635qfw7114wcd9385_firmwareqca6421qam8255p_firmwaresnapdragon_778g_5gsnapdragon_670snapdragon_678_firmwaresa8155_firmwaresdx61qcs4490snapdragon_732g_firmwaresnapdragon_662_firmwaresnapdragon_x50_5g_firmwarewsa8845sa6155pqca6421_firmwareqcm6125wsa8810qam8650pvideo_collaboration_vc5_platform_firmwaresa9000psnapdragon_855_firmwareqdu1000_firmwareqsm8250srv1h_firmwaresnapdragon_670_firmwaresnapdragon_678qca6595ausxr2250p_firmwaresnapdragon_865_5g_firmwareqdu1010sm7315_firmwarewcd9326_firmwaresa6155p_firmwaresnapdragon_730g_firmwaresnapdragon_ar1_gen_1wsa8840srv1m_firmwareqcs8550_firmwareqdu1210_firmwareqfw7124_firmwareqca6436_firmwaresnapdragon_x35_5g_firmwareqcn9012qcs4490_firmwarewcn3910_firmwaresnapdragon_7c\+_gen_3_compute_firmwaresnapdragon_675_firmwaresm4125_firmwaresm8635psnapdragon_680_4gqca6420wcn3910wcd9370_firmwarerobotics_rb2_firmwaresnapdragon_8_gen_2snapdragon_480\+_5g_firmwaresnapdragon_765_5g_firmwareqdu1110_firmwareqdu1000sa7255p_firmwareqca6574aqca6174asnapdragon_695_5g_firmwaresa8195psnapdragon_750g_5g_firmwarewcd9340qcs8250_firmwareqcm2290qdu1210talynplussnapdragon_auto_5g_modem-rf_gen_2qcm6490sa8540p_firmwaresm8550p_firmwaresnapdragon_x55_5g_firmwareqcm8550sxr2250pwcn3988sm6370_firmwareqcn9274qcn9024sa8775pqca6574sxr2230p_firmwareqca6430_firmwareqcn9011sa8775p_firmwareqamsrv1hsmart_audio_400qcn9024_firmwarewsa8845hsa6150pwcd9326sm8650qqcm2290_firmwaresa8155p_firmwaresnapdragon_855\+sa8155pwsa8830snapdragon_870_5g_firmwaresm8550psa6145psnapdragon_x65_5g_firmwareqcn9074_firmwaresm7675_firmwaresa8255p_firmwaresnapdragon_888\+_5gsnapdragon_x75_5gsnapdragon_720gar8035sm7635_firmwareqamsrv1m_firmwaresa6155qrb5165m_firmwaresa8650p_firmwarewcn6450_firmwareqcm4325snapdragon_860snapdragon_8cx_gen_3_computesnapdragon_x72_5g_firmwaresrv1l_firmwareqcs9100_firmwareqcn6224snapdragon_782gqca6698aqwcn3950_firmwaresa7775p_firmwaressg2125p_firmwareqrb5165nsm6250sa8530p_firmwaresm7635fastconnect_6200sd670sm7325p_firmwaresa8145p_firmwaresd460wcd9378sm8635p_firmwareqdx1011sa8150p_firmwarefastconnect_6700_firmwaresnapdragon_768g_5gvideo_collaboration_vc3_platform_firmwarewcn3990snapdragon_778g_5g_firmwaresnapdragon_780g_5gsd670_firmwareqcs6490qcs8250snapdragon_778g\+_5gfastconnect_6200_firmwarear8031_firmwarewsa8830_firmwareqcn6224_firmwareqca6431qca6678aq_firmwarewsa8845_firmwarewsa8832sdx61_firmwarewcd9378_firmwaresrv1lsxr2130_firmwaresrv1msm7675pqca6678aqar8035_firmwareqrb5165msnapdragon_680_4g_firmwaresc8380xpsa4150p_firmwaresd888_firmwareqcs6125_firmwaresm4635snapdragon_460qcn9074wsa8815_firmwaresnapdragon_865_5gsa8195p_firmwareqca8337_firmwaresnapdragon_auto_4g_firmwaresnapdragon_665_firmwareqcm4290snapdragon_480_5g_firmwaresnapdragon_4_gen_1_firmwarear8031sg8275p_firmwaresnapdragon_xr2\+_gen_1snapdragon_x62_5gqcm6490_firmwaresnapdragon_685_4gsnapdragon_665snapdragon_w5\+_gen_1sm7250p_firmwaresm4635_firmwarewcn3999sa2150p_firmwaresm4125qcm4490_firmwareqru1032wcn3950qcs6125flight_rb5_5gsnapdragon_690_5g_firmwareqca6797aq_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_7c\+_gen_3_computetalynplus_firmwaresa8295p_firmwaresmart_audio_400_firmwaresnapdragon_855\+_firmwaresnapdragon_460_firmwaresa4155p_firmwaresm7250psm6250_firmwaresa8155snapdragon_768g_5g_firmwaresnapdragon_710_firmwareqca6584ausd888qcn6274_firmwarewcn6755_firmwareqcn9011_firmwareqru1062_firmwaresd460_firmwaresa2150psw5100_firmwarewcn6740wcn6650_firmwaresc8380xp_firmwareqru1062snapdragon_732gfastconnect_6800qfw7114_firmwaresnapdragon_662qcs7230qca6595_firmwarefastconnect_7800_firmwaresm8635_firmwarefastconnect_6900_firmwarerobotics_rb5_firmwarewcd9380sa6145p_firmwareqam8255psa6155_firmwaresxr2230psnapdragon_xr2_5gsa8150psxr2330pwcn6755snapdragon_888_5g_firmwaresnapdragon_8\+_gen_2_firmwaresnapdragon_765g_5gsnapdragon_auto_5g_modem-rf_firmwaresxr1230psd662_firmwarewcn7881sm6650sw5100video_collaboration_vc3_platformaqt1000c-v2x_9150_firmwareqca6688aqqam8295p_firmwaresd855qca6431_firmwaresnapdragon_8_gen_1_firmwaresnapdragon_8cx_gen_3_compute_firmwarewcn3990_firmwaresm7315snapdragon_750g_5gqca6698aq_firmwareqcs2290wcd9385qcn7606qsm8350qcs2290_firmwaresnapdragon_xr2\+_gen_1_firmwarewcn3999_firmwaresd662snapdragon_8_gen_1sa8255pqcs7230_firmwareqcs4290sxr1230p_firmwarewcd9390_firmwaresnapdragon_x62_5g_firmwaresnapdragon_8_gen_3qep8111_firmwareqca6430sg8275psnapdragon_782g_firmwaresnapdragon_855sdx55_firmwareqdx1011_firmwaresnapdragon_x55_5gsnapdragon_auto_5g_modem-rfflight_rb5_5g_firmwaressg2125pqru1052sxr2130qcm4490snapdragon_4_gen_1snapdragon_870_5gcsra6640_firmwareqamsrv1mrobotics_rb5snapdragon_480\+_5gqca6174a_firmwaresnapdragon_685_4g_firmwarewcn7861sm7325pqam8650p_firmwarevideo_collaboration_vc5_platformwcn7861_firmwareqca6420_firmwareaqt1000_firmwareqcs6490_firmwaresm6650_firmwaresnapdragon_480_5gqam8620psd855_firmwareqrb5165n_firmwareqca6436wcd9335_firmwarewcn3980_firmwarewsa8835wsa8840_firmwareqca6391_firmwareqca6584au_firmwareqcn6274qfw7124qdu1010_firmwareqca6595au_firmwaresw5100p_firmwareqca6696_firmwareqcs4290_firmwarewcd9380_firmwareqca6574_firmwarecsra6620qca8081wsa8815sg4150psd_8_gen1_5gqam8775psnapdragon_ar2_gen_1_firmwareqca6797aqsnapdragon_860_firmwaresnapdragon_x35_5gsnapdragon_730_firmwareqcm4325_firmwaresa8620pqca6574a_firmwaresdx55qcm4290_firmwaresnapdragon_8\+_gen_1_firmwaresd_8_gen1_5g_firmwaresnapdragon_8_gen_3_firmwaresa7775pqca6391snapdragon_ar1_gen_1_firmwaresnapdragon_w5\+_gen_1_firmwaresnapdragon_x75_5g_firmwarewcd9375_firmwareqcn9274_firmwareqcn9012_firmwareqcs5430_firmwaresg4150p_firmwareqru1052_firmwaresnapdragon_780g_5g_firmwarecsra6620_firmwaresa8770p_firmwaresa8295pqcs8550snapdragon_675fastconnect_7800sa8650pqam8775p_firmwaresd865_5g_firmwaresnapdragon_xr1wcd9375qca6688aq_firmwaresnapdragon_ar2_gen_1wcn3988_firmwareqamsrv1h_firmwaresm7675sa8145pwsa8835_firmwaressg2115p_firmwarewcn3980sm7675p_firmwareqdx1010Snapdragon
CWE ID-CWE-285
Improper Authorization
CVE-2020-11123
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 13.47%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 10:00
Updated-04 Aug, 2024 | 11:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

u'information disclosure in gatekeeper trustzone implementation as the throttling mechanism to prevent brute force attempts at getting user`s lock-screen password can be bypassed by performing the standard gatekeeper operations.' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8009W, APQ8017, APQ8037, APQ8053, APQ8064AU, APQ8096, APQ8096AU, APQ8096SG, APQ8098, MDM8207, MDM9150, MDM9205, MDM9206, MDM9207, MDM9250, MDM9607, MDM9628, MDM9640, MDM9650, MDM9655, MSM8108, MSM8208, MSM8209, MSM8608, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8996SG, MSM8998, QCM4290, QCS405, QCS410, QCS4290, QCS603, QCS605, QCS610, QM215, QSM8250, QSM8350, SA415M, SA515M, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SC8180X, SC8180XP, SDA429W, SDA640, SDA660, SDA670, SDA845, SDA855, SDM1000, SDM429, SDM429W, SDM439, SDM450, SDM455, SDM630, SDM632, SDM636, SDM640, SDM660, SDM670, SDM710, SDM712, SDM830, SDM845, SDM850, SDW2500, SDX24, SDX50M, SDX55, SDX55M, SM4125, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR1120, SXR1130, SXR2130, SXR2130P, WCD9330

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-mdm9150_firmwaresm7250mdm9640_firmwaresa6150p_firmwaresm6250p_firmwareqcs610sm6125sdm712_firmwaresdm640sdm450_firmwaresdm632sm7250_firmwaremdm9628_firmwaremdm9650qcs4290mdm9250sa8150p_firmwaresa6155apq8009_firmwaresdm712msm8917sdm670sm8350qcs605_firmwaresm6115apq8096sgsm7150psda845_firmwaremsm8108sa415msdw2500_firmwareapq8098msm8108_firmwaresm4250sc8180xpmdm9628sm4125mdm9206_firmwaresda855qsm8350_firmwareqsm8350apq8037sa8155msm8905_firmwaresda660sdx55_firmwaresa6155_firmwaresdm1000msm8909wsm7250p_firmwareapq8009w_firmwaresxr1130apq8053_firmwaresxr2130psda845mdm9207sa6155p_firmwaremsm8208sxr2130p_firmwaresda640mdm8207sdm450sdm636_firmwaresa515m_firmwareapq8098_firmwaremsm8998_firmwaresa8155_firmwaresdm630mdm9607_firmwaresm8250_firmwaremdm9655_firmwaresa415m_firmwareqcs405msm8996sg_firmwaresa6145p_firmwareqm215sc7180_firmwaresm4250_firmwaresm6250sa8195papq8017_firmwaresdm710_firmwaresdm830_firmwaresxr1120sa6155pqcs603_firmwaremsm8937msm8209_firmwaremsm8905sm8350p_firmwaremdm9250_firmwareqcs4290_firmwaresm8150_firmwaremsm8909sm7150p_firmwaresxr2130_firmwaremdm9655sc7180apq8064ausa8150psc8180xp_firmwaresm6250_firmwaremdm9207_firmwaremsm8953_firmwaresm6150_firmwaresda429wmsm8917_firmwaremsm8998sm7225_firmwaresm8150sdm850sa8195p_firmwaresdm640_firmwareapq8017msm8208_firmwaremsm8996sxr1120_firmwaresm6125_firmwaresm8150pmsm8608mdm9640sm6115_firmwaresda429w_firmwareapq8096_firmwaresdm429wmsm8996au_firmwaresdm632_firmwarewcd9330sdm845apq8096sdx24sdx55m_firmwaresdm439sm6150psm6115p_firmwaresdm429msm8940_firmwaresm7150_firmwaresm6150msm8909w_firmwaremsm8996ausdm429w_firmwareapq8096sg_firmwaresm7150sm6250pqcs410sda640_firmwaresc8180xsxr2130sdx50m_firmwaremdm9206sm8350psdm670_firmwaresdx24_firmwaresdm636sda670sm7225mdm9205sa515mqcs605sm6115psm4125_firmwaresdm455_firmwaremsm8937_firmwaremdm9650_firmwaresdm429_firmwaresxr1130_firmwaremsm8209sda855_firmwareapq8009wcd9330_firmwaremsm8909_firmwaresdx55msm6150p_firmwaresdm455sm6350sm7125sdm850_firmwaresm4250p_firmwaremsm8920msm8953apq8064au_firmwareqcm4290msm8996sgsdx50msm8350_firmwareqcs603sdm660msm8920_firmwaresc8180x_firmwaresm6350_firmwaresa8155p_firmwaresdm710mdm9607apq8009wsda670_firmwareqcm4290_firmwareqcs610_firmwaremdm9150msm8996_firmwareqsm8250sa6145psm4250papq8096ausdm439_firmwareqcs405_firmwaremdm8207_firmwaresdm630_firmwaremdm9205_firmwaresda660_firmwaremsm8608_firmwareqm215_firmwaresm7125_firmwaresa6150psdw2500msm8940apq8053apq8096au_firmwaresa8155psdx55sm8150p_firmwaresm8250apq8037_firmwaresdm1000_firmwaresm7250psdm830qcs410_firmwaresdm660_firmwareqsm8250_firmwaresdm845_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CVE-2023-28563
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.05% / 16.96%
||
7 Day CHG~0.00%
Published-07 Nov, 2023 | 05:26
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in IOE Firmware

Information disclosure in IOE Firmware while handling WMI command.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sw5100pqcs410_firmwaresa6150p_firmwaresxr1120vision_intelligence_300_platformqcn9000_firmwareqca6595snapdragon_xr1_platformqcn9022qcs610_firmwareipq6028_firmwareimmersive_home_214_platformqca8081_firmwareqca9558qfe1922wcd9335wcd9370snapdragon_x50_5g_modem-rf_systemqca4004qca6696wcd9340_firmwarewcd9341_firmwareipq5028_firmwaresnapdragon_730_mobile_platformqcn6024ar9380ipq8076fastconnect_6700ipq6018_firmwareqca9984_firmwareqcn6023snapdragon_768g_5g_mobile_platform_firmwaresa4150pqcn5124_firmwarewsa8832_firmwareimmersive_home_216_platformqca9994_firmwareqcn7605snapdragon_460_mobile_platformipq6000snapdragon_auto_4g_modemqcn5064_firmwareqca6574au_firmwareipq8078aqcn7606_firmwareipq8078a_firmwareqam8295pwcd9341qca6574auwsa8810_firmwaresd730_firmwarecsra6640snapdragon_8cx_gen_2_5g_compute_platformqcn9100_firmwareqfe1922_firmwareqcn5122sd730snapdragon_730g_mobile_platform_firmwareqca6554afastconnect_6800_firmwareqcn6024_firmwareipq8072_firmwaresnapdragon_4_gen_2_mobile_platform_firmwareqca9886_firmwaresnapdragon_695_5g_mobile_platformsnapdragon_4_gen_1_mobile_platform_firmwarevideo_collaboration_vc1_platform_firmwaresa4155pqca9880qcm6125_firmwareqcn9000qca9882_firmwaresnapdragon_8cx_compute_platform_firmwareqcn6132_firmwaresnapdragon_480\+_5g_mobile_platform_firmwaresxr1120_firmwaresnapdragon_695_5g_mobile_platform_firmwareqfe1952_firmwarefastconnect_6900snapdragon_765g_5g_mobile_platformvideo_collaboration_vc1_platformqcn5052qca9980wcd9385_firmwaresnapdragon_x55_5g_modem-rf_systemqca6310qam8255p_firmwareipq8064sa8155_firmwareipq8074a_firmwareipq8076awcd9360qcn5164qcs4490snapdragon_7c_compute_platformsnapdragon_685_4g_mobile_platformsa6155pqcm6125qca6564au_firmwaresd820snapdragon_768g_5g_mobile_platformqca8075csr8811_firmwarewsa8810qam8650pqca9561qca6595auwcd9326_firmwaresa6155p_firmwaremdm9640_firmwareqca9986_firmwareqcn9012qca9531_firmwareipq8070a_firmwareqcn9070mdm9650_firmwaresnapdragon_7c_compute_platform_firmwarewcd9371_firmwareqcs4490_firmwarewcn3910_firmwaresm4125_firmwaresnapdragon_855\+\/860_mobile_platform_firmwareqca6420snapdragon_7c_gen_2_compute_platform_firmwarewcn3910wcd9370_firmwarecsrb31024qca9531snapdragon_x55_5g_modem-rf_system_firmwaresnapdragon_750g_5g_mobile_platform_firmwaresnapdragon_660_mobile_platformqca6574aqca6174asa8195pqca9898_firmwarewcd9340snapdragon_820_automotive_platform_firmwareimmersive_home_316_platform_firmwareqcn6122_firmwareqcn5154_firmwareipq8074qca7500wcn3988ipq4019qcn5122_firmwareqcn9024ipq8076a_firmwaresnapdragon_460_mobile_platform_firmwareqca6574ar9380_firmwaresnapdragon_8cx_compute_platformhome_hub_100_platformsd675_firmwareqca6430_firmwareipq4029_firmwareqcn9024_firmwaresa6150pwcd9326qcs410sa8155p_firmwareqca6564asa8155pwsa8830snapdragon_675_mobile_platformqcn5550_firmwaresnapdragon_662_mobile_platformsa6145pqca1023_firmwareqcn9074_firmwarevision_intelligence_400_platform_firmwareipq8174sc8180x\+sdx55_firmwaresnapdragon_765_5g_mobile_platformqcn6122sa8255p_firmwareipq8174_firmwaresnapdragon_665_mobile_platformar8035ipq8072amsm8996auqca9558_firmwaresa6155snapdragon_678_mobile_platform_firmwareqca9987_firmwareqcm4325qca9985qfe1952ipq8071asc8180x\+sdx55qca6698aqwcn3950_firmwaresnapdragon_7c_gen_2_compute_platformsm6250snapdragon_8c_compute_platform_firmwarefastconnect_6200snapdragon_710_mobile_platformsd670sa8145p_firmwaresd460snapdragon_730g_mobile_platformsnapdragon_8cx_gen_2_5g_compute_platform_firmwarewcd9360_firmwareqca4010_firmwaresmart_audio_400_platformsnapdragon_855\+\/860_mobile_platformsa8150p_firmwaresnapdragon_w5\+_gen_1_wearable_platformfastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwarewcn3990qcn6023_firmwareqcn5164_firmwareqca6428_firmwaresd670_firmwaresnapdragon_680_4g_mobile_platform_firmwareipq8078snapdragon_712_mobile_platform_firmwareqca6438_firmwaresnapdragon_750g_5g_mobile_platformfastconnect_6200_firmwareqcn9072ar8031_firmwareqca9982ipq4028_firmwarewsa8830_firmwaresd660_firmwarewsa8832snapdragon_auto_4g_modem_firmwareqca9880_firmwareipq8071snapdragon_675_mobile_platform_firmwarear8035_firmwaresnapdragon_730_mobile_platform_firmwareqcn5022_firmwareqca9992snapdragon_w5\+_gen_1_wearable_platform_firmwareqca6320sa4150p_firmwareqca4024_firmwareqca9898snapdragon_712_mobile_platformsnapdragon_662_mobile_platform_firmwareqca9982_firmwareqca6564auqcs6125_firmwareqca9992_firmwareqca6428qca9990ipq8070sm6250p_firmwareqcn9074immersive_home_214_platform_firmwarewsa8815_firmwaresa8195p_firmwareqca9888snapdragon_680_4g_mobile_platformar8031qca9377_firmwareipq8173ipq8072a_firmwaresnapdragon_8c_compute_platformsm7250p_firmwarewcn3999sm4125ipq6010_firmwareqcm4490_firmwaresnapdragon_855_mobile_platformwcn3950qcs6125qca6797aq_firmwaresnapdragon_765g_5g_mobile_platform_firmwaresnapdragon_670_mobile_platform_firmwareipq5028qca9986qcn9070_firmwareqca4004_firmwaresnapdragon_710_mobile_platform_firmwaresa8295p_firmwareqca9987sd_675_firmwaresa4155p_firmwareqca9984ipq5010_firmwareqcn9022_firmwaresnapdragon_720g_mobile_platformsm7250pcsrb31024_firmwareipq6018sa8155sd_8cx_firmwareqca9886qcn6132sm6250_firmwareqca6584auqca6320_firmwaresd460_firmwaresnapdragon_4_gen_2_mobile_platformipq8069sw5100_firmwaresnapdragon_765_5g_mobile_platform_firmwareipq8065qca6310_firmwarefastconnect_6800qca4024qca6595_firmwaresnapdragon_685_4g_mobile_platform_firmwarewcd9371immersive_home_216_platform_firmwareipq8070afastconnect_6900_firmwarewcd9380ipq4028qam8255psa6145p_firmwaresnapdragon_732g_mobile_platform_firmwaresa6155_firmwareqca9990_firmwaresnapdragon_4_gen_1_mobile_platformqca7500_firmwarehome_hub_100_platform_firmwaresa8150pqca8075_firmwarevision_intelligence_300_platform_firmwaresnapdragon_665_mobile_platform_firmwaremsm8996au_firmwareqcn5052_firmwaresnapdragon_auto_5g_modem-rf_firmwareipq8072sd662_firmwareipq6010sw5100video_collaboration_vc3_platformaqt1000qca9980_firmwareqca9985_firmwareqam8295p_firmwaresd855qca4010wcn3990_firmwareqca6698aq_firmwareqca6564a_firmwarewcd9385qcn7606qca9994wcn3999_firmwaresd662qcn7605_firmwaresnapdragon_678_mobile_platformsa8255psnapdragon_720g_mobile_platform_firmwareimmersive_home_318_platform_firmwareipq4018qcn5024snapdragon_690_5g_mobile_platformsd820_firmwareqca6430sm6250pmdm9650sdx55_firmwareipq8071a_firmwaresnapdragon_auto_5g_modem-rfqca6438qca9561_firmwareipq4019_firmwareqca6554a_firmwareqca9882ipq6028qcm4490csra6640_firmwareqcn9100ipq4029qca6174a_firmwareqam8650p_firmwaresnapdragon_855_mobile_platform_firmwareqca6420_firmwareaqt1000_firmwareipq4018_firmwareipq8076_firmwaresd855_firmwarewcd9335_firmwaremdm9640wcn3980_firmwareqca6584au_firmwareqcn5152_firmwarewsa8835snapdragon_480_5g_mobile_platform_firmwareqca6391_firmwareipq8074_firmwareqca6595au_firmwaresw5100p_firmwaresnapdragon_732g_mobile_platformipq8068qca6696_firmwarewcd9380_firmwareqca6574_firmwarecsra6620qca8081sd660wsa8815sg4150pqcn5124qam8775pqca9377ipq8064_firmwareqca6797aqqcn5152ipq8065_firmwareqcm4325_firmwarevision_intelligence_400_platformipq8069_firmwareqca6574a_firmwaresdx55qcn9072_firmwaresnapdragon_480\+_5g_mobile_platformqca9888_firmwareipq8074aimmersive_home_318_platformqca9889sd675qcn5024_firmwarewcd9375_firmwareqca6391ipq5010qca9887_firmwaresmart_audio_400_platform_firmwareipq8173_firmwareqcn5064sg4150p_firmwaresnapdragon_480_5g_mobile_platformqcn9012_firmwaresnapdragon_670_mobile_platformcsra6620_firmwaresnapdragon_xr1_platform_firmwaresa8295psnapdragon_x50_5g_modem-rf_system_firmwareipq8068_firmwareipq6000_firmwareqam8775p_firmwarewcd9375ipq8078_firmwareqca9887qca9889_firmwareqcn5550wcn3988_firmwareipq8071_firmwareipq8070_firmwaresa8145pqca1023immersive_home_316_platformsd_675qcn5154sd_8cxwsa8835_firmwarecsr8811qcn5022snapdragon_660_mobile_platform_firmwarewcn3980snapdragon_820_automotive_platformsnapdragon_690_5g_mobile_platform_firmwareqcs610Snapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2023-28566
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.06% / 17.45%
||
7 Day CHG~0.00%
Published-07 Nov, 2023 | 05:26
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in WLAN HAL

Information disclosure in WLAN HAL while handling the WMI state info command.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sw5100pqcs410_firmwaresa6150p_firmwaresd660_firmwaresnapdragon_850_mobile_compute_platform_firmwaresxr1120snapdragon_auto_4g_modem_firmwarevision_intelligence_300_platformwsa8832qca6595snapdragon_xr1_platformqcs610_firmwarewcd9335wcd9370snapdragon_675_mobile_platform_firmwaresnapdragon_730_mobile_platform_firmwareqca6696snapdragon_x50_5g_modem-rf_systemwcd9340_firmwarewcd9341_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwareqca6320snapdragon_730_mobile_platformsnapdragon_712_mobile_platformsnapdragon_662_mobile_platform_firmwarefastconnect_6700qca6564auqcs6125_firmwaresm6250p_firmwaresnapdragon_768g_5g_mobile_platform_firmwarewsa8815_firmwarewsa8832_firmwaresa8195p_firmwaresnapdragon_680_4g_mobile_platformqcn7605snapdragon_460_mobile_platformsnapdragon_auto_4g_modemqca6574au_firmwaresnapdragon_8c_compute_platformqcn7606_firmwaresm7250p_firmwaresm4125wcd9341qcm4490_firmwareqca6574aurobotics_rb3_platform_firmwaresnapdragon_855_mobile_platformwcn3950wsa8810_firmwaresd730_firmwareqcs6125snapdragon_8cx_gen_2_5g_compute_platformsnapdragon_835_mobile_pc_platform_firmwaresnapdragon_765g_5g_mobile_platform_firmwaresd730snapdragon_670_mobile_platform_firmwaresnapdragon_730g_mobile_platform_firmwareqca6554afastconnect_6800_firmwaresnapdragon_710_mobile_platform_firmwaresd_675_firmwaresd835_firmwaresnapdragon_720g_mobile_platformsnapdragon_4_gen_2_mobile_platform_firmwaresm6250_firmwarecsrb31024_firmwaresa8155sd_8cx_firmwarevideo_collaboration_vc1_platform_firmwaresm7250psnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_695_5g_mobile_platformqcm6125_firmwaresnapdragon_845_mobile_platform_firmwareqca6584auqca6320_firmwaresnapdragon_850_mobile_compute_platformsd460_firmwaresnapdragon_4_gen_2_mobile_platformsnapdragon_8cx_compute_platform_firmwaresw5100_firmwaresnapdragon_765_5g_mobile_platform_firmwaresnapdragon_480\+_5g_mobile_platform_firmwaresxr1120_firmwareqca6310_firmwaresnapdragon_695_5g_mobile_platform_firmwarefastconnect_6800robotics_rb3_platformqca6595_firmwaresnapdragon_685_4g_mobile_platform_firmwarefastconnect_6900snapdragon_765g_5g_mobile_platformvideo_collaboration_vc1_platformwcd9371wcd9385_firmwaresnapdragon_x55_5g_modem-rf_systemfastconnect_6900_firmwareqca6310wcd9380sa6145p_firmwaresa6155_firmwaresa8155_firmwaresnapdragon_732g_mobile_platform_firmwarewcd9360snapdragon_4_gen_1_mobile_platformqca6335sa8150pqcs4490snapdragon_7c_compute_platformvision_intelligence_300_platform_firmwaresnapdragon_665_mobile_platform_firmwaresnapdragon_685_4g_mobile_platformsa6155pqcm6125snapdragon_835_mobile_pc_platformsnapdragon_auto_5g_modem-rf_firmwareqca6564au_firmwaresnapdragon_768g_5g_mobile_platformwsa8810sd662_firmwaresw5100video_collaboration_vc3_platformqca6595auaqt1000wcd9326_firmwaresa6155p_firmwaresd855sd835wcn3990_firmwarewcd9385qcn7606wcd9371_firmwareqcs4490_firmwaresnapdragon_7c_compute_platform_firmwaresd662qcn7605_firmwarewcn3910_firmwaresnapdragon_678_mobile_platformsm4125_firmwaresnapdragon_720g_mobile_platform_firmwaresnapdragon_855\+\/860_mobile_platform_firmwareqca6420snapdragon_7c_gen_2_compute_platform_firmwaresnapdragon_690_5g_mobile_platformwcn3910qca6430sm6250pwcd9370_firmwarecsrb31024sdx55_firmwaresnapdragon_auto_5g_modem-rfsnapdragon_845_mobile_platformsnapdragon_750g_5g_mobile_platform_firmwaresnapdragon_x55_5g_modem-rf_system_firmwareqca6554a_firmwaresnapdragon_660_mobile_platformqca6574aqcm4490sa8195pwcd9340qca6335_firmwaresnapdragon_855_mobile_platform_firmwareqca6420_firmwareaqt1000_firmwarewcn3988qca6584au_firmwaresd855_firmwaresnapdragon_460_mobile_platform_firmwareqca6574snapdragon_480_5g_mobile_platform_firmwarewcd9335_firmwarewcn3980_firmwareqca6595au_firmwareqca6391_firmwaresd675_firmwaresnapdragon_8cx_compute_platformwsa8835qca6430_firmwaresw5100p_firmwaresnapdragon_732g_mobile_platformqca6696_firmwarewcd9380_firmwaresa6150pqca6574_firmwarewcd9326qcs410sa8155p_firmwarewsa8815sd660sg4150psa8155psnapdragon_675_mobile_platformwsa8830snapdragon_662_mobile_platformsa6145pqcm4325_firmwaresnapdragon_765_5g_mobile_platformsc8180x\+sdx55_firmwarevision_intelligence_400_platform_firmwarevision_intelligence_400_platformsnapdragon_665_mobile_platformqca6574a_firmwaresdx55snapdragon_750g_5g_mobile_platformsnapdragon_480\+_5g_mobile_platformsa6155snapdragon_678_mobile_platform_firmwareqcm4325sd675wcd9375_firmwareqca6391snapdragon_712_mobile_platform_firmwaresc8180x\+sdx55snapdragon_7c_gen_2_compute_platformsg4150p_firmwaresm6250snapdragon_480_5g_mobile_platformsnapdragon_670_mobile_platformsnapdragon_xr1_platform_firmwaresnapdragon_8c_compute_platform_firmwarewcn3950_firmwaresnapdragon_x50_5g_modem-rf_system_firmwarefastconnect_6200sd670snapdragon_710_mobile_platformsa8145p_firmwaresd460snapdragon_730g_mobile_platformsnapdragon_8cx_gen_2_5g_compute_platform_firmwarewcd9360_firmwarewcd9375sa8150p_firmwaresnapdragon_855\+\/860_mobile_platformsnapdragon_w5\+_gen_1_wearable_platformwcn3988_firmwarefastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwaresa8145psd_675wcn3990sd_8cxwsa8835_firmwaresd670_firmwaresnapdragon_680_4g_mobile_platform_firmwaresnapdragon_660_mobile_platform_firmwarewcn3980snapdragon_690_5g_mobile_platform_firmwarefastconnect_6200_firmwarewsa8830_firmwareqcs610Snapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2023-28571
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.03% / 7.23%
||
7 Day CHG~0.00%
Published-03 Oct, 2023 | 05:00
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in WLAN HOST

Information disclosure in WLAN HOST while processing the WLAN scan descriptor list during roaming scan.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6431qca6678aq_firmwareqcs410_firmwaresa6150p_firmwaresd865_5gsw5100pwsa8845_firmwaresnapdragon_auto_4g_modem_firmwareqcc2076_firmwareqca6595qcs610_firmwarewcd9335sxr2130_firmwarewcd9370qca6678aqqca6696wcd9340_firmwarewcd9341_firmwaresm8250-ab_firmwareqca63208998snapdragon_w5\+_gen_1_wearable_platform_firmwarewcd9395_firmwareqca6390qcc2073_firmwareqca6426qca6564auqcn9074wsa8815_firmwaresa8195p_firmwaresm8250-abqca6426_firmwarewcd9395snapdragon_auto_4g_modemqca6574au_firmwarewcn785x-5qam8295pwcd9341qca6574auwcd9390wcn785x-5_firmwarewcn3950wsa8810_firmwaresnapdragon_xr2_5g_platformwsa8845h_firmwareqca6797aq_firmwareqca6554asa8295p_firmwaresd835_firmwarecsrb31024_firmwarevideo_collaboration_vc1_platform_firmwareqca6584auqca6320_firmwaresw5100_firmwarewcn685x-5qca6310_firmwareqca6595_firmwaresm8250-acs820avideo_collaboration_vc1_platformsm8250_firmwarewcd9385_firmwareqca6421snapdragon_x55_5g_modem-rf_systemqca6310qam8255p_firmwarewcd9380sa6145p_firmwareqam8255psnapdragon_xr2_5g_platform_firmwaresa8150psnapdragon_8\+_gen_2_mobile_platform_firmwarewsa8845msm8996au_firmwaresa6155pqca6421_firmwaresnapdragon_auto_5g_modem-rf_firmwareqca6564au_firmwarewsa8810snapdragon_8\+_gen_2_mobile_platformsw5100qca6595auvideo_collaboration_vc3_platformsa6155p_firmwarewsa8840qam8295p_firmwareqca6390_firmwareqca6431_firmwaresd835wcn3990_firmwareqca6175a_firmwareqca6564a_firmwareqca6436_firmwareqca6698aq_firmware8998_firmwarewcd9385mdm9650_firmwaresnapdragon_8_gen_2_mobile_platformsa8255pwcd9390_firmwaresm8250-ac_firmwareapq8064au_firmwarewcd9370_firmwarecsrb31024mdm9650snapdragon_auto_5g_modem-rfsnapdragon_x55_5g_modem-rf_system_firmwareqcc2076qca6554a_firmwareqca6574asxr2130sa8195p8098_firmwarewcd9340sm8550p_firmwarewcn3988qca6584au_firmwarewcd9335_firmwarewcn3980_firmwareqca6436qca6574wsa8835qca6595au_firmwareqca6391_firmwarewsa8840_firmwaresw5100p_firmwaresm8250qca6696_firmwarewsa8845hwcd9380_firmwaresa6150pqca6574_firmwareqcs410sa8155p_firmwarewsa8815qca6564asa8155pwsa8830qca6797aqsm8550psa6145pqcn9074_firmwaresa8255p_firmwarewcn785x-1_firmwareqca6574a_firmwareqcc2073msm8996auqca6175aqca6391wcn785x-1apq8064auqca6698aqwcn3950_firmwaresnapdragon_8_gen_2_mobile_platform_firmwaresa8295p8098wcn685x-1sa8145p_firmwaresd865_5g_firmwarewcn685x-5_firmwaresa8150p_firmwares820a_firmwaresnapdragon_w5\+_gen_1_wearable_platformwcn3988_firmwarevideo_collaboration_vc3_platform_firmwaresa8145pwcn3990wsa8835_firmwarewcn3980wsa8830_firmwarewcn685x-1_firmwareqcs610Snapdragon
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-126
Buffer Over-read
CVE-2023-28569
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.05% / 16.96%
||
7 Day CHG~0.00%
Published-07 Nov, 2023 | 05:26
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in WLAN HAL

Information disclosure in WLAN HAL while handling command through WMI interfaces.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sw5100pqcs410_firmwaresa6150p_firmwaresxr1120vision_intelligence_300_platformqcn9000_firmwareqca6595snapdragon_xr1_platformqcn9022qcs610_firmwareipq6028_firmwareimmersive_home_214_platformqca8081_firmwarewcd9335wcd9370snapdragon_x50_5g_modem-rf_systemqca6696wcd9340_firmwarewcd9341_firmwareipq5028_firmwaresnapdragon_730_mobile_platformqcn6024ar9380ipq8076fastconnect_6700ipq6018_firmwareqca9984_firmwareqcn6023snapdragon_768g_5g_mobile_platform_firmwaresa4150pqcn5124_firmwarewsa8832_firmwareimmersive_home_216_platformqca9994_firmwareqcn7605snapdragon_460_mobile_platformipq6000snapdragon_auto_4g_modemqcn5064_firmwareqca6574au_firmwareipq8078aqcn7606_firmwareipq8078a_firmwareqam8295pwcd9341qca6574auwsa8810_firmwaresd730_firmwaresnapdragon_8cx_gen_2_5g_compute_platformqcn9100_firmwaresnapdragon_835_mobile_pc_platform_firmwareqcn5122sd730snapdragon_730g_mobile_platform_firmwareqca6554afastconnect_6800_firmwaresd835_firmwareqcn6024_firmwareipq8072_firmwaresnapdragon_4_gen_2_mobile_platform_firmwareqca9886_firmwaresnapdragon_695_5g_mobile_platformsnapdragon_4_gen_1_mobile_platform_firmwarevideo_collaboration_vc1_platform_firmwaresa4155pqca9880qcm6125_firmwareqcn9000snapdragon_850_mobile_compute_platformsnapdragon_8cx_compute_platform_firmwareqcn6132_firmwaresnapdragon_480\+_5g_mobile_platform_firmwaresxr1120_firmwaresnapdragon_695_5g_mobile_platform_firmwarerobotics_rb3_platformfastconnect_6900snapdragon_765g_5g_mobile_platformvideo_collaboration_vc1_platformqcn5052qca9980wcd9385_firmwaresnapdragon_x55_5g_modem-rf_systemqca6310qam8255p_firmwareipq8064sa8155_firmwareipq8074a_firmwareipq8076awcd9360qcn5164qca6335qcs4490snapdragon_7c_compute_platformsnapdragon_685_4g_mobile_platformsa6155pqcm6125qca6564au_firmwaresnapdragon_768g_5g_mobile_platformcsr8811_firmwareqca8075wsa8810qam8650pqca6595auwcd9326_firmwaresa6155p_firmwaresd835qca9986_firmwareqcn9012ipq8070a_firmwareqcn9070wcd9371_firmwaresnapdragon_7c_compute_platform_firmwareqcs4490_firmwarewcn3910_firmwaresm4125_firmwaresnapdragon_855\+\/860_mobile_platform_firmwareqca6420snapdragon_7c_gen_2_compute_platform_firmwarewcn3910wcd9370_firmwarecsrb31024snapdragon_845_mobile_platformsnapdragon_x55_5g_modem-rf_system_firmwaresnapdragon_750g_5g_mobile_platform_firmwareqca6574asa8195pqca9898_firmwarewcd9340qca6335_firmwareimmersive_home_316_platform_firmwareqcn6122_firmwareqcn5154_firmwareipq8074qca7500wcn3988ipq4019qcn5122_firmwareqcn9024ipq8076a_firmwaresnapdragon_460_mobile_platform_firmwareqca6574ar9380_firmwaresnapdragon_8cx_compute_platformsd675_firmwareqca6430_firmwareipq4029_firmwareqcn9024_firmwaresa6150pwcd9326qcs410sa8155p_firmwaresa8155pwsa8830snapdragon_675_mobile_platformqcn5550_firmwaresnapdragon_662_mobile_platformsa6145pqcn9074_firmwarevision_intelligence_400_platform_firmwareipq8174sc8180x\+sdx55_firmwaresnapdragon_765_5g_mobile_platformqcn6122sa8255p_firmwareipq8174_firmwaresnapdragon_665_mobile_platformipq8072asa6155snapdragon_678_mobile_platform_firmwareqca9987_firmwareqcm4325qca9985ipq8071asc8180x\+sdx55qca6698aqwcn3950_firmwaresnapdragon_7c_gen_2_compute_platformsm6250snapdragon_8c_compute_platform_firmwarefastconnect_6200snapdragon_710_mobile_platformsd670sa8145p_firmwaresd460snapdragon_730g_mobile_platformsnapdragon_8cx_gen_2_5g_compute_platform_firmwarewcd9360_firmwaresa8150p_firmwaresnapdragon_855\+\/860_mobile_platformsnapdragon_w5\+_gen_1_wearable_platformfastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwarewcn3990qcn6023_firmwareqcn5164_firmwareqca6428_firmwaresd670_firmwaresnapdragon_680_4g_mobile_platform_firmwareipq8078snapdragon_712_mobile_platform_firmwareqca6438_firmwaresnapdragon_750g_5g_mobile_platformfastconnect_6200_firmwareqcn9072wsa8830_firmwareipq4028_firmwaresnapdragon_850_mobile_compute_platform_firmwarewsa8832snapdragon_auto_4g_modem_firmwareqca9880_firmwareipq8071snapdragon_675_mobile_platform_firmwaresnapdragon_730_mobile_platform_firmwareqcn5022_firmwareqca9992snapdragon_w5\+_gen_1_wearable_platform_firmwareqca6320sa4150p_firmwareqca4024_firmwareqca9898snapdragon_712_mobile_platformsnapdragon_662_mobile_platform_firmwareqca6564auqcs6125_firmwareqca9992_firmwareqca6428qca9990ipq8070sm6250p_firmwareqcn9074immersive_home_214_platform_firmwarewsa8815_firmwaresa8195p_firmwareqca9888snapdragon_680_4g_mobile_platformipq8173ipq8072a_firmwaresnapdragon_8c_compute_platformsm7250p_firmwaresm4125ipq6010_firmwareqcm4490_firmwaresnapdragon_855_mobile_platformrobotics_rb3_platform_firmwarewcn3950qcs6125qca6797aq_firmwaresnapdragon_765g_5g_mobile_platform_firmwaresnapdragon_670_mobile_platform_firmwareipq5028qca9986qcn9070_firmwaresnapdragon_710_mobile_platform_firmwaresa8295p_firmwareqca9987sd_675_firmwaresa4155p_firmwareqca9984ipq5010_firmwareqcn9022_firmwaresnapdragon_720g_mobile_platformsm7250pcsrb31024_firmwareipq6018sa8155sd_8cx_firmwareqca9886qcn6132sm6250_firmwaresnapdragon_845_mobile_platform_firmwareqca6584auqca6320_firmwaresd460_firmwaresnapdragon_4_gen_2_mobile_platformipq8069sw5100_firmwaresnapdragon_765_5g_mobile_platform_firmwareipq8065qca6310_firmwarefastconnect_6800qca4024qca6595_firmwaresnapdragon_685_4g_mobile_platform_firmwarewcd9371immersive_home_216_platform_firmwareipq8070afastconnect_6900_firmwarewcd9380ipq4028qam8255psa6145p_firmwaresnapdragon_732g_mobile_platform_firmwaresa6155_firmwareqca9990_firmwaresnapdragon_4_gen_1_mobile_platformqca7500_firmwaresa8150pqca8075_firmwarevision_intelligence_300_platform_firmwaresnapdragon_665_mobile_platform_firmwareqcn5052_firmwaresnapdragon_835_mobile_pc_platformsnapdragon_auto_5g_modem-rf_firmwareipq8072sd662_firmwareipq6010sw5100video_collaboration_vc3_platformaqt1000qca9980_firmwareqca9985_firmwareqam8295p_firmwaresd855wcn3990_firmwareqca6698aq_firmwarewcd9385qca9994qcn7606sd662qcn7605_firmwaresnapdragon_678_mobile_platformsa8255psnapdragon_720g_mobile_platform_firmwareimmersive_home_318_platform_firmwareipq4018qcn5024snapdragon_690_5g_mobile_platformqca6430sm6250psdx55_firmwareipq8071a_firmwaresnapdragon_auto_5g_modem-rfqca6438ipq4019_firmwareqca6554a_firmwareipq6028qcm4490qcn9100ipq4029qam8650p_firmwaresnapdragon_855_mobile_platform_firmwareqca6420_firmwareaqt1000_firmwareipq4018_firmwareipq8076_firmwaresd855_firmwarewcd9335_firmwarewcn3980_firmwareqca6584au_firmwareqcn5152_firmwaresnapdragon_480_5g_mobile_platform_firmwarewsa8835ipq8074_firmwareqca6391_firmwareqca6595au_firmwaresw5100p_firmwaresnapdragon_732g_mobile_platformipq8068qca6696_firmwarewcd9380_firmwareqca6574_firmwareqca8081wsa8815sg4150pqcn5124qam8775pipq8064_firmwareqca6797aqqcn5152ipq8065_firmwareqcm4325_firmwarevision_intelligence_400_platformipq8069_firmwareqca6574a_firmwaresdx55qcn9072_firmwaresnapdragon_480\+_5g_mobile_platformqca9888_firmwareipq8074aimmersive_home_318_platformqca9889sd675qcn5024_firmwarewcd9375_firmwareqca6391ipq5010ipq8173_firmwareqcn9012_firmwareqcn5064sg4150p_firmwaresnapdragon_480_5g_mobile_platformsnapdragon_670_mobile_platformsnapdragon_xr1_platform_firmwaresa8295psnapdragon_x50_5g_modem-rf_system_firmwareipq8068_firmwareipq6000_firmwareqam8775p_firmwarewcd9375ipq8078_firmwareqca9889_firmwareqcn5550wcn3988_firmwareipq8071_firmwareipq8070_firmwaresa8145psd_675immersive_home_316_platformqcn5154sd_8cxwsa8835_firmwarecsr8811qcn5022wcn3980snapdragon_690_5g_mobile_platform_firmwareqcs610Snapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2023-28554
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.06% / 17.45%
||
7 Day CHG~0.00%
Published-07 Nov, 2023 | 05:26
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in Qualcomm IPC

Information Disclosure in Qualcomm IPC while reading values from shared memory in VM.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sw5100pqcs410_firmwaresa6150p_firmwaresd865_5gqcn9000_firmwareqcs8155_firmwareqca6595qcn9022qcs610_firmwarewcd9335ipq6028_firmwareimmersive_home_214_platformqca8081_firmwarewcd9370qca8072qca6696wcd9340_firmwarewcd9341_firmwareipq5028_firmwareqcn6024ar9380ipq8076qca6426wcn3610ipq6018_firmwareqca9984_firmwareqcn6023qcn5124_firmwareimmersive_home_216_platformqca8337qca9994_firmwareqca6426_firmwareipq8078aqca6574au_firmwareipq8078a_firmwareqam8295pwcd9341qca6574auwsa8810_firmwareqcn9100_firmwaresnapdragon_835_mobile_pc_platform_firmwarewcn3660b_firmwareqcn5122qca6554afastconnect_6800_firmwaresd835_firmwareqcn6024_firmwareqca9886_firmwarevideo_collaboration_vc1_platform_firmwareqca9880snapdragon_210_processor_firmwarec-v2x_9150qcn9000qcn6132_firmwareqsm8250_firmwareqcn5054fastconnect_6900video_collaboration_vc1_platformqcn5052qca9980wcd9385_firmwaresnapdragon_x55_5g_modem-rf_systemqca6310qam8255p_firmwareipq8064ipq8074a_firmwareipq8076aqcn5164snapdragon_888_5g_mobile_platform_firmwaresnapdragon_8_gen_1_mobile_platform_firmwaresa6155pqca6564au_firmwarecsr8811_firmwarewsa8810qca8075qcn5021qsm8250qca6595ausa6155p_firmwaresd835snapdragon_870_5g_mobile_platform_firmwareqca6436_firmwaresnapdragon_wear_4100\+_platform_firmwareipq8070a_firmwareqcn5021_firmwareqcn9070qualcomm_205_mobile_platformsnapdragon_855\+\/860_mobile_platform_firmwaresnapdragon_212_mobile_platform_firmwareqca6420wcd9370_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcn3660bqca6574asa8195pqca9898_firmwarewcd9340immersive_home_316_platform_firmwareqcn6122_firmwareqcn5154_firmwareqca7500wcn3988ipq4019qcn5122_firmwarepmp8074qcn9024ipq8076a_firmwareqca6574ar9380_firmwareqca6430_firmwaresnapdragon_870_5g_mobile_platformipq4029_firmwareqcn9024_firmwaresa6150pqcs410sa8155p_firmwaresa8155pqca8072_firmwarewsa8830sa6145pqcn9074_firmwareipq8174qcn6122ipq8174_firmwaresa8255p_firmwareipq8072aqca9985ipq8071aqca6698aqwcn3950_firmwaresnapdragon_8_gen_1_mobile_platformfastconnect_6200wcn3680bsa8145p_firmwareqcs8155snapdragon_888\+_5g_mobile_platformsa8150p_firmwaresnapdragon_855\+\/860_mobile_platformsnapdragon_w5\+_gen_1_wearable_platformwcn3990video_collaboration_vc3_platform_firmwareqcn6023_firmwareqcn5164_firmwareipq8078fastconnect_6200_firmwarewsa8830_firmwareqcn9072ipq4028_firmwareqca9880_firmwaresxr2130_firmwareqcn5022_firmwareqca9992snapdragon_888_5g_mobile_platformsnapdragon_w5\+_gen_1_wearable_platform_firmwareqca6320qca4024_firmwareqca9898qca6564auqca9992_firmwareqca9990immersive_home_214_platform_firmwareqcn9074wsa8815_firmwaresa8195p_firmwareqca8337_firmwareqcn5054_firmwareqca9888ipq8173ipq8072a_firmwareipq6010_firmwaresnapdragon_855_mobile_platformwcn3950snapdragon_xr2_5g_platformqca6797aq_firmwareipq5028qcn9070_firmwaresa8295p_firmwareqca9984ipq5010_firmwareqca9886qcn6132qcn9022_firmwareipq6018qca6584auqca6320_firmwaresw5100_firmwareipq8065qca6310_firmwarefastconnect_6800qca4024qca6595_firmwarefastconnect_7800_firmwareimmersive_home_216_platform_firmwareipq8070afastconnect_6900_firmwarewcd9380ipq4028qam8255psa6145p_firmwareqca9990_firmwaresnapdragon_xr2_5g_platform_firmwareqca7500_firmwaresa8150pqca8075_firmwareqcn5052_firmwaresnapdragon_835_mobile_pc_platformsnapdragon_865\+_5g_mobile_platformipq6010sw5100video_collaboration_vc3_platformaqt1000snapdragon_865_5g_mobile_platform_firmwarec-v2x_9150_firmwareqca9980_firmwareqca9985_firmwareqam8295p_firmwaresd855snapdragon_212_mobile_platformwcn3990_firmwareqca6698aq_firmwarewcd9385qca9994wcn3610_firmwaresa8255pimmersive_home_318_platform_firmwareqcn5024snapdragon_865\+_5g_mobile_platform_firmwareqca6430sdx55_firmwareipq8071a_firmwareipq4019_firmwareqca6554a_firmwaresnapdragon_210_processorsxr2130ipq6028qcn9100ipq4029snapdragon_855_mobile_platform_firmwareqca6420_firmwareaqt1000_firmwareipq8076_firmwareqca6584au_firmwareqcn5152_firmwarewcd9335_firmwareqca6436wcn3980_firmwaresd855_firmwarewsa8835qca6595au_firmwareqca6391_firmwaresw5100p_firmwareipq8068qca6696_firmwaresnapdragon_865_5g_mobile_platformwcd9380_firmwarequalcomm_205_mobile_platform_firmwareqca6574_firmwareqca8081wsa8815qcn5124ipq8064_firmwareqca6797aqqcn5152ipq8065_firmwareqca6574a_firmwaresdx55qcn9072_firmwareqca9888_firmwareipq8074aimmersive_home_318_platformqca9889qcn5024_firmwareqca6391ipq5010qualcomm_215_mobile_platformipq8173_firmwaresa8295pipq8068_firmwarefastconnect_7800sd865_5g_firmwarepmp8074_firmwarequalcomm_215_mobile_platform_firmwareipq8078_firmwareqca9889_firmwarewcn3988_firmwareqcn5154sa8145pimmersive_home_316_platformsnapdragon_888\+_5g_mobile_platform_firmwaresnapdragon_wear_4100\+_platformwsa8835_firmwarecsr8811qcn5022wcn3980wcn3680b_firmwareqcs610Snapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2023-28553
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.06% / 17.45%
||
7 Day CHG~0.00%
Published-07 Nov, 2023 | 05:26
Updated-04 Sep, 2024 | 18:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in WLAN Host

Information Disclosure in WLAN Host when processing WMI event command.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa6150p_firmwareipq4028_firmwareqca8337qfw7124ar9380ipq8173_firmwaresnapdragon_870_5g_mobile_platform_firmwareqcn5124qca4024_firmwareimmersive_home_318_platform_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqca6595au_firmwaresnapdragon_480_5g_mobile_platformsnapdragon_480_5g_mobile_platform_firmwareqca6554a_firmwareqam8295pipq8076aqca8386_firmwareqcn6024_firmwareimmersive_home_316_platform_firmwareqca8084_firmwaresnapdragon_695_5g_mobile_platform_firmwareqca6574au_firmwareqcn5164_firmwarewcd9375_firmwareqca8081_firmwaresnapdragon_auto_5g_modem-rf_firmwareipq8065ipq8078a_firmwareqca6678aq_firmwareipq5028qca7500ipq4029_firmwareqca6698aqsa4155p_firmwareipq6010ipq8068sdx65mwcd9340qcn6132sw5100qca6436sa6155pqcf8000qca6698aq_firmwareqca9888_firmwareqcn6122ipq8068_firmwareqca6696_firmwareipq9008_firmwareqcn5154_firmwaresa8150pqcc710_firmwarewsa8830_firmwareqca9992_firmwaresd865_5g_firmwarewcn3988sa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwarefastconnect_6800_firmwareqca9898qcn5022_firmwaresa8295p_firmwareipq4028immersive_home_216_platform_firmwareqca9985_firmwareqca8337_firmwarewcd9380_firmwareipq8072aqca7500_firmwareqca9980_firmwaresw5100pipq8076a_firmwaresnapdragon_w5\+_gen_1_wearable_platformipq8078qca6564auqca8084ipq8173ipq9008qcn5164qca6574csr8811_firmwarewcd9380ipq4019_firmwareqcn5024qca9985wcn3980qcn5052_firmwareqcn9274_firmwareqfw7114_firmwareqcc2073_firmwareipq6018_firmwarewcd9340_firmwarewsa8815qcn6112snapdragon_865\+_5g_mobile_platformsnapdragon_4_gen_1_mobile_platformqca6426_firmwareqca9984ipq6028ipq8064qcn9024ipq9574_firmwarewcn3980_firmwareimmersive_home_3210_platform_firmwareipq8064_firmwaresa8295psnapdragon_xr2_5g_platformqca6678aqsnapdragon_x65_5g_modem-rf_systemipq8078_firmwarefastconnect_6900snapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900_firmwareqca9994qca9980qcn9024_firmwareipq8174_firmwareqca9880sw5100p_firmwareimmersive_home_326_platformipq6018sa6145pqca9886_firmwareqcc710immersive_home_214_platformqca6595_firmwaresa8145pqca6391_firmwareimmersive_home_214_platform_firmwaresa4150p_firmwareqca4024wcd9370_firmwaresdx55sa8155psnapdragon_695_5g_mobile_platformqfw7124_firmwaresa4155par8035_firmwaresnapdragon_480\+_5g_mobile_platformqcn5024_firmwarewsa8830qcn9070sa8145p_firmwarecsrb31024snapdragon_865_5g_mobile_platformqcn6224_firmwareqca8082qcn9072qca8386qca9880_firmwareqca9992ipq6000snapdragon_auto_4g_modem_firmwarewcd9370qcn5152_firmwaresnapdragon_480\+_5g_mobile_platform_firmwareqca6426qca6584au_firmwareqcn9000_firmwareqca9984_firmwarewcd9385_firmwareimmersive_home_216_platformfastconnect_6200immersive_home_316_platformimmersive_home_318_platformipq8074aqcn5124_firmwareqam8295p_firmwareqca8082_firmwaresnapdragon_x55_5g_modem-rf_systemqcn5122_firmwaresdx55_firmwareqca6595auqcn6023_firmwareqfw7114qca6436_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwareipq5010qca6564au_firmwareqca6584ausa6155p_firmwaresnapdragon_x65_5g_modem-rf_system_firmwaresnapdragon_870_5g_mobile_platformqcn9274ipq8174qca9990qcn5052qcn6112_firmwarewcn3988_firmwareqcn9074sa6145p_firmwareqca8085sa8195pwsa8810_firmwareqcn6224snapdragon_x75_5g_modem-rf_systemqca8081ipq8071aqcn6023sdx65m_firmwareipq8071a_firmwareimmersive_home_3210_platformqca8085_firmwaresxr2130_firmwarewcd9385ar8035csr8811qca9898_firmwarewcd9375ipq4019qcn9100_firmwareipq5010_firmwareipq8074a_firmwarewsa8815_firmwarewsa8835_firmwaresa4150pqcn9000qcf8000_firmwareqca6554asd865_5gfastconnect_6800qca6595ar9380_firmwareimmersive_home_326_platform_firmwareqcn6122_firmwareipq8065_firmwarewsa8835snapdragon_auto_5g_modem-rfqcn6274snapdragon_4_gen_1_mobile_platform_firmwareqcn5154qca8075_firmwaresxr2130qca6574aqca9889qcn6132_firmwareqca9888qca9994_firmwareqcc2076_firmwareipq8070a_firmwareipq8076_firmwareqca6574_firmwareqca9886ipq8076snapdragon_xr2_5g_platform_firmwareqca6175aqca6574a_firmwarefastconnect_6200_firmwareqcn5152snapdragon_x55_5g_modem-rf_system_firmwareqca6391fastconnect_7800qcn9100snapdragon_865\+_5g_mobile_platform_firmwareqcn6274_firmwaresnapdragon_auto_4g_modemcsrb31024_firmwareqcn9070_firmwareipq6028_firmwareipq8072a_firmwareqca6574auqca9889_firmwaresa8155p_firmwareipq9574qcn5122fastconnect_7800_firmwarewsa8810qcn5022ipq6010_firmwareqca6696sa6150pqca8075qcn9022_firmwareqcn6024qcn9022qcc2076qca9990_firmwareipq8070aqcn9072_firmwareipq6000_firmwaresw5100_firmwareqcn9074_firmwareipq4029qcc2073qca6175a_firmwareSnapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2023-28568
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.05% / 16.96%
||
7 Day CHG~0.00%
Published-07 Nov, 2023 | 05:26
Updated-02 Aug, 2024 | 13:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in WLAN HAL

Information disclosure in WLAN HAL when reception status handler is called.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_850_mobile_compute_platform_firmwaresnapdragon_662_mobile_platform_firmwarewsa8830sm6250p_firmwaresnapdragon_850_mobile_compute_platformwcn3950_firmwaresc8180x\+sdx55qca6420_firmwaresnapdragon_480_5g_mobile_platformqca6335snapdragon_xr1_platform_firmwaresd730_firmwarewcd9370snapdragon_460_mobile_platform_firmwaresnapdragon_480\+_5g_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwarewcn3990_firmwarewcd9385_firmwarewcn3950sm4125fastconnect_6200wcd9326_firmwaresnapdragon_7c_gen_2_compute_platformsd662snapdragon_460_mobile_platformsd460_firmwareqca6320_firmwaresnapdragon_695_5g_mobile_platform_firmwaresnapdragon_835_mobile_pc_platform_firmwaresdx55_firmwaresnapdragon_4_gen_2_mobile_platformsnapdragon_x55_5g_modem-rf_systemwcd9375_firmwaresm7250p_firmwareqca6420snapdragon_680_4g_mobile_platform_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwareqca6310robotics_rb3_platform_firmwaresd662_firmwarevision_intelligence_300_platform_firmwaresnapdragon_765g_5g_mobile_platformqca6430robotics_rb3_platformsnapdragon_678_mobile_platform_firmwarewcn3988_firmwaresm6250fastconnect_6700_firmwaresnapdragon_720g_mobile_platformsnapdragon_8cx_compute_platformsxr1120wcd9340wsa8810_firmwarevision_intelligence_400_platformsw5100wcd9326wcd9335sg4150psnapdragon_765_5g_mobile_platform_firmwaresnapdragon_690_5g_mobile_platformqcm4490wcd9385wcd9341wcn3910_firmwarewcd9375snapdragon_855_mobile_platform_firmwareaqt1000sc8180x\+sdx55_firmwaresm6250_firmwaresnapdragon_712_mobile_platform_firmwarevision_intelligence_400_platform_firmwaresnapdragon_662_mobile_platformsnapdragon_685_4g_mobile_platformsnapdragon_768g_5g_mobile_platform_firmwarewsa8830_firmwaresd855_firmwarewcn3988wsa8815_firmwarewsa8835_firmwaresnapdragon_685_4g_mobile_platform_firmwarefastconnect_6800_firmwaresnapdragon_7c_gen_2_compute_platform_firmwaresxr1120_firmwaresg4150p_firmwaresnapdragon_730_mobile_platform_firmwaresnapdragon_750g_5g_mobile_platform_firmwaresnapdragon_675_mobile_platform_firmwareqcm4325snapdragon_855\+\/860_mobile_platform_firmwaresnapdragon_845_mobile_platformwcd9380_firmwarewcn3990sw5100psnapdragon_8cx_gen_2_5g_compute_platformfastconnect_6800snapdragon_w5\+_gen_1_wearable_platformsnapdragon_835_mobile_pc_platformsnapdragon_670_mobile_platform_firmwaresnapdragon_8c_compute_platformsd670_firmwarewsa8835wcd9380sm6250pfastconnect_6700snapdragon_678_mobile_platformsnapdragon_855\+\/860_mobile_platformsnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_4_gen_2_mobile_platform_firmwareqca6310_firmwareqca6430_firmwarewcd9335_firmwarewcn3980snapdragon_732g_mobile_platform_firmwareqca6335_firmwareqcm4325_firmwarewcd9340_firmwaresd855sm4125_firmwarewsa8815wcn3910qca6320snapdragon_4_gen_1_mobile_platformfastconnect_6200_firmwaresnapdragon_670_mobile_platformsd835snapdragon_730g_mobile_platformvision_intelligence_300_platformsnapdragon_x55_5g_modem-rf_system_firmwaresd730sd460qca6391wcn3980_firmwaresnapdragon_x50_5g_modem-rf_system_firmwaresnapdragon_710_mobile_platformaqt1000_firmwaresnapdragon_7c_compute_platform_firmwareqcm4490_firmwaresnapdragon_690_5g_mobile_platform_firmwaresnapdragon_845_mobile_platform_firmwaresnapdragon_8cx_compute_platform_firmwareqcs4490_firmwarewsa8832_firmwaresnapdragon_xr1_platformfastconnect_6900fastconnect_6900_firmwaresd670wcd9341_firmwarewsa8810snapdragon_765g_5g_mobile_platform_firmwarewsa8832snapdragon_712_mobile_platformsw5100p_firmwaresnapdragon_730g_mobile_platform_firmwaresnapdragon_680_4g_mobile_platformsnapdragon_730_mobile_platformsd835_firmwaresnapdragon_8c_compute_platform_firmwaresnapdragon_675_mobile_platformqcs4490snapdragon_750g_5g_mobile_platformsnapdragon_732g_mobile_platformqca6391_firmwaresnapdragon_710_mobile_platform_firmwarewcd9370_firmwaresdx55snapdragon_x50_5g_modem-rf_systemsnapdragon_768g_5g_mobile_platformsnapdragon_765_5g_mobile_platformsnapdragon_695_5g_mobile_platformsm7250psw5100_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_firmwaresnapdragon_720g_mobile_platform_firmwaresnapdragon_7c_compute_platformsnapdragon_855_mobile_platformsnapdragon_480\+_5g_mobile_platformSnapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2019-14115
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 13.47%
||
7 Day CHG~0.00%
Published-08 Sep, 2020 | 09:31
Updated-05 Aug, 2024 | 00:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

u'Information disclosure issue occurs as in current logic as secure touch is released without clearing the display session which can result in user reading the secure input while touch is in non-secure domain as secure display is active' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8076, APQ8096AU, APQ8098, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9650, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS404, QCS405, QCS605, QCS610, QM215, Rennell, SA415M, SA515M, SA6155P, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-mdm9150_firmwarekamorta_firmwareqcm2150_firmwareqcs610sdm429wmsm8996au_firmwaresdm632_firmwaresdm845sdm450_firmwaresdm632sdx24sdm439qcs404_firmwaremdm9650sdm429msm8940_firmwaresm7150_firmwaresm6150msm8996ausdm429w_firmwaresm7150apq8009_firmwaremsm8917sdm670sxr2130qcs605_firmwareapq8076sc8180xmdm9206sdm670_firmwareqcs404sdx24_firmwareapq8076_firmwaresdm636sda845_firmwaresa415mapq8098mdm9205mdm9206_firmwaresa515mqcs605msm8937_firmwaremdm9650_firmwaresdm429_firmwaremsm8905_firmwaresda660sdx55_firmwaresxr1130_firmwaresxr1130apq8009msm8909_firmwareapq8053_firmwaresda845nicobarsdm850_firmwaresa6155p_firmwaremsm8920msm8953sdm450sdm636_firmwaresa515m_firmwareapq8098_firmwaremsm8998_firmwareqcm2150msm8920_firmwaresdm630mdm9607_firmwaresm8250_firmwaresdm660sc8180x_firmwaresa415m_firmwareqcs405sdm710qm215sc7180_firmwaremdm9607apq8017_firmwaresdm710_firmwaresa6155pqcs610_firmwaremdm9150msm8937msm8996_firmwaremsm8905sm8150_firmwaremsm8909sxr2130_firmwareapq8096ausdm439_firmwareqcs405_firmwarerennellsc7180sdm630_firmwaremdm9205_firmwaresda660_firmwarerennell_firmwareqm215_firmwaresdx55msm8953_firmwaremsm8940sm6150_firmwareapq8053apq8096au_firmwaremsm8917_firmwaresm8250msm8998sm8150sdm850kamortaapq8017msm8996nicobar_firmwaresdm660_firmwaresdm845_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-459
Incomplete Cleanup
CVE-2021-1968
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.2||MEDIUM
EPSS-0.02% / 4.04%
||
7 Day CHG~0.00%
Published-20 Oct, 2021 | 00:00
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper validation of kernel buffer address while copying information back to user buffer can lead to kernel memory information exposure to user space in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055wcn3991_firmwaremdm9150_firmwarewcn3991sd678sa6150p_firmwareqca8337_firmwaresa8145p_firmwareqcs610sda429w_firmwarewcd9380_firmwaresd_675fsm10056qca8337qca6595sdx55m_firmwarecsra6620fsm10055_firmwareqca6574wcn3950_firmwaresd665_firmwarewcd9380sa8150p_firmwareqca6420_firmwareqca6595au_firmwaresa6155qcs410wcd9370csra6620_firmwaresd_675_firmwaresd675_firmwareqca6574acsra6640_firmwareqcs6125_firmwareqca6584au_firmwareqca6430_firmwarewcd9335_firmwarewcn3980wcn3998sd_8cx_firmwarewcn3950sd720gqca6574_firmwarewcd9340_firmwarewcn3660bsd855wsa8815sd665sd_8c_firmwarewcn3660b_firmwaresa8155qca6574a_firmwareqca6574au_firmwaresdx55_firmwareqca6595ausa6155_firmwarewcd9375_firmwarewcn3998_firmwarewcn3999_firmwarewcn3980_firmwarewcn3610_firmwareqca6420qca6391sdx55maqt1000_firmwareqca6584ausa6155p_firmwarewcn3999sd678_firmwarear8031_firmwareqcs6125sa8155_firmwareqcs405qca6430wcn3988_firmwareqca6574ausa6145p_firmwaresa8155p_firmwaresm6250wcd9340sa8195pwsa8810_firmwarewcd9341_firmwareqcm6125wsa8810fsm10056_firmwarewcd9335sa6155pqcs610_firmwaremdm9150sd_8csa6145pwcd9341ar8031qca6696_firmwareqca6595_firmwareqcs405_firmwaresa8145pqca6696qca6391_firmwarear8035wcd9375sd_8cxaqt1000sa8150pwcd9370_firmwaresm6250_firmwaresa6150psdx55sa8155pcsra6640sda429wsd675sd855_firmwarewcn3620_firmwarewcn3988wsa8815_firmwarewcn3620sd720g_firmwaresa8195p_firmwareqcs410_firmwarear8035_firmwarewcn3610qcm6125_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-20
Improper Input Validation
CVE-2018-13897
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.24% / 46.03%
||
7 Day CHG~0.00%
Published-25 Jul, 2019 | 16:33
Updated-05 Aug, 2024 | 09:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Clients hostname gets added to DNS record on device which is running dnsmasq resulting in an information exposure in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Wearables in MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS605, SD 210/SD 212/SD 205, SD 615/16/SD 415, SD 625, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 855, SDA660, SDM630, SDM660

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd_712sd_855sd_730_firmwaremdm9640_firmwaresd_820asd_675msm8996au_firmwaresd_415sd_616sd_670_firmwaresdm660sdm630mdm9607_firmwaresd_615mdm9650sd_636sd_650_firmwaresd_710_firmwaresd_625sd_615_firmwaremsm8909w_firmwaremdm9607msm8996ausd_210sd_636_firmwaresd_650sd_820_firmwaresd_820sd_820a_firmwareqcs605_firmwaresd_675_firmwaremdm9206sd_652sd_730sd_212_firmwaresd_625_firmwaresd_855_firmwaresd_712_firmwaresdm630_firmwaresda660_firmwaremdm9206_firmwareqcs605sd_670sd_835_firmwaremdm9650_firmwaresd_710sd_835sd_205sda660sd_210_firmwaresd_415_firmwaresd_652_firmwaremsm8909wsd_616_firmwaresd_205_firmwaresdm660_firmwaresd_212mdm9640Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Wearables
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-13885
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 13.47%
||
7 Day CHG~0.00%
Published-24 May, 2019 | 16:44
Updated-05 Aug, 2024 | 09:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible memory overread may be lead to access of sensitive data in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9650, MDM9655, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 835, SD 845 / SD 850, SDA660, SDM439, SDM630, SDM660, SDX20, SM7150, SXR1130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd_850mdm9150_firmwaremdm9635m_firmwaresd_632sd_675sd_439sd_670_firmwaresd_429sdm439mdm9650sd_636sm7150_firmwaresd_450_firmwaresd_845_firmwaresm7150qcs605_firmwaresd_675_firmwaremdm9206sd_425_firmwaresd_625_firmwaresd_450mdm9635mmdm9615sd_845mdm9206_firmwareqcs605sd_632_firmwaresd_835_firmwaremdm9650_firmwaresd_835sda660sxr1130_firmwaresd_210_firmwaresxr1130sd_205_firmwaresd_212sd_427_firmwaresd_712sdx20sd_425sdm660sd_430_firmwaremdm9607_firmwaresd_435mdm9655_firmwaresd_710_firmwaresdm630sd_625qm215mdm9607sd_210sd_636_firmwaremdm9625_firmwaresd_439_firmwaremdm9150sd_429_firmwaresd_212_firmwaresd_850_firmwaremdm9655sdm439_firmwaresd_712_firmwaresdm630_firmwaresda660_firmwaremdm9625qm215_firmwaresd_427sd_430sd_670sd_435_firmwaremdm9615_firmwaresd_710sdx20_firmwaresd_205sdm660_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-11845
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.84%
||
7 Day CHG~0.00%
Published-25 Feb, 2019 | 23:00
Updated-05 Aug, 2024 | 08:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Usage of non-time-constant comparison functions can lead to information leakage through side channel analysis in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in versions MDM9150, MDM9206, MDM9607, MDM9650, MDM9655, MSM8996AU, QCS605, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 8CX, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016, SXR1130.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd_850mdm9150_firmwaresd_632sd_820asd_675msm8996au_firmwaresd_439sd_670_firmwaresd_429sdm439mdm9650sd_636snapdragon_high_med_2016_firmwaremsm8996ausd_820sd_650sd_450_firmwaresd_845_firmwaresd_410sd_820a_firmwareqcs605_firmwaresd_675_firmwaremdm9206sd_652sd_425_firmwaresd_625_firmwaresd_450sd_8cx_firmwaresd_845mdm9206_firmwareqcs605sd_632_firmwaresd_835_firmwaremdm9650_firmwaresd_835sda660sxr1130_firmwaresd_210_firmwaresd_652_firmwaresxr1130sd_205_firmwaresd_212sd_650_firmwaresd_427_firmwaresd_712sd_412sd_425sdm660sd_430_firmwaremdm9607_firmwaresd_435mdm9655_firmwaresd_710_firmwaresdm630sd_625sd_820_firmwaresd_210mdm9607sd_636_firmwaresd_439_firmwaremdm9150sd_429_firmwaresnapdragon_high_med_2016sd_212_firmwaresd_850_firmwaremdm9655sdm439_firmwaresd_412_firmwaresd_712_firmwaresdm630_firmwaresda660_firmwaresd_8cxsd_430sd_427sd_670sd_435_firmwaresd_710sd_410_firmwaresd_205sdm660_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-12006
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 4.29%
||
7 Day CHG~0.00%
Published-11 Feb, 2019 | 15:00
Updated-05 Aug, 2024 | 08:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, Users with no extra privileges can potentially access leaked data due to uninitialized padding present in display function.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.Google LLC
Product-androidAndroid for MSM, Firefox OS for MSM, QRD Android
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-11976
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 13.47%
||
7 Day CHG~0.00%
Published-24 May, 2019 | 16:44
Updated-05 Aug, 2024 | 08:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ECDSA signature code leaks private keys from secure world to non-secure world in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in IPQ8074, MDM9150, MDM9206, MDM9607, MDM9650, MDM9655, MSM8909W, MSM8996AU, QCA8081, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 8CX, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016, SXR1130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd_850mdm9150_firmwaresd_632sd_820amsm8996au_firmwaresd_439sd_670_firmwaresd_429sdm439mdm9650sd_636sd_615_firmwaresnapdragon_high_med_2016_firmwaremsm8909w_firmwaremsm8996ausd_820sd_650sd_450_firmwaresd_845_firmwaresd_410sd_820a_firmwareqcs605_firmwaremdm9206sd_652sd_425_firmwaresd_625_firmwareipq8074sd_450sd_8cx_firmwaresd_845mdm9206_firmwareqcs605sd_632_firmwaresd_835_firmwaremdm9650_firmwaresd_835sda660sxr1130_firmwaresd_210_firmwaresd_415_firmwaresd_652_firmwareqca8081_firmwaresxr1130msm8909wsd_616_firmwaresd_205_firmwaresd_415sd_212sd_650_firmwaresd_427_firmwaresd_712sd_412sd_616sd_425sdm660sd_430_firmwaremdm9607_firmwaresd_435mdm9655_firmwaresd_615sd_710_firmwaresdm630sd_625ipq8074_firmwareqm215sd_820_firmwaresd_210mdm9607sd_636_firmwaresd_439_firmwareqca8081mdm9150sd_429_firmwaresnapdragon_high_med_2016sd_212_firmwaresd_850_firmwaremdm9655sdm439_firmwaresd_412_firmwaresd_712_firmwaresdm630_firmwaresda660_firmwaresd_8cxsd_430qm215_firmwaresd_427sd_670sd_435_firmwaresd_710sd_410_firmwaresd_205sdm660_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-11942
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 13.07%
||
7 Day CHG~0.00%
Published-14 Jun, 2019 | 17:02
Updated-05 Aug, 2024 | 08:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Failure to initialize the reserved memory which is sent to the firmware might lead to exposure of 1 byte of uninitialized kernel SKB memory to FW in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in IPQ4019, IPQ8064, IPQ8074, MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCS405, QCS605, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM630, SDM660, SDX20, SDX24

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd_850mdm9150_firmwaremdm9640_firmwaresd_820asd_675msm8996au_firmwaresd_670_firmwaresdx24mdm9650sd_636msm8996ausd_450_firmwaresd_845_firmwaresd_820a_firmwareqcs605_firmwareipq4019_firmwaresd_675_firmwaremdm9206sd_425_firmwaresdx24_firmwaresd_625_firmwareipq8074sd_450sd_845mdm9206_firmwareqcs605mdm9640sd_835_firmwaremdm9650_firmwaresd_835ipq8064sda660ipq8064_firmwaresd_427_firmwaresd_712sd_855sd_730_firmwaresdx20sd_425sdm660sd_430_firmwaremdm9607_firmwaresd_435sd_710_firmwaresdm630qcs405sd_625ipq8074_firmwaremdm9607sd_636_firmwaremdm9150sd_730sd_850_firmwareqcs405_firmwaresd_712_firmwaresdm630_firmwaresda660_firmwaresd_427ipq4019sd_430sd_670sd_435_firmwaresd_710sdx20_firmwaresdm660_firmwaresd_855_firmwareSnapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-11275
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 11.54%
||
7 Day CHG~0.00%
Published-18 Sep, 2018 | 18:00
Updated-05 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In all android releases (Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, when flashing image using FastbootLib if size is not divisible by block size, information leak occurs.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.Google LLC
Product-androidAndroid for MSM, Firefox OS for MSM, QRD Android
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-8239
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.12% / 31.95%
||
7 Day CHG~0.00%
Published-13 Jun, 2017 | 20:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In all Android releases from CAF using the Linux kernel, userspace-controlled parameters for flash initialization are not sanitized potentially leading to exposure of kernel memory.

Action-Not Available
Vendor-Google LLCQualcomm Technologies, Inc.
Product-androidAll Qualcomm products
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-9701
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.12% / 30.68%
||
7 Day CHG~0.00%
Published-16 Nov, 2017 | 22:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while processing OEM unlock/unlock-go fastboot commands data leak may occur, resulting from writing uninitialized stack structure to non-volatile memory.

Action-Not Available
Vendor-Google LLCQualcomm Technologies, Inc.
Product-androidAndroid for MSM, Firefox OS for MSM, QRD Android
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-8269
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.11% / 29.43%
||
7 Day CHG~0.00%
Published-11 Aug, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Userspace-controlled non null terminated parameter for IPA WAN ioctl in all Qualcomm products with Android releases from CAF using the Linux kernel can lead to exposure of kernel memory.

Action-Not Available
Vendor-Google LLCQualcomm Technologies, Inc.
Product-androidAll Qualcomm products
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-8258
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 19.59%
||
7 Day CHG~0.00%
Published-11 Aug, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An array out-of-bounds access in all Qualcomm products with Android releases from CAF using the Linux kernel can potentially occur in a camera driver.

Action-Not Available
Vendor-Google LLCQualcomm Technologies, Inc.
Product-androidAll Qualcomm products
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-18332
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.84%
||
7 Day CHG~0.00%
Published-18 Jan, 2019 | 22:00
Updated-05 Aug, 2024 | 21:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Security keys are logged when any WCDMA call is configured or reconfigured in snapdragon automobile, snapdragon mobile and snapdragon wear in versions MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SDA660, SDX20, SXR1130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd_712sd_850mdm9635m_firmwaremdm9640_firmwaresd_820amsm8996au_firmwaresdx20sd_670_firmwaresd_425sd_430_firmwaremdm9607_firmwaresd_710_firmwaremdm9655_firmwaremdm9650sd_650_firmwaresd_625msm8909w_firmwaremdm9607msm8996aumdm9645mdm9645_firmwaresd_210sd_650sd_820_firmwaresd_820sd_450_firmwaresd_845_firmwaresd_820a_firmwaresd_652sd_425_firmwaresd_212_firmwaresd_850_firmwaresd_625_firmwaresd_450mdm9655sd_712_firmwaremdm9635msda660_firmwaresd_845sd_430sd_670sd_835_firmwaremdm9650_firmwaresd_710sdx20_firmwaresd_835sd_205sda660sxr1130_firmwaresd_210_firmwaresd_652_firmwaresxr1130msm8909wsd_205_firmwaresd_212mdm9640Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-18321
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.84%
||
7 Day CHG~0.00%
Published-03 Jan, 2019 | 15:00
Updated-05 Aug, 2024 | 21:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Security keys used by the terminal and NW for a session could be leaked in snapdragon mobile in versions MDM9650, MDM9655, SD 835, SDA660.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd_835_firmwaremdm9655_firmwaremdm9650_firmwaremdm9655sd_835sda660sda660_firmwaremdm9650Snapdragon Mobile
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-18072
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.22% / 43.95%
||
7 Day CHG~0.00%
Published-11 Apr, 2018 | 15:00
Updated-17 Sep, 2024 | 03:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Android before security patch level 2018-04-05 on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9640, MDM9650, QCA4531, QCA6174A, QCA6564, QCA6574, QCA6574AU, QCA6584, QCA6584AU, QCA9377, QCA9378, QCA9379, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 808, SD 810, SD 820, SD 835, SD 845, SDM630, SDM636, SDM660, Snapdragon_High_Med_2016, the probe requests originated from user's phone contains the information elements which specifies the supported wifi features. This shall impact the user's privacy if someone sniffs the probe requests originated by this DUT. Hence, control the presence of which information elements is supported.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwareqca4531_firmwaremdm9640_firmwaremdm9650sd_615_firmwareqca6574sd_820sd_650sd_450_firmwaresd_845_firmwaresd_410mdm9206sd_652qca6564qca6174asd_425_firmwareqca9379_firmwareqca6584au_firmwaresd_450sd_625_firmwaresdm636qca9377qca4531sd_845mdm9206_firmwareqca6574_firmwareqca6584_firmwaresd_835_firmwaremdm9650_firmwareqca9378_firmwaresd_835qca6584qca6574au_firmwaresd_210_firmwaresd_415_firmwaresd_652_firmwaresd_616_firmwaresd_205_firmwaresd_415sd_650_firmwaresd_212sd_427_firmwareqca6584ausd_412sdm636_firmwaresd_808_firmwaresd_616sd_425sdm660sd_430_firmwaremdm9607_firmwaresd_615sd_435sdm630sd_625qca6574ausd_210mdm9607sd_820_firmwaresd_808qca6174a_firmwaresd_212_firmwareqca6564_firmwaresd_412_firmwareqca9378ausdm630_firmwaresd_430sd_427sd_810sd_435_firmwaresd_410_firmwaresd_205qca9379sd_810_firmwaresdm660_firmwaremdm9640Snapdragon Mobile, Snapdragon Wear
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-18326
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.84%
||
7 Day CHG~0.00%
Published-03 Jan, 2019 | 15:00
Updated-05 Aug, 2024 | 21:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cryptographic keys are printed in modem debug messages in snapdragon mobile and snapdragon wear in versions MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 636, SD 650/52, SD 800, SD 810, SD 820, SD 835, SDA660, SDM630, SDM660, Snapdragon_High_Med_2016.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-mdm9635m_firmwaremdm9640_firmwaremdm9650sd_636sd_615_firmwaresnapdragon_high_med_2016_firmwaremsm8909w_firmwaresd_820mdm9645sd_650sd_450_firmwaresd_410sd_652sd_425_firmwaresd_800_firmwaresd_625_firmwaresd_450mdm9635mmdm9615sd_835_firmwaremdm9650_firmwaresd_835sda660sd_210_firmwaresd_415_firmwaresd_652_firmwaremsm8909wsd_616_firmwaresd_205_firmwaresd_415sd_650_firmwaresd_212sd_427_firmwaresd_412sd_616sd_425sdm660sd_430_firmwaremdm9607_firmwaresd_435mdm9655_firmwaresd_615sdm630sd_625sd_210mdm9607sd_636_firmwaresd_820_firmwaremdm9645_firmwaremdm9625_firmwaresd_800snapdragon_high_med_2016sd_212_firmwaremdm9655sd_412_firmwaresdm630_firmwaresda660_firmwaremdm9625sd_427sd_430sd_810sd_435_firmwaremdm9615_firmwaresd_410_firmwaresd_205sd_810_firmwaresdm660_firmwaremdm9640Snapdragon Mobile, Snapdragon Wear
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-15851
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.42%
||
7 Day CHG~0.00%
Published-06 Jul, 2018 | 19:00
Updated-17 Sep, 2024 | 02:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Lack of copy_from_user and information leak in function "msm_ois_subdev_do_ioctl, file msm_ois.c can lead to a camera crash in all Android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the Linux kernel

Action-Not Available
Vendor-Qualcomm Technologies, Inc.Google LLC
Product-androidAndroid for MSM, Firefox OS for MSM, QRD Android
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-15850
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.09% / 24.77%
||
7 Day CHG~0.00%
Published-10 Jan, 2018 | 22:00
Updated-16 Sep, 2024 | 23:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, userspace can read values from audio codec registers.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.Google LLC
Product-androidAndroid for MSM, Firefox OS for MSM, QRD Android
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-13218
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-4.7||MEDIUM
EPSS-0.04% / 13.39%
||
7 Day CHG~0.00%
Published-12 Jan, 2018 | 23:00
Updated-16 Sep, 2024 | 20:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Access to CNTVCT_EL0 in Small Cell SoC, Snapdragon Automobile, Snapdragon Mobile and Snapdragon Wear could be used for side channel attacks and this could lead to local information disclosure with no additional execution privileges needed in FSM9055, IPQ4019, IPQ8064, MDM9206, MDM9607, MDM9635M, MDM9640, MDM9650, MSM8909W, QCA4531, QCA9980, QCN5502, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.Google LLC
Product-androidAndroid for MSM, Firefox OS for MSM, QRD Android
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 8
  • 9
  • Next
Details not found