Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-47379

Summary
Assigner-qualcomm
Assigner Org ID-2cfc7d3e-20d3-47ac-8db7-1b7285aff15f
Published At-02 Mar, 2026 | 16:53
Updated At-03 Mar, 2026 | 04:56
Rejected At-
Credits

Use After Free in Automotive Audio

Memory Corruption when concurrent access to shared buffer occurs due to improper synchronization between assignment and deallocation of buffer resources.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:qualcomm
Assigner Org ID:2cfc7d3e-20d3-47ac-8db7-1b7285aff15f
Published At:02 Mar, 2026 | 16:53
Updated At:03 Mar, 2026 | 04:56
Rejected At:
â–¼CVE Numbering Authority (CNA)
Use After Free in Automotive Audio

Memory Corruption when concurrent access to shared buffer occurs due to improper synchronization between assignment and deallocation of buffer resources.

Affected Products
Vendor
Qualcomm Technologies, Inc.Qualcomm, Inc.
Product
Snapdragon
Platforms
  • Snapdragon Auto
  • Snapdragon Compute
  • Snapdragon Consumer IOT
  • Snapdragon Industrial IOT
  • Snapdragon Mobile
  • Snapdragon Voice & Music
  • Snapdragon WBC
  • Snapdragon Wearables
Default Status
unaffected
Versions
Affected
  • 5G Fixed Wireless Access Platform
  • AR8031
  • AR8035
  • C-V2X 9150
  • CSRA6620
  • CSRA6640
  • FastConnect 6200
  • FastConnect 6700
  • FastConnect 6800
  • FastConnect 6900
  • FastConnect 7800
  • Flight RB5 5G Platform
  • FWA Gen 3 Ultra Platform
  • G1 Gen 1
  • LeMans_AU_LGIT
  • LeMansAU
  • MDM9250
  • MDM9628
  • Milos
  • QAM8255P
  • QAM8295P
  • QAMSRV1H
  • QAMSRV1M
  • QCA2066
  • QCA6174A
  • QCA6391
  • QCA6564
  • QCA6564A
  • QCA6564AU
  • QCA6574
  • QCA6574A
  • QCA6574AU
  • QCA6584AU
  • QCA6595
  • QCA6595AU
  • QCA6678AQ
  • QCA6688AQ
  • QCA6696
  • QCA6698AQ
  • QCA6698AU
  • QCA6797AQ
  • QCA8081
  • QCA8337
  • QCA8695AU
  • QCA9367
  • QCA9377
  • QCC710
  • QCM2290
  • QCM4325
  • QCM5430
  • QCM6125
  • QCM6490
  • QCN6224
  • QCN6274
  • QCN9011
  • QCN9012
  • QCS2290
  • QCS4290
  • QCS8550
  • QEP8111
  • QFW7114
  • QFW7124
  • QRB5165M
  • QRB5165N
  • Qualcomm 215 Mobile Platform
  • Qualcomm Video Collaboration VC1 Platform
  • Qualcomm Video Collaboration VC3 Platform
  • Qualcomm Video Collaboration VC5 Platform
  • Robotics RB2 Platform
  • Robotics RB5 Platform
  • SA2150P
  • SA4150P
  • SA4155P
  • SA6145P
  • SA6150P
  • SA6155
  • SA6155P
  • SA7255P
  • SA7775P
  • SA8145P
  • SA8150P
  • SA8155
  • SA8155P
  • SA8195P
  • SA8255P
  • SA8295P
  • SA8620P
  • SA8770P
  • SA9000P
  • SD662
  • SD865 5G
  • SDA660
  • SM6225P
  • SM6650P
  • SM7325P
  • SM7550
  • SM7550P
  • SM7635P
  • SM7675
  • SM7675P
  • SM8550P
  • SM8635
  • SM8635P
  • SM8650Q
  • Smart Audio 400 Platform
  • Snapdragon 4 Gen 1 Mobile Platform
  • Snapdragon 460 Mobile Platform
  • Snapdragon 480 5G Mobile Platform
  • Snapdragon 480+ 5G Mobile Platform
  • Snapdragon 6 Gen 4 Mobile Platform
  • Snapdragon 660 Mobile Platform
  • Snapdragon 662 Mobile Platform
  • Snapdragon 680 4G Mobile Platform
  • Snapdragon 685 4G Mobile Platform
  • Snapdragon 690 5G Mobile Platform
  • Snapdragon 695 5G Mobile Platform
  • Snapdragon 778G 5G Mobile Platform
  • Snapdragon 778G+ 5G Mobile Platform
  • Snapdragon 782G Mobile Platform
  • Snapdragon 7c+ Gen 3 Compute
  • Snapdragon 7s Gen 3 Mobile Platform
  • Snapdragon 8 Gen 2 Mobile Platform
  • Snapdragon 8 Gen 3 Mobile Platform
  • Snapdragon 8+ Gen 2 Mobile Platform
  • Snapdragon 865 5G Mobile Platform
  • Snapdragon 865+ 5G Mobile Platform
  • Snapdragon 870 5G Mobile Platform
  • Snapdragon 888 5G Mobile Platform
  • Snapdragon 888+ 5G Mobile Platform
  • Snapdragon Auto 5G Modem-RF
  • Snapdragon Auto 5G Modem-RF Gen 2
  • Snapdragon W5+ Gen 1 Wearable Platform
  • Snapdragon X12 LTE Modem
  • Snapdragon X32 5G Modem-RF System
  • Snapdragon X35 5G Modem-RF System
  • Snapdragon X53 5G Modem-RF System
  • Snapdragon X55 5G Modem-RF System
  • Snapdragon X72 5G Modem-RF System
  • Snapdragon X75 5G Modem-RF System
  • Snapdragon XR2 5G Platform
  • Snapdragon XR2+ Gen 1 Platform
  • SnapdragonAuto 4GModem
  • SRV1H
  • SRV1M
  • SW5100
  • SW5100P
  • WCD9326
  • WCD9335
  • WCD9340
  • WCD9341
  • WCD9360
  • WCD9370
  • WCD9371
  • WCD9375
  • WCD9378
  • WCD9380
  • WCD9385
  • WCD9390
  • WCD9395
  • WCN3615
  • WCN3660B
  • WCN3680B
  • WCN3910
  • WCN3950
  • WCN3980
  • WCN3988
  • WCN3990
  • WCN6450
  • WCN6650
  • WCN6755
  • WSA8810
  • WSA8815
  • WSA8830
  • WSA8832
  • WSA8835
  • WSA8840
  • WSA8845
  • WSA8845H
Problem Types
TypeCWE IDDescription
CWECWE-416CWE-416 Use After Free
Type: CWE
CWE ID: CWE-416
Description: CWE-416 Use After Free
Metrics
VersionBase scoreBase severityVector
3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2026-bulletin.html
N/A
Hyperlink: https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2026-bulletin.html
Resource: N/A
â–¼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:product-security@qualcomm.com
Published At:02 Mar, 2026 | 17:16
Updated At:02 Mar, 2026 | 20:29

Memory Corruption when concurrent access to shared buffer occurs due to improper synchronization between assignment and deallocation of buffer resources.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-416Primaryproduct-security@qualcomm.com
CWE ID: CWE-416
Type: Primary
Source: product-security@qualcomm.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2026-bulletin.htmlproduct-security@qualcomm.com
N/A
Hyperlink: https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2026-bulletin.html
Source: product-security@qualcomm.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

2315Records found

CVE-2022-40522
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.07% / 20.58%
||
7 Day CHG+0.01%
Published-06 Jun, 2023 | 07:38
Updated-03 Aug, 2024 | 12:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Double free in Linux Networking

Memory corruption in Linux Networking due to double free while handling a hyp-assign.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca8072wcn3991_firmwarewcn3991wcd9380_firmwareqcn9070sa6150p_firmwaresa8145p_firmwareqcn9000qca8084ipq9008qcn5021qca4024_firmwareqca8082qcn9072qca8386sm7250-ac_firmwarecsr8811_firmwarewcd9380sa8150p_firmwareqca6595au_firmwaresa6155ipq6000qca8075_firmwareqca6574aipq6005_firmwareqcn5152_firmwareqca8072_firmwareqcn9000_firmwareqcn5052_firmwareqcn9274_firmwarewcn3998wcd9385_firmwareqcn6024_firmwareqca8386_firmwareipq6018_firmwaresm7250-abwsa8815qca8084_firmwareqca8082_firmwaresa8155qca6574a_firmwareqca6574au_firmwareqcn5122_firmwareqcn5152ipq6028qca6595auwcn3998_firmwareqca8081_firmwareqcn6023_firmwaresa6155_firmwaresm7250p_firmwareqcn9024ipq9574_firmwareipq6005sa6155p_firmwareqcn9274qcn5052qcn9070_firmwaresa8155_firmwareipq6010ipq6028_firmwaresm7250-ab_firmwareqca6574auqcn9074sa6145p_firmwaresa8155p_firmwareqca8085sm7250-aaipq9574qcn5122sa8195pqcn9024_firmwarewsa8810_firmwarewsa8810sm7250-aa_firmwareqcn5121_firmwaresa6155psm7250-acqca8081qcn6023ipq6018qcn5022sa6145pwcd9385qca8085_firmwareipq6010_firmwareqca6696_firmwaresa8145pqca6696ipq9008_firmwarecsr8811qca4024sa8150psa6150pqca8075qcn5021_firmwareqcn9022_firmwareqcn6024qcn9022sa8155pwsa8815_firmwareqcn9072_firmwaresm7250pipq6000_firmwaresa8195p_firmwareqcn5121qcn9074_firmwareqcn5022_firmwareSnapdragonsa6155p_firmwarewcd9380_firmwaresa6150p_firmwaresa8145p_firmwareqcn9070_firmwaresa8155_firmwareipq6028_firmwareqca4024_firmwaresa6145p_firmwaresa8155p_firmwareqcn9024_firmwarecsr8811_firmwarewsa8810_firmwaresa8150p_firmwareqca6595au_firmwareqcn5121_firmwareqca8075_firmwareipq6005_firmwareqcn5152_firmwareqca8085_firmwareipq6010_firmwareqca8072_firmwareqca6696_firmwareqcn9000_firmwareqcn5052_firmwareqcn9274_firmwareipq9008_firmwarewcd9385_firmwareqcn6024_firmwareipq6018_firmwareqca8386_firmwareqca8084_firmwareqcn9022_firmwareqcn5021_firmwaresm7250p_firmwareqcn9072_firmwarewsa8815_firmwareqca8082_firmwareqca6574a_firmwareipq6000_firmwarefastconnect_6200_firmwareqca6574au_firmwareqcn5122_firmwaresa8195p_firmwareipq9574_firmwareqca8081_firmwareqcn5022_firmwareqcn6023_firmwareqcn9074_firmwaresa6155_firmware
CWE ID-CWE-415
Double Free
CVE-2024-45584
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 9.86%
||
7 Day CHG~0.00%
Published-03 Feb, 2025 | 16:51
Updated-05 Feb, 2025 | 16:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Untrusted Pointer Dereference in Automotive Android OS

Memory corruption can occur when a compat IOCTL call is followed by a normal IOCTL call from userspace.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800_firmwareqep8111sa7255psnapdragon_x35_5g_modem-rfwcn7860qamsrv1mqdu1210qcn6224_firmwareqam8295p_firmwarewcn7881_firmwareqcs8550_firmwareqru1052_firmwarewcn7881qdu1010_firmwaresa7775p_firmwaresa8775pqca6574au_firmwareqam8775psa8195psa8650p_firmwareqcn6274_firmwareqca6391qca6584ausm8750wcn3950_firmwarevision_intelligence_400qca6688aq_firmwareqdu1110wcn6650qdu1210_firmwaresa8255psnapdragon_480_5g_mobilewcn3950snapdragon_w5\+_gen_1_wearablesw5100wsa8845_firmwareqcc710_firmwareqru1052qdu1000_firmwareqca6574_firmwareqcm8550_firmwaresnapdragon_8\+_gen_2_mobilesw5100p_firmwarear8035wcn6755_firmwareqep8111_firmwarevideo_collaboration_vc5_platform_firmwaresm7635_firmwaresrv1l_firmwareqru1032wsa8845hqca6574sa6155p_firmwarewcn6450_firmwaresnapdragon_4_gen_1_mobileqcm8550snapdragon_680_4g_mobilewcd9341sa8650psa8770p_firmwarewcn3988wcn7880_firmwareqca6698aq_firmwarewcd9395_firmwareqamsrv1m_firmwaresa8775p_firmwarewcn3990_firmwareqcs6125sm7635snapdragon_680_4g_mobile_firmwarefastconnect_6900qca6688aqwcn3988_firmwareqca6574awcd9335qcs8250wcd9375_firmwarewcd9385_firmwareqam8650p_firmwarewsa8810qdx1011snapdragon_8_gen_3_mobile_firmwareqam8255p_firmwaresa8295pwcd9375snapdragon_685_4g_mobile_firmwaresa8620p_firmwaresm6650snapdragon_w5\+_gen_1_wearable_firmwaresa7255p_firmwareqca6595_firmwareqdu1000fastconnect_6200_firmwareqamsrv1hsa6155psnapdragon_x75_5g_modem-rf_firmwarewcd9380snapdragon_480\+_5g_mobile_firmwaresnapdragon_480\+_5g_mobileqamsrv1h_firmwaresa8155pwcn7861_firmwarewsa8832_firmwaresw5100pwsa8830_firmwarewcn6755qca8081sg4150psnapdragon_8_gen_2_mobile_firmwareqca6595au_firmwareqdu1110_firmwareqcn6224wcd9385sa8255p_firmwarewsa8840_firmwareqca6595auqfw7124_firmwareqam8255psm4635wsa8840srv1hqam8620psm8550p_firmwareqfw7124ar8035_firmwareqca6696sa8195p_firmwaresg4150p_firmwaresa8155p_firmwareqca6595sm7675snapdragon_460_mobileqca8337wsa8845h_firmwareqdx1010_firmwareqam8650pqca8337_firmwarevideo_collaboration_vc1_platform_firmwarewsa8845qcm6125wcn6650_firmwarewcd9380_firmwarevision_intelligence_400_firmwarewcn6450qca6391_firmwaresnapdragon_662_mobile_firmwareqca6174a_firmwaresrv1mqdx1010qdu1010qru1062qam8775p_firmwaresm8635pvideo_collaboration_vc5_platformwcn3980sm8635p_firmwaresnapdragon_685_4g_mobilewcd9370wcd9340_firmwareqcs7230_firmwarewcd9378sm7675_firmwaresa8295p_firmwareqcm4325_firmwaresm8750psa9000pwsa8835sm8750p_firmwareqca8081_firmwareqca6678aqfastconnect_7800qca6797aq_firmwaresnapdragon_480_5g_mobile_firmwaresnapdragon_x75_5g_modem-rfwcd9341_firmwarewcd9340qam8295pqcs8250_firmwaresnapdragon_695_5g_mobilesnapdragon_8_gen_2_mobileqca6174awcn7880qam8620p_firmwaresm4635_firmwareqcm6125_firmwarewcd9378_firmwarewcd9335_firmwareqca6574auqca6797aqqcs7230qcs8550sm7675psw5100_firmwaresm6650_firmwaresnapdragon_auto_5g_modem-rf_gen_2qca6584au_firmwarewcn3990qca6696_firmwaresm7675p_firmwaresnapdragon_x72_5g_modem-rf_firmwareqdx1011_firmwarewsa8810_firmwareqru1032_firmwaresrv1m_firmwarewsa8832wcd9390_firmwareqcn6274sm8635qcc710snapdragon_695_5g_mobile_firmwaresm8635_firmwaresnapdragon_8_gen_3_mobilewsa8815qcs6125_firmwaresnapdragon_662_mobilesnapdragon_x72_5g_modem-rfqru1062_firmwarewcn7861qca6574a_firmwaresa8620psm8750_firmwarewsa8830wsa8815_firmwaresrv1lsnapdragon_8\+_gen_2_mobile_firmwarewcn7860_firmwaresa8770pfastconnect_6200srv1h_firmwarewcn3980_firmwaresnapdragon_x35_5g_modem-rf_firmwareqca6678aq_firmwareqca6698aqvideo_collaboration_vc1_platformsnapdragon_4_gen_1_mobile_firmwarefastconnect_6900_firmwareqcm4325snapdragon_460_mobile_firmwaresa9000p_firmwareqfw7114sm8550pwcd9390sa7775pwcd9395qfw7114_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwarewsa8835_firmwarewcd9370_firmwareSnapdragon
CWE ID-CWE-822
Untrusted Pointer Dereference
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2024-45574
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.86%
||
7 Day CHG+0.04%
Published-06 May, 2025 | 08:32
Updated-26 Feb, 2026 | 18:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Validation of Array Index in Camera Driver

Memory corruption during array access in Camera kernel due to invalid index from invalid command data.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_429_mobile_firmwarewcn3620_firmwaresdm429wwcn3620sdm429w_firmwarewcn3660b_firmwaresnapdragon_429_mobilewcn3660bSnapdragon
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2024-45570
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.07% / 20.86%
||
7 Day CHG+0.04%
Published-06 May, 2025 | 08:32
Updated-09 May, 2025 | 19:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use of Out-of-range Pointer Offset in Camera Driver

Memory corruption may occur during IO configuration processing when the IO port count is invalid.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800_firmwarewcd9341qca6696_firmwareqam8295psw5100pwcd9385_firmwarewcn3988_firmwaresnapdragon_865\+_5g_mobileqca6426sa9000pwsa8835_firmwareqcs610snapdragon_w5\+_gen_1_wearable_firmwareqam8295p_firmwareqsm8250_firmwarewcn3980qca6696sa8540p_firmwarec-v2x_9150_firmwareqcs410qsm8250wsa8832_firmwaresa6150p_firmwarewcn3620_firmwarewcd9385sa8530pqca6391sa8295psxr2230pwcn3620snapdragon_x55_5g_modem-rf_systemsnapdragon_865_5g_mobile_firmwarefastconnect_6800_firmwaresa6155p_firmwaresnapdragon_429_mobilesa8195p_firmwaresw5100p_firmwaresnapdragon_xr2_5gqca6574au_firmwarewcd9370_firmwaresa8155p_firmwaresdm429wsnapdragon_865\+_5g_mobile_firmwarefastconnect_6900c-v2x_9150snapdragon_8_gen_1_mobilesnapdragon_870_5g_mobile_firmwaresa8145p_firmwarefastconnect_7800wcn3680bwsa8832sa8150psxr2130_firmwarewcn3660bwsa8810wcd9380_firmwaresd865_5g_firmwaresnapdragon_w5\+_gen_1_wearablesnapdragon_429_mobile_firmwarevideo_collaboration_vc1_platform_firmwarewcd9341_firmwarewsa8835qcn9074_firmwaresnapdragon_xr2_5g_firmwarewcd9370sdm429w_firmwarewsa8830sa9000p_firmwareqca6574auvideo_collaboration_vc3_platformsa6145psa8195psa6150psnapdragon_8_gen_1_mobile_firmwarewsa8815_firmwaresnapdragon_865_5g_mobilewcn3980_firmwarewcn3950_firmwaresa8530p_firmwaresa8540psa8295p_firmwaresd865_5gsw5100_firmwarevideo_collaboration_vc3_platform_firmwaresw5100snapdragon_x55_5g_modem-rf_system_firmwaresxr2250psxr2130wsa8810_firmwaresxr2230p_firmwarefastconnect_6800qca6426_firmwaresa8150p_firmwaresnapdragon_870_5g_mobilewcn3950wcn3988wcn3680b_firmwarewsa8830_firmwaresxr2250p_firmwarewcd9380sdx55_firmwarewsa8815qcs610_firmwareqca6436_firmwareqca6436sa6155psa8155psdx55sa8145pvideo_collaboration_vc1_platformfastconnect_6900_firmwaresa6145p_firmwareqcn9074wcn3660b_firmwareqca6391_firmwareqcs410_firmwareSnapdragon
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-823
Use of Out-of-range Pointer Offset
CVE-2024-45560
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 5.22%
||
7 Day CHG~0.00%
Published-03 Feb, 2025 | 16:51
Updated-12 Feb, 2025 | 20:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Camera

Memory corruption while taking a snapshot with hardware encoder due to unvalidated userspace buffer.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800_firmwarewsa8840qcm6490_firmwaresdm429wsc8380xp_firmwareqcs5430wsa8845h_firmwareqca6420wcn3620_firmwarewsa8845qcm6490wcd9380_firmwareqca6391_firmwaresc8180x-ad_firmwareqca6391qcs5430_firmwarewcn3660bsdm429w_firmwareqca6430wsa8845_firmwarevideo_collaboration_vc3_platform_firmwareqcm5430wcd9370wcd9340_firmwaresc8180x-acafsnapdragon_429_mobile_firmwarewsa8835wsa8845haqt1000_firmwarefastconnect_7800wcd9341_firmwarewcd9340wcd9341sc8280xp-abbbsc8180x-aaab_firmwarefastconnect_6900qcm5430_firmwarefastconnect_6800snapdragon_7c\+_gen_3_computesnapdragon_429_mobilefastconnect_6700wcd9375_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewsa8810_firmwarewcd9385_firmwarewsa8810fastconnect_6700_firmwaresc8180x-adwcd9375sc8280xp-abbb_firmwaresc8180x-aaabqca6420_firmwarewsa8815fastconnect_6200_firmwareqca6430_firmwarewcd9380video_collaboration_vc3_platformwsa8830wsa8815_firmwarefastconnect_6200wsa8830_firmwarewcn3620fastconnect_6900_firmwareqcs6490qcs6490_firmwaresc8180x-acaf_firmwaresc8380xpaqt1000fastconnect_6800_firmwarewcd9385wsa8840_firmwarewcn3660b_firmwarewsa8835_firmwarewcd9370_firmwareSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-45547
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.10% / 27.65%
||
7 Day CHG~0.00%
Published-06 Jan, 2025 | 10:33
Updated-13 Jan, 2025 | 21:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in WLAN Windows Host

Memory corruption while processing IOCTL call invoked from user-space to verify non extension FIPS encryption and decryption functionality.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wsa8840_firmwarefastconnect_7800qcc2073_firmwareqcc2076qcc2076_firmwarewsa8845hfastconnect_7800_firmwarewsa8845h_firmwarewcd9380_firmwarewcd9385_firmwarefastconnect_6900_firmwarewcd9380qcc2073wcd9385fastconnect_6900sc8380xp_firmwaresc8380xpwsa8845_firmwarewsa8840wsa8845Snapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2022-40524
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 5.07%
||
7 Day CHG~0.00%
Published-05 Sep, 2023 | 06:23
Updated-03 Aug, 2024 | 12:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer over-read in Modem

Memory corruption due to buffer over-read in Modem while processing SetNativeHandle RTP service.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380_firmwarewsa8830sa6150p_firmwaresa8145p_firmwaresw5100psd865_5gqcc5100sdx55m_firmwarewsa8835wcd9380sa8150p_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwareqca6426qca6430_firmwarewcn3980wcn3998sdxr2_5g_firmwaresd855wcn3660bwcn6850wsa8815qca6426_firmwarewcn3660b_firmwareqca6574au_firmwarewcn3680b_firmwareqca6595auwcn3998_firmwarewcn3980_firmwareqca6391sdx55mqca6420qca6436_firmwareqcc5100_firmwareaqt1000_firmwaresa6155p_firmwaresdxr2_5gwcn6851_firmwarewcn3988_firmwareqca6430qca6574ausa6145p_firmwaresa8155p_firmwaresa8195pwsa8810_firmwarewcd9341_firmwaresw5100sd870wsa8810qca6436wcn6851sa6155psw5100p_firmwaresa6145pwcn3680bwcd9341qca6696_firmwaresa8145psd870_firmwareqca6696qca6391_firmwareqca6390aqt1000sa8150psa6150psa8155pwsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3988wcn6850_firmwarewsa8815_firmwarewsa8835_firmwaresa8195p_firmwaresw5100_firmwareSnapdragon
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-45581
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.17% / 37.76%
||
7 Day CHG+0.11%
Published-06 May, 2025 | 08:32
Updated-26 Feb, 2026 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds Write in Audio

Memory corruption while sound model registration for voice activation with audio kernel driver.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_429_mobile_firmwareqam8295pqca6696_firmwareqca6678aqsdm429w_firmwaremdm9628_firmwaresa9000pqca6574ausa9000p_firmwaresa6145psa8195pqca6574a_firmwareqca6678aq_firmwareqam8295p_firmwaresa6150pqca6595au_firmwareqca9367qca6698aq_firmwaresa8540p_firmwareqca6696sa8530p_firmwaresa8540psa8295p_firmwareqca6564au_firmwareqca6688aqqca9377_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqca6574asa6150p_firmwarewcn3620_firmwaresa8530psa8150p_firmwareqca9367_firmwaresa8295pqca6688aq_firmwareqca6564auqca9377wcn3620qcs8550sa6155p_firmwareqcs8550_firmwaresnapdragon_429_mobilesa8195p_firmwareqca6574au_firmwaresa6155psa8155psnapdragon_auto_5g_modem-rf_gen_2sa8155p_firmwaresa8145psdm429wmdm9628qca6564aqca6595ausa8145p_firmwareqca6698aqsa6145p_firmwareqca6564a_firmwaresa8150pwcn3660b_firmwarewcn3660bSnapdragon
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-45565
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.83%
||
7 Day CHG+0.03%
Published-06 May, 2025 | 08:31
Updated-26 Feb, 2026 | 18:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Camera Driver

Memory corruption when blob structure is modified by user-space after kernel verification.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_429_mobile_firmwarewcn3620_firmwaresdm429wwcn3620sdm429w_firmwarewcn3660b_firmwaresnapdragon_429_mobilewcn3660bSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-45578
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.86%
||
7 Day CHG+0.04%
Published-06 May, 2025 | 08:32
Updated-26 Feb, 2026 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Validation of Array Index in Camera Driver

Memory corruption while acquire and update IOCTLs during IFE output resource ID validation.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380_firmwaresnapdragon_429_mobile_firmwarefastconnect_7800_firmwarewcn3620_firmwarewcd9385wsa8835sxr2230p_firmwarewcn3660bwcd9385_firmwaresxr2230pwcn3620sdm429w_firmwarewsa8830wsa8830_firmwarewsa8835_firmwaresxr2250p_firmwarewcd9380snapdragon_8_gen_1_mobile_firmwaresnapdragon_429_mobilefastconnect_6900sdm429wfastconnect_6900_firmwaresnapdragon_8_gen_1_mobilewsa8832_firmwarewsa8832wcn3660b_firmwarefastconnect_7800sxr2250pSnapdragon
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2024-45557
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.86%
||
7 Day CHG~0.00%
Published-07 Apr, 2025 | 10:15
Updated-26 Feb, 2026 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use of Out-of-range Pointer Offset in Trust Management Engine

Memory corruption can occur when TME processes addresses from TZ and MPSS requests without proper validation.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-ssg2125p_firmwaresnapdragon_8_gen_1_mobile_platformqru1032ar8035_firmwareqdu1210qcs4490_firmwareqdx1010qcn6224_firmwareqcn6274_firmwareqru1062wsa8832snapdragon_x75_5g_modem-rf_system_firmwaresnapdragon_x72_5g_modem-rf_system_firmwarewcn3988qca6584auwsa8835ssg2125psnapdragon_8\+_gen_1_mobile_platformqca6174a_firmwaresnapdragon_x35_5g_modem-rf_system_firmwareqca6698aqsd_8_gen1_5g_firmwaresxr2230p_firmwareqdx1011_firmwaressg2115pwcn3950_firmwaresnapdragon_8_gen_3_mobile_platformwcn3988_firmwarefastconnect_7800_firmwarewsa8845_firmwarewsa8830qdx1010_firmwaresm8635sxr1230p_firmwarewcn6755wsa8845h_firmwarewsa8815_firmwarewsa8810wcd9370_firmwareqfw7114_firmwareqru1032_firmwaresnapdragon_x35_5g_modem-rf_systemtalynplus_firmwareqcc710_firmwarewsa8840_firmwareqru1052_firmwarear8035wcd9395wsa8810_firmwarewcd9380_firmwarewsa8835_firmwareqfw7124_firmwareqru1062_firmwaresd_8_gen1_5gssg2115p_firmwareqep8111wcd9370snapdragon_8_gen_1_mobile_platform_firmwaresm8635_firmwareqcm4490wcd9385qdu1110wsa8832_firmwareqcc710sxr1230pqca6174aqca8081_firmwareqdu1010wsa8840qfw7124qca8081wcn3950snapdragon_4_gen_2_mobile_platform_firmwarewcd9375_firmwaretalynpluswcd9385_firmwarewsa8815qcn6224snapdragon_ar2_gen_1_platformsnapdragon_4_gen_2_mobile_platformwcd9390_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewcd9380qdu1110_firmwareqcs4490fastconnect_6700_firmwarefastconnect_7800wsa8845hwcn6755_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqfw7114qcn6274sc8380xpwcd9340qdu1000_firmwarefastconnect_6900_firmwareqdu1000fastconnect_6700qca6584au_firmwaresnapdragon_ar2_gen_1_platform_firmwareqca8337_firmwaresxr2230pwcd9395_firmwarewsa8845qcm4490_firmwarefastconnect_6900wcd9375qep8111_firmwaresc8380xp_firmwareqdu1010_firmwareqdu1210_firmwaresnapdragon_8\+_gen_1_mobile_platform_firmwaresnapdragon_x75_5g_modem-rf_systemwcd9340_firmwarewcd9390qdx1011qca6698aq_firmwaresnapdragon_auto_5g_modem-rf_gen_2qca8337wsa8830_firmwaresnapdragon_x72_5g_modem-rf_systemqru1052Snapdragon
CWE ID-CWE-823
Use of Out-of-range Pointer Offset
CVE-2024-45568
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 19.26%
||
7 Day CHG+0.04%
Published-06 May, 2025 | 08:32
Updated-26 Feb, 2026 | 18:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in Camera Driver

Memory corruption due to improper bounds check while command handling in camera-kernel driver.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380_firmwaresnapdragon_429_mobile_firmwarefastconnect_7800_firmwarewcn3620_firmwarewcd9385wsa8835sxr2230p_firmwarewcn3660bwcd9385_firmwaresxr2230pwcn3620sdm429w_firmwarewsa8830wsa8830_firmwarewsa8835_firmwaresxr2250p_firmwarewcd9380snapdragon_429_mobilefastconnect_6900sdm429wfastconnect_6900_firmwarewsa8832_firmwarewsa8832wcn3660b_firmwarefastconnect_7800sxr2250pSnapdragon
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-45573
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 9.86%
||
7 Day CHG~0.00%
Published-03 Feb, 2025 | 16:51
Updated-12 Feb, 2025 | 20:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use of Out-of-range Pointer Offset in Display

Memory corruption may occour while generating test pattern due to negative indexing of display ID.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800_firmwarewsa8840fastconnect_6900qcm5430_firmwareqcm6490_firmwaresdm429wsc8380xp_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_429_mobilefastconnect_6700qcs5430wcd9375_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewsa8845h_firmwarewcn3620_firmwarewcd9385_firmwarewsa8845qcm6490fastconnect_6700_firmwarewcd9380_firmwarewcd9375qcs5430_firmwarewcn3660bsc8280xp-abbb_firmwaresdm429w_firmwarewcd9370_firmwarewsa8845_firmwarevideo_collaboration_vc3_platform_firmwareqcm5430wcd9370wcd9380video_collaboration_vc3_platformwsa8830snapdragon_429_mobile_firmwarewsa8835wsa8845hwsa8830_firmwarewcn3620fastconnect_7800fastconnect_6900_firmwareqcs6490qcs6490_firmwaresc8380xpwcd9385wsa8840_firmwarewcn3660b_firmwarewsa8835_firmwaresc8280xp-abbbSnapdragon
CWE ID-CWE-823
Use of Out-of-range Pointer Offset
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2024-45542
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.11% / 30.27%
||
7 Day CHG~0.00%
Published-06 Jan, 2025 | 10:33
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack-based Buffer Overflow in WLAN Windows Host

Memory corruption when IOCTL call is invoked from user-space to write board data to WLAN driver.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wsa8845_firmwareqcc2076_firmwarewsa8840wcd9370sc8180xp-aaab_firmwarewcd9340_firmwarewcd9385sc8380xpwcd9341_firmwareqca1064qcn7606snapdragon_7c_compute_platform_firmwareqcn7605_firmwaresnapdragon_7c\+_gen_3_compute_firmwareqcc2073_firmwarefastconnect_6700qca1064_firmwareqca6420sc8180xp-adsc8280xp-abbbsnapdragon_7c_gen_2_compute_platform_firmwareqca6430wsa8815_firmwarewcd9370_firmwaresc8180xp-ad_firmwareqcn7605qcc2076qcm6490_firmwaresc8180xp-aaabqcn7606_firmwareqca6595auwcd9340wcd9341qcm6490wsa8810_firmwarewsa8845h_firmwareqca2062qca6420_firmwareaqt1000_firmwareqcs6490_firmwaresc8180xp-acafqca2064_firmwaresnapdragon_7c\+_gen_3_computewsa8835qca6595au_firmwareqca6391_firmwarewsa8840_firmwareqca2066_firmwareqca6430_firmwarefastconnect_6800_firmwareqcs5430wsa8845hwcd9380_firmwareqcm5430sm6250_firmwaresc8180x-ad_firmwareqcm5430_firmwaresc8180x-acafwsa8815wsa8830sc8180x\+sdx55_firmwareqca2062_firmwareqcc2073sc8380xp_firmwareqca2065fastconnect_6800qca1062fastconnect_7800_firmwarefastconnect_6900wcd9375_firmwareqca6391qcs5430_firmwaresc8180x\+sdx55snapdragon_7c_gen_2_compute_platformwcd9385_firmwaresm6250fastconnect_6900_firmwarewcd9380qca1062_firmwarefastconnect_6200sc8280xp-abbb_firmwarefastconnect_7800sc8180x-acaf_firmwarewcd9375snapdragon_7c_compute_platformwsa8845fastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwareqca2064sc8180x-adsc8180x-aaabwsa8810sc8180x-aaab_firmwarewsa8835_firmwareqca2066qcs6490sc8180xp-acaf_firmwarefastconnect_6200_firmwareqca2065_firmwarewsa8830_firmwarevideo_collaboration_vc3_platformaqt1000Snapdragon
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-45563
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.07% / 20.86%
||
7 Day CHG+0.04%
Published-06 May, 2025 | 08:31
Updated-09 May, 2025 | 19:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds Write in Camera Driver

Memory corruption while handling schedule request in Camera Request Manager(CRM) due to invalid link count in the corresponding session.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380_firmwaresnapdragon_429_mobile_firmwarefastconnect_7800_firmwarewcn3620_firmwarewcd9385wsa8835sxr2230p_firmwarewcn3660bwcd9385_firmwaresxr2230pwcn3620sdm429w_firmwarewsa8830wsa8830_firmwarewsa8835_firmwaresxr2250p_firmwarewcd9380snapdragon_8_gen_1_mobile_firmwaresnapdragon_429_mobilefastconnect_6900sdm429wfastconnect_6900_firmwaresnapdragon_8_gen_1_mobilewsa8832_firmwarewsa8832wcn3660b_firmwarefastconnect_7800sxr2250pSnapdragon
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-13916
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.09% / 26.39%
||
7 Day CHG~0.00%
Published-21 Nov, 2019 | 14:38
Updated-05 Aug, 2024 | 09:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds memory access in Qurt kernel function when using the identifier to access Qurt kernel buffer to retrieve thread data. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096, APQ8096AU, APQ8098, IPQ8074, MDM9150, MDM9206, MDM9607, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8976, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA8081, QCM2150, QCN7605, QCS404, QCS405, QCS605, QM215, SC8180X, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX55, SM8150, SM8250, Snapdragon_High_Med_2016, SXR1130, SXR2130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-mdm9150_firmwaremdm9635m_firmwareapq8096_firmwaremdm9640_firmwareqcm2150_firmwaresdm632_firmwaremsm8996au_firmwaresdm845sdm450_firmwaresdm632apq8096sdm439qcs404_firmwaremdm9650sdm429msm8940_firmwaresnapdragon_high_med_2016_firmwaremsm8909w_firmwaremsm8976_firmwaremsm8996auapq8009_firmwaremsm8917sdm670sxr2130qcs605_firmwaresc8180xmdm9206sdm670_firmwareqcs404ipq8074sdm636sda845_firmwaremdm9635mapq8098qcn7605mdm9206_firmwareqcs605msm8937_firmwaremdm9650_firmwaresdm429_firmwaremsm8905_firmwaresda660sdx55_firmwaresxr1130_firmwareqca8081_firmwaresxr1130msm8909wapq8009msm8909_firmwareapq8053_firmwaresda845nicobarsdm850_firmwaremsm8920msm8953sdm450sdm636_firmwaresdm845_firmwareapq8098_firmwaresdx20msm8998_firmwareqcm2150msm8920_firmwaresdm630mdm9607_firmwaresm8250_firmwaremdm9655_firmwaresdm660sc8180x_firmwareqcs405ipq8074_firmwaresdm710qm215mdm9607apq8017_firmwaresdm710_firmwareqcn7605_firmwareqca8081mdm9150msm8937msm8996_firmwaremsm8905snapdragon_high_med_2016sm8150_firmwaremsm8909sxr2130_firmwaremdm9655apq8096ausdm439_firmwareqcs405_firmwaresdm630_firmwaresda660_firmwareqm215_firmwaremsm8976sdx55msm8953_firmwaremsm8940apq8053apq8096au_firmwaresm8250msm8917_firmwaremsm8998sm8150sdx20_firmwaresdm850apq8017msm8996nicobar_firmwaresdm660_firmwaremdm9640Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2022-40520
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-3.85% / 88.04%
||
7 Day CHG~0.00%
Published-06 Jan, 2023 | 05:02
Updated-09 Apr, 2025 | 19:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack based buffer overflow in Core

Memory corruption due to stack-based buffer overflow in Core

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresd_8cx_gen3_firmwaremdm9640_firmwaresa6150p_firmwaresm6250p_firmwareqcs610qca8337qca6431_firmwarewcd9360_firmwaresdx65wcn3950_firmwaresa8150p_firmwareqca6595au_firmwaresa6155qca6335sd_455_firmwareqcs605_firmwaresd_675_firmwaresa415mwcn3998wcd9371_firmwareqam8295psd_8cx_gen2_firmwareqcn6024_firmwaresd720gwcn3950sd_8_gen1_5g_firmwareqsm8350_firmwaresd710_firmwareqsm8350sm7315_firmwarewcn7850qca6574au_firmwarewcd9375_firmwareqca8081_firmwaresa6155_firmwarewcn3998_firmwareqca6420wcd9360sd_8cx_gen2qrb5165_firmwareqrb5165m_firmwaresa4155p_firmwaresa8155_firmwareqca4004_firmwareqca6430wcd9306_firmwarewcd9340sd765gfsm10056_firmwareqca6436wcn6851sa6155pqcs603_firmwarewcn7851_firmwarewcd9341qca6431qca6696_firmwarewcd9371sd750gsd870_firmwaresxr2150p_firmwaresd_8cxsa8150pqca4004wsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwaresd712wcn3988sd660_firmwarewcn7850_firmwaresa8195p_firmwaresm8475sa8295p_firmwarewcn6750_firmwaremdm9640wcn3991qca8337_firmwarewcd9380_firmwaremsm8996au_firmwareqca6564ausdx55m_firmwarewcn6856_firmwaresd670_firmwareqca6574wcd9380qcs410sd690_5g_firmwaresdx50m_firmwaresdx24_firmwareqca6430_firmwareqcn9012_firmwarewcd9335_firmwarewcn3980qca6335_firmwareqcs605wcd9340_firmwarewsa8815wcn6850sd7cqca6320mdm9650_firmwareqca6426_firmwaresd835qcn9024wcn3980_firmwaresd730sdx55msa8295pqca6421_firmwarewcn6740_firmwaresd678_firmwareapq8064au_firmwareqrb5165wcn6851_firmwareqcs603sd_636_firmwaresd670qca6564a_firmwareqcn9024_firmwaresd870wcn6855sa8540pqcs610_firmwareqsm8250sa6145psdxr1apq8096auqca6595_firmwaresa8145psdm630_firmwaremdm9205_firmwareqca6391_firmwaresd820_firmwaresa4150p_firmwaresd780g_firmwarewcd9370_firmwaresdx55sd888_firmwaresa8155psd675qcs8155_firmwaresa4155psxr2150par8035_firmwareqsm8250_firmwarewcn3991_firmwaremdm9150_firmwarewsa8830sd678sa8145p_firmwarefsm10056sd7c_firmwarecsrb31024mdm9650sd_636sd765g_firmwareqca6420_firmwareqca6390_firmwaresd690_5gsd730_firmwarewcd9370sd675_firmwareqca6564qca6426qca6584au_firmwarewcn3990_firmwareqrb5165n_firmwareqca9377sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwareqam8295p_firmwareqcn9011_firmwaresa8155qca6320_firmwaresa9000p_firmwaresdx55_firmwareqca6595ausm7250p_firmwareqca6436_firmwareqrb5165nqca6564au_firmwareqca6584ausa6155p_firmwareqca6310sd778gwcd9306qcs8155sa515m_firmwareqcs6490wcn7851sdxr2_5gsdm630sa415m_firmwarewcn3988_firmwaresa6145p_firmwareqca6421sd712_firmwaresd778g_firmwaresm6250sa8195pwsa8810_firmwaresd765_firmwarewcd9326wcd9335qca8081qca6174a_firmwarewcd9385qcs6490_firmwaresd_8cx_gen3ar8035qca6390sd750g_firmwareapq8064auaqt1000wcd9375sm6250_firmwaresd820qcm6490sd888_5g_firmwarewcn6850_firmwarewsa8815_firmwarewsa8835_firmwareqcx315qca6564asa4150pwcn3990sd_675sd780gsd865_5gqca6595sdx24qcn9012sd888wsa8835qcx315_firmwaremsm8996ausa8540p_firmwaresd888_5gsm6250psc8180xqca6574awcn6855_firmwareqca6174asm7325pqca6310_firmwarewcn6750mdm9205sa515mqca6574_firmwaresa9000psd855sm7325p_firmwaresd765qca6574a_firmwaresd768g_firmwareqrb5165msd850_firmwaresm7315qca6391sdxr1_firmwareaqt1000_firmwaresdx65_firmwarecsrb31024_firmwareqcm6490_firmwaresdx50mqcn9011sc8180x_firmwaresd_455qca6574ausa8155p_firmwaresd710wcd9341_firmwarewsa8810mdm9150wcn6856sd835_firmwareqca6564_firmwaresd768gwcn6740qca6696sd845_firmwaresa6150papq8096au_firmwareqcn6024sd845sm7250psd720g_firmwareqcs410_firmwaresd850Snapdragon
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-43052
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.11% / 29.00%
||
7 Day CHG~0.00%
Published-02 Dec, 2024 | 10:18
Updated-12 Dec, 2024 | 15:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in Video Analytics and Processing

Memory corruption while processing API calls to NPU with invalid input.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_wear_2100_platformwsa8830sg8275p_firmwareqca6431_firmwaresnapdragon_870_5g_mobile_platform_firmwaresnapdragon_865_5g_mobile_platformwsa8840snapdragon_wear_2100_platform_firmwaresnapdragon_212_mobile_platformwcn6755_firmwaresnapdragon_427_mobile_platformwcd9370home_hub_100_platformqca6426snapdragon_8_gen_2_mobile_platformmsm8108msm8108_firmwarewcd9385_firmwarewcn7881_firmwarewcd9326_firmwarewcn3615_firmwareqsw8573_firmwarewcn3660bapq8037snapdragon_435_mobile_platform_firmwaresnapdragon_429_mobile_platform_firmwaresnapdragon_x55_5g_modem-rf_systemwcn3680b_firmwaresdx55_firmwaresnapdragon_208_processor_firmwaresnapdragon_212_mobile_platform_firmwarewcd9375_firmwaresnapdragon_8_gen_3_mobile_platformwcn3615wsa8845h_firmwaremsm8909wsnapdragon_425_mobile_platformwcn3610_firmwaresnapdragon_429_mobile_platformqca6436_firmwaresnapdragon_xr2\+_gen_1_platformwcn7860snapdragon_427_mobile_platform_firmwareqcm8550_firmwareqcn9274pm8937snapdragon_870_5g_mobile_platformsnapdragon_208_processorwcn7881snapdragon_439_mobile_platformwsa8840_firmwarevideo_collaboration_vc5_platformqcs8550_firmwaresc8380xp_firmwaresnapdragon_wear_3100_platformsm8635wcn7880_firmwareqca6421apq8017_firmwarewsa8810_firmwarehome_hub_100_platform_firmwarewsa8845hqca6436wcd9326wcd9335sm8750_firmwareqcs7230sm8750p_firmwarewcd9395_firmwarewcn6755msm8209_firmwareqca6174a_firmwarewcd9385sxr2130_firmwaresnapdragon_wear_2500_platformpm8937_firmwareqca6431wcd9375snapdragon_210_processor_firmwaresnapdragon_430_mobile_platformwcd9390wsa8830_firmwaresd865_5g_firmwarewcn3620_firmwarewsa8815_firmwarewsa8835_firmwarewcn3620video_collaboration_vc5_platform_firmwaresnapdragon_865_5g_mobile_platform_firmwareapq8017fastconnect_6800_firmwaresnapdragon_8_gen_2_mobile_platform_firmwarewcn3610wcn7880msm8608wcd9380_firmwareqcm2150_firmwaresdm429wsd865_5gfastconnect_6800qcm8550qcs7230_firmwareqet4101_firmwaremsm8909w_firmwarewsa8835sdm429w_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwarewcd9380snapdragon_wear_4100\+_platform_firmwaresnapdragon_210_processorsxr2130snapdragon_425_mobile_platform_firmwaresm8635_firmwaresnapdragon_wear_4100\+_platformsnapdragon_430_mobile_platform_firmwareqca9379_firmwareqca6174asg8275pwcd9335_firmwarewcn3980qcn9274_firmwarewsa8845qsw8573wsa8815snapdragon_865\+_5g_mobile_platformwsa8845_firmware205_mobile_platform_firmwaresnapdragon_xr2_5g_platform_firmwaresnapdragon_439_mobile_platform_firmwareqca6426_firmwareqcs8250snapdragon_435_mobile_platformsc8380xpsm8750pwcn3660b_firmwarewcn3680msm8209wcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresnapdragon_xr2\+_gen_1_platform_firmwareqca6391qca6421_firmwarefastconnect_7800snapdragon_865\+_5g_mobile_platform_firmwaresmart_audio_200_platform215_mobile_platformsnapdragon_xr2_5g_platformwcn7861_firmwarewcn3680_firmwarewsa8832_firmwarefastconnect_6900fastconnect_6900_firmwareqcm2150smart_audio_200_platform_firmwareqcs8250_firmwarefastconnect_7800_firmwaresnapdragon_8\+_gen_2_mobile_platformwsa8810wsa8832sm8550pqsm8250wcn3680bsm8750snapdragon_wear_2500_platform_firmwarewcn7860_firmwarewcd9395wcn7861205_mobile_platform215_mobile_platform_firmwareqca6391_firmwareqcs8550msm8608_firmwaresm8550p_firmwarewcd9370_firmwaresdx55snapdragon_8_gen_3_mobile_platform_firmwarewcd9390_firmwareapq8037_firmwareqet4101snapdragon_wear_3100_platform_firmwareqca9379qsm8250_firmwareSnapdragonwcd9380_firmwareqcm2150_firmwaresg8275p_firmwareqca6431_firmwareqcs7230_firmwareqet4101_firmwaremsm8909w_firmwaresnapdragon_wear_2100_platform_firmwaresdm429w_firmwarewcn6755_firmwaresnapdragon_425_mobile_platform_firmwaresm8635_firmwaresnapdragon_430_mobile_platform_firmwareqca9379_firmwarewcd9335_firmwareqcn9274_firmwaremsm8108_firmwarewcd9385_firmwarewcn7881_firmwarewcd9326_firmwarewcn3615_firmwareqsw8573_firmwarewsa8845_firmwaresnapdragon_xr2_5g_platform_firmwaresnapdragon_439_mobile_platform_firmwaresnapdragon_435_mobile_platform_firmwareqca6426_firmwarewcn3660b_firmwaresnapdragon_429_mobile_platform_firmwarewcn3680b_firmwaresdx55_firmwaresnapdragon_208_processor_firmwaresnapdragon_212_mobile_platform_firmwarewcd9375_firmwarewsa8845h_firmwarewcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcn3610_firmwareqca6436_firmwareqca6421_firmwaresnapdragon_427_mobile_platform_firmwareqcm8550_firmwarewcn7861_firmwarewcn3680_firmwarewsa8840_firmwarewsa8832_firmwarefastconnect_6900_firmwareqcs8550_firmwaresc8380xp_firmwarewcn7880_firmwaresmart_audio_200_platform_firmwareapq8017_firmwarewsa8810_firmwareqcs8250_firmwarefastconnect_7800_firmwarehome_hub_100_platform_firmwarewcd9395_firmwaresm8750_firmwaresm8750p_firmwaremsm8209_firmwarequalcomm_215_mobile_platform_firmwareqca6174a_firmwarequalcomm_205_mobile_platform_firmwaresxr2130_firmwarepm8937_firmwaresnapdragon_wear_2500_platform_firmwarewcn7860_firmwareqca6391_firmwaremsm8608_firmwaresm8550p_firmwaresnapdragon_210_processor_firmwarewcd9370_firmwarequalcomm_video_collaboration_vc5_platform_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewcd9390_firmwarewsa8830_firmwaresd865_5g_firmwarewcn3620_firmwareapq8037_firmwarewsa8815_firmwarewsa8835_firmwaresnapdragon_865_5g_mobile_platform_firmwaresnapdragon_wear_3100_platform_firmwarefastconnect_6800_firmwaresnapdragon_8_gen_2_mobile_platform_firmwareqsm8250_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2024-43067
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.23%
||
7 Day CHG~0.00%
Published-07 Apr, 2025 | 10:15
Updated-26 Feb, 2026 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Camera

Memory corruption occurs during the copying of read data from the EEPROM because the IO configuration is exposed as shared memory.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sw5100pwsa8832_firmwaresa8195psnapdragon_xr2_5g_platformvideo_collaboration_vc1_platformwsa8810_firmwarewsa8835sxr2130qcs610_firmwareqam8295pqca6696fastconnect_7800sdx55_firmwarewcn3660bqca6391wsa8830sa8155pwsa8832sw5100sa8155p_firmwarefastconnect_6800sa6150p_firmwarewcn3988_firmwaresnapdragon_865_5g_mobile_platform_firmwareqca6426_firmwarevideo_collaboration_vc1_platform_firmwarewsa8835_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresa8295p_firmwaresd865_5g_firmwarewcn3660b_firmwaresa6155p_firmwaresa6145pqcs410_firmwarewcd9385qca6696_firmwaresa8530pwcd9385_firmwarewcn3680b_firmwaresnapdragon_xr2_5g_platform_firmwarevideo_collaboration_vc3_platform_firmwarec-v2x_9150_firmwaresxr2250pwcn3680bsdm429wqca6426sa8145pqcs610wcn3950_firmwaresa6150pqca6436sxr2230p_firmwaresa8530p_firmwarewcd9370_firmwaresxr2250p_firmwaresnapdragon_865_5g_mobile_platformwcd9370qca6574au_firmwarewsa8815sdm429w_firmwaresa8295pwcd9341qsm8250_firmwaresa6145p_firmwarewsa8810qca6436_firmwaresnapdragon_870_5g_mobile_platform_\(sm8250-ac\)snapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)_firmwarewcd9380sxr2130_firmwarec-v2x_9150fastconnect_6800_firmwarewsa8815_firmwarefastconnect_6900_firmwaresnapdragon_8_gen_1_mobile_platform_firmwaresw5100p_firmwareqca6391_firmwaresa8540p_firmwaresnapdragon_429_mobile_platform_firmwaresa8150p_firmwareqcn9074video_collaboration_vc3_platformsw5100_firmwarewcn3980_firmwaresd865_5gsnapdragon_870_5g_mobile_platform_\(sm8250-ac\)_firmwareqam8295p_firmwarefastconnect_7800_firmwaresnapdragon_429_mobile_platformsnapdragon_w5\+_gen_1_wearable_platform_firmwarewcn3620snapdragon_w5\+_gen_1_wearable_platformwcn3980sa8145p_firmwareqca6574auwcn3988snapdragon_8_gen_1_mobile_platformqcn9074_firmwaresa8150pfastconnect_6900wcn3620_firmwareqsm8250snapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)sa9000psxr2230psdx55wcd9341_firmwaresa9000p_firmwaresa8195p_firmwaresa6155psnapdragon_x55_5g_modem-rf_systemwcn3950wcd9380_firmwareqcs410wsa8830_firmwaresa8540pSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-43049
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.08% / 23.97%
||
7 Day CHG~0.00%
Published-02 Dec, 2024 | 10:18
Updated-12 Dec, 2024 | 15:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Restriction of Operations within the Bounds of a Memory Buffer in WLAN Windows Host

Memory corruption while invoking IOCTL calls from user space to set generic private command inside WLAN driver.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800wcd9380_firmwarewsa8830sdm429wwsa8840_firmwarefastconnect_6900fastconnect_6900_firmwaresc8380xp_firmwareqcc2073wsa8835wsa8840sdm429w_firmwarefastconnect_6700_firmwaresnapdragon_7c\+_gen_3_computewcd9380fastconnect_7800_firmwarewsa8845hfastconnect_6700snapdragon_8cx_gen_3_compute_platformwcd9385qcc2076_firmwarewcd9385_firmwarewsa8845qcc2073_firmwarewcn3660bwsa8830_firmwareqcc2076wsa8845_firmwarewcn3620_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewcn3660b_firmwarewsa8835_firmwaresc8380xpsnapdragon_429_mobile_platform_firmwarewcn3620wsa8845h_firmwaresnapdragon_429_mobile_platformsnapdragon_8cx_gen_3_compute_platform_firmwareSnapdragonwcd9380_firmwareqcc2076_firmwarewsa8840_firmwarewcd9385_firmwarefastconnect_6900_firmwareqcc2073_firmwaresc8380xp_firmwarewsa8830_firmwarewsa8845_firmwarewcn3620_firmwaresdm429w_firmwarefastconnect_6700_firmwarewcn3660b_firmwarewsa8835_firmwaresnapdragon_429_mobile_platform_firmwarefastconnect_7800_firmwarewsa8845h_firmware
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-30279
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.75%
||
7 Day CHG~0.00%
Published-03 Jan, 2022 | 07:25
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible access control violation while setting current permission for VMIDs due to improper permission masking in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcm2290_firmwarewcn3991_firmwaresm6375wcn3991wsa8830qca8337_firmwarewcd9380_firmwarewcn3990qcs2290_firmwareqca8337sd865_5gsdx55m_firmwarewcn6856_firmwarewsa8835qcx315_firmwareqcs4290wcn3950_firmwarewcd9380sd765g_firmwaresd888_5gqcs2290qca6390_firmwaresd690_5gwcd9370sd690_5g_firmwarewcn6855_firmwaresm7325pqca6426wcn3990_firmwareqrb5165n_firmwareqca9984_firmwarewcd9335_firmwarewcn3980wcn3998wcn6750wcd9385_firmwaresdxr2_5g_firmwarewcn3950sm6375_firmwarewsa8815sm7325p_firmwarewcn6850sd662wcn3910sdx57m_firmwaresd460_firmwaresd765qca6426_firmwareqca9984sd768g_firmwaresdx55_firmwarewcd9375_firmwarewcn3998_firmwarewcn3999_firmwarewcn3980_firmwaresm7250p_firmwaresd460qca6391sdx55mqca6436_firmwareqrb5165nsd778gsm6225wcn3999qcs6490qrb5165_firmwaresdxr2_5gqcm4290qcm6490_firmwareqrb5165sd480_firmwarewcn6851_firmwaresd662_firmwaresm6225_firmwareqcs405wcn3988_firmwaresd778g_firmwarewsa8810_firmwaresd765gsdx57mwcd9341_firmwareqcm4290_firmwaresd765_firmwaresd480qca6436wcn6851wcd9335sd870wcn6855wsa8810wcn6856qsm8250qcs4290_firmwarewcd9385wcd9341sd768gqcs6490_firmwareqcs405_firmwaresd750gsd870_firmwareqca6391_firmwareqca6390ar8035sd750g_firmwarewcd9375wcn3910_firmwarewcd9370_firmwaresdx55wsa8830_firmwaresd660sd865_5g_firmwareqcm6490sd888_5g_firmwarewcn3988sd660_firmwarewcn6850_firmwarewsa8815_firmwarewsa8835_firmwaresm7250pqcx315wcn6750_firmwarear8035_firmwareqcm2290qsm8250_firmwareSnapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-281
Improper Preservation of Permissions
CVE-2021-30281
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.03% / 6.85%
||
7 Day CHG~0.00%
Published-14 Jun, 2022 | 10:10
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible unauthorized access to secure space due to improper check of data allowed while flashing the no access control device configuration in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055qca9377_firmwaresa6150p_firmwaresm6250p_firmwareqcs610qca8337qca4024_firmwarewcn3950_firmwaresa8150p_firmwareqcs2290qca6595au_firmwaresa6155csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareqcs6125_firmwaresa415mwcn3998sd_8cx_gen2_firmwareqcn6024_firmwaresd720gwcn3950sm6375_firmwaresd460_firmwaresm7315_firmwareqca6574au_firmwarewcd9375_firmwareqca8081_firmwaresa6155_firmwarewcn3998_firmwareqca6420sd680_firmwarewcn3999sd_8cx_gen2qrb5165_firmwareqrb5165m_firmwaresa4155p_firmwareqcs6125sa8155_firmwareipq6010qca4004_firmwaresd662_firmwareqcs405qca6430wcd9306_firmwarewcd9340sd765gsw5100fsm10056_firmwareqca6436sd680wcn6851sa6155pqcs603_firmwareqca6696_firmwaresd750gsd870_firmwarewcn3910_firmwaresxr2150p_firmwaresa8150pqca4004wsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3988sa8195p_firmwareqcn5121qcn5022_firmwarewcn6750_firmwaresm6375wcn3991qca8337_firmwarewcd9380_firmwaresw5100pqca6564ausdx55m_firmwarewcn6856_firmwareqca6574csr8811_firmwarewcd9380qcs410sd690_5g_firmwaresdx24_firmwareqca8072_firmwareqca6430_firmwareqcn5052_firmwareqcn9012_firmwarewcd9335_firmwareipq6018_firmwareqcs605wcd9340_firmwarewsa8815wcn6850sd7cwcn3910qca6426_firmwareqca9984ipq6028qcn9024sd730sdx55msd678_firmwarear8031_firmwareqrb5165wcn6851_firmwareqcs603qca6564a_firmwareqcn9024_firmwaresdx57mqcm4290_firmwaresd480sd870qcn5121_firmwarewcn6855sw5100p_firmwareqcs610_firmwareqsm8250ipq6018sa6145psdxr1ar8031qcs405_firmwaresa8145pmdm9205_firmwareqca6391_firmwaresa4150p_firmwareqca4024wcd9370_firmwaresdx55sd888_firmwareqcn5021_firmwaresa8155pcsra6640sd675qcs8155_firmwaresa4155psxr2150par8035_firmwareqcm2290qsm8250_firmwarewcn3991_firmwaremdm9150_firmwarewsa8830sd678qcn9070sa8145p_firmwareqcs2290_firmwarefsm10056sd7c_firmwarecsrb31024csra6620fsm10055_firmwareqcn9072qcs4290sd765g_firmwareqca6420_firmwareqca6390_firmwareipq6000sd690_5gsd730_firmwarewcd9370sd675_firmwareqcn5152_firmwareqca6564qca6426qrb5165n_firmwareqcn9000_firmwareqca9984_firmwareqca9377wcd9385_firmwaresdxr2_5g_firmwaresd662qcn9011_firmwaresa8155qcn5122_firmwaresdx55_firmwareqca6595auqcn6023_firmwarewcn3999_firmwaresm7250p_firmwareqca6436_firmwareqrb5165nqca6564au_firmwaresd778gsa6155p_firmwarewcd9306qcs8155sa515m_firmwareqcs6490sdxr2_5gqcn5052sa415m_firmwarewcn3988_firmwareqcn9074sa6145p_firmwaresm6250sd778g_firmwaresa8195pwsa8810_firmwaresd765_firmwarewcd9335qca8081qcn6023qca6174a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwarear8035csr8811qca6390aqt1000sd750g_firmwarewcd9375sm6250_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewsa8815_firmwarewsa8835_firmwareqcx315qca6564asa4150pqcm6125_firmwareqca8072qcm2290_firmwareqcn9000sd_675sd865_5gsdx24qcn9012sd888wsa8835qcx315_firmwaresd665_firmwaresd888_5gsm6250pqca8075_firmwareqca6574aipq6005_firmwarewcn6855_firmwareqca6174asm7325pwcn6750mdm9205sa515mqca6574_firmwaresd855sm7325p_firmwaresd665sdx57m_firmwaresd765qca6574a_firmwareqcn5021qcn5152sd768g_firmwareqrb5165msm7315sd460qca6391sdxr1_firmwareipq6005aqt1000_firmwareqcm4290csrb31024_firmwareqcm6490_firmwareqcn9070_firmwaresd480_firmwareipq6028_firmwareqcn9011qca6574ausa8155p_firmwareqcn5122qcm6125wsa8810mdm9150wcn6856qcn5022qca6564_firmwareipq6010_firmwaresd768gqca6696sa6150pqca8075qcn9022_firmwareqcn6024qcn9022qcn9072_firmwaresm7250pipq6000_firmwaresd720g_firmwaresw5100_firmwareqcn9074_firmwareqcs410_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CVE-2021-30276
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.03% / 8.00%
||
7 Day CHG~0.00%
Published-03 Jan, 2022 | 07:25
Updated-03 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control while doing XPU re-configuration dynamically can lead to unauthorized access to a secure resource in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcm2290_firmwarewcn3991_firmwaresm6375wcn3991wsa8830qca8337_firmwarewcd9380_firmwarewcn3990qcs2290_firmwareqca8337sd865_5gsdx55m_firmwarewcn6856_firmwarewsa8835qcx315_firmwareqcs4290wcn3950_firmwarewcd9380sd765g_firmwaresd888_5gqcs2290qca6390_firmwaresd690_5gwcd9370sd690_5g_firmwarewcn6855_firmwaresm7325pqca6426wcn3990_firmwareqrb5165n_firmwareqca9984_firmwarewcd9335_firmwarewcn3980wcn6750wcd9385_firmwaresdxr2_5g_firmwarewcn3950sm6375_firmwaresm7325p_firmwarewcn6850sd662wcn3910sdx57m_firmwaresd460_firmwaresd765qca6426_firmwareqca9984sd768g_firmwaresdx55_firmwarewcd9375_firmwarewcn3999_firmwarewcn3980_firmwaresm7250p_firmwaresd460qca6391sdx55mqca6436_firmwareqrb5165nsd778gsm6225wcn3999qcs6490qrb5165_firmwaresdxr2_5gqcm4290qcm6490_firmwareqrb5165sd480_firmwarewcn6851_firmwaresd662_firmwaresm6225_firmwareqcs405wcn3988_firmwaresd778g_firmwaresd765gsdx57mqcm4290_firmwaresd765_firmwaresd480qca6436wcn6851wcd9335sd870wcn6855wcn6856qsm8250qcs4290_firmwarewcd9385sd768gqcs6490_firmwareqcs405_firmwaresd750gsd870_firmwareqca6391_firmwareqca6390ar8035sd750g_firmwarewcd9375wcn3910_firmwarewcd9370_firmwaresdx55wsa8830_firmwaresd660sd865_5g_firmwareqcm6490sd888_5g_firmwarewcn3988sd660_firmwarewcn6850_firmwarewsa8835_firmwaresm7250pqcx315wcn6750_firmwarear8035_firmwareqcm2290qsm8250_firmwareSnapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wired Infrastructure and Networking
CVE-2021-30336
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.03% / 9.34%
||
7 Day CHG~0.00%
Published-03 Jan, 2022 | 07:26
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible out of bound read due to lack of domain input validation while processing APK close session request in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewsa8830sd678sa6150p_firmwaresa8145p_firmwareqcs2290_firmwareqcs4290wcn3950_firmwaresa8150p_firmwaresd765g_firmwareqcs2290qca6595au_firmwareqca6390_firmwaresa6155sd690_5gsd730_firmwarewcd9370sd_675_firmwaresd675_firmwaresm8450wcd9385_firmwarewcn3950sd720gsm6375_firmwarewcn3660bsd662sd460_firmwaresa8155sm7315_firmwareqca6574au_firmwareqca6595ausa6155_firmwarewcd9375_firmwaresm7250p_firmwarewcn3610_firmwaresd778gsa6155p_firmwaresm6225qcs6490sa8155_firmwaresd662_firmwarewcn3988_firmwaresa6145p_firmwaresm6250sd778g_firmwaresa8195pqualcomm215_firmwaresd765gsm8450_firmwaresd765_firmwarewcn6851sa6155pqcs4290_firmwarewcd9385qca6696_firmwareqcs6490_firmwaresd750gsd870_firmwareqca6390wcd9375sd750g_firmwarewcn3910_firmwaresa8150psm6250_firmwarewsa8830_firmwaresda429wsd865_5g_firmwareqcm6490sd888_5g_firmwarewcn3988wcn6850_firmwarewsa8835_firmwaresa8195p_firmwarewcn6750_firmwarewcn3610qcm2290_firmwaresm6375wcn3991sda429w_firmwarewcd9380_firmwaresd_675sd780gsd865_5gsdx55m_firmwarewcn6856_firmwaresm8450p_firmwaresd888wsa8835qca6574sd665_firmwarewcd9380sd888_5gqualcomm215qca6574asd690_5g_firmwarewcn6855_firmwaresm7325pwcn6750qca6574_firmwaresm7325p_firmwaresd665wcn3910wcn6850sd765wcn3660b_firmwareqca6574a_firmwaresd768g_firmwaresm7315sd730sd460qca6391sdx55msdxr1_firmwarewcn6740_firmwaresd678_firmwareqcm4290qcm6490_firmwaresd480_firmwarewcn6851_firmwaresm6225_firmwareqca6574ausa8155p_firmwareqcm4290_firmwaresd480sd870sm8450pwcn6855wcn6856sa6145psdxr1sd768gsa8145pwcn6740qca6696qca6391_firmwaresd780g_firmwarewcd9370_firmwaresa6150psd888_firmwaresa8155psd675sm7250psd720g_firmwareqcm2290Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Wearables
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-30295
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.03% / 10.00%
||
7 Day CHG~0.00%
Published-09 Sep, 2021 | 07:36
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible heap overflow due to improper validation of local variable while storing current task information locally in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055qca9377_firmwaremdm9150_firmwarewcn3991_firmwaresd678sa6150p_firmwaresm7250sa8145p_firmwareqcs610wsa8830qcs2290_firmwarefsm10056sm7250_firmwarecsrb31024wcd9360_firmwarecsra6620fsm10055_firmwareqcs4290wcn3950_firmwaresa8150p_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqcs2290qca6390_firmwaresa6155msm8917sd690_5gsd730_firmwarewcd9370csra6620_firmwareqcs605_firmwaresd_675_firmwaresd675_firmwarecsra6640_firmwareqca6426qca6584au_firmwaresd632wcn3990_firmwareqca9377sa415mwcn3998wcd9385_firmwarewcn3950sm4125sd720gwcd9326_firmwarewcn3615_firmwarewcn3660bsd662sd710_firmwaresd460_firmwaresa8155qca6574au_firmwaresdx55_firmwarewcn3680b_firmwareqca6595ausa6155_firmwaresdx12_firmwarewcd9375_firmwarewcn3615wcn3998_firmwarewcn3610_firmwareqca6420apq8053_firmwarewcd9360qca6564au_firmwareqca6584ausa6155p_firmwaresd778gsa515m_firmwareqcs6490qrb5165_firmwaresd429sa8155_firmwaresd662_firmwaresa415m_firmwareqcs405qca6430wcn3988_firmwaresa6145p_firmwaresd205sd429_firmwaresd778g_firmwaresm6250wcd9340sa8195papq8017_firmwarewsa8810_firmwarequalcomm215_firmwaresd765gsd765_firmwarefsm10056_firmwarewcd9326wcd9335sa6155pwcn6851qcs603_firmwareqca6174a_firmwareqcs4290_firmwarewcd9385wcd9341qca6696_firmwareqcs6490_firmwaresd750gsd870_firmwareqca6390wcd9375sd750g_firmwareaqt1000sa8150pwcn3910_firmwaresm6250_firmwaremsm8953_firmwarewsa8830_firmwaresda429wmsm8917_firmwaresd210sd660sd855_firmwaresd865_5g_firmwareqcm6490sd888_5g_firmwarewcn3620_firmwaresd660_firmwarewcn3620wcn3988sa8195p_firmwarewcn6850_firmwarewsa8815_firmwarewsa8835_firmwareapq8017qcx315wcn6750_firmwarewcn3610qcm2290_firmwarewcn3991sda429w_firmwarewcd9380_firmwarewcn3990sd_675sdm429wsd780gsd865_5gqca6595qca6564ausdx55m_firmwarewcn6856_firmwaresd888sd670_firmwareqca6574qcx315_firmwaresd632_firmwaresdm429w_firmwaresd665_firmwarewsa8835wcd9380sd888_5gqualcomm215qcs410qca6574asd690_5g_firmwaresdx50m_firmwarewcn6855_firmwareqca6174asm7325qca6430_firmwarewcd9335_firmwarewcn3980sd439_firmwarewcn6750sa515mqca6574_firmwareqcs605wcd9340_firmwaresd855sm4125_firmwarewcn6850sd665wcn3910wsa8815sd765qca6426_firmwarewcn3660b_firmwarewcn3680qca6574a_firmwaresd768g_firmwarewcn3980_firmwaresd460qca6391sd730sdx55maqt1000_firmwarewcn6740_firmwaremsm8953sd678_firmwarear8031_firmwarecsrb31024_firmwareqcm4290qcm6490_firmwaresdx50mwcn3680_firmwareqrb5165sd480_firmwareqcs603wcn6851_firmwareqca6574ausa8155p_firmwaresd710sd205_firmwaresd670wcd9341_firmwareqcm4290_firmwaresd480sd870wcn6855wsa8810sd210_firmwareqcs610_firmwaremdm9150wcn6856sa6145pwcn3680bsd768gar8031qca6595_firmwareqcs405_firmwaresa8145pwcn6740qca6696qca6391_firmwaresd845_firmwaresd780g_firmwarewcd9370_firmwaresa6150psd888_firmwaresdx55apq8053sa8155pcsra6640sd675sd845sd439sd720g_firmwaresdx12qcs410_firmwareqcm2290sm7325_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-43050
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.08% / 23.97%
||
7 Day CHG~0.00%
Published-02 Dec, 2024 | 10:18
Updated-12 Dec, 2024 | 15:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack-based Buffer Overflow in WLAN Windows Host

Memory corruption while invoking IOCTL calls from user space to issue factory test command inside WLAN driver.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwareqca2066wsa8830wcd9380_firmwareqca1062_firmwaresdm429wsnapdragon_8cx_gen_2_5g_compute_platformfastconnect_6800snapdragon_8c_compute_platformwsa8840wsa8835sdm429w_firmwaresnapdragon_7c\+_gen_3_computewcd9380qca6420_firmwareqca6595au_firmwarefastconnect_6700video_collaboration_vc3_platformqca2064_firmwareqca2062qca6174_firmwarewcd9370sc8180xqcm5430_firmwareqca6174avideo_collaboration_vc3_platform_firmwareqca6174qca9377qca6430_firmwareqcc2076_firmwareqcn7605wcd9385_firmwarewsa8845qcc2073_firmwarefastconnect_6200wcd9340_firmwarewcn3660bwsa8815qca2065wsa8845_firmwareqca1064wcn3660b_firmwaresnapdragon_429_mobile_platform_firmwaresc8380xpfastconnect_6200_firmwaresdx55_firmwareqca6595auwcd9375_firmwarewsa8845h_firmwareqca6391snapdragon_429_mobile_platformqca6420snapdragon_8cx_gen_3_compute_platform_firmwarefastconnect_7800aqt1000_firmwareqca2062_firmwaresnapdragon_8cx_compute_platform_firmwareqcs6490qcm6490_firmwarewsa8840_firmwarefastconnect_6900fastconnect_6900_firmwaresc8380xp_firmwaresc8180x_firmwareqca6164_firmwareqca6430fastconnect_6700_firmwaresnapdragon_8cx_compute_platformwcd9340wsa8810_firmwarewcd9341_firmwarefastconnect_7800_firmwarewsa8810wsa8845hqcn7605_firmwaresnapdragon_8cx_gen_3_compute_platformqcm5430snapdragon_8c_compute_platform_firmwareqcs5430qca6174a_firmwarewcd9385wcd9341qca2066_firmwareqca2065_firmwareqcs6490_firmwareqca1064_firmwareqca6164qca1062qcs5430_firmwareqca6391_firmwarewcd9375qca2064aqt1000wcd9370_firmwaresdx55wsa8830_firmwareqcc2076wcn3620_firmwaresnapdragon_7c\+_gen_3_compute_firmwareqcm6490wsa8815_firmwarewsa8835_firmwarewcn3620snapdragon_8cx_gen_2_5g_compute_platform_firmwarefastconnect_6800_firmwareqcn7606_firmwareqcc2073qcn7606Snapdragonaqt1000_firmwareqca2062_firmwareqca9377_firmwarewcd9380_firmwareqca1062_firmwareqcm6490_firmwarewsa8840_firmwarefastconnect_6900_firmwaresc8380xp_firmwareqca6164_firmwaresdm429w_firmwarefastconnect_6700_firmwarewsa8810_firmwarewcd9341_firmwarefastconnect_7800_firmwareqca6420_firmwareqca6595au_firmwareqcn7605_firmwareqca2064_firmwareqca6174_firmwareqcm5430_firmwareqca6174a_firmwareqca2066_firmwareqca2065_firmwareqca6430_firmwareqca1064_firmwareqcc2076_firmwareqcs5430_firmwareqcs6490_firmwarequalcomm_video_collaboration_vc3_platform_firmwareqca6391_firmwarewcd9385_firmwareqcc2073_firmwarewcd9370_firmwarewcd9340_firmwarewsa8830_firmwarewsa8845_firmwarewcn3620_firmwarewsa8815_firmwarewcn3660b_firmwarewsa8835_firmwaresnapdragon_429_mobile_platform_firmwarefastconnect_6200_firmwarewcd9375_firmwarewsa8845h_firmwarefastconnect_6800_firmwareqcn7606_firmware
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-43058
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.86%
||
7 Day CHG~0.00%
Published-07 Apr, 2025 | 10:15
Updated-20 Aug, 2025 | 21:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect Type Conversion or Cast in Multimedia Frameworks

Memory corruption while processing IOCTL calls.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800fastconnect_6900_firmwaresnapdragon_8_gen_1_mobile_platform_firmwarefastconnect_7800_firmwarewsa8830wcd9380_firmwarewsa8835snapdragon_8_gen_1_mobile_platformwsa8835_firmwarefastconnect_6900wsa8830_firmwarewcd9380Snapdragon
CWE ID-CWE-704
Incorrect Type Conversion or Cast
CVE-2024-43060
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 9.86%
||
7 Day CHG~0.00%
Published-03 Mar, 2025 | 10:07
Updated-03 Mar, 2025 | 13:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use of Out-of-range Pointer Offset in Automotive Audio

Memory corruption during voice activation, when sound model parameters are loaded from HLOS to ADSP.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-Snapdragon
CWE ID-CWE-823
Use of Out-of-range Pointer Offset
CVE-2021-30271
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.3||HIGH
EPSS-0.03% / 8.78%
||
7 Day CHG~0.00%
Published-03 Jan, 2022 | 07:25
Updated-03 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible null pointer dereference in trap handler due to lack of thread ID validation before dereferencing it in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarefsm10055qca2066mdm9640_firmwaresm6250p_firmwaresa6150p_firmwareqcs610qca8337ipq8173_firmwaresdx65qcn5124qca4024_firmwaremdm9645wcn3950_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqca6595au_firmwaresa6155qca2062csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwaresa415mwcn3950qcn6024_firmwaresd720gipq8076amdm9206_firmwareqsw8573_firmwaremdm9628sm6375_firmwaresd460_firmwareqca6574au_firmwareqcn5164_firmwarewcd9375_firmwareqca8081_firmwaresa6155_firmwaresdx12_firmwaremsm8909wapq8009w_firmwareqca9367_firmwareipq8078a_firmwaremdm8207wcn3999ipq5028sa8155_firmwareqca4004_firmwareipq6010sd662_firmwareqcs405sc8280xp_firmwarewcd9306_firmwareqcn6132sd765gfsm10056_firmwarewcn6851sa6155pqcs603_firmwaremdm9250_firmwareqca9888_firmwareqcn6122qca2066_firmwaremdm9655qca6696_firmwaresd870_firmwaresd750gqcn5154_firmwaresd_8cxsa8150pmdm9207_firmwareqca4004wsa8830_firmwaresd865_5g_firmwarewcn3988sa8195p_firmwareqcn5022_firmwareqcn7606_firmwarewcn3610mdm9640ipq5018_firmwaresm6375wcn3991qca8337_firmwaresda429w_firmwarewcd9380_firmwareipq8072asdm429wwcd9330msm8996au_firmwareipq8076a_firmwareipq8078qca6564ausdx55m_firmwareipq8173wcn6856_firmwareqcn5164qca6574csr8811_firmwarewcd9380qcs410qcn5024sd690_5g_firmwaresdx24_firmwareqcn5052_firmwareipq6018_firmwareqsw8573qcs605wcn6850sd7cqca6584_firmwaremdm9650_firmwareqca9984ipq6028qcn9024sd730wcd9330_firmwaresdx55mqca2062_firmwaresd678_firmwarear8031_firmwareipq8078_firmwarewcn6851_firmwareqcs603qcn9024_firmwareipq8174_firmwareapq8009wqca6564a_firmwaresd480sd870wcn6855qcn7605_firmwaresd210_firmwareqcs610_firmwaresa6145pipq6018sdxr1ar8031apq8096auqcs405_firmwaresa8145pmdm8207_firmwaremdm9205_firmwareqca6391_firmwareqca4024wcd9370_firmwareqca2064sdx55sd888_firmwaresc8280xpsa8155pcsra6640sd675ar8035_firmwareqcn7606qcn5024_firmwarewcn3991_firmwaremdm9150_firmwarewsa8830sd678qcn9070sa8145p_firmwarefsm10056sd7c_firmwarecsrb31024mdm9628_firmwaremdm9650csra6620fsm10055_firmwareqcn9072mdm9250sd765g_firmwareqca6390_firmwareqca2064_firmwaresd690_5gsd730_firmwarewcd9370sd675_firmwareqcn5152_firmwareqca6564qca6584au_firmwareqca9984_firmwareqca9377sm8450ipq5018sdw2500_firmwaresd_8cx_firmwarewcd9385_firmwareqcn7605ipq8074aqca2065sd662qcn5124_firmwaresa8155qca6584qcn5122_firmwaresdx55_firmwareqca6595auqcn6023_firmwarewcn3999_firmwaresm7250p_firmwarewcn3610_firmwaremdm9207ipq5010wcd9306qca6584auqca6564au_firmwaresa6155p_firmwaresm6225ipq8174sd429sa515m_firmwareqcn5052qca9367mdm9607_firmwaremdm9655_firmwaresa415m_firmwarewcn3988_firmwareqcn9074sd205sd429_firmwaresa6145p_firmwaresm6250sa8195papq8017_firmwaresm8450_firmwaresd765_firmwareqca8081qcn6023ipq8071aqca6174a_firmwareipq8071a_firmwarewcd9385qca2065_firmwareqca6390wcd9375sd750g_firmwarear8035csr8811sm6250_firmwaresda429wsd210wcn3620_firmwareipq5010_firmwareipq8074a_firmwaresd888_5g_firmwaresdx20_firmwarewcn6850_firmwarewsa8835_firmwarewcn3620apq8017qcx315qca6564amdm9635m_firmwaresd_675sd865_5gsdx24sm8450p_firmwaresd888msm8909w_firmwareqcx315_firmwareqcn6122_firmwaremsm8996ausdm429w_firmwaresd665_firmwarewsa8835sd888_5gsm6250pqcn5154qca8075_firmwareqca6574amdm9206wcn6855_firmwareqca9889qca6174aqcn6132_firmwareqca9888mdm9635mipq8070a_firmwareipq8076_firmwaremdm9205sa515mqca6574_firmwaresd665ipq8076sd765qca6574a_firmwareqcn5152sd768g_firmwaresd850_firmwaresd460qca6391sdxr1_firmwaresdx65_firmwarecsrb31024_firmwareqcn9070_firmwaresdx20sd480_firmwareipq6028_firmwareipq8072a_firmwaresm6225_firmwareqca6574auqca9889_firmwaresa8155p_firmwaremdm9607qcn5122sd205_firmwaremdm9645_firmwaresm8450pmdm9150wcn6856qcn5022qca6564_firmwaresd768gipq6010_firmwareqca6696sdw2500sa6150pqca8075qcn9022_firmwareapq8096au_firmwareqcn6024qcn9022ipq8070aqcn9072_firmwaresm7250psd720g_firmwaresdx12qcn9074_firmwareqcs410_firmwaresd850Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2024-43055
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.97%
||
7 Day CHG~0.00%
Published-03 Mar, 2025 | 10:07
Updated-03 Mar, 2025 | 13:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Camera_Linux

Memory corruption while processing camera use case IOCTL call.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-Snapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-43048
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.08% / 23.97%
||
7 Day CHG~0.00%
Published-02 Dec, 2024 | 10:18
Updated-12 Dec, 2024 | 15:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack-based Buffer Overflow in Performance

Memory corruption when invalid input is passed to invoke GPU Headroom API call.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_662_mobile_platform_firmwarewsa8830wcd9380_firmwaresm4635_firmwarewcn3990sdm429wwcd9378_firmwareqcm8550wsa8840wsa8835sdm429w_firmwarewcn3950_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwarewcd9380wcn6755_firmwaresnapdragon_480_5g_mobile_platformsnapdragon_4_gen_1_mobile_platform_firmwarewcd9370sm8635_firmwaresnapdragon_460_mobile_platform_firmwaresnapdragon_480\+_5g_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwarewcn7880wcn3990_firmwaresnapdragon_8_gen_2_mobile_platformwcd9335_firmwarewcd9385_firmwarewsa8845wcn3950wcn7881_firmwarefastconnect_6200qcm4325_firmwarewcn3660bwsa8815snapdragon_460_mobile_platformwsa8845_firmwaresnapdragon_4_gen_1_mobile_platformwcn3660b_firmwaresnapdragon_429_mobile_platform_firmwaresnapdragon_695_5g_mobile_platform_firmwaresm8750pfastconnect_6200_firmwarewcd9375_firmwaresnapdragon_8_gen_3_mobile_platformwsa8845h_firmwaresnapdragon_429_mobile_platformsnapdragon_680_4g_mobile_platform_firmwarewcn7860fastconnect_7800qcm8550_firmwarewcn7881wcn7861_firmwarewsa8840_firmwarewsa8832_firmwaresm4635fastconnect_6900fastconnect_6900_firmwaresm8635wcn3988_firmwarewcn7880_firmwarewsa8810_firmwarewcd9341_firmwarevision_intelligence_400_platformfastconnect_7800_firmwaresnapdragon_8\+_gen_2_mobile_platformwsa8845hwcn6755wcd9395_firmwarewcd9335sg4150psm8750_firmwaresm8750p_firmwarewsa8810wsa8832sm8550psnapdragon_680_4g_mobile_platformsm8750wcd9385wcd9341wcn7860_firmwarewcd9395wcn7861wcd9375wcd9370_firmwaresm8550p_firmwarewcd9390vision_intelligence_400_platform_firmwaresnapdragon_8_gen_3_mobile_platform_firmwaresnapdragon_662_mobile_platformsnapdragon_685_4g_mobile_platformwsa8830_firmwarewcd9390_firmwarewcn3620_firmwarewcn3988wsa8815_firmwarewsa8835_firmwarewcn3620snapdragon_695_5g_mobile_platformsnapdragon_685_4g_mobile_platform_firmwarewcd9378sg4150p_firmwaresnapdragon_8_gen_2_mobile_platform_firmwaresnapdragon_480\+_5g_mobile_platformqcm4325Snapdragonsnapdragon_662_mobile_platform_firmwarewcd9380_firmwareqcm8550_firmwaresm4635_firmwarewcd9378_firmwarewcn7861_firmwarewsa8832_firmwarewsa8840_firmwarefastconnect_6900_firmwarewcn3988_firmwarewcn7880_firmwaresdm429w_firmwarewcn3950_firmwarewsa8810_firmwarewcd9341_firmwarefastconnect_7800_firmwarewcn6755_firmwarewcd9395_firmwaresm8750_firmwaresm8750p_firmwaresnapdragon_4_gen_1_mobile_platform_firmwaresm8635_firmwaresnapdragon_460_mobile_platform_firmwaresnapdragon_8_gen_2_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwarewcn3990_firmwarewcn7860_firmwarewcd9335_firmwarewcd9385_firmwarewcn7881_firmwareqcm4325_firmwarewcd9370_firmwaresm8550p_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarevision_intelligence_400_platform_firmwarewcd9390_firmwarewsa8830_firmwarewsa8845_firmwarewcn3620_firmwarewsa8815_firmwarewcn3660b_firmwarewsa8835_firmwaresnapdragon_429_mobile_platform_firmwarefastconnect_6200_firmwaresnapdragon_695_5g_mobile_platform_firmwarewcd9375_firmwarewsa8845h_firmwaresg4150p_firmwaresnapdragon_680_4g_mobile_platform_firmware
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-30260
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.05% / 16.77%
||
7 Day CHG~0.00%
Published-17 Sep, 2021 | 07:05
Updated-03 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible Integer overflow to buffer overflow issue can occur due to improper validation of input parameters when extscan hostlist configuration command is received in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresm7250mdm9640_firmwaresm6250p_firmwareipq4028_firmwareqca1023qca8337ar9380ipq8173_firmwareqcn5124mdm9645msm8992_firmwarewcn3950_firmwaresc8180x\+sdx55qca6595au_firmwaresa6155mdm8215sd_455_firmwareapq8076qcs6125_firmwaresa415mwcn3998wcd9371_firmwarewcn3950qcn6024_firmwaresd720gsm4125mdm9206_firmwarewcn3660bqsm8350_firmwareqsm8350sd460_firmwareqca8081_firmwarewcn3998_firmwareqca6420apq8053_firmwareipq8070_firmwareqca9367_firmwareipq8078a_firmwareipq8072_firmwareqca0000sa8155_firmwareqca6430wcd9340sdm830_firmwaresd765gmdm9250_firmwareqca9888_firmwareqcn6122qca6696_firmwarewcd9371sd870_firmwareqca1062qcn5154_firmwaremdm8215_firmwaresd_8cxsa8150pqca9992_firmwaresd660sd865_5g_firmwaresd712sd660_firmwareqcn5121qcn5022_firmwareqcn7606_firmwarewcn6750_firmwareqca6428_firmwarewcn3991ipq4018_firmwareqca4531_firmwareqca9980_firmwareipq8078sdx55m_firmwareipq8173msm8976_firmwareqca6574sd670_firmwarecsr8811_firmwarewcd9380qcs410qcn5024sd690_5g_firmwareqca9379_firmwaresdx24_firmwareqcn9012_firmwareipq6018_firmwarewcd9340_firmwarewsa8815wcn6850pmp8074_firmwareqca6584_firmwaresd_8c_firmwaremdm9215_firmwareipq6028ipq8064sd835pmp8074qca1990wcn3980_firmwarewcn6745_firmwaresd730qca2062_firmwarewcn6740_firmwareqcn5064_firmwaresd678_firmwareapq8064au_firmwareipq8078_firmwareqca6234qcn5054qcs603qca9994qca9980sd670qcn9024_firmwareipq8174_firmwareqcm4290_firmwarewcn6855qcn7605_firmwareqcs610_firmwaresa6145pqca9886_firmwarear8031qca1023_firmwaresdm630_firmwaresd820_firmwareqca6391_firmwareqca4024wcd9370_firmwaresdx55apq8053qcn5021_firmwarecsra6640qca9379qca6234_firmwareqcn7606wsa8830qca1062_firmwarecsrb31024mdm9628_firmwaremdm9650sd_636qca9378aqca9992qcs4290mdm9250qca6420_firmwareapq8009_firmwareqca2064_firmwaresd690_5gmdm9310_firmwaresd675_firmwareipq8072qca6564qca6426wcn3990_firmwareqca9984_firmwareqca9377qca4531wcd9385_firmwaresdxr2_5g_firmwarewhs9410wcd9326_firmwarewcn3615_firmwareipq8074aapq8094sa8155qca6584qcn5122_firmwaresdx55_firmwarewcn3615qcn6023_firmwarewcn3610_firmwareqca6584ausd778gipq8174qcn5052qca9367apq8092sdm630mdm9607_firmwaresa415m_firmwarewcn3988_firmwareqcn9074qca6421sd778g_firmwaresa8195pqca6694wcd9326wcd9335qcn6023qcs4290_firmwareqca6390qca9898_firmwaresd750g_firmwareaqt1000msm8976wcd9375sc8180x\+sdx55_firmwaresm6250_firmwaremsm8994apq8092_firmwareipq5010_firmwareipq8074a_firmwaresd888_5g_firmwaresdx20_firmwarewsa8815_firmwareapq8017qcm6125_firmwaresd780gsd865_5gqca6595sd665_firmwareqcn5154qca8075_firmwareipq6005_firmwaremdm9206wcn6855_firmwareqca9888qca6310_firmwaresm7325apq8094_firmwareipq8070a_firmwaremdm9615qca6574_firmwareqca9886sd665qca6175asd765qca6574a_firmwaresd850_firmwareapq8009mdm9310csrb31024_firmwareqcn9070_firmwaresd480_firmwareipq6028_firmwareipq8072a_firmwaremdm9626_firmwareqca9889_firmwaresd710mdm9607qcn5122mdm9645_firmwaresdx20m_firmwareqcn5022qca6564_firmwaresd768gqca1064_firmwarewcn6740qca8075apq8096au_firmwareqcn6024qcn9022sd845mdm9615_firmwaresdm830ipq6000_firmwaresdx12qcs410_firmwareqca6175a_firmwaresm7325_firmwareqca2066sa6150p_firmwareqcs610qcn5550qca6431_firmwarewcd9360_firmwareqca4024_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqcs2290qca6335qca2062qcn5064csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareipq8076amdm9628sd710_firmwareqca4020qca6428qca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwaresa6155_firmwaresdx12_firmwarewcd9360sdx20mqca6438_firmwarewhs9410_firmwarewcn3999qrb5165_firmwareipq5028ipq4029_firmwareqcs6125ipq6010sd662_firmwareqcs405sc8280xp_firmwareqca1990_firmwareqca4020_firmwareqca6436wcn6851sa6155pqcs603_firmwarewcd9341qca2066_firmwareqca6431sd750gwcn3910_firmwarewsa8830_firmwaresd855_firmwarewcn3988qca6438sa8195p_firmwareqca9898ipq4028wcn3610mdm9640ipq5018_firmwareqca8337_firmwarewcd9380_firmwareipq8072awcd9330msm8996au_firmwarecsr6030ipq8076a_firmwareqca6564auwcn6856_firmwareqcn5164qcn5054_firmwaresdx50m_firmwareqca8072_firmwareqca6174qca6430_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980qca6335_firmwareqcs605sd7cwcn3910qca6320mdm9650_firmwareqca6426_firmwarewcn3660b_firmwareqca9984qcn9024qcn5550_firmwarewcd9330_firmwaresdx55mipq8064_firmwareqca6421_firmwaresd821_firmwarear8031_firmwareqrb5165wcn6851_firmwareipq8070sd_636_firmwareqca6564a_firmwaresd480sd870qcn5121_firmwaresd210_firmwareipq6018sdxr1apq8096auqca6595_firmwareqcs405_firmwaresa8145pqca2064sd780g_firmwaresd888_firmwaresc8280xpsa8155psd675qca9378a_firmwarear8035_firmwareqcm2290qcn5024_firmwarewcn3991_firmwaresd678qcn9070sa8145p_firmwareqcs2290_firmwaresm7250_firmwaresd7c_firmwarecsra6620qcn9072sd765g_firmwareipq8069_firmwareqca6390_firmwareipq6000qca6174_firmwaresd730_firmwarewcd9370qcn5152_firmwareqca0000_firmwareqca6584au_firmwareapq8076_firmwareqcn9000_firmwareipq5018sd_8cx_firmwareqcn7605wcn6745qca2065sd662qcn5124_firmwareqca1064qca6320_firmwarewcn3680b_firmwareqca6595auwcn3999_firmwareqca6436_firmwareipq5010qca6564au_firmwaresa6155p_firmwareqca6310sa515m_firmwareqca9990sdxr2_5gsd821msm8994_firmwaresa6145p_firmwaremsm8992sm6250sd712_firmwareapq8017_firmwarewsa8810_firmwaresd765_firmwareqca8081ipq8071aqca6174a_firmwareipq8071a_firmwarewcd9385qca2065_firmwarear8035csr8811apq8064auqca6694_firmwareqcn9100_firmwaresd210sd820wcn6850_firmwarewsa8835_firmwarecsr6030_firmwareqca6564aqca8072qcm2290_firmwarewcn3990qcn9000sd_675ar9380_firmwaresdx24qcn9012sd888qcn6122_firmwarewsa8835msm8996ausd888_5gsm6250pipq4018qca6574aqca9889qca6174aipq8074qca9994_firmwarewcn6750ipq8076_firmwaresa515msd855sm4125_firmwareipq8076qcn5021ipq8069qcn5152sd768g_firmwaresd460qca6391sdxr1_firmwareipq6005aqt1000_firmwareqcn9100mdm9626qcm4290sdx50msdx20mdm9215sd_455ipq8074_firmwareqca6574ausa8155p_firmwarewcd9341_firmwareqcm6125wsa8810wcn6856sd_8cwcn3680bsd835_firmwareipq6010_firmwareqca6696sd845_firmwaresa6150pqcn9022_firmwareqca9990_firmwareipq8070aqcn9072_firmwaresd720g_firmwareipq8071_firmwareqcn9074_firmwareipq4029sd850Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-30308
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.10% / 28.61%
||
7 Day CHG~0.00%
Published-13 Jan, 2022 | 11:40
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible buffer overflow while printing the HARQ memory partition detail due to improper validation of buffer size in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarewcn3991_firmwaremdm9150_firmwarewsa8830sd678sm6250p_firmwareqcs610fsm10056qca8337sd7c_firmwarecsrb31024wcd9360_firmwaremdm9650sdx65wcn3950_firmwaremdm9250sd765g_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwaresd690_5gsd730_firmwarewcd9370qcs605_firmwaresd_675_firmwaresd675_firmwareqca6426wcn3990_firmwareqca9377sa415mwcn3998wcd9385_firmwaresdxr2_5g_firmwaresd_8cx_gen2_firmwarewcd9326_firmwaresd720gwcn3950sd_8_gen1_5g_firmwaresm6375_firmwareqca6574au_firmwaresdx55_firmwareqca6595auqca8081_firmwaresdx12_firmwarewcd9375_firmwaresm7250p_firmwarewcn3998_firmwareqca6420qca6436_firmwarewcd9360qca6564au_firmwaresd_8cx_gen2sa515m_firmwaresdxr2_5gsa415m_firmwarewcn3988_firmwareqca6430sm6250wcd9340wsa8810_firmwaresd765gsd765_firmwarefsm10056_firmwareqca6436wcd9326wcd9335wcn6851qca8081qcs603_firmwareqca6174a_firmwaremdm9250_firmwarewcd9385wcd9341qca6696_firmwaresd750gsd870_firmwareqca6390ar8035sd750g_firmwareaqt1000wcd9375sm6250_firmwarewsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwaresdx20_firmwarewcn3988wcn6850_firmwarewsa8815_firmwaresd660_firmwarewsa8835_firmwareqcx315sm8475qca6564asm6375wcn3991qca8337_firmwarewcd9380_firmwarewcn3990sd_675sd865_5gqca6564ausdx24sdx55m_firmwarewcn6856_firmwarewsa8835qcx315_firmwaresd665_firmwarewcd9380sm6250pqcs410qca6574asd690_5g_firmwarewcn6855_firmwareqca6174asdx24_firmwareqca6430_firmwarewcd9335_firmwarewcn3980sa515mqcs605wcd9340_firmwaresd855wsa8815wcn6850sd665sd7cmdm9650_firmwaresd765qca6426_firmwareqca6574a_firmwaresd768g_firmwaresd850_firmwarewcn3980_firmwaresd730qca6391sdx55msdxr1_firmwareaqt1000_firmwaresdx65_firmwaresd678_firmwarecsrb31024_firmwaresdx20sd480_firmwareqcs603wcn6851_firmwareqca6574auqca6564a_firmwarewcd9341_firmwaresd480sd870wsa8810wcn6855qcs610_firmwaremdm9150wcn6856sdxr1sd768gqca6696qca6391_firmwaresd845_firmwarewcd9370_firmwaresdx55sd675sd845sm7250psd720g_firmwaresdx12qcs410_firmwarear8035_firmwaresd850Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-43053
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.08% / 23.97%
||
7 Day CHG~0.00%
Published-02 Dec, 2024 | 10:18
Updated-12 Dec, 2024 | 15:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Restriction of Operations within the Bounds of a Memory Buffer in WLAN Windows Host

Memory corruption while invoking IOCTL calls from user space to read WLAN target diagnostic information.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800qca2062_firmwareqca2066wcd9380_firmwaresdm429wwsa8840_firmwarefastconnect_6900fastconnect_6900_firmwaresc8380xp_firmwarewsa8840sdm429w_firmwarefastconnect_6700_firmwaresnapdragon_7c\+_gen_3_computewcd9380fastconnect_7800_firmwarewsa8845hfastconnect_6700qca2064_firmwareqca2062wcd9385qca2066_firmwareqca2065_firmwareqcc2076_firmwarewcd9385_firmwarewsa8845snapdragon_429_mobile_platformqcc2073_firmwareqca2064wcn3660bqca2065qcc2076wsa8845_firmwarewcn3620_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewcn3660b_firmwaresc8380xpsnapdragon_429_mobile_platform_firmwarewcn3620wsa8845h_firmwareqcc2073Snapdragonqca2062_firmwarewcd9380_firmwareqca2066_firmwareqca2065_firmwareqcc2076_firmwarewsa8840_firmwarewcd9385_firmwarefastconnect_6900_firmwareqcc2073_firmwaresc8380xp_firmwarewsa8845_firmwarewcn3620_firmwaresdm429w_firmwarefastconnect_6700_firmwarewcn3660b_firmwaresnapdragon_429_mobile_platform_firmwarefastconnect_7800_firmwarewsa8845h_firmwareqca2064_firmware
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-30268
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.47%
||
7 Day CHG~0.00%
Published-03 Jan, 2022 | 07:25
Updated-03 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible heap Memory Corruption Issue due to lack of input validation when sending HWTC IQ Capture command in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055qca9377_firmwaremdm9640_firmwaresm6250p_firmwareqcs610qca8337wcd9360_firmwaresdx65wcn3950_firmwareqcs2290qca6595au_firmwaremdm8215qcs605_firmwaresd_675_firmwaremdm8615m_firmwaresa415mwcn3998wcn3950mdm9628sd720gmdm9206_firmwareqsw8573_firmwaresm6375_firmwarewcn3660bsd460_firmwaremdm8215mqca6574au_firmwarewcd9375_firmwarewcn3998_firmwareqca8081_firmwaresdx12_firmwaremsm8909wapq8009w_firmwareqca6420wcd9360qca9367_firmwaremdm8207qca4004_firmwaresd662_firmwaremdm9615mqca6430wcd9306_firmwarewcd9340qualcomm215_firmwaresd765gfsm10056_firmwareqca6436wcn6851qcs603_firmwaremdm9250_firmwarewcd9341qca6696_firmwaresd750gsd870_firmwaremdm8215_firmwarewcn3910_firmwaresd_8cxmdm9207_firmwareqca4004wsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwarewcn3988sd660_firmwarewcn3610mdm9640sm6375wcn3991qca8337_firmwaresda429w_firmwarewcd9380_firmwaresdm429wmsm8996au_firmwarewcd9330qca6564ausdx55m_firmwarewcn6856_firmwareqet4101_firmwareqca6574wcd9380qualcomm215qcs410sd690_5g_firmwaresdx24_firmwareqca6430_firmwarewcd9335_firmwarewcn3980qsw8573qcs605wcd9340_firmwarewsa8815wcn6850sd7cwcn3910qca6584_firmwaremdm9650_firmwaremdm9215_firmwareqca6426_firmwarewcn3660b_firmwarewcn3980_firmwaresd730wcd9330_firmwaresdx55mar6003_firmwaresd678_firmwarewcn6851_firmwareqcs603qca6564a_firmwareapq8009wqcm4290_firmwaresd480sd870wcn6855sd210_firmwareqcs610_firmwaresdxr1apq8096aumdm8207_firmwaremdm9205_firmwareqca6391_firmwarewcd9370_firmwaresdx55sd675qet4101ar8035_firmwareqcm2290wcn3991_firmwaremdm9150_firmwarewsa8830sd678qcs2290_firmwarefsm10056sd7c_firmwarecsrb31024mdm9628_firmwaremdm9650fsm10055_firmwareqcs4290mdm9250sd765g_firmwareqca6420_firmwareqca6390_firmwaresd690_5gsd730_firmwarewcd9370mdm9310_firmwaresd675_firmwareqca6426qca6584au_firmwarewcn3990_firmwaresm8450qca9377sdw2500_firmwaresd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwaremdm9615m_firmwarewcn3615_firmwaresd662qca6584wcn3680b_firmwaresdx55_firmwareqca6595auwcn3615sm7250p_firmwarewcn3610_firmwareqca6436_firmwaremdm9207qca6564au_firmwareqca6584auwcd9306sm6225sa515m_firmwaresd429sdxr2_5gqca9367mdm9607_firmwaresa415m_firmwarewcn3988_firmwaresd205sd429_firmwaresm6250apq8017_firmwarewsa8810_firmwaresm8450_firmwaresd765_firmwarewcd9326wcd9335qca8081qca6174a_firmwareqcs4290_firmwarewcd9385mdm8615mar8035qca6390sd750g_firmwareaqt1000wcd9375sm6250_firmwaresda429wsd210wcn3620_firmwaresdx20_firmwarewsa8815_firmwarewcn6850_firmwarewsa8835_firmwarewcn3620apq8017qcx315qca6564aar6003qcm2290_firmwarewcn3990sd_675sd865_5gsdx24sm8450p_firmwaremsm8909w_firmwareqcx315_firmwaremsm8996ausdm429w_firmwarewsa8835sd665_firmwaresm6250pqca6574amdm9206wcn6855_firmwareqca6174amdm9615mdm9205sa515mqca6574_firmwaresd855sd665sd765qca6574a_firmwaresd768g_firmwaresd850_firmwaresd460qca6391sdxr1_firmwaremdm9310aqt1000_firmwaresdx65_firmwareqcm4290csrb31024_firmwaresdx20sd480_firmwaremdm9215sm6225_firmwareqca6574aumdm8215m_firmwaremdm9607sd205_firmwarewcd9341_firmwarewsa8810sm8450pmdm9150wcn6856wcn3680bsd768gqca6696sd845_firmwaresdw2500apq8096au_firmwaresd845mdm9615_firmwaresm7250psd720g_firmwaresdx12qcs410_firmwaresd850Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-30289
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 10.00%
||
7 Day CHG~0.00%
Published-03 Jan, 2022 | 07:26
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible buffer overflow due to lack of range check while processing a DIAG command for COEX management in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055qca9377_firmwaremdm9150_firmwarewcn3991_firmwaresd678mdm9640_firmwaresa6150p_firmwaresa8145p_firmwareqcs610sm6250p_firmwareqcs2290_firmwarefsm10056sd7c_firmwarecsrb31024mdm9628_firmwaremdm9650fsm10055_firmwareqcs4290wcn3950_firmwaremdm9250sa8150p_firmwareqca6420_firmwareqca6595au_firmwareqcs2290sd730_firmwarewcd9370qcs605_firmwaresd_675_firmwaresd675_firmwareqca6584au_firmwarewcn3990_firmwareqca9377sa415mwcn3998sdw2500_firmwaresd_8cx_firmwarewcn3950wcd9326_firmwaremdm9628sd720gmdm9206_firmwareqsw8573_firmwarewcn3615_firmwarewcn3660bsd662sd460_firmwareqca6584qca6574au_firmwarewcn3680b_firmwareqca6595ausdx12_firmwarewcd9375_firmwarewcn3615msm8909wwcn3998_firmwareapq8009w_firmwareqca6420wcn3610_firmwaremdm9207qca6564au_firmwareqca6584ausa6155p_firmwareqca9367_firmwarewcd9306mdm8207sm6225sd429qca9367qca4004_firmwaremdm9607_firmwaresd662_firmwaresa415m_firmwarewcn3988_firmwareqca6430sa6145p_firmwaresd205sd429_firmwaresm6250wcd9306_firmwarewcd9340sa8195papq8017_firmwarewsa8810_firmwarequalcomm215_firmwarefsm10056_firmwarewcd9326wcd9335sa6155pqcs603_firmwareqca6174a_firmwaremdm9250_firmwareqcs4290_firmwarewcd9341qca6696_firmwarewcn3910_firmwarewcd9375sd_8cxaqt1000sa8150psm6250_firmwaremdm9207_firmwareqca4004sda429wsd210sd855_firmwaresd660wcn3620_firmwaresdx20_firmwarewcn3988wsa8815_firmwaresd660_firmwarewcn3620sa8195p_firmwareapq8017qca6564awcn3610mdm9640qcm2290_firmwarewcn3991sda429w_firmwarewcd9380_firmwarewcn3990sd_675sdm429wmsm8996au_firmwarewcd9330qca6564ausdx24qet4101_firmwaremsm8909w_firmwareqca6574msm8996ausdm429w_firmwaresd665_firmwarewcd9380sd850sm6250pqualcomm215qcs410qca6574amdm9206qca6174asdx24_firmwareqca6430_firmwarewcd9335_firmwarewcn3980qsw8573mdm9205qca6574_firmwareqcs605wcd9340_firmwaresd855wsa8815sd665sd7cwcn3910qca6584_firmwaremdm9650_firmwarewcn3660b_firmwareqca6574a_firmwaresd850_firmwarewcn3980_firmwaresd460sd730sdxr1_firmwarewcd9330_firmwareaqt1000_firmwaresd678_firmwareqcm4290csrb31024_firmwaresdx20qcs603sm6225_firmwareqca6574ausa8155p_firmwaremdm9607sd205_firmwareqca6564a_firmwareapq8009wwcd9341_firmwareqcm4290_firmwarewsa8810sd210_firmwareqcs610_firmwaremdm9150sa6145pwcn3680bsdxr1apq8096ausa8145pmdm8207_firmwareqca6696mdm9205_firmwaresd845_firmwarewcd9370_firmwaresa6150psdw2500apq8096au_firmwaresa8155psd675sd845qet4101sd720g_firmwaresdx12qcs410_firmwareqcm2290Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2021-30319
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.10% / 27.65%
||
7 Day CHG~0.00%
Published-13 Jan, 2022 | 11:40
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible integer overflow due to improper validation of command length parameters while processing WMI command in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055qca9377_firmwaremdm9640_firmwaresa6150p_firmwaresm6250p_firmwareqcs610qca8337wcd9360_firmwaresdx65wcn3950_firmwaresa8150p_firmwareqcs2290qca6595au_firmwaresa6155csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwaresa415mwcn3998wcn3950mdm9628sd720gmdm9206_firmwaresd_8_gen1_5g_firmwaresm6375_firmwarewcn3660bsd460_firmwaresm7315_firmwareqca6574au_firmwarewcd9375_firmwareqca8081_firmwaresa6155_firmwaresdx12_firmwarewcn3998_firmwarewcd9360qca9367_firmwarewcn3999qrb5165_firmwaresa8155_firmwaresd662_firmwareqcs405wcd9340sd765gfsm10056_firmwareqca6436wcn6851sa6155pqcs603_firmwaremdm9250_firmwarewcd9341qca6696_firmwaresd750gsd870_firmwarewcn3910_firmwaresa8150pwsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3988sa8195p_firmwaresm8475wcn6750_firmwarewcn3610mdm9640sm6375wcn3991qca8337_firmwarewcd9380_firmwarewcd9330msm8996au_firmwareqca6564ausdx55m_firmwarewcn6856_firmwareqca6574wcd9380qcs410sd690_5g_firmwareqca9379_firmwaresdx24_firmwarewcd9335_firmwarewcn3980qcs605wcd9340_firmwarewsa8815wcn6850wcn3910qca6584_firmwaremdm9650_firmwareqca6426_firmwarewcn3660b_firmwarewcn3980_firmwaresd730wcd9330_firmwaresdx55mwcn6740_firmwaresd678_firmwareapq8064au_firmwarear8031_firmwareqrb5165wcn6851_firmwareqcs603qca6564a_firmwareqcm4290_firmwaresd480sd870wcn6855qcs610_firmwaresa6145psdxr1apq8096auar8031qcs405_firmwaresa8145pqca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55sd888_firmwaresa8155pcsra6640sd675qca9379ar8035_firmwareqcm2290wcn3991_firmwaremdm9150_firmwarewsa8830sd678sa8145p_firmwareqcs2290_firmwarefsm10056csrb31024mdm9628_firmwaremdm9650csra6620fsm10055_firmwareqcs4290mdm9250sd765g_firmwareqca6390_firmwareapq8009_firmwaresd690_5gsd730_firmwarewcd9370sd675_firmwareqca6564qca6426qca6584au_firmwarewcn3990_firmwareqrb5165n_firmwareqca9377wcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwaresd662sa8155qca6584sdx55_firmwareqca6595auwcn3999_firmwaresm7250p_firmwarewcn3610_firmwareqca6436_firmwareqrb5165nqca6564au_firmwareqca6584ausa6155p_firmwaresd778gsm6225sa515m_firmwareqcs6490sdxr2_5gqca9367mdm9607_firmwaresa415m_firmwarewcn3988_firmwaresa6145p_firmwaresm6250sd778g_firmwaresa8195papq8017_firmwarewsa8810_firmwaresd765_firmwarewcd9326wcd9335qca8081qca6174a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwarear8035qca6390sd750g_firmwareapq8064auaqt1000wcd9375sm6250_firmwaresdx20_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewsa8815_firmwarewsa8835_firmwareapq8017qcx315qca6564aqcm2290_firmwarewcn3990sd_675sd780gsd865_5gsdx24sd888wsa8835qcx315_firmwaremsm8996ausd665_firmwaresd888_5gsm6250pqca6574amdm9206wcn6855_firmwareqca6174asm7325pwcn6750sa515mqca6574_firmwaresd855sm7325p_firmwaresd665qca6175asd765qca6574a_firmwaresd768g_firmwaresm7315apq8009qca6391sd460sdxr1_firmwareaqt1000_firmwaresdx65_firmwareqcm4290csrb31024_firmwareqcm6490_firmwaresdx20sd480_firmwaresm6225_firmwareqca6574ausa8155p_firmwaremdm9607wcd9341_firmwarewsa8810mdm9150wcn6856qca6564_firmwaresd768gwcn6740qca6696sd845_firmwaresa6150papq8096au_firmwaresd845sm7250psd720g_firmwaresdx12qcs410_firmwareqca6175a_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-30309
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.50%
||
7 Day CHG~0.00%
Published-11 Feb, 2022 | 10:40
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper size validation of QXDM commands can lead to memory corruption in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarewcn3991_firmwarewcn3991wsa8830wcd9380_firmwarewcn3990qcs610sd865_5gsdx55m_firmwaremdm9650wsa8835wcn3950_firmwaresd665_firmwarewcd9380sd765g_firmwareqca6390_firmwareqcs410sd690_5gsd730_firmwarewcd9370qcs605_firmwaresd690_5g_firmwareqcs6125_firmwareqca6174awcn3990_firmwarewcd9335_firmwareqca9377wcn3980wcn3998wcd9385_firmwarewcn3950wcd9326_firmwareqcs605wsa8815wcn6850sd665mdm9650_firmwaresd765sd768g_firmwarewcd9375_firmwaresdx12_firmwarewcn3998_firmwarewcn3980_firmwaresm7250p_firmwaresd730sdxr1_firmwareqca6391sdx55mqcs6125wcn6851_firmwareqcs603wcn3988_firmwarewsa8810_firmwaresd765gwcd9341_firmwareqcm6125wsa8810sd765_firmwaresd870wcd9326wcd9335wcn6851qcs603_firmwareqcs610_firmwareqca6174a_firmwarewcd9385wcd9341sdxr1sd768gsd870_firmwareqca6391_firmwareqca6390wcd9375wcd9370_firmwarewsa8830_firmwaresd660sd865_5g_firmwarewcn3988wcn6850_firmwarewsa8815_firmwaresd660_firmwarewsa8835_firmwaresm7250psdx12qcs410_firmwareqcm6125_firmwareSnapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2018-11952
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.11%
||
7 Day CHG~0.00%
Published-26 Nov, 2024 | 08:55
Updated-09 Jan, 2025 | 20:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Authentication in TrustZone

An image with a version lower than the fuse version may potentially be booted lead to improper authentication.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd_615sd_820sd_652_firmwaremsm8909w_firmwaresd_210_firmwaresd_625sd_616_firmwaresd_810sd_450mdm9640sd_425sd_210sd_820asd_652sd_625_firmwaresd_415_firmwaresd_205mdm9650_firmwaremdm9206mdm9650sd_650sd_820_firmwaresd_835sd_616mdm9206_firmwaresd_810_firmwaresd_845sd_212_firmwaresd_820a_firmwaresd_835_firmwaresd_450_firmwaresd_617_firmwaresd_617mdm9640_firmwaresd_205_firmwaresd_212sd_425_firmwaremsm8909wmdm9607sd_415sd_650_firmwaremdm9607_firmwaresd_430sd_615_firmwaresd_430_firmwaresd_845_firmwareSnapdragon
CWE ID-CWE-287
Improper Authentication
CVE-2018-11980
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 10.00%
||
7 Day CHG-0.09%
Published-18 Dec, 2019 | 05:25
Updated-05 Aug, 2024 | 08:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When a fake broadcast/multicast 11w rmf without mmie received, since no proper length check in wma_process_bip, buffer overflow will happen in both cds_is_mmie_valid and qdf_nbuf_trim_tail in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in APQ8009, APQ8017, APQ8053, APQ8064, APQ8096AU, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8937, MSM8996AU, MSM8998, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCN7605, QCS605, SDM630, SDM636, SDM660, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaremdm9640_firmwaresdm636_firmwareapq8064msm8996au_firmwaresdx20msm8998_firmwaresdm660sdx24sdm630mdm9607_firmwaremdm9650sm7150_firmwareqca6574ausm6150mdm9607msm8996auapq8017_firmwaresm7150apq8009_firmwareqcn7605_firmwaremsm8937mdm9207c_firmwareqcs605_firmwaremdm9206mdm9207cqca6174a_firmwareqca6174aqca9379_firmwaresm8150_firmwaresdx24_firmwareapq8096ausdm636qca9377sdm630_firmwareqcn7605mdm9206_firmwareqcs605sdx55apq8053apq8096au_firmwaresm6150_firmwaremsm8937_firmwaremdm9650_firmwaremsm8998sdx20_firmwaresm8150qca6574au_firmwaresdx55_firmwaresxr1130_firmwareapq8017apq8064_firmwaresxr1130apq8009qca9379apq8053_firmwaresdm660_firmwaremdm9640Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-30318
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.12% / 31.08%
||
7 Day CHG~0.00%
Published-11 Feb, 2022 | 10:40
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper validation of input when provisioning the HDCP key can lead to memory corruption in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055qca9377_firmwaresa6150p_firmwaresm6250p_firmwareqcs610qca8337wcd9360_firmwaresdx65wcn3950_firmwaresa8150p_firmwareqcs2290qca6595au_firmwaresa6155csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareqcs6125_firmwaresa415mwcn3998wcn3950mdm9628sd720gmdm9206_firmwareqsw8573_firmwaresd_8_gen1_5g_firmwaresm6375_firmwarewcn3660bsd460_firmwaresm7315_firmwareqca6574au_firmwarewcd9375_firmwarewcn3998_firmwareqca8081_firmwaresa6155_firmwaresdx12_firmwaremsm8909wapq8009w_firmwarewcd9360qca9367_firmwarewcn3999qrb5165_firmwareqrb5165m_firmwareqcs6125sa8155_firmwaresd662_firmwareqcs405qualcomm215_firmwaresd765gfsm10056_firmwareqca6436wcn6851sa6155pqcs603_firmwaremdm9250_firmwareqca6696_firmwaresd750gsd870_firmwarewcn3910_firmwaresa8150pwsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwarewcn3988sd660_firmwaresa8195p_firmwaresm8475wcn6750_firmwarewcn3610sm6375wcn3991qca8337_firmwaresda429w_firmwarewcd9380_firmwaresdm429wmsm8996au_firmwarewcd9330qca6564ausdx55m_firmwarewcn6856_firmwareqca6574wcd9380qualcomm215qcs410sd690_5g_firmwaresdx24_firmwareqcn9012_firmwaresd439_firmwareqsw8573qcs605wcn6850wcn3910qca6426_firmwarewcn3660b_firmwaresd730wcd9330_firmwaresdx55mwcn6740_firmwaresd678_firmwarear8031_firmwareqrb5165wcn6851_firmwareqcs603qca6564a_firmwareapq8009wqcm4290_firmwaresd480sd870wcn6855sd210_firmwareqcs610_firmwaresa6145psdxr1apq8096auar8031qcs405_firmwaresa8145pqca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55sd888_firmwaresa8155pcsra6640sd675sd439qcs8155_firmwarear8035_firmwareqcm2290wcn3991_firmwaremdm9150_firmwarewsa8830sd678sa8145p_firmwareqcs2290_firmwarefsm10056csrb31024mdm9628_firmwarecsra6620fsm10055_firmwareqcs4290mdm9250sd765g_firmwareqca6390_firmwaresd690_5gsd730_firmwarewcd9370sd675_firmwareqca6564qca6426qca6584au_firmwareqrb5165n_firmwareqca9377sdw2500_firmwarewcd9385_firmwaresdxr2_5g_firmwaresd662qcn9011_firmwaresa8155sdx55_firmwareqca6595auwcn3999_firmwaresm7250p_firmwarewcn3610_firmwareqca6436_firmwareqrb5165nqca6564au_firmwareqca6584ausa6155p_firmwaresd778gqcs8155sm6225sa515m_firmwareqcs6490sd429sdxr2_5gqca9367mdm9607_firmwaresa415m_firmwarewcn3988_firmwaresa6145p_firmwaresd205sd429_firmwaresd778g_firmwaresm6250sa8195papq8017_firmwaresd765_firmwareqca8081qca6174a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwarear8035qca6390sd750g_firmwareaqt1000wcd9375sm6250_firmwaresda429wsd210wcn3620_firmwaresdx20_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewcn3620wsa8835_firmwareapq8017qcx315qca6564aqcm6125_firmwareqcm2290_firmwaresd_675sd780gsd865_5gsdx24qcn9012sd888msm8909w_firmwareqcx315_firmwaremsm8996ausdm429w_firmwarewsa8835sd665_firmwaresd888_5gsm6250pqca6574amdm9206wcn6855_firmwareqca6174asm7325pwcn6750sa515mqca6574_firmwaresd855sm7325p_firmwaresd665sd765qca6574a_firmwaresd768g_firmwareqrb5165msm7315sd460qca6391sdxr1_firmwareaqt1000_firmwaresdx65_firmwareqcm4290csrb31024_firmwareqcm6490_firmwaresdx20sd480_firmwareqcn9011sm6225_firmwareqca6574ausa8155p_firmwaremdm9607sd205_firmwareqcm6125mdm9150wcn6856qca6564_firmwaresd768gwcn6740qca6696sa6150psdw2500apq8096au_firmwaresm7250psd720g_firmwaresdx12qcs410_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-30282
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.03% / 9.34%
||
7 Day CHG~0.00%
Published-03 Jan, 2022 | 07:25
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible out of bound write in RAM partition table due to improper validation on number of partitions provided in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055qca9377_firmwaremdm9150_firmwarewcn3991_firmwaresd678qcn9070sa6150p_firmwaresa8145p_firmwareqcs610sm6250p_firmwarewsa8830qcs2290_firmwarefsm10056qca8337sd7c_firmwarecsrb31024csra6620fsm10055_firmwareqcn9072qcs4290wcn3950_firmwaresa8150p_firmwaresd765g_firmwareqcs2290qca6595au_firmwareqca6390_firmwaresa6155ipq6000sd690_5gsd730_firmwarecsra6620_firmwareqcs605_firmwaresd_675_firmwaresd675_firmwarewcd9370csra6640_firmwareqcn5152_firmwareqca6564qca6426qrb5165n_firmwareqcn9000_firmwareqca9984_firmwareqca9377sa415msd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcn3950qcn6024_firmwaresd720gsm6375_firmwaresd662sd460_firmwaresa8155qca6574au_firmwareqcn5122_firmwaresdx55_firmwareqca6595auqca8081_firmwareqcn6023_firmwaresa6155_firmwaresm7250p_firmwarewcd9375_firmwarewcn3999_firmwareqca6436_firmwareqrb5165nqca6564au_firmwaresd778gsa6155p_firmwarewcd9306sm6225wcn3999sa515m_firmwareqcs6490qrb5165_firmwaresdxr2_5gqcn5052sa8155_firmwareipq6010qca4004_firmwaresd662_firmwaresa415m_firmwareqcs405wcn3988_firmwareqcn9074sa6145p_firmwaresm6250sd778g_firmwarewcd9306_firmwarewcd9340sa8195psd765gsd765_firmwarefsm10056_firmwareqca6436wcn6851wcd9335sa6155pqca8081qcs603_firmwareqcn6023qca6174a_firmwareqcs4290_firmwarewcd9385qca6696_firmwareqcs6490_firmwaresd750gsd870_firmwarear8035csr8811qca6390sd_8cxsa8150psd750g_firmwaresm6250_firmwarewcd9375wcn3910_firmwareqca4004wsa8830_firmwaresd865_5g_firmwareqcm6490sd888_5g_firmwarewcn3988wcn6850_firmwarewsa8835_firmwaresa8195p_firmwareqcn5121qcx315qcn5022_firmwareqca6564awcn6750_firmwareqca8072qcm2290_firmwaresm6375wcn3991qca8337_firmwarewcd9380_firmwareqcn9000sd_675sd865_5gqca6564ausdx24sdx55m_firmwarewcn6856_firmwarewsa8835qca6574qcx315_firmwaresd665_firmwarecsr8811_firmwarewcd9380sd888_5gsm6250pqcs410qca8075_firmwareqca6574asd690_5g_firmwareipq6005_firmwarewcn6855_firmwareqca6174asm7325psdx24_firmwareqca8072_firmwarewcd9335_firmwareqcn5052_firmwarewcn6750ipq6018_firmwaremdm9205sa515mqca6574_firmwareqcs605wcd9340_firmwaresm7325p_firmwaresd665sd7cwcn3910wcn6850sd765qca6426_firmwareqca6574a_firmwareqca9984ipq6028qcn5021qcn5152qcn9024sd768g_firmwaresd460qca6391sd730sdx55msdxr1_firmwareipq6005sd678_firmwarear8031_firmwarecsrb31024_firmwareqcm4290qcm6490_firmwareqcn9070_firmwareqrb5165sd480_firmwareqcs603wcn6851_firmwareipq6028_firmwaresm6225_firmwareqca6574ausa8155p_firmwareqcn5122qca6564a_firmwareqcn9024_firmwareqcm4290_firmwaresd480sd870qcn5121_firmwarewcn6855qcs610_firmwaremdm9150wcn6856qsm8250ipq6018qcn5022sa6145pqca6564_firmwaresdxr1ipq6010_firmwarear8031sd768gqcs405_firmwaresa8145pqca6696mdm9205_firmwareqca6391_firmwarewcd9370_firmwaresa6150psdx55qca8075qcn5021_firmwareqcn9022_firmwarecsra6640qcn6024qcn9022sa8155psd675qcn9072_firmwaresm7250pipq6000_firmwaresd720g_firmwareqcn9074_firmwareqcs410_firmwarear8035_firmwareqcm2290qsm8250_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2021-30254
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 10.00%
||
7 Day CHG~0.00%
Published-12 Nov, 2021 | 06:15
Updated-03 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible buffer overflow due to improper input validation in factory calibration and test DIAG command in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresm7250mdm9640_firmwaresm6250p_firmwareqcs610qca8337sdx65wcn3950_firmwareqcs2290qca6595au_firmwaremsm8917qcs605_firmwaresd_675_firmwareqcs6125_firmwaresd632msm8108wcn3998wcd9371_firmwaremsm8108_firmwarewcn3950sm4125sd720gmdm9628mdm9206_firmwareqsw8573_firmwaresm6375_firmwarewcn3660bsd450_firmwaresd710_firmwaresd460_firmwaremdm9230_firmwareqca6574au_firmwaremdm9630wcd9375_firmwareqca8081_firmwarewcn3998_firmwaresdx12_firmwaremsm8909wapq8009w_firmwareqca6420apq8053_firmwareqca9367_firmwaremdm8207qcs6125qca4004_firmwaresd662_firmwareqca6430wcd9306_firmwarewcd9340sd765gqualcomm215_firmwarewcn6851qcs603_firmwaremsm8937msm8209_firmwaremdm9250_firmwarewcn3660_firmwarewcd9341wcd9371sd870_firmwarewcn3910_firmwaremdm9207_firmwareqca4004wsa8830_firmwaremdm9330_firmwaresd855_firmwaresd660sd865_5g_firmwaresd712wcn3988sd660_firmwaremsm8208_firmwarewcn6750_firmwaresd450wcn3610msm8608mdm9640sm6375wcn3991qca8337_firmwaresda429w_firmwarewcd9380_firmwaresdm429wwcd9330msm8996au_firmwarecsr6030qca6564ausdx55m_firmwarewcn6856_firmwaremsm8940_firmwareqet4101_firmwaremsm8976_firmwareqca6574sd632_firmwaresd670_firmwarewcd9380qualcomm215mdm9230qcs410sd690_5g_firmwaresdx50m_firmwareqca9379_firmwareqca6174qca6430_firmwarewcd9335_firmwaresd439_firmwarewcn3980qsw8573qcs605wcd9340_firmwarewsa8815wcn6850wcn3910qca6320qca6584_firmwaremsm8937_firmwaremdm9650_firmwarewcn3660b_firmwarewcn3680sd835wcn3980_firmwaresd730wcd9330_firmwaresdx55mwcn6740_firmwaremsm8953sd821_firmwaresd678_firmwarewcn3680_firmwarewcn6851_firmwareqcs603sd670sd_636_firmwareqca6564a_firmwareapq8009wqca6694au_firmwaremsm8976sg_firmwareqcm4290_firmwaresd480sd870wcn6855sd210_firmwareqcs610_firmwaresdxr1apq8096aumdm8207_firmwaresdm630_firmwaremdm9205_firmwareqca6391_firmwaresd820_firmwarewcd9370_firmwaresd780g_firmwaresdx55apq8053sd675sd439qet4101wcn3660qca9379ar8035_firmwareqcm2290wcn3991_firmwaremdm9150_firmwarewsa8830sd678qcs2290_firmwaresm7250_firmwaremdm9628_firmwaremdm9650sd_636qcs4290mdm9250sd765g_firmwareqca6420_firmwareqca6390_firmwareapq8009_firmwaresd690_5gqca6174_firmwaresd730_firmwarewcd9370sd675_firmwareqca6584au_firmwarewcn3990_firmwaresm8450qca9377sdw2500_firmwarewcd9385_firmwarewcd9326_firmwarewcn3615_firmwaresd662apq8037qca6320_firmwareqca6584wcn3680b_firmwaresdx55_firmwarewcn3615qca6595auwcn3610_firmwaremdm9207wcd9306qca6584ausd778gqca6564au_firmwaremsm8208qca6310sm6225sd429qcs6490qca9367sdm630mdm9607_firmwaresd821msm8976sgwcn3988_firmwaresd205sd429_firmwaresm6250sd778g_firmwaresd712_firmwareapq8017_firmwarewsa8810_firmwareqca6694sm8450_firmwaresd765_firmwarewcd9326wcd9335qca8081qca6174a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwareqca6390wcd9375ar8035aqt1000msm8976qca6694_firmwaresm6250_firmwaremsm8953_firmwareqca6694ausda429wmsm8917_firmwaresd210wcn3620_firmwaresd820wsa8815_firmwaresd888_5g_firmwareqcm6490wcn6850_firmwarewsa8835_firmwarewcn3620apq8017qcx315csr6030_firmwareqca6564amdm9630_firmwareqcm6125_firmwareqcm2290_firmwarewcn3990sd_675sd780gsd865_5gsm8450p_firmwaremsm8909w_firmwareqcx315_firmwarewsa8835msm8996ausdm429w_firmwaresd665_firmwaresd888_5gsm6250pqca6574amdm9206wcn6855_firmwareqca6174aqca6310_firmwaresm7325wcn6750mdm9205qca6574_firmwaresd855sm4125_firmwaresd665sd765qca6574a_firmwaresd768g_firmwaremsm8209apq8009sd460qca6391sdxr1_firmwareaqt1000_firmwaremsm8920sdx65_firmwareqcm4290qcm6490_firmwaresdx50msd480_firmwaremsm8920_firmwaresm6225_firmwareqca6574ausd710mdm9607sd205_firmwarewcd9341_firmwareqcm6125wsa8810sm8450pmdm9150wcn6856wcn3680bsd835_firmwaresd768gwcn6740sd845_firmwaremsm8608_firmwaresdw2500msm8940apq8096au_firmwaresd845apq8037_firmwaresd720g_firmwaresdx12qcs410_firmwaremdm9330sm7325_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-20
Improper Input Validation
CVE-2021-30259
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 9.34%
||
7 Day CHG~0.00%
Published-12 Nov, 2021 | 06:15
Updated-03 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible out of bound access due to improper validation of function table entries in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresm7250sa6150p_firmwaresm6250p_firmwareqcs610qca8337qca6431_firmwarewcd9360_firmwaresdx65wcn3950_firmwaresc8180x\+sdx55sa8150p_firmwareqcs2290qca6595au_firmwaresa6155qca6335sd_455_firmwarecsra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareqcs6125_firmwaresa415mwcn3998wcd9371_firmwarewcn3950sm4125sd720gsm6375_firmwarewcn3660bqsm8350_firmwaresd710_firmwareqsm8350sd460_firmwarewcn7850qca6574au_firmwarewcd9375_firmwareqca8081_firmwarewcn3998_firmwaresa6155_firmwaresdx12_firmwareqca6420wcd9360whs9410_firmwarewcn3999qrb5165_firmwareqcs6125sa8155_firmwareqca4004_firmwaresd662_firmwareqcs405qca6430wcd9306_firmwarewcd9340sdm830_firmwaresd765gqca6436wcn6851sa6155pqcs603_firmwarewcn7851_firmwaremdm9250_firmwarewcd9341mdm9655qca6696_firmwareqca6431wcd9371sd870_firmwaresd750gwcn3910_firmwaresd_8cxsa8150pqca4004wsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwaresd712wcn3988sd660_firmwarewcn7850_firmwaresa8195p_firmwarewcn6750_firmwarewcn3610sm6375wcn3991qca8337_firmwaresda429w_firmwarewcd9380_firmwareqca6564ausdx55m_firmwarewcn6856_firmwaresd670_firmwareqca6574wcd9380qcs410sd690_5g_firmwaresdx50m_firmwaresdx24_firmwareqca6430_firmwarewcd9335_firmwarewcn3980qca6335_firmwareqcs605wcd9340_firmwarewsa8815wcn6850sd7cwcn3910qca6320mdm9650_firmwaresd_8c_firmwareqca6426_firmwarewcn3660b_firmwareqca9984sd835wcn3980_firmwaresd730sdx55mqca6421_firmwarewcn6740_firmwaresd678_firmwarear8031_firmwareqrb5165wcn6851_firmwareqcs603sd670sd_636_firmwareqca6564a_firmwareqcm4290_firmwaresd480sd870wcn6855qcs610_firmwareqsm8250sa6145psdxr1ar8031qca6595_firmwareqcs405_firmwaresa8145psdm630_firmwaremdm9205_firmwareqca6391_firmwarewcd9370_firmwaresd780g_firmwaresdx55sd888_firmwaresa8155pcsra6640sd675ar8035_firmwareqcm2290qsm8250_firmwarewcn3991_firmwaremdm9150_firmwarewsa8830sd678sa8145p_firmwareqcs2290_firmwaresm7250_firmwaresd7c_firmwarecsrb31024mdm9650sd_636csra6620qcs4290mdm9250sd765g_firmwareqca6420_firmwareqca6390_firmwaresd690_5gsd730_firmwarewcd9370sd675_firmwareqca6564qca6426qca6584au_firmwarewcn3990_firmwareqrb5165n_firmwareqca9984_firmwareqca9377sm8450sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewhs9410wcd9326_firmwaresd662sa8155qca6320_firmwaresdx55_firmwareqca6595auwcn3999_firmwarewcn3610_firmwareqca6436_firmwareqrb5165nwcd9306qca6584ausd778gqca6564au_firmwaresa6155p_firmwareqca6310sm6225wcn7851sa515m_firmwareqcs6490sdxr2_5gsdm630mdm9655_firmwaresa415m_firmwarewcn3988_firmwaresa6145p_firmwareqca6421sd778g_firmwaresm6250sd712_firmwaresa8195pwsa8810_firmwaresm8450_firmwaresd765_firmwarewcd9326wcd9335qca8081qca6174a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwareqca6390wcd9375sd750g_firmwareaqt1000ar8035sc8180x\+sdx55_firmwaresm6250_firmwaresda429wwcn3620_firmwaresdx20_firmwarewsa8815_firmwaresd888_5g_firmwareqcm6490wcn6850_firmwarewsa8835_firmwarewcn3620qcx315qca6564aqcm6125_firmwareqcm2290_firmwarewcn3990sd_675sd780gsd865_5gqca6595sdx24sm8450p_firmwaresd888wsa8835qcx315_firmwaresd665_firmwaresd888_5gsm6250pqca6574awcn6855_firmwareqca6174aqca6310_firmwaresm7325wcn6750mdm9205sa515mqca6574_firmwaresd855sm4125_firmwaresd665qca6175asd765qca6574a_firmwaresd768g_firmwaresd850_firmwaresd460qca6391sdxr1_firmwareaqt1000_firmwaresdx65_firmwareqcm4290csrb31024_firmwareqcm6490_firmwaresdx50msdx20sd480_firmwaresd_455sm6225_firmwareqca6574ausd710sa8155p_firmwarewcd9341_firmwareqcm6125wsa8810sm8450pmdm9150wcn6856sd_8csd835_firmwareqca6564_firmwaresd768gwcn6740qca6696sd845_firmwaresa6150psd845sdm830sd720g_firmwaresdx12qcs410_firmwareqca6175a_firmwaresd850sm7325_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-30258
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.03% / 10.00%
||
7 Day CHG~0.00%
Published-20 Oct, 2021 | 06:31
Updated-03 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible buffer overflow due to improper size calculation of payload received in VR service in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewsa8830sd678sm7250sm6250p_firmwareqcs610qcs2290_firmwaresm7250_firmwaresd_636qcs4290wcn3950_firmwaresd765g_firmwareqca6420_firmwareqcs2290qca6390_firmwareqca6335msm8917sd690_5gsd730_firmwaresd_455_firmwarewcd9370qcs605_firmwaresd_675_firmwaresd675_firmwareqcs6125_firmwareqca6426sd632wcn3998wcd9371_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcn3950sm4125sd720gwcn3615_firmwarewcn3660bsd662sd460_firmwareqca6320_firmwareqca6574au_firmwaresdx55_firmwarewcn3680b_firmwarewcd9375_firmwarewcn3615wcn3998_firmwarewcn3610_firmwareqca6420qca6436_firmwareapq8053_firmwareqca6564au_firmwaresd778gqca6310qcs6490sd429sdxr2_5gqcs6125sd662_firmwaresdm630wcn3988_firmwareqca6430sd205sd429_firmwaresm6250sd778g_firmwareapq8017_firmwarequalcomm215_firmwaresd765gsd765_firmwareqca6436wcn6851qcs603_firmwareqcs4290_firmwarewcd9385qcs6490_firmwarewcd9371sd750gsd870_firmwareqca6390wcd9375sd750g_firmwareaqt1000apq8064auwcn3910_firmwaresm6250_firmwaremsm8953_firmwarewsa8830_firmwaremsm8917_firmwaresd210sd855_firmwaresd865_5g_firmwarewcn3620_firmwareqcm6490sd888_5g_firmwarewcn3988wcn3620wcn6850_firmwarewsa8835_firmwareapq8017qca6564awcn6750_firmwarewcn3610qcm6125_firmwareqcm2290_firmwarewcn3991wcd9380_firmwaresd_675sdm429wmsm8996au_firmwaresd780gsd865_5gqca6564ausdx55m_firmwarewcn6856_firmwaresd888wsa8835sd632_firmwaremsm8996ausdm429w_firmwaresd665_firmwarewcd9380sd888_5gsm6250pqualcomm215qca6574asd690_5g_firmwaresdx50m_firmwarewcn6855_firmwareqca6310_firmwaresm7325qca6430_firmwarewcn6750sd439_firmwareqca6335_firmwareqcs605sd855sm4125_firmwarewcn6850sd665wcn3910qca6320sd765qca6426_firmwarewcn3660b_firmwarewcn3680qca6574a_firmwaresd768g_firmwaresd460qca6391sd730sdx55msdxr1_firmwareaqt1000_firmwarewcn6740_firmwaremsm8953sd678_firmwareapq8064au_firmwareqcm4290qcm6490_firmwaresdx50mwcn3680_firmwaresd480_firmwareqcs603wcn6851_firmwaresd_455qca6574ausd_636_firmwaresd205_firmwareqca6564a_firmwareqcm6125qcm4290_firmwaresd480sd870wcn6855sd210_firmwareqcs610_firmwarewcn6856wcn3680bsdxr1sd768gapq8096auwcn6740sdm630_firmwareqca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55sd888_firmwareapq8053apq8096au_firmwaresd675sd439sd720g_firmwareqcm2290sm7325_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wearables
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-33231
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.05% / 16.00%
||
7 Day CHG~0.00%
Published-04 Apr, 2023 | 04:46
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Double free in Core

Memory corruption due to double free in core while initializing the encryption key.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresd_8cx_gen3_firmwaresm7325-ae_firmwaresa6150p_firmwaresm6250p_firmwareqcs610315_5g_iot_modem_firmwareqca83378098qca6431_firmwarewcd9360_firmwarewcn3950_firmwaresc8180x\+sdx55sa8150p_firmwareqcs2290qca6595au_firmwaresa6155snapdragon_x70_modem-rf_systemqca6335sdm712sdm670sm8350sd_455_firmwarehome_hub_100_platformcsra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareqcs6125_firmwaresm7350-ab_firmwarewcn685x-1msm8108sm4375wcn3998wcd9371_firmwaremsm8108_firmwareqam8295pwcn3950qcn6024_firmwaresm4125sd_8cx_gen2_firmwareqca8386_firmwaresm6375_firmwarewcn3660bqca8084_firmwareqsm8350_firmwaresm7150-acqsm8350sd460_firmware8998_firmwaresm7315_firmwaresm7325-aeqca6574au_firmwaresm4250-aasnapdragon_636_mobile_platformwcd9375_firmwareqca8081_firmwarewcn3998_firmwaresa6155_firmwaresm6225-adqca6420wcd9360snapdragon_xr2\+_gen_1_platformsnapdragon_auto_5g_modem-rf_firmware8909smart_audio_400_platform_firmwaresd_8cx_gen2wcn3999sm6225-ad_firmwareqrb5165_firmwareqrb5165m_firmwareqca6698aqqcs6125sa4155p_firmwaresa8155_firmwareqca4004_firmwaresd662_firmwaresm7250-ab_firmwareqca6430snapdragon_630_mobile_platformqts110wcd9306_firmwarewcd9340sw5100home_hub_100_platform_firmwarefsm10056_firmwareqca6436sa6155pqcs603_firmwareqca6698aq_firmwaremsm8209_firmwarewcn685x-1_firmwaresm8150_firmwarewcd9341qca6431qca6696_firmwarewcd9371ipq9008_firmwarewcn3910_firmwaresm4350_firmwaresd_8cxsa8150pqca4004sm8250-ac_firmwarewsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwaresm7225_firmwaresdm850wcn3988sd660_firmwaresm4250-aa_firmwaresa8195p_firmwaresm8475qcn7606_firmwaresm6125_firmwarewcn6750_firmwaresa8295p_firmwarewcn3610snapdragon_675_mobile_platform_firmwaremsm8608sm6375qca8337_firmwarewcd9380_firmwaressg2125psw5100psnapdragon_w5\+_gen_1_wearable_platformqca8084qca6564auipq9008sd670_firmwareqca6574wcd9380qcs410qca9379_firmwaresm7150-aa_firmwaresxr1230pc-v2x_9150_firmwareqcn9012_firmwareqca6430_firmwareqcn9274_firmwarewcd9335_firmwarewcn3980qca6335_firmwaresm7225qcs605wcd9340_firmwarewsa8815sm6150-ac_firmwaresd7cwcn3910qca6320snapdragon_630_mobile_platform_firmwareqca6426_firmwarewcn3660b_firmwareqca9984sd835qcn9024ipq9574_firmwarewcn3980_firmwaresd730snapdragon_xr2\+_gen_1_platform_firmwaresnapdragon_x50_5g_modem-rf_system_firmwaresm7150-aasa8295pqca6421_firmwaresm6350sm8475_firmwarewcn6740_firmwaresm7125smart_audio_200_platformsnapdragon_wear_1300snapdragon_xr2_5g_platformsnapdragon_x65_5g_modem-rf_systemar8031_firmwaresm7150-ab_firmwareqrb51658098_firmwareqcs603sm8350_firmwaresdm660sm6350_firmwarewcn785x-1_firmwaresdm710sd670smart_audio_200_platform_firmwareqcn9024_firmwareqca6564a_firmwarequalcomm_robotics_rb5_platform_firmwaresdx57mqcm4290_firmwaresnapdragon_x24_lte_modemwsa8832sw5100p_firmwaresa8540pqcs610_firmwareqsm8250sa6145par8031qca6595_firmwaresa8145pmdm9205_firmwareqca6391_firmwaresa4150p_firmwarewcd9370_firmwaresm7325_firmwaresm4350-ac_firmwaresdx55sd888_firmwaresm8250csra6640sa8155psd675ssg2115p_firmwareqcs8155_firmwareqca9379sa4155par8035_firmwareqcm2290qsm8250_firmwareqcn7606sdm845_firmwarewsa8830snapdragon_662_mobile_platform_firmware8998sxr2230p_firmwaresa8145p_firmwaresm6125sdm712_firmwaresnapdragon_x24_lte_modem_firmwareqcs2290_firmwarefsm10056wcn785x-5sd7c_firmwarecsrb31024csra6620qca8082sm7250-ac_firmwareqca8386qcs4290qca6420_firmwareqca6390_firmwareapq8009_firmwaresnapdragon_auto_4g_modem_firmwaresd730_firmwarewcd9370sd675_firmwaressg2115pqca6564qca6426wcn3990_firmwareqrb5165n_firmwareqca9984_firmwareqca9377sm8450sm8250-absd_8cx_firmwarewcd9385_firmwarewcd9326_firmwarewcn3615_firmwaresd662qam8295p_firmwaresm7325-afqcn9011_firmwaresa8155snapdragon_x55_5g_modem-rf_systemqca8082_firmwareqca6320_firmwaresdx55_firmwaresnapdragon_208_processor_firmwaresa9000p_firmwarewcn3615wcn3680b_firmwareqca6595ausm7325-af_firmwaresm7250p_firmwarewcn3999_firmwarewcn3610_firmwareqca6436_firmwaresm4350-acqrb5165nsnapdragon_w5\+_gen_1_wearable_platform_firmwarewcd9306sd778gqca6564au_firmwaresa6155p_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareqca6310qcn9274qcs8155sm6225snapdragon_208_processorsnapdragon_x70_modem-rf_system_firmwareqcs6490sm8250_firmwaresm8250-acwcn3988_firmware315_5g_iot_modemqcn9074sd205sa6145p_firmwareqca6421qca8085sd778g_firmwaresm7250-aasa8195psxr1120sdm710_firmwaresm6250c-v2x_9150wsa8810_firmwaresm4375_firmwaresm8450_firmwarewcd9326wcd9335snapdragon_ar2_gen_1_platform_firmwareqca8081qca6174a_firmwareqcs4290_firmwarewcd9385qca8085_firmwaresxr2130_firmwareqcs6490_firmwaresd_8cx_gen3sm7150-abqca6390wcd9375ar8035aqt10008909_firmwaresc8180x\+sdx55_firmwaresm6250_firmwaresnapdragon_662_mobile_platformsm8150wsa8815_firmwareqcm6490wsa8835_firmwaresnapdragon_636_mobile_platform_firmwaresm7350-absxr1120_firmwareqca6564asa4150pwcn785x-1qcm6125_firmwareqcm2290_firmwarewcn3990sd_675sdm845sd865_5gqca6595sm8350-ac_firmwaresm8150-acqcn9012sd888wsa8835sxr1230p_firmwaresa8540p_firmwaresnapdragon_auto_5g_modem-rfsm6250psxr2130ssg2125p_firmwareqca6574asmart_audio_400_platformwcn685x-5_firmwareqca6174asm7325psdm670_firmwareqca6310_firmwaresm7325wcn6750mdm9205sa9000pqca6574_firmwaresm7150-ac_firmwaresm7250-absd855sm4125_firmwaresm7325p_firmwaresxr2230psdx57m_firmwaresnapdragon_xr2_5g_platform_firmwareqca6574a_firmwaremsm8209qrb5165mwcn785x-5_firmwaresm7315apq8009snapdragon_x55_5g_modem-rf_system_firmwaresd460qca6391sm8250-ab_firmwareaqt1000_firmwaresdm850_firmwaresnapdragon_auto_4g_modemqcm4290csrb31024_firmwareqcm6490_firmwarewsa8832_firmwaresnapdragon_xr1_platformwcn685x-5qcn9011sd_455sm6225_firmwareqca6574ausa8155p_firmwareipq9574sd205_firmwarewcd9341_firmwareqcm6125wsa8810sm7250-aa_firmwaresm7250-acsm8150-ac_firmwaresnapdragon_ar2_gen_1_platformwcn3680bsm8350-acsd835_firmwareqca6564_firmwaresnapdragon_675_mobile_platformwcn6740qca6696sm4350msm8608_firmwaresm6150-acsm7125_firmwaresnapdragon_x50_5g_modem-rf_systemsa6150pqcn6024qualcomm_robotics_rb5_platformsm7250psw5100_firmwareqcn9074_firmwareqcs410_firmwaresnapdragon_wear_1300_firmwaresdm660_firmwaresnapdragon_xr1_platform_firmwareqts110_firmwareSnapdragon
CWE ID-CWE-415
Double Free
CVE-2021-30333
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.12% / 31.08%
||
7 Day CHG~0.00%
Published-01 Apr, 2022 | 04:40
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper validation of buffer size input to the EFS file can lead to memory corruption in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaremdm9640_firmwaresm6250p_firmwareqcs610qca8337wcd9360_firmwaresdx65wcn3950_firmwareqcs2290qca6595au_firmwaresd_675_firmwareqcs6125_firmwaresa415mwcn3998sd_8cx_gen2_firmwarewcn3950mdm9628sd720gqsw8573_firmwaresd_8_gen1_5g_firmwaresm6375_firmwarewcn3660bsd460_firmwaresm7315_firmwareqca6574au_firmwarewcd9375_firmwarewcn3998_firmwareqca8081_firmwaremsm8909wapq8009w_firmwareqca6420apq8053_firmwarewcd9360qca9367_firmwaremdm8207sd_8cx_gen2qcs6125sd662_firmwareqca6430wcd9306_firmwarewcd9340qualcomm215_firmwaresd765gsw5100qca6436wcn6851wcd9341qca6696_firmwaresd750gsd870_firmwarewcn3910_firmwaremdm9207_firmwarewsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwarewcn3988sd660_firmwaresm8475wcn6750_firmwarewcn3610mdm9640sm6375wcn3991qca8337_firmwaresda429w_firmwarewcd9380_firmwaresdm429wmsm8996au_firmwaresw5100pwcd9330qca6564ausdx55m_firmwarewcn6856_firmwareqet4101_firmwareqca6574wcd9380qualcomm215qcs410sd690_5g_firmwaresdx24_firmwareqca6430_firmwarewcd9335_firmwarewcn3980sd439_firmwareqsw8573wcd9340_firmwarewsa8815wcn6850sd7cwcn3910qca6426_firmwarewcn3660b_firmwarewcn3980_firmwaresd730wcd9330_firmwaresdx55mmsm8953sd678_firmwarewcn6851_firmwareqca6564a_firmwareapq8009wqcm4290_firmwaresd480sd870wcn6855sw5100p_firmwaresd210_firmwareqcs610_firmwaresdxr1apq8096aumdm8207_firmwareqca6391_firmwarewcd9370_firmwaresdx55sd888_firmwareapq8053sd675sd439qet4101ar8035_firmwareqcm2290wcn3991_firmwarewsa8830sd678qcs2290_firmwaresd7c_firmwarecsrb31024mdm9628_firmwareqcs4290sd765g_firmwareqca6420_firmwareqca6390_firmwaresd690_5gsd730_firmwarewcd9370sd675_firmwareqca6426qca6584au_firmwarewcn3990_firmwareqca9377sdw2500_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwarewcn3615_firmwaresd662wcn3680b_firmwaresdx55_firmwareqca6595auwcn3615sm7250p_firmwarewcn3610_firmwareqca6436_firmwaremdm9207qca6564au_firmwareqca6584ausd778gwcd9306sm6225sa515m_firmwareqcs6490sd429sdxr2_5gqca9367mdm9607_firmwaresa415m_firmwarewcn3988_firmwaresd205sd429_firmwaresm6250sd778g_firmwareapq8017_firmwarewsa8810_firmwaresd765_firmwarewcd9326wcd9335qca8081qca6174a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwarear8035qca6390sd750g_firmwareaqt1000wcd9375sm6250_firmwaremsm8953_firmwaresda429wsd210wcn3620_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewcn3620wsa8815_firmwarewsa8835_firmwareapq8017qcx315qca6564aqcm6125_firmwareqcm2290_firmwarewcn3990sd_675sd865_5gsdx24sd888msm8909w_firmwareqcx315_firmwaremsm8996ausdm429w_firmwarewsa8835sd665_firmwaresd888_5gsm6250pqca6574awcn6855_firmwareqca6174asm7325pwcn6750sa515mqca6574_firmwaresd855sm7325p_firmwaresd665sd765qca6574a_firmwaresd768g_firmwaresd850_firmwaresm7315sd460qca6391sdxr1_firmwareaqt1000_firmwaresdx65_firmwareqcm4290csrb31024_firmwareqcm6490_firmwaresd480_firmwaresm6225_firmwareqca6574aumdm9607sd205_firmwarewcd9341_firmwareqcm6125wsa8810wcn6856wcn3680bsd768gqca6696sdw2500apq8096au_firmwaresm7250psd720g_firmwaresw5100_firmwareqcs410_firmwaresd850Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-30350
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.10% / 28.63%
||
7 Day CHG~0.00%
Published-14 Jun, 2022 | 10:11
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Lack of MBN header size verification against input buffer can lead to memory corruption in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewsa8830sd678sa6150p_firmwaresm6250p_firmwaresa8145p_firmwareqcs610qcs2290_firmwareqca8337sd7c_firmwarecsrb31024wcd9360_firmwaresdx65qcs4290wcn3950_firmwaresa8150p_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqcs2290qca6390_firmwaresd690_5gsd730_firmwarewcd9370qcs605_firmwaresd_675_firmwaresd675_firmwareqcs6125_firmwareqca6426sa415mwcn3998wcd9385_firmwaresdxr2_5g_firmwaresd_8cx_gen2_firmwarewcn3950sd720gsd_8_gen1_5g_firmwaresm6375_firmwaresd662sd460_firmwaresm7315_firmwareqca6574au_firmwaresdx55_firmwareqca6595auqca8081_firmwarewcd9375_firmwarewcn3998_firmwaresm7250p_firmwareqca6420qca6436_firmwarewcd9360qca6564au_firmwaresd680_firmwaresa6155p_firmwaresd778gsd_8cx_gen2sa515m_firmwareqcs6490sdxr2_5gqcs6125sd662_firmwaresa415m_firmwarewcn3988_firmwareqca6430sa6145p_firmwaresm6250sd778g_firmwaresa8195psd765gsw5100sd765_firmwareqca6436sd680wcn6851sa6155pqca8081qcs603_firmwareqcs4290_firmwarewcd9385qca6696_firmwareqcs6490_firmwaresd750gsd870_firmwareqca6390ar8035sd750g_firmwareaqt1000sa8150pwcd9375sm6250_firmwarewcn3910_firmwarewsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwareqcm6490sd888_5g_firmwarewcn3988sd660_firmwarewcn6850_firmwarewsa8835_firmwaresa8195p_firmwareqcx315sm8475wcn6750_firmwareqcm6125_firmwareqcm2290_firmwaresm6375wcn3991qca8337_firmwarewcd9380_firmwaresd_675sw5100psd780gsd865_5gqca6564ausdx55m_firmwarewcn6856_firmwaresd888wsa8835qcx315_firmwaresd665_firmwarewcd9380sd888_5gsd850sm6250pqcs410qca6574asd690_5g_firmwarewcn6855_firmwaresm7325pqca6430_firmwarewcn6750sa515mqcs605sd855sm7325p_firmwaresd665sd7cwcn3910wcn6850sd765qca6426_firmwareqca6574a_firmwaresd768g_firmwaresd850_firmwaresm7315sd460qca6391sd730sdx55msdxr1_firmwareaqt1000_firmwarewcn6740_firmwaresdx65_firmwaresd678_firmwareqcm4290csrb31024_firmwareqcm6490_firmwaresd480_firmwareqcs603wcn6851_firmwareqca6574ausa8155p_firmwareqcm6125qcm4290_firmwaresd480sd870wcn6855sw5100p_firmwareqcs610_firmwarewcn6856sa6145psdxr1sd768gsa8145pwcn6740qca6696qca6391_firmwaresd780g_firmwarewcd9370_firmwaresa6150psd888_firmwaresdx55sa8155psd675sm7250psd720g_firmwaresw5100_firmwareqcs410_firmwarear8035_firmwareqcm2290Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wearables
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CVE-2021-30270
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.3||HIGH
EPSS-0.03% / 8.78%
||
7 Day CHG~0.00%
Published-03 Jan, 2022 | 07:25
Updated-03 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible null pointer dereference in thread profile trap handler due to lack of thread ID validation before dereferencing it in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarefsm10055qca2066mdm9640_firmwaresm6250p_firmwaresa6150p_firmwareqcs610wcn3950_firmwareipq8078asa8150p_firmwareqcs2290qca6595au_firmwaresa6155mdm8215csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwaremdm8615m_firmwaresa415mwcn3950ipq8076asd720gmdm9628mdm9206_firmwareqsw8573_firmwaresm6375_firmwaresd460_firmwaresm7315_firmwaremdm8215mqca6428qca6574au_firmwareipq8071wcd9375_firmwareqca8081_firmwaresa6155_firmwaresdx12_firmwaremsm8909wapq8009w_firmwareqca6438_firmwareipq8070_firmwareqca9367_firmwareipq8078a_firmwaremdm8207wcn3999qrb5165_firmwareipq8072_firmwaresa8155_firmwareqca4004_firmwaresd662_firmwaremdm9615mqcs405wcd9306_firmwaresd765gfsm10056_firmwareqca6436wcn6851sa6155pqcs603_firmwaremdm9250_firmwareqca2066_firmwareqca6696_firmwaresd870_firmwaresd750gmdm8215_firmwarewcn3910_firmwaresd_8cxsa8150pmdm9207_firmwareqca4004wsa8830_firmwaresd865_5g_firmwarewcn3988qca6438sa8195p_firmwarewcn6750_firmwarewcn3610mdm9640qca6428_firmwaresm6375wcn3991sda429w_firmwarewcd9380_firmwareipq8072asdm429wwcd9330msm8996au_firmwareipq8076a_firmwareipq8078qca6564ausdx55m_firmwarewcn6856_firmwareqca6574wcd9380qcs410sd690_5g_firmwaresdx24_firmwareqsw8573qcs605wcn6850sd7cwcn3910qca6584_firmwaremdm9650_firmwaremdm9215_firmwareqca6426_firmwareqca9984sd730wcd9330_firmwaresdx55mwcn6740_firmwarear6003_firmwaresd678_firmwareapq8064au_firmwarear8031_firmwareipq8078_firmwareqrb5165wcn6851_firmwareqcs603ipq8070qca6564a_firmwareapq8009wqcm4290_firmwaresd480sd870wcn6855sd210_firmwareqcs610_firmwareqsm8250sa6145psdxr1ar8031apq8096auqcs405_firmwaresa8145pmdm8207_firmwaremdm9205_firmwareqca6391_firmwarewcd9370_firmwaresd780g_firmwaresdx55sd888_firmwaresa8155pcsra6640sd675ar8035_firmwareqcm2290qsm8250_firmwarewcn3991_firmwaremdm9150_firmwarewsa8830sd678sa8145p_firmwareqcs2290_firmwarefsm10056sd7c_firmwarecsrb31024mdm9628_firmwaremdm9650csra6620fsm10055_firmwareqcs4290mdm9250sd765g_firmwareqca6390_firmwaresd690_5gsd730_firmwarewcd9370mdm9310_firmwaresd675_firmwareipq8072qca6564qca6426qca6584au_firmwareqrb5165n_firmwareqca9984_firmwareqca9377sdw2500_firmwaresd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwaremdm9615m_firmwareipq8074asd662sa8155qca6584sdx55_firmwareqca6595auwcn3999_firmwaresm7250p_firmwarewcn3610_firmwareqca6436_firmwareqrb5165nmdm9207wcd9306qca6584ausd778gqca6564au_firmwaresa6155p_firmwaresm6225sd429qcs6490sdxr2_5gqca9367mdm9607_firmwaresa415m_firmwarewcn3988_firmwaresd205sd429_firmwaresa6145p_firmwaresd778g_firmwaresm6250sa8195papq8017_firmwaresd765_firmwareqca8081qca6174a_firmwareqcs4290_firmwarewcd9385mdm8615mqcs6490_firmwareqca6390wcd9375sd750g_firmwarear8035apq8064ausm6250_firmwaresda429wsd210wcn3620_firmwaresdx20_firmwareipq8074a_firmwaresd888_5g_firmwareqcm6490wcn6850_firmwarewsa8835_firmwarewcn3620apq8017qcx315ar6003qca6564aqcm2290_firmwaresd_675sd780gsd865_5gsdx24sd888msm8909w_firmwareqcx315_firmwarewsa8835msm8996ausdm429w_firmwaresd665_firmwaresd888_5gsm6250pqca6574amdm9206wcn6855_firmwareqca9889qca6174asm7325pipq8074wcn6750ipq8070a_firmwaremdm9615mdm9205qca6574_firmwaresm7325p_firmwaresd665sd765qca6574a_firmwaresd768g_firmwaresd850_firmwaresm7315sd460qca6391sdxr1_firmwaremdm9310qcm4290csrb31024_firmwareqcm6490_firmwaresdx20sd480_firmwareipq8072a_firmwaremdm9215sm6225_firmwareipq8074_firmwareqca6574auqca9889_firmwaremdm8215m_firmwaremdm9607sa8155p_firmwaresd205_firmwaremdm9150wcn6856qca6564_firmwaresd768gwcn6740qca6696sdw2500sa6150papq8096au_firmwaremdm9615_firmwareipq8070asm7250psd720g_firmwaresdx12ipq8071_firmwareqcs410_firmwaresd850Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2021-30267
Matching Score-8
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-8
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.77%
||
7 Day CHG~0.00%
Published-03 Jan, 2022 | 07:25
Updated-03 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible integer overflow to buffer overflow due to improper input validation in FTM ARA commands in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055qca9377_firmwaremdm9150_firmwarewcn3991_firmwaresd678wsa8830sm6250p_firmwareqcs610fsm10056qca8337sd7c_firmwarecsrb31024wcd9360_firmwaremdm9650sdx65fsm10055_firmwarewcn3950_firmwaremdm9250sd765g_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwaresd690_5gsd730_firmwarewcd9370qcs605_firmwaresd_675_firmwaresd675_firmwareqca6426wcn3990_firmwaresm8450qca9377sa415mwcn3998sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcn3950wcd9326_firmwaresd720gsm6375_firmwareqca6574au_firmwaresdx55_firmwareqca6595auqca8081_firmwaresdx12_firmwarewcd9375_firmwaresm7250p_firmwarewcn3998_firmwareqca6420qca6436_firmwarewcd9360qca6564au_firmwaresa515m_firmwaresdxr2_5gsa415m_firmwarewcn3988_firmwareqca6430sm6250wcd9340wsa8810_firmwaresd765gsm8450_firmwaresd765_firmwarefsm10056_firmwareqca6436wcd9326wcd9335wcn6851qca8081qcs603_firmwareqca6174a_firmwaremdm9250_firmwarewcd9385wcd9341qca6696_firmwaresd750gsd870_firmwarear8035qca6390sd_8cxaqt1000sd750g_firmwarewcd9375sm6250_firmwarewsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwaresdx20_firmwarewcn3988wcn6850_firmwarewsa8815_firmwaresd660_firmwarewsa8835_firmwareqcx315qca6564asm6375wcn3991qca8337_firmwarewcd9380_firmwarewcn3990sd_675sd865_5gqca6564ausdx24sdx55m_firmwaresm8450p_firmwarewcn6856_firmwarewsa8835qcx315_firmwaresd665_firmwarewcd9380sm6250pqcs410qca6574asd690_5g_firmwarewcn6855_firmwareqca6174asdx24_firmwareqca6430_firmwarewcd9335_firmwarewcn3980sa515mqcs605wcd9340_firmwaresd855wsa8815wcn6850sd665sd7cmdm9650_firmwaresd765qca6426_firmwareqca6574a_firmwaresd768g_firmwaresd850_firmwarewcn3980_firmwaresd730qca6391sdx55msdxr1_firmwareaqt1000_firmwaresdx65_firmwaresd678_firmwarecsrb31024_firmwaresdx20sd480_firmwareqcs603wcn6851_firmwareqca6574auqca6564a_firmwarewcd9341_firmwaresd480sd870sm8450pwcn6855wsa8810qcs610_firmwaremdm9150wcn6856sdxr1sd768gqca6696qca6391_firmwaresd845_firmwarewcd9370_firmwaresdx55sd675sd845sm7250psd720g_firmwaresdx12qcs410_firmwarear8035_firmwaresd850Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-190
Integer Overflow or Wraparound
  • Previous
  • 1
  • 2
  • ...
  • 9
  • 10
  • 11
  • ...
  • 46
  • 47
  • Next
Details not found