Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-47388

Summary
Assigner-qualcomm
Assigner Org ID-2cfc7d3e-20d3-47ac-8db7-1b7285aff15f
Published At-06 Jan, 2026 | 22:48
Updated At-07 Jan, 2026 | 16:15
Rejected At-
Credits

Buffer Copy without Checking Size of Input in DSP Service

Memory corruption while passing pages to DSP with an unaligned starting address.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:qualcomm
Assigner Org ID:2cfc7d3e-20d3-47ac-8db7-1b7285aff15f
Published At:06 Jan, 2026 | 22:48
Updated At:07 Jan, 2026 | 16:15
Rejected At:
â–¼CVE Numbering Authority (CNA)
Buffer Copy without Checking Size of Input in DSP Service

Memory corruption while passing pages to DSP with an unaligned starting address.

Affected Products
Vendor
Qualcomm Technologies, Inc.Qualcomm, Inc.
Product
Snapdragon
Platforms
  • Snapdragon Compute
  • Snapdragon Industrial IOT
  • Snapdragon Mobile
  • Snapdragon Wearables
Default Status
unaffected
Versions
Affected
  • FastConnect 6200
  • FastConnect 6700
  • FastConnect 6900
  • FastConnect 7800
  • QCS610
  • QMP1000
  • Qualcomm Video Collaboration VC1 Platform
  • Qualcomm Video Collaboration VC3 Platform
  • SG6150
  • SG6150P
  • SM6475
  • SM7435
  • SM8735
  • SM8750
  • SM8750P
  • Snapdragon 4 Gen 2 Mobile Platform
  • Snapdragon 6 Gen 1 Mobile Platform
  • Snapdragon W5+ Gen 1 Wearable Platform
  • SW5100
  • SW5100P
  • SXR2330P
  • SXR2350P
  • WCD9370
  • WCD9375
  • WCD9378
  • WCD9380
  • WCD9385
  • WCD9395
  • WCN3950
  • WCN3980
  • WCN3988
  • WCN6755
  • WCN7750
  • WCN7860
  • WCN7861
  • WCN7880
  • WCN7881
  • WSA8810
  • WSA8815
  • WSA8830
  • WSA8832
  • WSA8835
  • WSA8840
  • WSA8845
  • WSA8845H
Problem Types
TypeCWE IDDescription
CWECWE-120CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow')
Type: CWE
CWE ID: CWE-120
Description: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow')
Metrics
VersionBase scoreBase severityVector
3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2026-bulletin.html
N/A
Hyperlink: https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2026-bulletin.html
Resource: N/A
â–¼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:product-security@qualcomm.com
Published At:07 Jan, 2026 | 12:17
Updated At:27 Jan, 2026 | 19:22

Memory corruption while passing pages to DSP with an unaligned starting address.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_6200_firmware>>-
cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_6200>>-
cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_6700_firmware>>-
cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_6700>>-
cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_6900_firmware>>-
cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_6900>>-
cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_7800_firmware>>-
cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_7800>>-
cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qcs610_firmware>>-
cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qcs610>>-
cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qmp1000_firmware>>-
cpe:2.3:o:qualcomm:qmp1000_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qmp1000>>-
cpe:2.3:h:qualcomm:qmp1000:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>video_collaboration_vc1_platform_firmware>>-
cpe:2.3:o:qualcomm:video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>video_collaboration_vc1_platform>>-
cpe:2.3:h:qualcomm:video_collaboration_vc1_platform:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>video_collaboration_vc3_platform_firmware>>-
cpe:2.3:o:qualcomm:video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>video_collaboration_vc3_platform>>-
cpe:2.3:h:qualcomm:video_collaboration_vc3_platform:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sg6150_firmware>>-
cpe:2.3:o:qualcomm:sg6150_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sg6150>>-
cpe:2.3:h:qualcomm:sg6150:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sg6150p_firmware>>-
cpe:2.3:o:qualcomm:sg6150p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sg6150p>>-
cpe:2.3:h:qualcomm:sg6150p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sm6475_firmware>>-
cpe:2.3:o:qualcomm:sm6475_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sm6475>>-
cpe:2.3:h:qualcomm:sm6475:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sm7435_firmware>>-
cpe:2.3:o:qualcomm:sm7435_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sm7435>>-
cpe:2.3:h:qualcomm:sm7435:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sm8735_firmware>>-
cpe:2.3:o:qualcomm:sm8735_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sm8735>>-
cpe:2.3:h:qualcomm:sm8735:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sm8750_firmware>>-
cpe:2.3:o:qualcomm:sm8750_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sm8750>>-
cpe:2.3:h:qualcomm:sm8750:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sm8750p_firmware>>-
cpe:2.3:o:qualcomm:sm8750p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sm8750p>>-
cpe:2.3:h:qualcomm:sm8750p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>snapdragon_4_gen_2_mobile_platform_firmware>>-
cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>snapdragon_4_gen_2_mobile_platform>>-
cpe:2.3:h:qualcomm:snapdragon_4_gen_2_mobile_platform:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>snapdragon_6_gen_1_mobile_platform_firmware>>-
cpe:2.3:o:qualcomm:snapdragon_6_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>snapdragon_6_gen_1_mobile_platform>>-
cpe:2.3:h:qualcomm:snapdragon_6_gen_1_mobile_platform:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>snapdragon_w5\+_gen_1_wearable_platform_firmware>>-
cpe:2.3:o:qualcomm:snapdragon_w5\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>snapdragon_w5\+_gen_1_wearable_platform>>-
cpe:2.3:h:qualcomm:snapdragon_w5\+_gen_1_wearable_platform:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sw5100_firmware>>-
cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sw5100>>-
cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sw5100p_firmware>>-
cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sw5100p>>-
cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sxr2330p_firmware>>-
cpe:2.3:o:qualcomm:sxr2330p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sxr2330p>>-
cpe:2.3:h:qualcomm:sxr2330p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sxr2350p_firmware>>-
cpe:2.3:o:qualcomm:sxr2350p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>sxr2350p>>-
cpe:2.3:h:qualcomm:sxr2350p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcd9370_firmware>>-
cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcd9370>>-
cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcd9375_firmware>>-
cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcd9375>>-
cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcd9378_firmware>>-
cpe:2.3:o:qualcomm:wcd9378_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>wcd9378>>-
cpe:2.3:h:qualcomm:wcd9378:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-120Secondaryproduct-security@qualcomm.com
CWE ID: CWE-120
Type: Secondary
Source: product-security@qualcomm.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2026-bulletin.htmlproduct-security@qualcomm.com
Patch
Vendor Advisory
Hyperlink: https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2026-bulletin.html
Source: product-security@qualcomm.com
Resource:
Patch
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

1162Records found

CVE-2024-33054
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.41% / 60.94%
||
7 Day CHG~0.00%
Published-02 Sep, 2024 | 10:22
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Computer Vision

Memory corruption during the handshake between the Primary Virtual Machine and Trusted Virtual Machine.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcm8550_firmwaresdm429w_firmwarewsa8845_firmwarewsa8832wsa8840qcs8550_firmwarewcd9370snapdragon_8_gen_2_mobile_firmwarewcd9385wcd9395_firmwarewcd9390_firmwarefastconnect_6700snapdragon_8_gen_2_mobilesg8275pwsa8832_firmwarewcd9370_firmwarewcd9395sg8275p_firmwaresnapdragon_8\+_gen_2_mobileqcm6490_firmwarewcn3660bwcn3620_firmwarewcd9390qcm6490wsa8845h_firmwaresm8550p_firmwareqcm8550qcs6490_firmwaresdm429wwcn3660b_firmwarewsa8835wsa8840_firmwareqcs5430wsa8845hwcd9380_firmwareqcm5430qcm5430_firmwarewsa8830sm8550pwcn6755_firmwarewcn3620snapdragon_8_gen_3_mobile_firmwarewcd9375_firmwarefastconnect_6900fastconnect_7800_firmwaresnapdragon_429_mobilesm8635qcs5430_firmwaresm8635_firmwarewcd9385_firmwarefastconnect_6900_firmwareqcs8550wcd9380fastconnect_7800snapdragon_8\+_gen_2_mobile_firmwarewcd9375wcn6755wsa8845fastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwarewsa8835_firmwaresnapdragon_429_mobile_firmwareqcs6490snapdragon_8_gen_3_mobilewsa8830_firmwarevideo_collaboration_vc3_platformSnapdragonwcd9380_firmwareqcm8550_firmwareqcm6490_firmwarewsa8832_firmwarewsa8840_firmwaresg8275p_firmwarefastconnect_6900_firmwareqcs8550_firmwaresdm429w_firmwarefastconnect_6700_firmwarefastconnect_7800_firmwarewcn6755_firmwarewcd9395_firmwaresm8635_firmwareqcm5430_firmwareqcs6490_firmwareqcs5430_firmwarequalcomm_video_collaboration_vc3_platform_firmwarewcd9385_firmwarewcd9370_firmwaresm8550p_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewcd9390_firmwarewsa8830_firmwarewsa8845_firmwarewcn3620_firmwarewcn3660b_firmwarewsa8835_firmwaresnapdragon_429_mobile_platform_firmwarewcd9375_firmwarewsa8845h_firmwaresnapdragon_8_gen_2_mobile_platform_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-11130
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.88%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 10:00
Updated-04 Aug, 2024 | 11:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

u'Possible buffer overflow in WIFI hal process due to copying data without checking the buffer length' in Snapdragon Auto, Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile in QCM4290, QCS4290, QM215, QSM8350, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SC8180X, SC8180XP, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6250, SM6350, SM7125, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR2130, SXR2130P

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sm6350sm7125sm4250p_firmwaresa6155p_firmwaresm6115_firmwaresm7250sxr2130p_firmwaresm6125qcm4290sm7250_firmwaresm8350_firmwaresa8155_firmwaresdx55m_firmwaresm8250_firmwaresc8180x_firmwaresm6115p_firmwaresm6350_firmwaresa6145p_firmwareqm215sa8155p_firmwaresm4250_firmwaresm6250qcs4290qcm4290_firmwaresa6155sa6155psm8350sxr2130sc8180xsa6145psm6115sm8350p_firmwareqcs4290_firmwaresm8350psm4250psm8150_firmwaresxr2130_firmwaresxr2130psm4250sc8180xpsm7225qm215_firmwaresc8180xp_firmwaresm6115psm7125_firmwaresdx55sm6250_firmwareqsm8350_firmwaresa8155psm8250qsm8350sm8150p_firmwaresm7225_firmwaresm8150sa8155sm7250psdx55_firmwaresa6155_firmwaresm7250p_firmwaresm6125_firmwaresdx55msm8150pSnapdragon Auto, Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2022-33224
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 10.41%
||
7 Day CHG~0.00%
Published-06 Jun, 2023 | 07:38
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer copy without checking the size of input in Core

Memory corruption in core due to buffer copy without check9ing the size of input while processing ioctl queries.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwareqam8255p_firmwarewcn3991wsa8830wcd9380_firmwaresa6150p_firmwaresa8145p_firmwaresw5100psnapdragon_w5\+_gen_1_wearable_platformwcn785x-5sm8350-ac_firmwaresm8150-acwsa8835wcd9380sa8150p_firmwareqca6420_firmwareqca6595au_firmwaresnapdragon_wear_4100\+_platform_firmwaresm8350snapdragon_wear_4100\+_platformwcn685x-5_firmwarewcn685x-1sm8450qca6430_firmwarewcn3980wcn3998wcd9385_firmwarewcn3660bsd855wsa8815wcn3660b_firmwareqca6574au_firmwarewcn3680b_firmwareqca6595auwcn3998_firmwarewcn785x-5_firmwarewcn3980_firmwarewcn3610_firmwareqca6420snapdragon_w5\+_gen_1_wearable_platform_firmwareaqt1000_firmwaresa6155p_firmwareqcs8155qca6698aqsm8350_firmwarewcn685x-5wcn3988_firmwareqca6430qca6797aq_firmwarewcn785x-1_firmwaresa6145p_firmwareqca6574ausa8155p_firmwaresa8195pwsa8810_firmwarewcd9341_firmwaresm8450_firmwaresw5100wsa8810sa8255p_firmwaresa6155psw5100p_firmwaresm8150-ac_firmwareqca6698aq_firmwaresa6145pwcn3680bsm8350-acwcn685x-1_firmwarewcd9385sm8150_firmwaresa8255pwcd9341qca6696_firmwaresa8145pqca6696qca6797aqaqt1000sa8150psa6150psa8155pwsa8830_firmwaresd855_firmwaresm8150wcn785x-1wcn3988wsa8815_firmwarewsa8835_firmwaresa8195p_firmwareqcs8155_firmwaresw5100_firmwareqam8255pwcn3610Snapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2022-33226
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 10.41%
||
7 Day CHG~0.00%
Published-06 Jun, 2023 | 07:38
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer copy without checking the size of input in Core

Memory corruption due to buffer copy without checking the size of input in Core while processing ioctl commands from diag client applications.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwareqam8255p_firmwarewcn3991wcd9380_firmwarewsa8830wcn785x-5sm8350-ac_firmwaresm8150-acwsa8835wcd9380qca6420_firmwareqca6595au_firmwaresnapdragon_wear_4100\+_platform_firmwaresm8350snapdragon_wear_4100\+_platformwcn685x-5_firmwarewcn685x-1qca6430_firmwaresm8450wcn3980wcn3998wcd9385_firmwaresd855wcn3660bwsa8815wcn3660b_firmwareqca6574au_firmwarewcn3680b_firmwareqca6595auwcn3998_firmwarewcn785x-5_firmwarewcn3980_firmwarewcn3610_firmwareqca6420aqt1000_firmwareqca6698aqsm8350_firmwarewcn685x-5qca6797aq_firmwareqca6430wcn785x-1_firmwareqca6574auwsa8810_firmwarewcd9341_firmwaresm8450_firmwarewsa8810sa8255p_firmwaresm8150-ac_firmwareqca6698aq_firmwarewcn3680bsm8350-acwcn685x-1_firmwarewcd9385sm8150_firmwaresa8255pwcd9341qca6797aqaqt1000wsa8830_firmwaresd855_firmwaresm8150wcn785x-1wsa8815_firmwarewsa8835_firmwareqam8255pwcn3610Snapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2022-33232
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.07% / 21.73%
||
7 Day CHG~0.00%
Published-09 Feb, 2023 | 06:58
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer copy without checking size of input in Hypervisor

Memory corruption due to buffer copy without checking size of input while running memory sharing tests with large scattered memory.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresd_8cx_gen3_firmwarewcn3991_firmwarewsa8830sd678qca8337qca6431_firmwaresdx65wcn3950_firmwaresa8150p_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwaresa6155qca6335sd690_5gwcd9370qcs605_firmwaresd_675_firmwaresd675_firmwaressg2115pqca6426wcn3990_firmwareqrb5165n_firmwareqca9377wcn3998sd_8cx_firmwarewcd9385_firmwareqam8295psd_8cx_gen2_firmwareqcn6024_firmwaresdxr2_5g_firmwarewcd9326_firmwarewcn3950sd_8_gen1_5g_firmwareqsm8350_firmwareqsm8350qam8295p_firmwareqcn9011_firmwaresa8155sa9000p_firmwaresm7315_firmwareqca6574au_firmwaresdx55_firmwarewcn7850qca6595auqca8081_firmwaresa6155_firmwarewcd9375_firmwaresm7250p_firmwarewcn3998_firmwareqca6420qca6436_firmwareqrb5165nqca6564au_firmwaresd778gsa6155p_firmwareqca6310sd_8cx_gen2wcn7851qcs6490qrb5165_firmwareqrb5165m_firmwaresdxr2_5gqca6698aqsa8155_firmwarewcn3988_firmwareqca6430sa6145p_firmwareqca6421sd778g_firmwarewcd9340wsa8810_firmwaresd765gsd765_firmwareqca6436wcd9326wcn6851sa6155pqca8081qcs603_firmwarewcn7851_firmwareqca6698aq_firmwareqca6174a_firmwarewcd9385wcd9341qca6431qca6696_firmwareqcs6490_firmwaresd750gsd870_firmwaresd_8cx_gen3sdx70m_firmwareqca6390ar8035sd_8cxaqt1000sa8150psd750g_firmwaresxr2150p_firmwarewcd9375wsa8830_firmwaresd855_firmwaresd865_5g_firmwareqcm6490sd888_5g_firmwarewcn3988wcn6850_firmwarewcn7850_firmwarewsa8815_firmwarewsa8835_firmwaresm8475qca6564asa8295p_firmwarewcn6750_firmwarewcn3991qca8337_firmwarewcd9380_firmwaressg2125pwcn3990sd_675sd780gsd865_5gqca6595qca6564ausdx24sdx55m_firmwarewcn6856_firmwareqcn9012sd888sd670_firmwareqca6574sxr1230p_firmwarewsa8835sa8540p_firmwarewcd9380sd888_5gssg2125p_firmwareqca6574asd690_5g_firmwaresdx50m_firmwarewcn6855_firmwareqca6174asm7325psxr1230psdx24_firmwareqca6310_firmwareqca6430_firmwareqcn9012_firmwarewcn3980wcn6750qca6335_firmwaresa9000pqca6574_firmwareqcs605wcd9340_firmwaresd855wsa8815sm7325p_firmwarewcn6850sdx57m_firmwaresd765qca6426_firmwareqca6574a_firmwaresd768g_firmwareqcn9024qrb5165msd850_firmwarewcn3980_firmwaresm7315qca6391sdx55msxr2150psa8295pqca6421_firmwareaqt1000_firmwarewcn6740_firmwaresdx65_firmwaresd678_firmwareqcm6490_firmwaresdx50mwsa8832_firmwareqrb5165wcn6851_firmwareqcs603qcn9011qca6574ausa8155p_firmwaresd670qca6564a_firmwareqcn9024_firmwaresdx57mwcd9341_firmwarewsa8810sd870wsa8832wcn6855sa8540pwcn6856qsm8250sa6145psd768gqca6595_firmwarewcn6740qca6696qca6391_firmwaresd845_firmwaresd780g_firmwarewcd9370_firmwaresdx55sd888_firmwaresa8155pqcn6024sd675sd845sdx70msm7250pssg2115p_firmwarear8035_firmwaresd850qsm8250_firmwareSnapdragonqca9377_firmwaresd_8cx_gen3_firmwarewcn3991_firmwareqca8337_firmwarewcd9380_firmwareqca6431_firmwaresdx55m_firmwarewcn6856_firmwaresd670_firmwaresxr1230p_firmwarewcn3950_firmwaresa8540p_firmwaresa8150p_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwaressg2125p_firmwareqcs605_firmwaresd_675_firmwaresd675_firmwaresd690_5g_firmwaresdx50m_firmwarewcn6855_firmwaresdx24_firmwarewcn3990_firmwareqrb5165n_firmwareqca6310_firmwareqca6430_firmwareqcn9012_firmwaresd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwaresd_8cx_gen2_firmwareqcn6024_firmwarewcd9326_firmwareqca6335_firmwareqca6574_firmwaresd_8_gen1_5g_firmwarewcd9340_firmwaresm7325p_firmwareqsm8350_firmwaresdx57m_firmwareqam8295p_firmwareqcn9011_firmwareqca6426_firmwaresa9000p_firmwaresm7315_firmwareqca6574a_firmwareqca6574au_firmwaresdx55_firmwaresd768g_firmwarewcd9375_firmwareqca8081_firmwaresa6155_firmwarewcn3998_firmwaresm7250p_firmwaresd850_firmwarewcn3980_firmwareqca6436_firmwareqca6421_firmwareaqt1000_firmwareqca6564au_firmwarewcn6740_firmwaresa6155p_firmwaresdx65_firmwaresd678_firmwareqrb5165_firmwareqrb5165m_firmwareqcm6490_firmwarewsa8832_firmwarewcn6851_firmwaresa8155_firmwarewcn3988_firmwaresa6145p_firmwaresa8155p_firmwaresd778g_firmwareqca6564a_firmwareqcn9024_firmwarewsa8810_firmwarewcd9341_firmwaresd765_firmwareqcs603_firmwarewcn7851_firmwareqca6698aq_firmwareqca6174a_firmwareqca6696_firmwareqcs6490_firmwareqca6595_firmwaresd870_firmwaresdx70m_firmwareqca6391_firmwaresxr2150p_firmwaresd750g_firmwarewcn6750_firmwaresd845_firmwaresd780g_firmwarewcd9370_firmwaresd888_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewsa8815_firmwaresd888_5g_firmwarewcn6850_firmwarewcn7850_firmwarewsa8835_firmwaressg2115p_firmwaresa8295p_firmwarear8035_firmwareqsm8250_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2022-33276
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.12% / 30.93%
||
7 Day CHG~0.00%
Published-06 Jan, 2023 | 05:02
Updated-09 Apr, 2025 | 19:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer copy without checking size of input in Modem

Memory corruption due to buffer copy without checking size of input in modem while receiving WMI_REQUEST_STATS_CMDID command.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd_8cx_gen3_firmwareqca2066qca8337ar9380qca6431_firmwareipq8173_firmwaresdx65qcn5124qca4024_firmwareipq8078aipq5028_firmwareqca6595au_firmwareqca2062qca6554a_firmwareqam8295pipq8076aqca8386_firmwareqcn6024_firmwaresd_8_gen1_5g_firmwareqca8084_firmwareqsm8350_firmwareqsm8350sm7315_firmwarewcn7850qca6574au_firmwareqcn5164_firmwarewcd9375_firmwareqca8081_firmwareqcn9002qca9986ipq8070_firmwareipq8065ipq8078a_firmwareqrb5165_firmwareipq5028qrb5165m_firmwareipq6010ipq8068qcn6132qca6436wcn6851wcn7851_firmwareqca9888_firmwareqcn6122ipq8068_firmwareqca2066_firmwareqca6431qca6696_firmwaresd870_firmwareipq9008_firmwareqcn5154_firmwaresxr2150p_firmwarewsa8830_firmwareqca9992_firmwaresd865_5g_firmwarewcn7850_firmwaresm8475qcn5022_firmwaresa8295p_firmwarewcn6750_firmwareipq5018_firmwareqca9985_firmwareqca8337_firmwarewcd9380_firmwareipq8072aqca9980_firmwareipq8076a_firmwareipq8078qca6564auqca8084ipq8173qcn9001_firmwaresdx55m_firmwareipq9008wcn6856_firmwareqcn5164qca6574csr8811_firmwarewcd9380qcn5054_firmwareqcn5024qca8072_firmwareqca9985qcn9012_firmwareqcn5052_firmwareqcn9274_firmwarewcn3980ipq6018_firmwarewsa8815wcn6850pmp8074_firmwareqcn6112qca9986_firmwareqca6426_firmwareqca9984ipq6028ipq8064qcn9024pmp8074ipq9574_firmwarewcn3980_firmwaresdx55mipq8064_firmwaresa8295pqca6421_firmwareqca2062_firmwarewcn6740_firmwareipq8078_firmwareqcn5054qrb5165wcn6851_firmwareipq8070qca9994qca9980qcn9024_firmwareipq8174_firmwaresd870wcn6855ipq6018qca9886_firmwareqca6595_firmwareqca6391_firmwareqca2064qca4024sd780g_firmwarewcd9370_firmwaresd888_firmwareqcn5021_firmwaresxr2150par8035_firmwareqcn5024_firmwarewsa8830qcn9070qca8082qcn9072qca8386qca9992qca6390_firmwareqca2064_firmwareipq6000wcd9370qcn5152_firmwareqca6426qca6584au_firmwareqrb5165n_firmwareqcn9000_firmwareqca9984_firmwareipq5018wcd9385_firmwaresdxr2_5g_firmwareipq8074aqca2065qcn5124_firmwareqam8295p_firmwareqcn6100_firmwareqcn6102_firmwareqcn9011_firmwareqca8082_firmwareqcn5122_firmwareqca6595auqcn6023_firmwareqca6436_firmwareqrb5165nipq5010qca6564au_firmwareqca6584ausd778gqcn9274ipq8174qca9990qcn9001qcs6490sdxr2_5gqcn5052wcn7851qcn6112_firmwareqcn9074qca6421qca8085sd778g_firmwarewsa8810_firmwareqca8081ipq8071aqcn6023ipq8071a_firmwarewcd9385qca8085_firmwareqca2065_firmwareqcs6490_firmwaresd_8cx_gen3ar8035csr8811qca6390wcd9375qcn9100_firmwareipq5010_firmwareipq8074a_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewsa8815_firmwarewsa8835_firmwareqca8072qcn9000sd780gqca6554asd865_5gqca6595ar9380_firmwareqcn9012sd888qcn6122_firmwareipq8065_firmwarewsa8835sd888_5gqcn5154qca8075_firmwareqca6574awcn6855_firmwareqca9889sm7325pqcn6132_firmwareqcn9003_firmwareqca9888qca9994_firmwarewcn6750qcn9003ipq8070a_firmwareipq8076_firmwareqca6574_firmwareqca9886sm7325p_firmwareipq8076qca6574a_firmwareqcn5021qcn5152qrb5165msm7315qca6391qcn6102qcn9100sdx65_firmwareqcm6490_firmwareqcn9070_firmwareipq6028_firmwareipq8072a_firmwareqcn9011qca6574auqca9889_firmwareipq9574qcn5122wsa8810wcn6856qcn5022ipq6010_firmwarewcn6740qca6696qca8075qcn9022_firmwareqcn6024qcn9022qca9990_firmwareipq8070aqcn9002_firmwareqcn6100qcn9072_firmwareipq6000_firmwareqcn9074_firmwareSnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2022-33277
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.07% / 21.73%
||
7 Day CHG~0.00%
Published-09 Feb, 2023 | 06:58
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer copy without checking size of input in modem

Memory corruption in modem due to buffer copy without checking size of input while receiving WMI command.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd_8cx_gen3_firmwareqca2066sa6150p_firmwaresm6250p_firmwareqcs610ipq4028_firmwareqca8337ar9380ipq8173_firmwareqca6431_firmwarewcd9360_firmwaresdx65qcn5124qca4024_firmwarewcn3950_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqcs2290qca6595au_firmwaresa6155qca6335qca2062csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareqcs6125_firmwaresa415mwcn3998qca6554a_firmwarewcd9371_firmwareqam8295pwcn3950qcn6024_firmwaresd720gsm4125sd_8cx_gen2_firmwareipq8076aqca8386_firmwaresd_8_gen1_5g_firmwareqca8084_firmwareqsm8350_firmwaresd710_firmwareqsm8350sd460_firmwaresm7315_firmwarewcn7850qca6428qca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwareqca8081_firmwarewcn3998_firmwaresa6155_firmwareqca6420wcd9360qcn9002qca6438_firmwareqca9986sd680_firmwareipq8070_firmwareipq8065ipq8078a_firmwareqca6678aq_firmwarewcn3999sd_8cx_gen2qrb5165_firmwareipq5028qrb5165m_firmwareipq8072_firmwareipq4029_firmwareqca6698aqqcs6125sa8155_firmwaresa4155p_firmwareipq6010sd662_firmwareipq8068qcs405qca6430wcd9340qcn6132sd765gsw5100sd680qca6436wcn6851sa6155pqcs603_firmwarewcn7851_firmwareqca6698aq_firmwareqca9888_firmwareqcn6122wcd9341ipq8068_firmwareqca2066_firmwareqca6696_firmwareqca6431wcd9371sd870_firmwaresd750gqca1062ipq9008_firmwareqcn5154_firmwarewcn3910_firmwaresxr2150p_firmwaresd_8cxsa8150pwsa8830_firmwareqca9992_firmwaresd660sd865_5g_firmwaresnapdragon_4_gen_1sd712sd855_firmwarewcn3988sd660_firmwareqca6438wcn7850_firmwaresa8195p_firmwaresm8475qcn5022_firmwareqcn7606_firmwarewcn6750_firmwareqca9898sa8295p_firmwareipq4028qca6428_firmwareipq5018_firmwareqca9985_firmwarewcn3991ipq4018_firmwareqca8337_firmwaressg2125pwcd9380_firmwareipq8072aqca9980_firmwaresw5100pipq8076a_firmwareipq8078qca8084qcn9001_firmwareipq8173sdx55m_firmwareqca6564auwcn6856_firmwareipq9008qcn5164sd670_firmwareqca6574csr8811_firmwarewcd9380qcn5054_firmwareqcs410qcn5024sd690_5g_firmwaresdx50m_firmwaresxr1230pqca8072_firmwareqca9985qcn9012_firmwareqca6430_firmwareqcn9274_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980qca6335_firmwareipq6018_firmwareqcm4325_firmwareqcs605wcd9340_firmwarewsa8815wcn6850sd7cpmp8074_firmwareqcn6112wcn3910qca9986_firmwareqca6426_firmwaresd695ipq6028ipq8064qca9984pmp8074qcn9024ipq9574_firmwarewcn3980_firmwaresd730sdx55mipq8064_firmwareqcc5100_firmwaresa8295pqca6421_firmwareqca2062_firmwarewcn6740_firmwareqca6678aqsd678_firmwarear8031_firmwareipq8078_firmwareqcn5054qrb5165wcn6851_firmwareqcs603ipq8070qca9994qca9980sd670qcn9024_firmwareipq8174_firmwareqcm4290_firmwaresd480sd870wcn6855qcn7605_firmwarewsa8832sw5100p_firmwareqcs610_firmwareqsm8250sa6145pipq6018qca9886_firmwaresd695_firmwaresdxr1ar8031qca6595_firmwareqcs405_firmwaresa8145pqca6391_firmwaresa4150p_firmwareqca4024wcd9370_firmwareqca2064sd780g_firmwaresdx55sd888_firmwareqcn5021_firmwaresa8155pcsra6640sd675ssg2115p_firmwaresa4155psxr2150par8035_firmwareqsm8250_firmwareqcn7606qcm2290qcn5024_firmwarewcn3991_firmwarewsa8830sd678qcn9070sxr2230p_firmwaresa8145p_firmwareqca1062_firmwareqcs2290_firmwaresd7c_firmwarecsrb31024snapdragon_4_gen_1_firmwarecsra6620qca8082qcn9072qca8386qca9992qcs4290sd765g_firmwareqca6420_firmwareipq8069_firmwareqca6390_firmwareqca2064_firmwaresd690_5gipq6000sd730_firmwarewcd9370sd675_firmwaressg2115pipq8072qcn5152_firmwareqca6426qca6584au_firmwarewcn3990_firmwareqrb5165n_firmwareqcn9000_firmwareqca9984_firmwareipq5018sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwareqcn7605wcd9326_firmwareipq8074aqca2065sd662qcn5124_firmwareqam8295p_firmwareqcn6102_firmwareqcn9011_firmwareqca1064sa8155qcn6100_firmwareqca8082_firmwareqcn5122_firmwaresdx55_firmwareqca6595auqcn6023_firmwarewcn3999_firmwaresm7250p_firmwareqca6436_firmwareqrb5165nipq5010qca6564au_firmwareqca6584ausd778gsa6155p_firmwareqca6310qcn9274ipq8174wcn7851sa515m_firmwareqca9990qcn9001qcn5052qcs6490sdxr2_5gqcn6112_firmwaresa415m_firmwarewcn3988_firmwareqcn9074sa6145p_firmwareqca6421qca8085sd778g_firmwaresm6250sa8195psd712_firmwarewsa8810_firmwaresd765_firmwarewcd9326wcd9335sg4150pqca8081qcn6023ipq8071aipq8071a_firmwareqcs4290_firmwarewcd9385qca8085_firmwareqcs6490_firmwareqca2065_firmwaresd_8cx_gen3qca6390qca9898_firmwaresd750g_firmwareaqt1000wcd9375ar8035sm6250_firmwarecsr8811qcn9100_firmwareipq5010_firmwareipq8074a_firmwaresd888_5g_firmwarewsa8815_firmwareqcm6490wcn6850_firmwarewsa8835_firmwareqcx315sa4150psg4150p_firmwareqcm6125_firmwareqcm4325qca8072qcm2290_firmwarewcn3990qcn9000sd_675sd780gqca6554asd865_5gqca6595ar9380_firmwareqcc5100qcn9012sd888qcn6122_firmwareipq8065_firmwareqcx315_firmwaresxr1230p_firmwarewsa8835sd665_firmwaresd888_5gsm6250pqcn5154qca8075_firmwaresc8180xssg2125p_firmwareipq4018qca6574awcn6855_firmwareqca9889sm7325pqcn6132_firmwareqcn9003_firmwareqca9888qca6310_firmwareipq8074qca9994_firmwarewcn6750qcn9003ipq8070a_firmwareipq8076_firmwaresa515mqca6574_firmwareqca9886sd855sm4125_firmwaresm7325p_firmwaresd665sxr2230pipq8076sd765qca6574a_firmwareqcn5021ipq8069qcn5152sd768g_firmwareqrb5165msd850_firmwaresm7315sd460qca6391sdxr1_firmwareaqt1000_firmwareqcn6102qcn9100sdx65_firmwareqcm4290csrb31024_firmwareqcm6490_firmwarewsa8832_firmwaresdx50mqcn9070_firmwaresd480_firmwareipq6028_firmwareipq8072a_firmwareqcn9011sc8180x_firmwareipq8074_firmwareqca6574auqca9889_firmwaresd710sa8155p_firmwareqcn5122ipq9574wcd9341_firmwareqcm6125wsa8810wcn6856qcn5022sd768gipq6010_firmwareqca1064_firmwarewcn6740qca6696sd845_firmwaresa6150pqca8075qcn9022_firmwareqcn6024qcn9022sd845qca9990_firmwareipq8070aqcn9002_firmwareqcn6100qcn9072_firmwaresm7250pipq6000_firmwaresd720g_firmwareipq8071_firmwareqcn9074_firmwareqcs410_firmwaresw5100_firmwareipq4029sd850Snapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2022-33278
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 18.82%
||
7 Day CHG~0.00%
Published-07 Mar, 2023 | 04:43
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer copy without checking the size of input in HLOS

Memory corruption due to buffer copy without checking the size of input in HLOS when input message size is larger than the buffer capacity.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwaresd_8cx_gen3_firmwarewsa8830sd678sa6150p_firmwaresa8145p_firmwaresxr2230p_firmwareqcs2290_firmwareqca8337qca6431_firmwaresnapdragon_4_gen_1_firmwaresdx65csra6620qcs4290wcn3950_firmwaresa8150p_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqcs2290qca6390_firmwaresa6155sd690_5gsd730_firmwarewcd9370csra6620_firmwaresd_675_firmwaresd675_firmwaressg2115pcsra6640_firmwareqcs6125_firmwareqca6426wcn3990_firmwarewcn3998wcd9385_firmwareqam8295psdxr2_5g_firmwareqcn6024_firmwaresd720gsm4125wcd9326_firmwarewcn3950sd_8_gen1_5g_firmwareqsm8350_firmwaresd662sd710_firmwareqsm8350sd460_firmwareqam8295p_firmwaresa8155sa9000p_firmwaresm7315_firmwareqca6574au_firmwarewcn7850qca6595auqca8081_firmwaresa6155_firmwarewcd9375_firmwaresm7250p_firmwarewcn3998_firmwareqca6420qca6436_firmwaresd680_firmwaresd778gsa6155p_firmwarewcn7851qcs6490sdxr2_5gqca6698aqqcs6125sa4155p_firmwaresa8155_firmwaresd662_firmwareqcs405qca6430wcn3988_firmwaresa6145p_firmwareqca6421sd778g_firmwaresm6250sa8195pwsa8810_firmwaresd765gsw5100sd765_firmwareqca6436sd680wcd9326sa6155psg4150pwcd9335qca8081wcn6851wcn7851_firmwareqca6698aq_firmwareqcs4290_firmwarewcd9385wcd9341qca6431qca6696_firmwareqcs6490_firmwaresd750gsd870_firmwaresd_8cx_gen3qca6390ar8035sd750g_firmwareaqt1000sa8150psxr2150p_firmwaresm6250_firmwarewcd9375wcn3910_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwaresnapdragon_4_gen_1qcm6490sd888_5g_firmwarewcn3988wcn6850_firmwarewcn7850_firmwarewsa8815_firmwaresa8195p_firmwarewsa8835_firmwaresm8475qcn7606_firmwaresa8295p_firmwarewcn6750_firmwaresa4150psg4150p_firmwareqcm6125_firmwareqcm2290_firmwarewcn3991qca8337_firmwarewcd9380_firmwaressg2125pwcn3990sd_675sw5100psd780gsd865_5gqca6595qcc5100sdx55m_firmwarewcn6856_firmwaresd888sd670_firmwareqca6574sxr1230p_firmwarewsa8835sd665_firmwaresa8540p_firmwarewcd9380sd888_5gssg2125p_firmwareqca6574asd690_5g_firmwaresdx50m_firmwarewcn6855_firmwaresm7325psxr1230pqca6430_firmwarewcd9335_firmwarewcn3980wcn6750sa9000pqca6574_firmwaresd855sm4125_firmwaresm7325p_firmwaresd665sxr2230pwcn3910wcn6850wsa8815sd765qca6426_firmwareqca6574a_firmwaresd695sd768g_firmwareqcn9024wcn3980_firmwaresm7315sd460qca6391sd730sdx55msdxr1_firmwaresxr2150pqcc5100_firmwareqca6421_firmwaresa8295paqt1000_firmwarewcn6740_firmwaresdx65_firmwaresd678_firmwareqcm4290qcm6490_firmwaresdx50mwsa8832_firmwaresd480_firmwarewcn6851_firmwareqca6574ausa8155p_firmwaresd710sd670qcn9024_firmwarewcd9341_firmwareqcm6125qcm4290_firmwaresd480sd870wcn6855wsa8810wsa8832sa8540psw5100p_firmwarewcn6856sa6145psd695_firmwaresdxr1sd768gqca6595_firmwareqcs405_firmwaresa8145pwcn6740qca6696qca6391_firmwaresa4150p_firmwaresd780g_firmwarewcd9370_firmwaresa6150psd888_firmwaresa8155pcsra6640qcn6024sd675sm7250psd720g_firmwaressg2115p_firmwaresw5100_firmwaresa4155par8035_firmwareqcm2290qcn7606Snapdragonqcm2290_firmwarewcn3991_firmwaresd_8cx_gen3_firmwareqca8337_firmwarewcd9380_firmwaresa6150p_firmwaresa8145p_firmwaresxr2230p_firmwareqcs2290_firmwareqca6431_firmwaresdx55m_firmwarewcn6856_firmwaresnapdragon_4_gen_1_firmwaresd670_firmwaresxr1230p_firmwarewcn3950_firmwaresd665_firmwaresa8540p_firmwaresa8150p_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwaresd730_firmwarecsra6620_firmwaressg2125p_firmwaresd_675_firmwaresd675_firmwaresd690_5g_firmwaresdx50m_firmwarecsra6640_firmwarewcn6855_firmwareqcs6125_firmwarewcn3990_firmwareqca6430_firmwarewcd9335_firmwarewcd9385_firmwaresdxr2_5g_firmwareqcn6024_firmwarewcd9326_firmwareqca6574_firmwaresd_8_gen1_5g_firmwaresm4125_firmwaresm7325p_firmwareqsm8350_firmwaresd710_firmwaresd460_firmwareqam8295p_firmwareqca6426_firmwaresa9000p_firmwaresm7315_firmwareqca6574a_firmwareqca6574au_firmwaresd768g_firmwarewcd9375_firmwareqca8081_firmwaresa6155_firmwarewcn3998_firmwaresm7250p_firmwarewcn3980_firmwaresdxr1_firmwareqca6436_firmwareqcc5100_firmwareqca6421_firmwareaqt1000_firmwaresd680_firmwarewcn6740_firmwaresa6155p_firmwaresdx65_firmwaresd678_firmwareqcm6490_firmwarewsa8832_firmwaresa4155p_firmwaresd480_firmwaresa8155_firmwarewcn6851_firmwaresd662_firmwareqcn7606_firmwarewcn3988_firmwaresa6145p_firmwaresa8155p_firmwaresd778g_firmwareqcn9024_firmwarewsa8810_firmwarewcd9341_firmwareqcm4290_firmwaresd765_firmwaresw5100p_firmwarewcn7851_firmwareqca6698aq_firmwareqcs4290_firmwaresd695_firmwareqca6696_firmwareqcs6490_firmwareqca6595_firmwareqcs405_firmwaresd870_firmwareqca6391_firmwaresa4150p_firmwarewcn3910_firmwaresxr2150p_firmwaresd750g_firmwarewcn6750_firmwaresd780g_firmwarewcd9370_firmwaresm6250_firmwaresd888_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewsa8815_firmwaresd888_5g_firmwarewcn6850_firmwarewcn7850_firmwarewsa8835_firmwaresd720g_firmwaresa8195p_firmwaressg2115p_firmwaresw5100_firmwaresa8295p_firmwaresg4150p_firmwarear8035_firmwareqcm6125_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2022-33217
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.30%
||
7 Day CHG~0.00%
Published-17 Oct, 2022 | 00:00
Updated-14 May, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory corruption in Qualcomm IPC due to buffer copy without checking the size of input while starting communication with a compromised kernel. in Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn6855wsa8830wcn6855_firmwaresm8475wcn7851_firmwarewcn6856wsa8830_firmwarewcn7850_firmwarewcn7850wcn6856_firmwarewsa8835sd_8_gen1_5g_firmwarewcd9380wcn7851wsa8835_firmwarewcd9380_firmwareSnapdragon Mobile
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2022-33230
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 9.69%
||
7 Day CHG~0.00%
Published-06 Jun, 2023 | 07:38
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer copy without checking the size of input in FM Host

Memory corruption in FM Host due to buffer copy without checking the size of input in FM Host

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwaresm6375wcn3991wsa8830sa6150p_firmwaresa8145p_firmwaresw5100pqca6554asnapdragon_w5\+_gen_1_wearable_platformqca6595qca6564auwsa8835qca6574sa8150p_firmwareqca6420_firmwareqca6595au_firmwaresnapdragon_wear_4100\+_platform_firmwarewcd9370qca6574asnapdragon_wear_4100\+_platformqca6584au_firmwareqca6430_firmwarewcn3980sm4375wcn3998qca6554a_firmwarewcd9385_firmwareqca6574_firmwaresm6375_firmwarewcn3660bsd855wsa8815wcn3660b_firmwareqca6574a_firmwareqca6574au_firmwarewcn3680b_firmwareqca6595auwcn3998_firmwarewcd9375_firmwarewcn3980_firmwarewcn3610_firmwareqca6420sm4350-acsnapdragon_w5\+_gen_1_wearable_platform_firmwareaqt1000_firmwareqca6564au_firmwareqca6584ausa6155p_firmwarewcn3988_firmwareqca6430qca6574ausa6145p_firmwaresa8155p_firmwaresa8195pwsa8810_firmwarewcd9341_firmwaresm4375_firmwaresw5100wsa8810sa6155psw5100p_firmwaresa6145pwcn3680bwcd9385sm8150_firmwarewcd9341qca6696_firmwareqca6595_firmwaresa8145pqca6696sm4350wcd9375sm4350_firmwareaqt1000sa8150pwcd9370_firmwaresm4350-ac_firmwaresa6150psa8155pwsa8830_firmwaresd855_firmwaresm8150wcn3988wsa8815_firmwarewsa8835_firmwaresa8195p_firmwaresw5100_firmwarewcn3610Snapdragonaqt1000_firmwareqca6564au_firmwaresa6155p_firmwaresa6150p_firmwaresa8145p_firmwarewcn3988_firmwaresa6145p_firmwaresa8155p_firmwarewsa8810_firmwaresa8150p_firmwarewcd9341_firmwareqca6420_firmwareqca6595au_firmwaresw5100p_firmwaresnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwareqca6584au_firmwareqca6696_firmwareqca6430_firmwareqca6595_firmwareqca6554a_firmwarewcd9385_firmwaresnapdragon_855_mobile_platform_firmwareqca6574_firmwarewcd9370_firmwarewsa8830_firmwaresd855_firmwarewsa8815_firmwarewcn3660b_firmwarewsa8835_firmwareqca6574a_firmwarefastconnect_6200_firmwareqca6574au_firmwaresa8195p_firmwaresnapdragon_695_5g_mobile_platform_firmwarewcn3680b_firmwaresw5100_firmwarewcd9375_firmwarewcn3980_firmwarewcn3610_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-35129
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.11% / 29.74%
||
7 Day CHG~0.00%
Published-14 Jun, 2022 | 10:11
Updated-04 Aug, 2024 | 00:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory corruption in BT controller due to improper length check while processing vendor specific commands in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-ipq5018_firmwaresd_8cx_gen3_firmwareqca2066wsa8830qcn9070qca8337_firmwarewcd9380_firmwareqcn9000qca8337wcn6856_firmwareqcn9012sd888sdx65qcn9072qcn6122_firmwarewsa8835wcd9380ipq5028_firmwaresd888_5gqca2064_firmwareqca2062wcd9370wcn6855_firmwareqcn6132_firmwareqcn9000_firmwareqcn9012_firmwareipq5018wcn6750wcd9385_firmwareqcn6024_firmwaresd_8_gen1_5g_firmwarewcn6850qca2065qcn6112qcn6100_firmwareqcn6102_firmwareqcn9024wcd9375_firmwareqca8081_firmwareqcn6023_firmwareqca6391ipq5010qca2062_firmwareqcn6102qcn9100sdx65_firmwareqcs6490qcm6490_firmwareipq5028qcn9070_firmwarewcn6851_firmwareqcn6112_firmwareqcn9074qcn9024_firmwareqcn6132wcn6855wcn6851qca8081wcn6856qcn6023wcd9385qcn6122qcc710qca2066_firmwareqca2065_firmwareqcs6490_firmwaresd_8cx_gen3qca6391_firmwarear8035wcd9375qca2064wcd9370_firmwaresd888_firmwareqcc710_firmwareqcn9100_firmwareqcn9022_firmwarewsa8830_firmwareqcn6024qcn9022ipq5010_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewsa8835_firmwareqcn6100qcn9072_firmwareqcn9074_firmwaresm8475wcn6750_firmwarear8035_firmwareSnapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-35089
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.10% / 27.12%
||
7 Day CHG~0.00%
Published-01 Apr, 2022 | 04:40
Updated-04 Aug, 2024 | 00:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible buffer overflow due to lack of input IB amount validation while processing the user command in Snapdragon Auto

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6574ausa8155psa8155p_firmwareqca6696_firmwareqca6574au_firmwareqca6696Snapdragon Auto
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-35102
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.10% / 27.12%
||
7 Day CHG~0.00%
Published-14 Jun, 2022 | 09:40
Updated-04 Aug, 2024 | 00:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible buffer overflow due to lack of validation for the length of NAI string read from EFS in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewsa8830sd678sm6250p_firmwareqca8337qca6431_firmwarewcd9360_firmwaresdx65wcn3950_firmwaresd765g_firmwareqca6595au_firmwareqca6390_firmwaresd690_5gsd730_firmwarewcd9370sd_675_firmwaresd675_firmwareqca6426wcn3990_firmwarewcn3998wcd9385_firmwaresdxr2_5g_firmwarewcn3950sd720gsd_8_gen1_5g_firmwaresm7315_firmwareqca6574au_firmwaresdx55_firmwareqca6595auqca8081_firmwarewcd9375_firmwarewcn3998_firmwaresm7250p_firmwarewcd9360qca6436_firmwaresm7450_firmwaresd778gsa515m_firmwarewcn7851sdxr2_5gwcn3988_firmwareqca6421sd778g_firmwaresm6250wsa8810_firmwaresd765gsd765_firmwareqca6436wcn6851qca8081wcn7851_firmwarewcd9385wcd9341qca6431qca6696_firmwaresd750gsd870_firmwareqca6390ar8035sd750g_firmwarewcd9375sm6250_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3988sd888_5g_firmwarewcn6850_firmwarewsa8815_firmwaresm7450sm8475wcn6750_firmwarewcn3991qca8337_firmwarewcd9380_firmwarewcn3990sd_675sd780gsd865_5gsdx55m_firmwarewcn6856_firmwaresd888wcd9380sd888_5gsm6250pqca6574asd690_5g_firmwarewcn6855_firmwarewcn3980wcn6750sa515msd855wsa8815wcn6850sd765qca6426_firmwareqca6574a_firmwaresd695sd768g_firmwarewcn3980_firmwaresm7315sd730qca6391sdx55mqca6421_firmwaresm8475_firmwarewcn6740_firmwaresdx65_firmwaresd678_firmwarewsa8832_firmwaresd480_firmwarewcn6851_firmwareqca6574auwcd9341_firmwaresd480sd870wsa8810wcn6855wsa8832wcn6856sd695_firmwaresd768gwcn6740qca6696qca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55sd888_firmwaresd675sm7250psd720g_firmwaresm8475p_firmwarear8035_firmwaresm8475pSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Mobile
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-35114
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.03% / 9.95%
||
7 Day CHG~0.00%
Published-14 Jun, 2022 | 09:40
Updated-04 Aug, 2024 | 00:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer initialization on the backend driver can lead to buffer overflow in Snapdragon Auto

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa8540psa9000psa8540p_firmwaresa9000p_firmwareSnapdragon Auto
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-23368
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.11% / 29.78%
||
7 Day CHG~0.00%
Published-01 Jul, 2024 | 14:17
Updated-01 Aug, 2024 | 23:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Qualcomm IPC

Memory corruption when allocating and accessing an entry in an SMEM partition.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresm7325-ae_firmwareipq4028_firmwareqca8337qfw7124sg8275p_firmwarear9380ipq8173_firmwareqam8775pqcf8001qamsrv1mqru1052snapdragon_888_5g_mobile_platformqcn5124wcn3950_firmwareqca6595au_firmwaresa6155video_collaboration_vc3_platformsnapdragon_480_5g_mobile_platformqcm5430_firmwareqcs6125_firmwaresnapdragon_460_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwarewcn3950qcn6024_firmwaresm4125immersive_home_316_platform_firmwarewcn3660bqsm8350_firmwaresnapdragon_460_mobile_platformqsm8350snapdragon_660_mobile_platform_firmwaresm7315_firmwaresnapdragon_429_mobile_platform_firmwaresnapdragon_695_5g_mobile_platform_firmwareqcn6422_firmwareqca8081_firmwareqca6420qcn9002snapdragon_auto_5g_modem-rf_firmwareipq8070_firmwareqca9367_firmwareipq8065ipq8078a_firmwareqca0000sa8155_firmwarerobotics_rb3_platform_firmwareipq8068qca6430sa7775p_firmwaresdx65mwcd9340qca6698aq_firmwaresnapdragon_690_5g_mobile_platformipq5312qualcomm_205_mobile_platform_firmwareqca9888_firmwareqcn6122qca6696_firmwareqcn5154_firmwareqru1052_firmwaresa8150pqca9992_firmwaresd660sd865_5g_firmwaresd660_firmwaresnapdragon_865_5g_mobile_platform_firmwarefastconnect_6800_firmwareqcn5022_firmwareimmersive_home_216_platform_firmwaresa8770psnapdragon_750g_5g_mobile_platform_firmwaresnapdragon_675_mobile_platform_firmwareqca9985_firmwareipq4018_firmwaresnapdragon_778g_5g_mobile_platform_firmwaressg2125pqca9980_firmwaresdm429wipq8078qca8084qcm8550ipq8173qcn9001_firmwaresnapdragon_670_mobile_platform_firmwaresd670_firmwareqca6574qdu1110_firmwarecsr8811_firmwaresnapdragon_7c\+_gen_3_computewcd9380snapdragon_x72_5g_modem-rf_system_firmwareqcs410snapdragon_210_processorqcn5024sxr1230pvideo_collaboration_vc3_platform_firmwareqca9985qcn9012_firmwareqcn9274_firmwarewsa8845ipq6018_firmwareqcm4325_firmwarewcd9340_firmwarewsa8815sm6150-ac_firmwarepmp8074_firmwareqcn6112qcs8250ipq6028ipq8064sd835pmp8074snapdragon_x62_5g_modem-rf_system_firmwareipq9574_firmwarewcn3980_firmwaresd730immersive_home_3210_platform_firmwaresa8295pwcn6740_firmwareqcs4490_firmwareqca6678aqsnapdragon_x65_5g_modem-rf_systemapq8064au_firmwareipq8078_firmwaresa8650p_firmwarefastconnect_6900qcn5054snapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900_firmwaresnapdragon_660_mobile_platformqca9994srv1lqca9980qdx1011_firmwareqcn9024_firmwarefsm20056ipq8174_firmwaresd670snapdragon_8\+_gen_2_mobile_platformqcm4290_firmwareqcn6412_firmwareqdx1010_firmwaresw5100p_firmwareqcs610_firmwareipq5302_firmwareqamsrv1m_firmwareqcm5430qualcomm_215_mobile_platform_firmwaresa6145pqca9886_firmwareimmersive_home_214_platformqcs5430_firmwaresnapdragon_750g_5g_mobile_platformqca6391_firmwaresa4150p_firmwareqca4024wcd9370_firmwaresm8550p_firmwareqdx1010sdx55qcn5021_firmwarecsra6640snapdragon_695_5g_mobile_platformvideo_collaboration_vc1_platformsrv1mssg2115p_firmwareqam8620p_firmwareqfw7124_firmwareqam8255pqdu1210_firmwaresa4155ptalynplus_firmwarewsa8830sxr2230p_firmwaresnapdragon_x24_lte_modem_firmwareqam8650pcsrb31024mdm9628_firmwareflight_rb5_5g_platformmdm9650snapdragon_865_5g_mobile_platformflight_rb5_5g_platform_firmwarefsm10055_firmwareqcn6224_firmwareqca8082qca9992qcs4290srv1l_firmwareqca6420_firmwaresnapdragon_auto_4g_modem_firmwareqca6564qca6426wcn3990_firmwareqrb5165n_firmwaresnapdragon_8_gen_2_mobile_platformqca9984_firmwareqca9377ipq9554wcd9385_firmwarewcd9326_firmwarefastconnect_6200wcn3615_firmwareqamsrv1h_firmwareipq8074asm7325-afqcn6102_firmwareqcn9011_firmwaresa8155snapdragon_x55_5g_modem-rf_systemsnapdragon_835_mobile_pc_platform_firmwareqcn5122_firmwaresa7255psdx55_firmwaresnapdragon_4_gen_2_mobile_platformqcn6023_firmwaresnapdragon_8_gen_3_mobile_platformqfw7114sm7250p_firmwarewcn3615wcn3610_firmwarewsa8845h_firmwareqrb5165nqca6584ausnapdragon_x65_5g_modem-rf_system_firmwareqcm8550_firmwaresnapdragon_x72_5g_modem-rf_systemipq8174qcn5052qca9367qcn6112_firmwaresm8250-acwcn3988_firmwareqcn9074srv1hqca8085sm7250-aafastconnect_6700_firmwaresa8195psxr1120qcn6224wcd9326snapdragon_x75_5g_modem-rf_systemwcd9335wcd9395_firmwaresnapdragon_auto_5g_modem-rf_gen_2qcm4490qcn6023qcs4290_firmwaresa8770p_firmwareqca8085_firmwareipq5300sxr2130_firmwareqcs6490_firmwareipq9570sm7150-abqca9898_firmwarewcd9375aqt1000snapdragon_210_processor_firmwaresm6250_firmwaresnapdragon_662_mobile_platformipq5010_firmwareipq8074a_firmwarewsa8815_firmwarevideo_collaboration_vc5_platform_firmwaresxr1120_firmwaresxr2250p_firmwaresnapdragon_8_gen_2_mobile_platform_firmwareqcm6125_firmwarerobotics_rb5_platform_firmwaresd865_5gqca6595qdu1010_firmwarequalcomm_205_mobile_platformipq8065_firmwaresxr1230p_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwareqcn6274qcn6422qcn5154qca8075_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaresxr2130smart_audio_400_platformqcn6132_firmwareqcn9003_firmwareqca9888qca6310_firmwareipq8070a_firmwareqru1062sa8650psa9000pqca6574_firmwareqca9886sm7325p_firmwaresxr2230psnapdragon_xr2_5g_platform_firmwareqca6574a_firmwaresa8775pqrb5165msm7315snapdragon_x55_5g_modem-rf_system_firmwareqcn6102snapdragon_x35_5g_modem-rf_system_firmwaresnapdragon_690_5g_mobile_platform_firmwareqcn6274_firmwaresnapdragon_auto_4g_modemcsrb31024_firmwareqcm6490_firmwarewsa8832_firmwaresnapdragon_xr1_platformqcn9070_firmwareqcm2150ipq6028_firmwareipq8072a_firmwareqcn6432_firmwareqca9889_firmwareqcn5122qcs8250_firmwaresm7250-aa_firmwaresm8550psnapdragon_8_gen_1_mobile_platform_firmwaresm8150-ac_firmwareqcn5022sm8350-acqca6564_firmwarewcn6740qcs8550sm6150-acsnapdragon_x50_5g_modem-rf_systemqca8075snapdragon_8_gen_3_mobile_platform_firmwareqcn6024qcn9022qdu1210qcn9002_firmwareipq6000_firmwareqcs410_firmwarefsm10055qam8255p_firmwaresnapdragon_8_gen_1_mobile_platformsa6150p_firmwareqcs610snapdragon_820_automotive_platform_firmwareqca4024_firmwarewsa8840snapdragon_212_mobile_platformimmersive_home_318_platform_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqcs2290qca6335csra6620_firmwarecsra6640_firmwareqep8111_firmwareqam8295pipq8076amdm9628qca8386_firmwaresd_8_gen1_5g_firmwareqca8084_firmwaresm7150-acqcn6412sm7325-aeqca6574au_firmwareqcn5164_firmwarewcd9375_firmwaresa6155_firmwaresm6225-adsnapdragon_xr2\+_gen_1_platformqca6678aq_firmwaresmart_audio_400_platform_firmwaresm6225-ad_firmwareqrb5165m_firmwareipq5028qca7500ipq4029_firmwareqca6698aqqcs6125sa4155p_firmwareqcf8001_firmwarewsa8840_firmwareipq6010sm7250-ab_firmwareqru1062_firmwarerobotics_rb3_platformsnapdragon_8\+_gen_1_mobile_platformsnapdragon_720g_mobile_platformqcn6132snapdragon_780g_5g_mobile_platformsw5100fsm10056_firmwareqca6436sa6155pfsm20055_firmwareqdu1000_firmwareqcf8000sxr2250psnapdragon_auto_5g_modem-rf_gen_2_firmwarewcd9341qam8775p_firmwareipq8068_firmwaresa8255pipq9008_firmwaresnapdragon_x12_lte_modemqca6797aqwcn3910_firmwaresnapdragon_855_mobile_platform_firmwareqcc710_firmwarerobotics_rb5_platformsm8250-ac_firmwarewsa8830_firmwaresd855_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewcn3988snapdragon_780g_5g_mobile_platform_firmwaresa8195p_firmwareqca9898sa8295p_firmwareipq4028wcn3610qca8337_firmwarewcd9380_firmwareipq8072aqca7500_firmwaresw5100pmsm8996au_firmwareipq8076a_firmwaresnapdragon_w5\+_gen_1_wearable_platformqca6564auipq9008qualcomm_215_mobile_platformqcn5164qcn6402_firmwarefastconnect_6700ipq9554_firmwareqcn5054_firmwareipq4019_firmwaresm7150-aa_firmwaresg8275pqca8072_firmwareqca6430_firmwareqcn5052_firmwareqfw7114_firmwaresm6370_firmwarewcd9335_firmwarewcn3980qca6335_firmwarewcn3910qca6320mdm9650_firmwaresnapdragon_4_gen_1_mobile_platformqca6426_firmwarewcn3660b_firmwarewcn3680qca9984snapdragon_670_mobile_platformqcn9024snapdragon_xr2\+_gen_1_platform_firmwareipq5302ipq8064_firmwaresm7150-aasnapdragon_820_automotive_platformsnapdragon_x50_5g_modem-rf_system_firmwaresnapdragon_xr2_5g_platformwcn3680_firmwaresm7150-ab_firmwareipq8070qca6797aq_firmwareqdu1010qca6564a_firmwaresa7255p_firmwareqca9880sa8620psnapdragon_x24_lte_modemwsa8832ipq5332immersive_home_326_platformipq6018qcc710qcs4490qca6595_firmwaresa8145pwcd9395snapdragon_710_mobile_platform_firmwareimmersive_home_214_platform_firmwaresm4350-ac_firmwaresd888_firmwareqcn6402sa8155pqep8111snapdragon_720g_mobile_platform_firmwarear8035_firmwareqcm2290snapdragon_855_mobile_platformqcn5024_firmwaresnapdragon_662_mobile_platform_firmwareqcn9070sa8145p_firmwareqcs2290_firmwarefsm10056csra6620qcn9072sm7250-ac_firmwareqca8386qca9880_firmwaresnapdragon_888_5g_mobile_platform_firmwareipq6000sd730_firmwarewcd9370ssg2115pqcn5152_firmwareqca0000_firmwareqca6584au_firmwareqdu1110qcn9000_firmwaresm8250-abqamsrv1himmersive_home_216_platformtalynplusimmersive_home_316_platformimmersive_home_318_platformqcn5124_firmwareqam8295p_firmwareqcn6100_firmwareqca8082_firmwareqca6320_firmwaresa9000p_firmwarewcn3680b_firmwaresnapdragon_778g_5g_mobile_platformsnapdragon_212_mobile_platform_firmwareqca6595ausm7325-af_firmwaresnapdragon_429_mobile_platformqca6436_firmwaresm4350-acsnapdragon_680_4g_mobile_platform_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwareipq5010qca6564au_firmwaresa8620p_firmwaresa6155p_firmwareqca6310qcn9274sa8775p_firmwareqcn9001qca9990qcs6490video_collaboration_vc5_platformqcs8550_firmwarevision_intelligence_300_platform_firmwaresa6145p_firmwarefsm20056_firmwaresm6250wsa8810_firmwarevision_intelligence_400_platformwsa8845hsnapdragon_x62_5g_modem-rf_systemsnapdragon_ar2_gen_1_platform_firmwaresa8255p_firmwaresg4150pqcs7230qca8081snapdragon_x35_5g_modem-rf_systemipq8071asa7775psdx65m_firmwareqam8620pqca6174a_firmwareipq8071a_firmwareqcs5430immersive_home_3210_platformwcd9385snapdragon_x12_lte_modem_firmwarear8035csr8811apq8064auipq4019wcd9390qcn9100_firmwarevision_intelligence_400_platform_firmwarewcn3620_firmwareqcm6490wsa8835_firmwarewcn3620qca6564asa4150psg4150p_firmwareqcm4325qca8072qcm2290_firmwaresnapdragon_845_mobile_platformqcm2150_firmwarewcn3990qcn9000qcf8000_firmwarefastconnect_6800ar9380_firmwareqru1032sm8350-ac_firmwareqcs7230_firmwaresnapdragon_835_mobile_pc_platformqcn9012sm8150-acsd888qdx1011qdu1000immersive_home_326_platform_firmwareqcn6122_firmwarewsa8835msm8996ausdm429w_firmwaresnapdragon_auto_5g_modem-rfsd_8_gen1_5gsnapdragon_4_gen_1_mobile_platform_firmwaressg2125p_firmwareipq4018qca6574aqca9889qca6174asm7325pqca9994_firmwareqcn9003ipq8076_firmwaresm7150-ac_firmwaresm7250-absd855sm4125_firmwareipq8076qru1032_firmwarewsa8845_firmwarefastconnect_6200_firmwareqcn5021qcn5152vision_intelligence_300_platformsm8250-ab_firmwareqca6391snapdragon_710_mobile_platformfastconnect_7800aqt1000_firmwareqcn9100qcm4490_firmwaresnapdragon_845_mobile_platform_firmwareqcm4290ipq5300_firmwareipq9570_firmwaresrv1h_firmwareqcn9011video_collaboration_vc1_platform_firmwareipq5312_firmwareqca6574ausa8155p_firmwareipq9574wcd9341_firmwarefastconnect_7800_firmwareqcm6125wsa8810sm7250-acipq5332_firmwaresnapdragon_680_4g_mobile_platformsm6370srv1m_firmwaresnapdragon_ar2_gen_1_platformwcn3680bsd835_firmwareqam8650p_firmwaresnapdragon_675_mobile_platformipq6010_firmwareqca6696fsm20055sa6150pqcn9022_firmwarewcd9390_firmwareqca9990_firmwareipq8070aqcn6100qcn9072_firmwaresm7250psnapdragon_8\+_gen_1_mobile_platform_firmwaresw5100_firmwareqcn9074_firmwareipq4029qcn6432snapdragon_xr1_platform_firmwareSnapdragonqca9377_firmwareqam8255p_firmwaresa6150p_firmwareipq4028_firmwaresg8275p_firmwareipq8173_firmwaresnapdragon_820_automotive_platform_firmwareqca4024_firmwarewcn3950_firmwareimmersive_home_318_platform_firmwareipq5028_firmwaresa8150p_firmwareqca6595au_firmwarecsra6620_firmwarecsra6640_firmwareqcm5430_firmwareqcs6125_firmwaresnapdragon_460_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwareqep8111_firmwareqcn6024_firmwareqca8386_firmwareimmersive_home_316_platform_firmwaresd_8_gen1_5g_firmwareqca8084_firmwareqsm8350_firmwaresnapdragon_660_mobile_platform_firmwaresm7315_firmwaresnapdragon_429_mobile_platform_firmwaresnapdragon_695_5g_mobile_platform_firmwareqca6574au_firmwareqcn5164_firmwareqcn6422_firmwarewcd9375_firmwareqca8081_firmwaresa6155_firmwaresnapdragon_auto_5g_modem-rf_firmwareipq8070_firmwareqca9367_firmwareipq8078a_firmwareqca6678aq_firmwaresmart_audio_400_platform_firmwareqrb5165m_firmwarewsa8840_firmwareipq4029_firmwaresa4155p_firmwaresa8155_firmwareqcf8001_firmwarerobotics_rb3_platform_firmwareqru1062_firmwaresa7775p_firmwarefsm10056_firmwarefsm20055_firmwareqdu1000_firmwareqca6698aq_firmwarequalcomm_205_mobile_platform_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqca9888_firmwareqam8775p_firmwareipq8068_firmwareqca6696_firmwareipq9008_firmwareqcn5154_firmwareqru1052_firmwarewcn3910_firmwaresnapdragon_855_mobile_platform_firmwareqcc710_firmwarewsa8830_firmwareqca9992_firmwaresd865_5g_firmwaresd855_firmwaresd660_firmwaresnapdragon_780g_5g_mobile_platform_firmwaresa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwarefastconnect_6800_firmwareqcn5022_firmwaresa8295p_firmwareimmersive_home_216_platform_firmwaresnapdragon_750g_5g_mobile_platform_firmwaresnapdragon_675_mobile_platform_firmwarequalcomm_video_collaboration_vc1_platform_firmwareqca9985_firmwareipq4018_firmwareqca8337_firmwaresnapdragon_778g_5g_mobile_platform_firmwarewcd9380_firmwareqca7500_firmwareqca9980_firmwaremsm8996au_firmwareipq8076a_firmwareqcn9001_firmwaresnapdragon_670_mobile_platform_firmwaresd670_firmwareqdu1110_firmwareqcn6402_firmwarecsr8811_firmwaresnapdragon_x72_5g_modem-rf_system_firmwareipq9554_firmwareqcn5054_firmwareipq4019_firmwareqca8072_firmwareqcn9012_firmwareqca6430_firmwareqcn9274_firmwareqcn5052_firmwareqfw7114_firmwaresm6370_firmwarewcd9335_firmwareqca6335_firmwareipq6018_firmwareqcm4325_firmwarewcd9340_firmwarepmp8074_firmwaremdm9650_firmwareqca6426_firmwarewcn3660b_firmwaresnapdragon_x62_5g_modem-rf_system_firmwareipq9574_firmwarewcn3980_firmwareimmersive_home_3210_platform_firmwareipq8064_firmwaresnapdragon_x50_5g_modem-rf_system_firmwarewcn6740_firmwareqcs4490_firmwareapq8064au_firmwarewcn3680_firmwareipq8078_firmwaresa8650p_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900_firmwareqca6797aq_firmwareqdx1011_firmwareqcn9024_firmwareipq8174_firmwareqca6564a_firmwaresa7255p_firmwareqcm4290_firmwareqcn6412_firmwareqdx1010_firmwaresw5100p_firmwareqcs610_firmwareipq5302_firmwareqamsrv1m_firmwarequalcomm_215_mobile_platform_firmwareqca9886_firmwareqca6595_firmwareqcs5430_firmwareqca6391_firmwaresnapdragon_710_mobile_platform_firmwaresa4150p_firmwareimmersive_home_214_platform_firmwarewcd9370_firmwaresm8550p_firmwarequalcomm_video_collaboration_vc5_platform_firmwaresd888_firmwareqcn5021_firmwaressg2115p_firmwareqam8620p_firmwareqfw7124_firmwareqdu1210_firmwaresnapdragon_720g_mobile_platform_firmwarear8035_firmwareqcn5024_firmwaretalynplus_firmwaresnapdragon_662_mobile_platform_firmwaresxr2230p_firmwaresa8145p_firmwaresnapdragon_x24_lte_modem_firmwareqcs2290_firmwaremdm9628_firmwareflight_rb5_5g_platform_firmwarefsm10055_firmwareqcn6224_firmwareqca9880_firmwaresrv1l_firmwaresnapdragon_888_5g_mobile_platform_firmwareqca6420_firmwaresnapdragon_auto_4g_modem_firmwaresd730_firmwareqcn5152_firmwareqca0000_firmwareqca6584au_firmwarewcn3990_firmwareqrb5165n_firmwareqcn9000_firmwareqca9984_firmwarequalcomm_video_collaboration_vc3_platform_firmwarewcd9385_firmwarewcd9326_firmwarewcn3615_firmwareqamsrv1h_firmwareqcn5124_firmwareqam8295p_firmwareqcn6102_firmwareqcn9011_firmwareqcn6100_firmwareqca8082_firmwareqca6320_firmwaresa9000p_firmwaresnapdragon_835_mobile_pc_platform_firmwareqcn5122_firmwaresdx55_firmwarewcn3680b_firmwarewsa8845h_firmwareqcn6023_firmwaresnapdragon_212_mobile_platform_firmwaresm7250p_firmwarewcn3610_firmwareqca6436_firmwaresnapdragon_680_4g_mobile_platform_firmwareqca6564au_firmwaresa8620p_firmwaresa6155p_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareqcm8550_firmwaresa8775p_firmwareqcs8550_firmwarevision_intelligence_300_platform_firmwareqcn6112_firmwarewcn3988_firmwaresa6145p_firmwarefsm20056_firmwarefastconnect_6700_firmwarewsa8810_firmwarewcd9395_firmwaresnapdragon_ar2_gen_1_platform_firmwaresa8255p_firmwaresdx65m_firmwareqca6174a_firmwareipq8071a_firmwareqcs4290_firmwaresa8770p_firmwareqca8085_firmwaresxr2130_firmwareqcs6490_firmwaresnapdragon_x12_lte_modem_firmwareqca9898_firmwaresnapdragon_210_processor_firmwaresm6250_firmwareqcn9100_firmwarevision_intelligence_400_platform_firmwarewcn3620_firmwareipq5010_firmwareipq8074a_firmwarewsa8815_firmwarewsa8835_firmwaresxr1120_firmwaresxr2250p_firmwaresg4150p_firmwaresnapdragon_8_gen_2_mobile_platform_firmwareqcm6125_firmwareqcm2290_firmwarerobotics_rb5_platform_firmwareqcm2150_firmwareqcf8000_firmwarear9380_firmwareqcs7230_firmwareqdu1010_firmwareimmersive_home_326_platform_firmwareqcn6122_firmwareipq8065_firmwaresxr1230p_firmwaresdm429w_firmwaresnapdragon_4_gen_1_mobile_platform_firmwareqca8075_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaressg2125p_firmwareqcn6132_firmwareqcn9003_firmwareqca6310_firmwareqca9994_firmwareipq8070a_firmwareipq8076_firmwareqca6574_firmwaresm4125_firmwaresm7325p_firmwareqru1032_firmwaresnapdragon_xr2_5g_platform_firmwarewsa8845_firmwareqca6574a_firmwarefastconnect_6200_firmwaresnapdragon_x55_5g_modem-rf_system_firmwareaqt1000_firmwaresnapdragon_x35_5g_modem-rf_system_firmwaresnapdragon_690_5g_mobile_platform_firmwareqcm4490_firmwareqcn6274_firmwaresnapdragon_845_mobile_platform_firmwarecsrb31024_firmwareqcm6490_firmwarewsa8832_firmwareipq5300_firmwareqcn9070_firmwareipq9570_firmwaresrv1h_firmwareipq6028_firmwareipq8072a_firmwareqcn6432_firmwareipq5312_firmwareqca9889_firmwaresa8155p_firmwareqcs8250_firmwarewcd9341_firmwarefastconnect_7800_firmwareipq5332_firmwaresnapdragon_8_gen_1_mobile_platform_firmwaresrv1m_firmwaresd835_firmwareqca6564_firmwareqam8650p_firmwareipq6010_firmwaresnapdragon_8_gen_3_mobile_platform_firmwareqcn9022_firmwarewcd9390_firmwareqca9990_firmwareqcn9002_firmwareqcn9072_firmwareipq6000_firmwaresw5100_firmwareqcn9074_firmwareqcs410_firmwaresnapdragon_xr1_platform_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2019-2321
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 9.22%
||
7 Day CHG~0.00%
Published-12 Dec, 2019 | 08:30
Updated-04 Aug, 2024 | 18:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect length used while validating the qsee log buffer sent from HLOS which could then lead to remap conflict in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096, APQ8096AU, APQ8098, IPQ4019, IPQ8074, MDM9150, MDM9205, MDM9206, MDM9207C, MDM9607, MDM9650, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, QCA8081, QCS404, QCS605, QM215, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SM6150, SM7150, SM8150, Snapdragon_High_Med_2016, SXR1130, SXR2130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-mdm9150_firmwareapq8096_firmwaresdm632_firmwaremsm8996au_firmwaresdm845sdm450_firmwaresdm632apq8096sdx24sdm439qcs404_firmwaremdm9650sdm429msm8940_firmwaresm7150_firmwaresnapdragon_high_med_2016_firmwaresm6150msm8909w_firmwaremsm8996ausm7150apq8009_firmwaremsm8917sdm670sxr2130qcs605_firmwareipq4019_firmwaremdm9206sdm670_firmwareqcs404sdx24_firmwareipq8074sdm636sda845_firmwareapq8098mdm9205mdm9206_firmwaremsm8939qcs605msm8937_firmwaremdm9650_firmwaresdm429_firmwaremsm8905_firmwaresda660sxr1130_firmwareqca8081_firmwaresxr1130msm8909wapq8009msm8909_firmwareapq8053_firmwaresda845sdm850_firmwaremsm8920msm8953sdm450sdm636_firmwareapq8098_firmwaremsm8998_firmwaresdm660msm8920_firmwaresdm630mdm9607_firmwareipq8074_firmwaresdm710qm215mdm9607apq8017_firmwaresdm710_firmwaremsm8939_firmwareqca8081mdm9150msm8937mdm9207c_firmwaremsm8996_firmwaremsm8905mdm9207csnapdragon_high_med_2016sm8150_firmwaremsm8909sxr2130_firmwareapq8096ausdm439_firmwaresdm630_firmwaremdm9205_firmwaresda660_firmwareqm215_firmwareipq4019msm8953_firmwaremsm8940sm6150_firmwareapq8053apq8096au_firmwaremsm8917_firmwaremsm8998sm8150sdm850apq8017msm8996sdm660_firmwaresdm845_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2019-2341
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 13.53%
||
7 Day CHG~0.00%
Published-30 Sep, 2019 | 15:40
Updated-04 Aug, 2024 | 18:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow when the audio buffer size provided by user is larger than the maximum allowable audio buffer size. in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd_850mdm9150_firmwaresd_632mdm9640_firmwaresd_820asd_675msm8996au_firmwaresd_439sd_670_firmwaresd_429sdx24sdm439mdm9650sd_636sd_615_firmwaremsm8909w_firmwaremsm8996ausd_820sd_450_firmwaresd_845_firmwaresd_820a_firmwareqcs605_firmwaresd_675_firmwaremdm9206sd_425_firmwaresd_665sdx24_firmwaresd_625_firmwaresd_450sd_845mdm9206_firmwareqcs605sd_632_firmwaresd_835_firmwaremdm9650_firmwaresd_835sda660sd_210_firmwaresd_415_firmwaremsm8909wsd_665_firmwaresd_616_firmwaresd_205_firmwaresd_415sd_212sd_427_firmwaresd_712sd_855sd_730_firmwarequalcomm_215sdx20sd_616sd_425sdm660sd_430_firmwaremdm9607_firmwaresd_435sd_615sd_710_firmwaresdm630qcs405sd_625sd_820_firmwaresd_210mdm9607sd_636_firmwaresd_439_firmwarequalcomm_215_firmwaremdm9150sd_429_firmwaresd_730sd_212_firmwaresd_850_firmwaresd_855_firmwaresdm439_firmwareqcs405_firmwaresd_712_firmwaresdm630_firmwaresda660_firmwaresd_430sd_427sd_670sd_435_firmwaresdx20_firmwaresd_710sd_205sdm660_firmwaremdm9640Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2019-2333
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 13.53%
||
7 Day CHG~0.00%
Published-30 Sep, 2019 | 15:40
Updated-04 Aug, 2024 | 18:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow due to improper validation of buffer size while IPA driver processing to perform read operation in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9607, MDM9650, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd_850mdm9150_firmwaresd_632sd_820asd_675msm8996au_firmwaresd_439sd_670_firmwaresd_429sdx24sdm439mdm9650sd_636msm8909w_firmwaremsm8996ausd_820sd_450_firmwaresd_845_firmwaresd_820a_firmwareqcs605_firmwaresd_675_firmwaresd_425_firmwaresd_665sdx24_firmwaresd_625_firmwaresd_450sd_845qcs605sd_632_firmwaresd_835_firmwaremdm9650_firmwaresd_835sda660sd_210_firmwaremsm8909wsd_665_firmwaresd_205_firmwaresd_212sd_427_firmwaresd_712sd_855sd_730_firmwarequalcomm_215sdx20sd_425sdm660sd_430_firmwaremdm9607_firmwaresd_435sd_710_firmwaresdm630sd_625sd_210mdm9607sd_636_firmwaresd_820_firmwaresd_439_firmwarequalcomm_215_firmwaremdm9150sd_429_firmwaresd_730sd_212_firmwaresd_850_firmwaresdm439_firmwaresd_712_firmwaresdm630_firmwaresda660_firmwaresd_427sd_430sd_670sd_435_firmwaresd_710sdx20_firmwaresd_205sdm660_firmwaresd_855_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-30323
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.47%
||
7 Day CHG~0.00%
Published-11 Feb, 2022 | 10:40
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper validation of maximum size of data write to EFS file can lead to memory corruption in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarewcn3991_firmwaremdm9150_firmwaresd678mdm9640_firmwaresa6150p_firmwaresa8145p_firmwareqcs610sm6250p_firmwareqcs2290_firmwaresd7c_firmwarecsrb31024mdm9628_firmwaremdm9650qcs4290wcn3950_firmwaremdm9250sa8150p_firmwareqca6420_firmwareqca6595au_firmwareqcs2290sd730_firmwarewcd9370sd_675_firmwaresd675_firmwareqcs6125_firmwareqca6584au_firmwarewcn3990_firmwareqca9377sa415mwcn3998sdw2500_firmwaresd_8cx_gen2_firmwarewcd9326_firmwaremdm9628sd720gmdm9206_firmwareqsw8573_firmwarewcn3615_firmwarewcn3950wcn3660bqca6574au_firmwarewcn3680b_firmwareqca6595ausdx12_firmwarewcd9375_firmwarewcn3615msm8909wwcn3998_firmwareapq8009w_firmwareqca6420apq8053_firmwarewcn3610_firmwaremdm9207qca6564au_firmwareqca6584ausa6155p_firmwareqca9367_firmwarewcd9306mdm8207sd_8cx_gen2sd429qca9367qcs6125qca4004_firmwaremdm9607_firmwaremdm9655_firmwaresa415m_firmwarewcn3988_firmwareqca6430sa6145p_firmwaresd205sd429_firmwaresm6250wcd9306_firmwarewcd9340sa8195papq8017_firmwarewsa8810_firmwarequalcomm215_firmwarewcd9326wcd9335sa6155pqca6174a_firmwaremdm9250_firmwareqcs4290_firmwarewcd9341mdm9655qca6696_firmwarewcn3910_firmwarewcd9375aqt1000sa8150psm6250_firmwaremdm9207_firmwaremsm8953_firmwareqca4004sda429wsd210sd855_firmwaresd660wcn3620_firmwaresdx20_firmwarewcn3988wsa8815_firmwaresd660_firmwarewcn3620sa8195p_firmwareapq8017qca6564awcn3610qcm6125_firmwaremdm9640qcm2290_firmwarewcn3991sda429w_firmwarewcd9380_firmwarewcn3990sd_675sdm429wmsm8996au_firmwarewcd9330qca6564ausdx24qet4101_firmwaremsm8909w_firmwareqca6574msm8996ausdm429w_firmwaresd665_firmwarewcd9380sd850sm6250pqualcomm215qcs410qca6574amdm9206qca6174asdx24_firmwareqca6430_firmwarewcd9335_firmwarewcn3980sd439_firmwareqsw8573mdm9205qca6574_firmwarewcd9340_firmwaresd855wsa8815sd665sd7cwcn3910mdm9650_firmwarewcn3660b_firmwareqca6574a_firmwaresd850_firmwarewcn3980_firmwaresd730sdxr1_firmwarewcd9330_firmwareaqt1000_firmwaremsm8953sd678_firmwareqcm4290csrb31024_firmwaresdx20qca6574ausa8155p_firmwaremdm9607sd205_firmwareqca6564a_firmwareapq8009wwcd9341_firmwareqcm6125qcm4290_firmwarewsa8810sd210_firmwareqcs610_firmwaremdm9150sa6145pwcn3680bsdxr1apq8096ausa8145pmdm8207_firmwareqca6696mdm9205_firmwaresd845_firmwarewcd9370_firmwaresa6150psdw2500apq8053apq8096au_firmwaresa8155psd675sd845sd439qet4101sd720g_firmwaresdx12qcs410_firmwareqcm2290Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-30308
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.10% / 28.72%
||
7 Day CHG~0.00%
Published-13 Jan, 2022 | 11:40
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible buffer overflow while printing the HARQ memory partition detail due to improper validation of buffer size in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarewcn3991_firmwaremdm9150_firmwarewsa8830sd678sm6250p_firmwareqcs610fsm10056qca8337sd7c_firmwarecsrb31024wcd9360_firmwaremdm9650sdx65wcn3950_firmwaremdm9250sd765g_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwaresd690_5gsd730_firmwarewcd9370qcs605_firmwaresd_675_firmwaresd675_firmwareqca6426wcn3990_firmwareqca9377sa415mwcn3998wcd9385_firmwaresdxr2_5g_firmwaresd_8cx_gen2_firmwarewcd9326_firmwaresd720gwcn3950sd_8_gen1_5g_firmwaresm6375_firmwareqca6574au_firmwaresdx55_firmwareqca6595auqca8081_firmwaresdx12_firmwarewcd9375_firmwaresm7250p_firmwarewcn3998_firmwareqca6420qca6436_firmwarewcd9360qca6564au_firmwaresd_8cx_gen2sa515m_firmwaresdxr2_5gsa415m_firmwarewcn3988_firmwareqca6430sm6250wcd9340wsa8810_firmwaresd765gsd765_firmwarefsm10056_firmwareqca6436wcd9326wcd9335wcn6851qca8081qcs603_firmwareqca6174a_firmwaremdm9250_firmwarewcd9385wcd9341qca6696_firmwaresd750gsd870_firmwareqca6390ar8035sd750g_firmwareaqt1000wcd9375sm6250_firmwarewsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwaresdx20_firmwarewcn3988wcn6850_firmwarewsa8815_firmwaresd660_firmwarewsa8835_firmwareqcx315sm8475qca6564asm6375wcn3991qca8337_firmwarewcd9380_firmwarewcn3990sd_675sd865_5gqca6564ausdx24sdx55m_firmwarewcn6856_firmwarewsa8835qcx315_firmwaresd665_firmwarewcd9380sm6250pqcs410qca6574asd690_5g_firmwarewcn6855_firmwareqca6174asdx24_firmwareqca6430_firmwarewcd9335_firmwarewcn3980sa515mqcs605wcd9340_firmwaresd855wsa8815wcn6850sd665sd7cmdm9650_firmwaresd765qca6426_firmwareqca6574a_firmwaresd768g_firmwaresd850_firmwarewcn3980_firmwaresd730qca6391sdx55msdxr1_firmwareaqt1000_firmwaresdx65_firmwaresd678_firmwarecsrb31024_firmwaresdx20sd480_firmwareqcs603wcn6851_firmwareqca6574auqca6564a_firmwarewcd9341_firmwaresd480sd870wsa8810wcn6855qcs610_firmwaremdm9150wcn6856sdxr1sd768gqca6696qca6391_firmwaresd845_firmwarewcd9370_firmwaresdx55sd675sd845sm7250psd720g_firmwaresdx12qcs410_firmwarear8035_firmwaresd850Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-21464
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.03% / 9.77%
||
7 Day CHG~0.00%
Published-06 Jan, 2025 | 10:33
Updated-10 Jan, 2025 | 17:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in Data Network Stack & Connectivity

Memory corruption while processing IPA statistics, when there are no active clients registered.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-talynplus_firmwarewcn6740_firmwarewcd9395wsa8830fastconnect_7800wcn3950_firmwarewsa8845hqcm4490wcd9370_firmwarewsa8840wcd9390_firmwarefastconnect_6700talynplusqcs4490wcn6740fastconnect_6700_firmwarewcd9370wcd9390snapdragon_8\+_gen_1_mobilewsa8815wsa8832wcd9395_firmwarewsa8845wsa8810fastconnect_6900_firmwareqcm4490_firmwareqcs4490_firmwarewcn3950wsa8845_firmwarefastconnect_6900wsa8832_firmwarewsa8815_firmwarewsa8830_firmwarewsa8845h_firmwarefastconnect_7800_firmwarewsa8835_firmwarewsa8835wsa8840_firmwaresnapdragon_8\+_gen_1_mobile_firmwaresnapdragon_8_gen_3_mobilesnapdragon_8_gen_3_mobile_firmwarewsa8810_firmwareSnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-30318
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.12% / 31.20%
||
7 Day CHG~0.00%
Published-11 Feb, 2022 | 10:40
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper validation of input when provisioning the HDCP key can lead to memory corruption in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055qca9377_firmwaresa6150p_firmwaresm6250p_firmwareqcs610qca8337wcd9360_firmwaresdx65wcn3950_firmwaresa8150p_firmwareqcs2290qca6595au_firmwaresa6155csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareqcs6125_firmwaresa415mwcn3998wcn3950mdm9628sd720gmdm9206_firmwareqsw8573_firmwaresd_8_gen1_5g_firmwaresm6375_firmwarewcn3660bsd460_firmwaresm7315_firmwareqca6574au_firmwarewcd9375_firmwarewcn3998_firmwareqca8081_firmwaresa6155_firmwaresdx12_firmwaremsm8909wapq8009w_firmwarewcd9360qca9367_firmwarewcn3999qrb5165_firmwareqrb5165m_firmwareqcs6125sa8155_firmwaresd662_firmwareqcs405qualcomm215_firmwaresd765gfsm10056_firmwareqca6436wcn6851sa6155pqcs603_firmwaremdm9250_firmwareqca6696_firmwaresd750gsd870_firmwarewcn3910_firmwaresa8150pwsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwarewcn3988sd660_firmwaresa8195p_firmwaresm8475wcn6750_firmwarewcn3610sm6375wcn3991qca8337_firmwaresda429w_firmwarewcd9380_firmwaresdm429wmsm8996au_firmwarewcd9330qca6564ausdx55m_firmwarewcn6856_firmwareqca6574wcd9380qualcomm215qcs410sd690_5g_firmwaresdx24_firmwareqcn9012_firmwaresd439_firmwareqsw8573qcs605wcn6850wcn3910qca6426_firmwarewcn3660b_firmwaresd730wcd9330_firmwaresdx55mwcn6740_firmwaresd678_firmwarear8031_firmwareqrb5165wcn6851_firmwareqcs603qca6564a_firmwareapq8009wqcm4290_firmwaresd480sd870wcn6855sd210_firmwareqcs610_firmwaresa6145psdxr1apq8096auar8031qcs405_firmwaresa8145pqca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55sd888_firmwaresa8155pcsra6640sd675sd439qcs8155_firmwarear8035_firmwareqcm2290wcn3991_firmwaremdm9150_firmwarewsa8830sd678sa8145p_firmwareqcs2290_firmwarefsm10056csrb31024mdm9628_firmwarecsra6620fsm10055_firmwareqcs4290mdm9250sd765g_firmwareqca6390_firmwaresd690_5gsd730_firmwarewcd9370sd675_firmwareqca6564qca6426qca6584au_firmwareqrb5165n_firmwareqca9377sdw2500_firmwarewcd9385_firmwaresdxr2_5g_firmwaresd662qcn9011_firmwaresa8155sdx55_firmwareqca6595auwcn3999_firmwaresm7250p_firmwarewcn3610_firmwareqca6436_firmwareqrb5165nqca6564au_firmwareqca6584ausa6155p_firmwaresd778gqcs8155sm6225sa515m_firmwareqcs6490sd429sdxr2_5gqca9367mdm9607_firmwaresa415m_firmwarewcn3988_firmwaresa6145p_firmwaresd205sd429_firmwaresd778g_firmwaresm6250sa8195papq8017_firmwaresd765_firmwareqca8081qca6174a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwarear8035qca6390sd750g_firmwareaqt1000wcd9375sm6250_firmwaresda429wsd210wcn3620_firmwaresdx20_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewcn3620wsa8835_firmwareapq8017qcx315qca6564aqcm6125_firmwareqcm2290_firmwaresd_675sd780gsd865_5gsdx24qcn9012sd888msm8909w_firmwareqcx315_firmwaremsm8996ausdm429w_firmwarewsa8835sd665_firmwaresd888_5gsm6250pqca6574amdm9206wcn6855_firmwareqca6174asm7325pwcn6750sa515mqca6574_firmwaresd855sm7325p_firmwaresd665sd765qca6574a_firmwaresd768g_firmwareqrb5165msm7315sd460qca6391sdxr1_firmwareaqt1000_firmwaresdx65_firmwareqcm4290csrb31024_firmwareqcm6490_firmwaresdx20sd480_firmwareqcn9011sm6225_firmwareqca6574ausa8155p_firmwaremdm9607sd205_firmwareqcm6125mdm9150wcn6856qca6564_firmwaresd768gwcn6740qca6696sa6150psdw2500apq8096au_firmwaresm7250psd720g_firmwaresdx12qcs410_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-30295
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.03% / 9.95%
||
7 Day CHG~0.00%
Published-09 Sep, 2021 | 07:36
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible heap overflow due to improper validation of local variable while storing current task information locally in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055qca9377_firmwaremdm9150_firmwarewcn3991_firmwaresd678sa6150p_firmwaresm7250sa8145p_firmwareqcs610wsa8830qcs2290_firmwarefsm10056sm7250_firmwarecsrb31024wcd9360_firmwarecsra6620fsm10055_firmwareqcs4290wcn3950_firmwaresa8150p_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqcs2290qca6390_firmwaresa6155msm8917sd690_5gsd730_firmwarewcd9370csra6620_firmwareqcs605_firmwaresd_675_firmwaresd675_firmwarecsra6640_firmwareqca6426qca6584au_firmwaresd632wcn3990_firmwareqca9377sa415mwcn3998wcd9385_firmwarewcn3950sm4125sd720gwcd9326_firmwarewcn3615_firmwarewcn3660bsd662sd710_firmwaresd460_firmwaresa8155qca6574au_firmwaresdx55_firmwarewcn3680b_firmwareqca6595ausa6155_firmwaresdx12_firmwarewcd9375_firmwarewcn3615wcn3998_firmwarewcn3610_firmwareqca6420apq8053_firmwarewcd9360qca6564au_firmwareqca6584ausa6155p_firmwaresd778gsa515m_firmwareqcs6490qrb5165_firmwaresd429sa8155_firmwaresd662_firmwaresa415m_firmwareqcs405qca6430wcn3988_firmwaresa6145p_firmwaresd205sd429_firmwaresd778g_firmwaresm6250wcd9340sa8195papq8017_firmwarewsa8810_firmwarequalcomm215_firmwaresd765gsd765_firmwarefsm10056_firmwarewcd9326wcd9335sa6155pwcn6851qcs603_firmwareqca6174a_firmwareqcs4290_firmwarewcd9385wcd9341qca6696_firmwareqcs6490_firmwaresd750gsd870_firmwareqca6390wcd9375sd750g_firmwareaqt1000sa8150pwcn3910_firmwaresm6250_firmwaremsm8953_firmwarewsa8830_firmwaresda429wmsm8917_firmwaresd210sd660sd855_firmwaresd865_5g_firmwareqcm6490sd888_5g_firmwarewcn3620_firmwaresd660_firmwarewcn3620wcn3988sa8195p_firmwarewcn6850_firmwarewsa8815_firmwarewsa8835_firmwareapq8017qcx315wcn6750_firmwarewcn3610qcm2290_firmwarewcn3991sda429w_firmwarewcd9380_firmwarewcn3990sd_675sdm429wsd780gsd865_5gqca6595qca6564ausdx55m_firmwarewcn6856_firmwaresd888sd670_firmwareqca6574qcx315_firmwaresd632_firmwaresdm429w_firmwaresd665_firmwarewsa8835wcd9380sd888_5gqualcomm215qcs410qca6574asd690_5g_firmwaresdx50m_firmwarewcn6855_firmwareqca6174asm7325qca6430_firmwarewcd9335_firmwarewcn3980sd439_firmwarewcn6750sa515mqca6574_firmwareqcs605wcd9340_firmwaresd855sm4125_firmwarewcn6850sd665wcn3910wsa8815sd765qca6426_firmwarewcn3660b_firmwarewcn3680qca6574a_firmwaresd768g_firmwarewcn3980_firmwaresd460qca6391sd730sdx55maqt1000_firmwarewcn6740_firmwaremsm8953sd678_firmwarear8031_firmwarecsrb31024_firmwareqcm4290qcm6490_firmwaresdx50mwcn3680_firmwareqrb5165sd480_firmwareqcs603wcn6851_firmwareqca6574ausa8155p_firmwaresd710sd205_firmwaresd670wcd9341_firmwareqcm4290_firmwaresd480sd870wcn6855wsa8810sd210_firmwareqcs610_firmwaremdm9150wcn6856sa6145pwcn3680bsd768gar8031qca6595_firmwareqcs405_firmwaresa8145pwcn6740qca6696qca6391_firmwaresd845_firmwaresd780g_firmwarewcd9370_firmwaresa6150psd888_firmwaresdx55apq8053sa8155pcsra6640sd675sd845sd439sd720g_firmwaresdx12qcs410_firmwareqcm2290sm7325_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-30303
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 9.95%
||
7 Day CHG~0.00%
Published-03 Jan, 2022 | 07:26
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible buffer overflow due to lack of buffer length check when segmented WMI command is received in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwareqca2066mdm9640_firmwaresm6250p_firmwaresa6150p_firmwareqcs610ipq4028_firmwareqcn5550qca1023qca8337ar9380ipq8173_firmwarewcd9360_firmwareqca9561_firmwaresdx65qcn5124qca4024_firmwarewcn3950_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqcs2290qca6595au_firmwaresa6155qca2062qcn5064csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareqca9987_firmwaresa415mwcn3998wcn3950qcn6024_firmwaresd720gipq8076amdm9206_firmwaremdm9628sm6375_firmwarewcn3660bsd460_firmwaresm7315_firmwareqca6428qca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwareqca8081_firmwarewcn3998_firmwaresa6155_firmwaresdx12_firmwareqca6420wcd9360qca6438_firmwareqca9986ipq8070_firmwareqca9367_firmwareipq8065ipq8078a_firmwarewcn3999qrb5165_firmwareipq5028qca7500ipq8072_firmwareipq4029_firmwaresa8155_firmwareipq6010sd662_firmwareipq8068qcs405qca6430sc8280xp_firmwarewcd9340qcn6132sd765gqca6436wcn6851sa6155pqcs603_firmwaremdm9250_firmwareqca9888_firmwareqcn6122wcd9341ipq8068_firmwareqca2066_firmwareqca6696_firmwaresd870_firmwaresd750gqca9988_firmwareqcn5154_firmwarewcn3910_firmwaresd_8cxqcn5501_firmwaresa8150par7420_firmwarewsa8830_firmwareqca9992_firmwaresd660sd865_5g_firmwaresd855_firmwarewcn3988qca6438sd660_firmwaresa8195p_firmwareqcn5121qcn5022_firmwareqcn7606_firmwarewcn6750_firmwareqca9898ipq4028wcn3610mdm9640qca6428_firmwareipq5018_firmwaresm6375qca9985_firmwarewcn3991ipq4018_firmwareqca4531_firmwareqca8337_firmwarewcd9380_firmwareipq8072aqca7500_firmwareqca9980_firmwarewcd9330msm8996au_firmwareipq8076a_firmwareqca7550_firmwareipq8078qca6564ausdx55m_firmwareipq8173wcn6856_firmwareqcn5164qca9558qca6574csr8811_firmwareqca7520_firmwarewcd9380qcn5054_firmwareqcs410qcn5024sd690_5g_firmwareipq4019_firmwareqca9379_firmwaresdx24_firmwareqca8072_firmwareqca9985qcn9012_firmwareqca6430_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980ipq6018_firmwareqcs605wcd9340_firmwarewsa8815wcn6850sd7cpmp8074_firmwarewcn3910qca6584_firmwareqca6320mdm9650_firmwareqca9986_firmwareqca6426_firmwarewcn3660b_firmwareqca9984ipq6028ipq8064qcn9024pmp8074wcn3980_firmwaresd730qcn5550_firmwarewcd9330_firmwaresdx55mipq8064_firmwareqca2062_firmwarewcn6740_firmwareqcn5064_firmwaresd678_firmwareapq8064au_firmwarear8031_firmwareipq8078_firmwareqcn5054qrb5165wcn6851_firmwareqcs603ipq8070qca9896qcn5502qca9994qca9887_firmwareqca9980qcn9024_firmwareipq8174_firmwareqca6564a_firmwareqca9880qcm4290_firmwaresd480sd870wcn6855qcn7605_firmwareqcn5121_firmwareqcs610_firmwaresa6145pipq6018qca9886_firmwaresdxr1ar8031qca1023_firmwareapq8096auqcs405_firmwaresa8145pqca6391_firmwareqca4024wcd9370_firmwareqca2064sd780g_firmwaresdx55sd888_firmwaresc8280xpqcn5021_firmwaresa8155pcsra6640sd675qca9531_firmwareqca9379ar8035_firmwareqcm2290qcn7606qcn5024_firmwarewcn3991_firmwarewsa8830sd678qca9561qcn9070sa8145p_firmwareqca7520qcs2290_firmwaresd7c_firmwarecsrb31024qca9563_firmwaremdm9628_firmwareqca9378mdm9650csra6620qca9987qcn9072qca9880_firmwareqca9992qcs4290mdm9250sd765g_firmwareqca6420_firmwareipq8069_firmwareapq8009_firmwareqca2064_firmwareqca6390_firmwaresd690_5gipq6000sd730_firmwarewcd9370sd675_firmwareipq8072qcn5152_firmwareqca6564qca6426qca6584au_firmwarewcn3990_firmwareqrb5165n_firmwareqcn9000_firmwareqca9984_firmwareqca9377sm8450qca4531ipq5018sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwareqcn7605wcd9326_firmwareqca9563ipq8074aqca2065sd662qcn5124_firmwaresa8155qca6320_firmwareqca6584qcn5122_firmwaresdx55_firmwareqca6595auqcn6023_firmwarewcn3999_firmwaresm7250p_firmwarewcn3610_firmwareqca6436_firmwareqrb5165nipq5010qca6564au_firmwareqca6584ausd778gsa6155p_firmwaresm6225ipq8174sa515m_firmwareqca9990qcs6490sdxr2_5gqcn5052qca9367qcn5501mdm9607_firmwaresa415m_firmwarewcn3988_firmwareqcn9074sa6145p_firmwaresm6250sd778g_firmwaresa8195papq8017_firmwarewsa8810_firmwareqca7550sm8450_firmwaresd765_firmwarewcd9326wcd9335qca8081qcn6023ipq8071aqca6174a_firmwareipq8071a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwareqca2065_firmwareqca6390qca9898_firmwaresd750g_firmwareaqt1000wcd9375ar8035sm6250_firmwarecsr8811apq8064auipq4019qcn9100_firmwareipq5010_firmwareipq8074a_firmwaresd888_5g_firmwaresdx20_firmwarewsa8815_firmwareqcm6490wcn6850_firmwarewsa8835_firmwareapq8017qcx315qca6564aqca9988qca9882qca8072qcm2290_firmwarewcn3990qcn9000sd_675sd780gsd865_5gar9380_firmwaresdx24sm8450p_firmwareqcn9012sd888qca9558_firmwareqca9896_firmwareqcn6122_firmwareipq8065_firmwareqcx315_firmwarewsa8835msm8996ausd665_firmwaresd888_5gsm6250pqcn5154qca8075_firmwareipq4018qca6574aipq6005_firmwaremdm9206wcn6855_firmwareqca9889qca6174asm7325pqcn6132_firmwareqca9888ipq8074qca9994_firmwarewcn6750ipq8070a_firmwareipq8076_firmwaresa515mqca6574_firmwareqca9886qcn5502_firmwarear7420sd855sm7325p_firmwaresd665ipq8076qca6175asd765qca9887qca9378_firmwareqca6574a_firmwareqcn5021ipq8069qcn5152sd768g_firmwaresd850_firmwaresm7315apq8009sd460qca6391sdxr1_firmwareipq6005aqt1000_firmwareqcn9100sdx65_firmwareqcm4290csrb31024_firmwareqcm6490_firmwareqca9882_firmwareqcn9070_firmwaresdx20sd480_firmwareipq6028_firmwareipq8072a_firmwaresm6225_firmwareqca9531ipq8074_firmwareqca6574auqca9889_firmwaresa8155p_firmwaremdm9607qcn5122wcd9341_firmwarewsa8810sm8450pwcn6856qcn5022qca6564_firmwaresd768gipq6010_firmwarewcn6740qca6696sd845_firmwaresa6150pqca8075qcn9022_firmwareapq8096au_firmwareqcn6024qcn9022sd845qca9990_firmwareipq8070aqcn9072_firmwaresm7250pipq6000_firmwaresd720g_firmwaresdx12ipq8071_firmwareqcs410_firmwareqcn9074_firmwareipq4029qca6175a_firmwaresd850Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-30309
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.58%
||
7 Day CHG~0.00%
Published-11 Feb, 2022 | 10:40
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper size validation of QXDM commands can lead to memory corruption in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarewcn3991_firmwarewcn3991wsa8830wcd9380_firmwarewcn3990qcs610sd865_5gsdx55m_firmwaremdm9650wsa8835wcn3950_firmwaresd665_firmwarewcd9380sd765g_firmwareqca6390_firmwareqcs410sd690_5gsd730_firmwarewcd9370qcs605_firmwaresd690_5g_firmwareqcs6125_firmwareqca6174awcn3990_firmwarewcd9335_firmwareqca9377wcn3980wcn3998wcd9385_firmwarewcn3950wcd9326_firmwareqcs605wsa8815wcn6850sd665mdm9650_firmwaresd765sd768g_firmwarewcd9375_firmwaresdx12_firmwarewcn3998_firmwarewcn3980_firmwaresm7250p_firmwaresd730sdxr1_firmwareqca6391sdx55mqcs6125wcn6851_firmwareqcs603wcn3988_firmwarewsa8810_firmwaresd765gwcd9341_firmwareqcm6125wsa8810sd765_firmwaresd870wcd9326wcd9335wcn6851qcs603_firmwareqcs610_firmwareqca6174a_firmwarewcd9385wcd9341sdxr1sd768gsd870_firmwareqca6391_firmwareqca6390wcd9375wcd9370_firmwarewsa8830_firmwaresd660sd865_5g_firmwarewcn3988wcn6850_firmwarewsa8815_firmwaresd660_firmwarewsa8835_firmwaresm7250psdx12qcs410_firmwareqcm6125_firmwareSnapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-30268
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.47%
||
7 Day CHG~0.00%
Published-03 Jan, 2022 | 07:25
Updated-03 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible heap Memory Corruption Issue due to lack of input validation when sending HWTC IQ Capture command in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055qca9377_firmwaremdm9640_firmwaresm6250p_firmwareqcs610qca8337wcd9360_firmwaresdx65wcn3950_firmwareqcs2290qca6595au_firmwaremdm8215qcs605_firmwaresd_675_firmwaremdm8615m_firmwaresa415mwcn3998wcn3950mdm9628sd720gmdm9206_firmwareqsw8573_firmwaresm6375_firmwarewcn3660bsd460_firmwaremdm8215mqca6574au_firmwarewcd9375_firmwarewcn3998_firmwareqca8081_firmwaresdx12_firmwaremsm8909wapq8009w_firmwareqca6420wcd9360qca9367_firmwaremdm8207qca4004_firmwaresd662_firmwaremdm9615mqca6430wcd9306_firmwarewcd9340qualcomm215_firmwaresd765gfsm10056_firmwareqca6436wcn6851qcs603_firmwaremdm9250_firmwarewcd9341qca6696_firmwaresd750gsd870_firmwaremdm8215_firmwarewcn3910_firmwaresd_8cxmdm9207_firmwareqca4004wsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwarewcn3988sd660_firmwarewcn3610mdm9640sm6375wcn3991qca8337_firmwaresda429w_firmwarewcd9380_firmwaresdm429wmsm8996au_firmwarewcd9330qca6564ausdx55m_firmwarewcn6856_firmwareqet4101_firmwareqca6574wcd9380qualcomm215qcs410sd690_5g_firmwaresdx24_firmwareqca6430_firmwarewcd9335_firmwarewcn3980qsw8573qcs605wcd9340_firmwarewsa8815wcn6850sd7cwcn3910qca6584_firmwaremdm9650_firmwaremdm9215_firmwareqca6426_firmwarewcn3660b_firmwarewcn3980_firmwaresd730wcd9330_firmwaresdx55mar6003_firmwaresd678_firmwarewcn6851_firmwareqcs603qca6564a_firmwareapq8009wqcm4290_firmwaresd480sd870wcn6855sd210_firmwareqcs610_firmwaresdxr1apq8096aumdm8207_firmwaremdm9205_firmwareqca6391_firmwarewcd9370_firmwaresdx55sd675qet4101ar8035_firmwareqcm2290wcn3991_firmwaremdm9150_firmwarewsa8830sd678qcs2290_firmwarefsm10056sd7c_firmwarecsrb31024mdm9628_firmwaremdm9650fsm10055_firmwareqcs4290mdm9250sd765g_firmwareqca6420_firmwareqca6390_firmwaresd690_5gsd730_firmwarewcd9370mdm9310_firmwaresd675_firmwareqca6426qca6584au_firmwarewcn3990_firmwaresm8450qca9377sdw2500_firmwaresd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwaremdm9615m_firmwarewcn3615_firmwaresd662qca6584wcn3680b_firmwaresdx55_firmwareqca6595auwcn3615sm7250p_firmwarewcn3610_firmwareqca6436_firmwaremdm9207qca6564au_firmwareqca6584auwcd9306sm6225sa515m_firmwaresd429sdxr2_5gqca9367mdm9607_firmwaresa415m_firmwarewcn3988_firmwaresd205sd429_firmwaresm6250apq8017_firmwarewsa8810_firmwaresm8450_firmwaresd765_firmwarewcd9326wcd9335qca8081qca6174a_firmwareqcs4290_firmwarewcd9385mdm8615mar8035qca6390sd750g_firmwareaqt1000wcd9375sm6250_firmwaresda429wsd210wcn3620_firmwaresdx20_firmwarewsa8815_firmwarewcn6850_firmwarewsa8835_firmwarewcn3620apq8017qcx315qca6564aar6003qcm2290_firmwarewcn3990sd_675sd865_5gsdx24sm8450p_firmwaremsm8909w_firmwareqcx315_firmwaremsm8996ausdm429w_firmwarewsa8835sd665_firmwaresm6250pqca6574amdm9206wcn6855_firmwareqca6174amdm9615mdm9205sa515mqca6574_firmwaresd855sd665sd765qca6574a_firmwaresd768g_firmwaresd850_firmwaresd460qca6391sdxr1_firmwaremdm9310aqt1000_firmwaresdx65_firmwareqcm4290csrb31024_firmwaresdx20sd480_firmwaremdm9215sm6225_firmwareqca6574aumdm8215m_firmwaremdm9607sd205_firmwarewcd9341_firmwarewsa8810sm8450pmdm9150wcn6856wcn3680bsd768gqca6696sd845_firmwaresdw2500apq8096au_firmwaresd845mdm9615_firmwaresm7250psd720g_firmwaresdx12qcs410_firmwaresd850Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-30298
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 11.93%
||
7 Day CHG~0.00%
Published-03 Jan, 2022 | 07:26
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible out of bound access due to improper validation of item size and DIAG memory pools data while switching between USB and PCIE interface in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055wcn3991_firmwaremdm9150_firmwarewsa8830wcn3991qca8337_firmwaresda429w_firmwarewcd9380_firmwareqcs610qcn9000ipq8072afsm10056qca8337ipq8076a_firmwaresd865_5gsdx55m_firmwarecsra6620fsm10055_firmwarewsa8835wcn3950_firmwaresd665_firmwarewcd9380sd765g_firmwareqca6595au_firmwareqca6390_firmwarequalcomm215qcs410wcd9370csra6620_firmwarecsra6640_firmwareqrb5165n_firmwareqcn9000_firmwarewcd9335_firmwarewcn3980wcn3998wcd9385_firmwarewcn3950ipq8076awcd9340_firmwarewcn3660bwsa8815wcn6850sd665ipq8074asd662sd460_firmwaresd765wcn3660b_firmwareqca6574au_firmwaresdx55_firmwaresd768g_firmwareqca6595auwcd9375_firmwarewcn3998_firmwarewcn3999_firmwaresm7250p_firmwarewcn3980_firmwarewcn3610_firmwaresd460qca6391sdx55mqrb5165nwcn3999ar8031_firmwareqrb5165_firmwareqrb5165wcn6851_firmwaresd662_firmwareipq8072a_firmwareqcs405wcn3988_firmwareqca6574auqcn9074sd205sa8155p_firmwaresd205_firmwarewcd9340wsa8810_firmwarequalcomm215_firmwaresd765gwcd9341_firmwarewsa8810sd765_firmwarefsm10056_firmwaresd870wcn6851wcd9335sd210_firmwareqcs610_firmwaremdm9150wcd9385wcd9341sd768gar8031qca6696_firmwareqcs405_firmwaresd870_firmwareqca6696qca6391_firmwarear8035qca6390wcd9375wcd9370_firmwaresdx55sa8155pwsa8830_firmwaresda429wsd210csra6640sd865_5g_firmwarewcn3620_firmwareipq8074a_firmwarewcn3988wcn6850_firmwarewcn3620wsa8815_firmwarewsa8835_firmwaresm7250pqcn9074_firmwareqcs410_firmwarear8035_firmwarewcn3610Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2022-25746
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-8.1||HIGH
EPSS-0.10% / 27.76%
||
7 Day CHG~0.00%
Published-06 Jan, 2023 | 05:02
Updated-09 Apr, 2025 | 19:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in Kernel

Memory corruption in kernel due to missing checks when updating the access rights of a memextent mapping.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresd_8cx_gen3_firmwarewcn3991_firmwarewsa8830sd678qca8337qca6431_firmwaresdx65wcn3950_firmwaresa8150p_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwaresa6155qca6335wcd9370qcs605_firmwaresd_675_firmwaresd675_firmwareqca6426wcn3990_firmwareqrb5165n_firmwareqca9377wcn3998sd_8cx_firmwarewcd9385_firmwareqam8295psd_8cx_gen2_firmwaresdxr2_5g_firmwarewcd9326_firmwarewcn3950sd_8_gen1_5g_firmwareqsm8350_firmwareqsm8350qam8295p_firmwareqcn9011_firmwaresa8155sa9000p_firmwaresm7315_firmwareqca6574au_firmwaresdx55_firmwarewcn7850qca6595auqca8081_firmwaresa6155_firmwarewcd9375_firmwaresm7250p_firmwarewcn3998_firmwareqca6420qca6436_firmwareqrb5165nqca6564au_firmwaresd778gsa6155p_firmwareqca6310sd_8cx_gen2wcn7851qcs6490qrb5165_firmwareqrb5165m_firmwaresdxr2_5gsa8155_firmwareqca6430sa6145p_firmwareqca6421sd778g_firmwarewcd9340wsa8810_firmwaresd765gsd765_firmwareqca6436wcd9326wcn6851sa6155pqca8081qcs603_firmwarewcn7851_firmwareqca6174a_firmwarewcd9385wcd9341qca6431qca6696_firmwareqcs6490_firmwaresd870_firmwaresd_8cx_gen3qca6390ar8035sd_8cxaqt1000sa8150pwcd9375wsa8830_firmwaresd855_firmwaresd865_5g_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewcn7850_firmwarewsa8815_firmwarewsa8835_firmwaresm8475qca6564asa8295p_firmwarewcn6750_firmwarewcn3991qca8337_firmwarewcd9380_firmwarewcn3990sd_675sd780gsd865_5gqca6595qca6564ausdx24sdx55m_firmwarewcn6856_firmwareqcn9012sd888sd670_firmwareqca6574wsa8835sa8540p_firmwarewcd9380sd888_5gqca6574asdx50m_firmwarewcn6855_firmwareqca6174asm7325psdx24_firmwareqca6310_firmwareqca6430_firmwareqcn9012_firmwarewcn3980wcn6750qca6335_firmwaresa9000pqca6574_firmwareqcs605wcd9340_firmwaresd855wsa8815sm7325p_firmwarewcn6850sdx57m_firmwaresd765qca6426_firmwareqca6574a_firmwaresd768g_firmwareqrb5165msd850_firmwarewcn3980_firmwaresm7315qca6391sdx55msa8295pqca6421_firmwareaqt1000_firmwarewcn6740_firmwaresdx65_firmwaresd678_firmwareqcm6490_firmwaresdx50mqrb5165wcn6851_firmwareqcs603qcn9011qca6574ausa8155p_firmwaresd670qca6564a_firmwaresdx57mwcd9341_firmwarewsa8810sd870wcn6855sa8540pwcn6856sa6145psd768gqca6595_firmwarewcn6740qca6696qca6391_firmwaresd845_firmwaresd780g_firmwarewcd9370_firmwaresdx55sd888_firmwaresa8155psd675sd845sm7250par8035_firmwaresd850Snapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2022-25724
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.05% / 16.29%
||
7 Day CHG~0.00%
Published-15 Nov, 2022 | 00:00
Updated-22 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory corruption in graphics due to buffer overflow while validating the user address in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380_firmwarewcn3615_firmwaremsm8996ausd429_firmwareqca6595au_firmwarequalcomm215_firmwaresd730qca6310apq8009mdm9607qca6696qca6421wcn7850qsm8250_firmwareqca6564ausdx24wcn3660bqca6426_firmwaresd632_firmwaresd720gsa6150psd460sd710_firmwaresd205_firmwaremsm8996au_firmwareapq8056sdx24_firmwarewsa8830wsa8815wcn3680bqca6430wcn3620_firmwaresd855qcs6490_firmwarewcd9340sdx55_firmwaresxr2150p_firmwaresdxr2_5g_firmwaremsm8976sg_firmwaresa4155p_firmwaremdm9650sd765g_firmwareqca6574amsm8108_firmwaresd865_5g_firmwareapq8017_firmwareqcm6125_firmwaresdm429w_firmwaresd835_firmwarewcn6750sa8295p_firmwaresm7325pmsm8917_firmwaresd_636_firmwaresd695_firmwareqcc5100sd_675qca6335sd625_firmwaremsm8108qcs405qca6595qca6431_firmwaremsm8208csra6640sd480_firmwareapq8064au_firmwareqca6430_firmwareqca8081sm7315_firmwaresm7325p_firmwareqca6584auapq8009wsd870mdm9150qca9367qca6390_firmwareqcn9024_firmwareqcn9011_firmwaresa6155_firmwarewcn6855qca6584_firmwareqcx315_firmwarewcn3910sd870_firmwareqcm6490_firmwaresm6250qcs8155sdm630_firmwareqca6431qca6595auwcd9370sd821_firmwareqcs4290_firmwaresd888_firmwarewcn3980sm4125_firmwaresd439_firmwaresm7315sd765_firmwaresd720g_firmwaresd765gsd670mdm9150_firmwaresdx55mmsm8208_firmwaremsm8917qam8295psd450wcn6850_firmwarewcn3660sm6250pwsa8810_firmwarewsa8815_firmwarewcn3991_firmwaresa8150psd625wcn6740msm8608_firmwareqca6436apq8064aumsm8952_firmwaresa8155psdxr1wsa8810msm8909wsdm630sw5100p_firmwareaqt1000_firmwareqcn9012wsa8835_firmwarewcd9335_firmwaresm7250p_firmwareapq8009_firmwareqca6391qcn9024wcn3998_firmwarecsra6620wcn6851sd778g_firmwarewcd9370_firmwaresd675qca6420_firmwaresd439wcn3660_firmwareqcx315qcc5100_firmwaresd210_firmwareqcm6125apq8052_firmwareqca4020_firmwaresdx12sd660csrb31024_firmwaresa4150p_firmwaresdm429wsdx20qcs610qualcomm215apq8052qca6391_firmwaresd205wcd9326_firmwareqcn9012_firmwaresm7250psa8155p_firmwarecsra6620_firmwarewcn3610sdx20_firmwaresa6145pwcn3910_firmwareqrb5165_firmwaremsm8209apq8017wcd9375sd750g_firmwaremsm8976_firmwareqca6696_firmwaresm6250p_firmwaresxr2150psd865_5gqca9377wcn3990_firmwarewcn3950_firmwarewcn3988sd778gwcd9371_firmwarewcn3615msm8976sd750gsd768g_firmwareqcs605msm8952wcn7851qca6310_firmwaresd710qcs8155_firmwareqca6436_firmwaresa8195p_firmwareqca4020qca9367_firmwaresd_636wcd9341_firmwaresd821sd632wcd9340_firmwaresd_675_firmwareqca6174a_firmwareqca6564a_firmwaresd855_firmwaresd662_firmwarewcd9371mdm9650_firmwaresdx50mqcs405_firmwareqcn6024_firmwareqcs6490sdx55sd460_firmwaremsm8956mdm9628wcn3610_firmwaresa6155qcm4290_firmwaremsm8976sgsd450_firmwaresd820wcn3660b_firmwaresm4375msm8909w_firmwaresdx20m_firmwarewcd9360_firmwareqrb5165m_firmwaresdw2500_firmwaresdw2500sa6145p_firmwaresd626sd768gwcn6740_firmwarewcn6856sd626_firmwaresm4125sda429w_firmwaresdx50m_firmwareapq8009w_firmwaresa6155pqca6390sa8150p_firmwaresd480wcd9330wcn7851_firmwaresa8145p_firmwaresw5100wcn6850sa8145psa415mwcn3950msm8608qca6320_firmwareqca6584au_firmwareqcm6490qcn6024qca6174awcd9335wcn3999sd835sd670_firmwarewcn3680b_firmwareqca6595_firmwareqrb5165nqca6421_firmwareqrb5165qca6574au_firmwaresd662qrb5165n_firmwaremdm9250_firmwareqam8295p_firmwareqca6564_firmwaresa8295pqcs610_firmwaremsm8956_firmwareqca6174qcm2290_firmwarewcd9380ar8031qcm4290wcn3680mdm9628_firmwaresd660_firmwaresd730_firmwaresd695qca6174_firmwarewcd9375_firmwaresd888sa6150p_firmwarear8035_firmwarewcn6856_firmwareaqt1000sdx12_firmwarear8035wcn6855_firmwareqsm8250qca6420wcd9360sd780g_firmwarewcn3680_firmwareqcm2290sdx65_firmwaremdm9250qcn9011sa515msd845_firmwaremdm9206sdxr1_firmwaresa515m_firmwaremdm9607_firmwarewcn3990apq8076sd429apq8076_firmwaresd690_5gqca8081_firmwarewsa8835wcn3998ar8031_firmwareapq8056_firmwareqca8337_firmwaremdm9206_firmwareqcs2290qrb5165msd820_firmwarewcd9385sd678qca6574auwcn7850_firmwaresdx65wcd9385_firmwareapq8096auwcn6750_firmwareqcs410_firmwaresd210sd680sd888_5gsd678_firmwareqca9379wcn3999_firmwareqcs6125sm4375_firmwarewcn3991qca6574csra6640_firmwareqca6574_firmwaresa415m_firmwareqca6564asdx20msa8195psd675_firmwareqca6574a_firmwaresda429wsa8155_firmwarewsa8830_firmwaresd888_5g_firmwareqca6320qca8337sd_8_gen1_5g_firmwaresm6250_firmwaresdxr2_5gwcd9341wcn3980_firmwareqcs2290_firmwarewcn6851_firmwarewcd9326sd680_firmwareqca9379_firmwaresa6155p_firmwaresa4150pqca9377_firmwareapq8096au_firmwaresw5100_firmwareqca6584sd780gqca6564au_firmwarecsrb31024qca6426qca6335_firmwaresdx55m_firmwareqcs6125_firmwaresd690_5g_firmwaresm8475sa8155wcn3620sd765qcs605_firmwareqca6564wcd9330_firmwarewcn3988_firmwareqcs4290msm8209_firmwaresa4155psw5100psd845qcs410Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-43542
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.16%
||
7 Day CHG~0.00%
Published-03 Jun, 2024 | 10:05
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in Trusted Execution Environment

Memory corruption while copying a keyblob`s material when the key material`s size is not accurately checked.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qdx1010_firmwareqcm8550_firmwarerobotics_rb3sa6150p_firmwaresd865_5gqcs8155_firmwareqca6595wcd9335wcd9370qca8081_firmwaresnapdragon_670_mobileqca4004qca6696snapdragon_x70_modem-rf_firmwarewcd9340_firmwarewcd9341_firmwarewcd9395_firmwareqcn6024qcc710_firmwareqca6426snapdragon_8\+_gen_1_mobilewcn6740_firmwarefastconnect_6700snapdragon_780g_5g_mobileqca9984_firmwaresnapdragon_685_4g_mobilesa4150psnapdragon_782g_mobile_firmwaresnapdragon_x50_5g_modem-rf_firmwarewsa8832_firmwareqca8337qdu1110qca6426_firmwarewcd9395snapdragon_665_mobile_firmwaresc8180xp-aaab9205_lte_modemqca6574au_firmwareqcn7606_firmwareqca6564_firmwareqam8295pwcd9341snapdragon_wear_1300qca6574auwcd9390snapdragon_888\+_5g_mobile_firmwarewsa8810_firmwarewsa8845h_firmwarecsra6640snapdragon_778g_5g_mobile_firmwaresa9000p_firmwaresc8180xp-acafsnapdragon_850_mobile_computefastconnect_6800_firmwareqcs5430qcn6024_firmwareqcm5430qcm5430_firmwaresa4155psa8770psnapdragon_678_mobile_firmwaressg2115pqcc710snapdragon_xr2_5g_firmwaresa8540pqsm8350_firmwarefastconnect_6900qru1032_firmwarefsm10056_firmwareqfw7114wcd9385_firmwareqca6421qca6310qam8255p_firmwaresa8155_firmwareqca6335snapdragon_x65_5g_modem-rfqcs4490snapdragon_680_4g_mobilewsa8845sa6155pqca6421_firmwaresc8180x-adqca6564au_firmwarewsa8810qam8650pvideo_collaboration_vc5_platform_firmwaresa9000pqdu1000_firmwaresnapdragon_888_5g_mobile_firmwareqca6595ausnapdragon_888_5g_mobilesm7315_firmwareqdu1010snapdragon_662_mobile_firmwaresa6155p_firmwaresnapdragon_685_4g_mobile_firmwarewcd9326_firmwaresnapdragon_845_mobile_firmwarewsa8840qcs8550_firmwaresnapdragon_782g_mobileqdu1210_firmwaresnapdragon_8_gen_2_mobile_firmwaresnapdragon_x55_5g_modem-rfqfw7124_firmwaresnapdragon_4_gen_2_mobile_firmwareqca6436_firmwareqcn9012snapdragon_695_5g_mobile_firmwareqcs4490_firmwaresnapdragon_x55_5g_modem-rf_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewcn3910_firmwaresm4125_firmwaresnapdragon_460_mobilesnapdragon_8_gen_2_mobileqca6420wcn3910wcd9370_firmwareqdu1110_firmwareqdu1000qca6574asnapdragon_8\+_gen_2_mobileqca6174asa8195pwcd9340qcs8250_firmwareqcm2290qdu1210snapdragon_auto_5g_modem-rf_gen_2qca6335_firmwareqcm6490sa8540p_firmwaresm8550p_firmwareqcm8550wcn3988snapdragon_765_5g_mobile_firmwaresnapdragon_662_mobileqcn9024vision_intelligence_300_firmwaresa8775pqca6574sxr2230p_firmwaresd675_firmwaresnapdragon_855_mobile_firmwareqca6430_firmwareqcn9011sa8775p_firmwaresdx57msmart_audio_400qcn9024_firmwarewsa8845hsa6150pwcd9326qcm2290_firmwaresa8155p_firmwareqca6564asa8155psnapdragon_765g_5g_mobile_firmwarewsa8830sm8550psa6145psnapdragon_768g_5g_mobile_firmwaresa8255p_firmwarear8035snapdragon_4_gen_2_mobileqca6564sa6155qrb5165m_firmwareqcm4325qcn6224snapdragon_865\+_5g_mobile_firmwareqca6698aqwcn3950_firmwaressg2125p_firmwareqrb5165nsnapdragon_480\+_5g_mobilefastconnect_6200sd670sm7325p_firmwaresa8145p_firmwaresd460sc8180x-acaf_firmwaresnapdragon_480_5g_mobile_firmwareqcs8155qdx1011sa8150p_firmwarefastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwarewcn3990robotics_rb3_firmwaresnapdragon_x75_5g_modem-rf_firmwaresd670_firmwaresnapdragon_855_mobileqcs6490qcs8250snapdragon_695_5g_mobilesc8180xp-acaf_firmwaresnapdragon_778g_5g_mobilefastconnect_6200_firmwarear8031_firmwarewsa8830_firmwaresnapdragon_460_mobile_firmwareqcn6224_firmwareqca6431wsa8845_firmwarewsa8832snapdragon_480_5g_mobilesdx57m_firmwaresxr2130_firmwaresnapdragon_860_mobile_firmwarear8035_firmwaresc8180xp-aaab_firmwaresnapdragon_778g\+_5g_mobileqrb5165msc8380xpsa4150p_firmwaresd888_firmwarewcd9306qca6564ausc8180xp-adsnapdragon_wear_1300_firmwaresc8280xp-abbbwsa8815_firmwaresa8195p_firmwareqca8337_firmwareqcm4290ar8031sg8275p_firmwareqca9377_firmwareqcm6490_firmwaresnapdragon_665_mobilesm7250p_firmwarewcn3999sm4125qcm4490_firmwareqru1032vision_intelligence_400_firmwarewcn3950flight_rb5_5gsnapdragon_870_5g_mobile_firmwareqca6797aq_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_7c\+_gen_3_computeqca4004_firmwaresnapdragon_778g\+_5g_mobile_firmwaresa8295p_firmwaresmart_audio_400_firmwaresd_675_firmwaresnapdragon_870_5g_mobilesnapdragon_678_mobilesa4155p_firmwareqca9984sm7250psc8180x-acafsa8155sd_8cx_firmwaresc8180x-ad_firmwareqca6584ausd888qcn6274_firmwareqcn9011_firmwareqru1062_firmwarefsm10056sd460_firmwaresnapdragon_675_mobile_firmwaresnapdragon_850_mobile_compute_firmwarewcn6740snapdragon_768g_5g_mobilesc8380xp_firmwaresnapdragon_780g_5g_mobile_firmwareqru1062qca6310_firmwaresnapdragon_845_mobilefastconnect_6800qfw7114_firmwareqcs7230qca6595_firmwarefastconnect_7800_firmwaresnapdragon_675_mobilesnapdragon_865_5g_mobile_firmwarefastconnect_6900_firmwarerobotics_rb5_firmwarewcd9380sa6145p_firmwareqam8255psa6155_firmwaresxr2230psnapdragon_xr2_5gsa8150psnapdragon_x24_lte_modemsc8180x-aaabsxr1230psc8180x-aaab_firmwaresd662_firmwarevideo_collaboration_vc3_platformaqt1000wcd9306_firmwaresnapdragon_4_gen_1_mobile_firmwareqam8295p_firmwaresd855qca6431_firmwarewcn3990_firmware9205_lte_modem_firmwaresm7315qca6698aq_firmwareqcs2290qca6564a_firmwareqcn7606wcd9385qcs2290_firmwaresnapdragon_888\+_5g_mobileqsm8350snapdragon_8_gen_1_mobilewcn3999_firmwaresd662snapdragon_680_4g_mobile_firmwaresa8255pqcs7230_firmwareqcs4290sxr1230p_firmwarewcd9390_firmwaresnapdragon_865\+_5g_mobileqca6430snapdragon_855\+_mobilesg8275psnapdragon_765_5g_mobileqdx1011_firmwaresnapdragon_860_mobilesc8180xp-ad_firmwaresdx55_firmwareflight_rb5_5g_firmwaressg2125pqru1052sxr2130qcm4490snapdragon_x65_5g_modem-rf_firmwarecsra6640_firmwaresnapdragon_480\+_5g_mobile_firmwarerobotics_rb5qca6174a_firmwaresm7325psnapdragon_x50_5g_modem-rfqam8650p_firmwarevideo_collaboration_vc5_platformsnapdragon_670_mobile_firmwareqca6420_firmwareaqt1000_firmwareqcs6490_firmwaresd855_firmwarewcd9335_firmwareqrb5165n_firmwareqca6436snapdragon_x70_modem-rfwcn3980_firmwaresnapdragon_x24_lte_modem_firmwarewsa8835qca6391_firmwarewsa8840_firmwareqcn6274qfw7124qdu1010_firmwareqca6595au_firmwareqca6696_firmwareqcs4290_firmwarewcd9380_firmwareqca6574_firmwarecsra6620qca8081wsa8815sg4150psd_8_gen1_5gqam8775pqca9377snapdragon_ar2_gen_1_firmwareqca6797aqsnapdragon_x75_5g_modem-rfqcm4325_firmwareqca6574a_firmwaresdx55snapdragon_4_gen_1_mobileqcm4290_firmwaresnapdragon_865_5g_mobilesnapdragon_855\+_mobile_firmwaresd675sd_8_gen1_5g_firmwarewcd9375_firmwareqca6391qcn9012_firmwareqcs5430_firmwaresg4150p_firmwareqru1052_firmwaresa8770p_firmwarecsra6620_firmwaresa8295pqcs8550sc8280xp-abbb_firmwarefastconnect_7800qam8775p_firmwaresd865_5g_firmwaresnapdragon_8\+_gen_2_mobile_firmwarewcd9375vision_intelligence_300snapdragon_ar2_gen_1snapdragon_765g_5g_mobilewcn3988_firmwaresa8145psd_675snapdragon_8\+_gen_1_mobile_firmwaresd_8cxvision_intelligence_400ssg2115p_firmwarewsa8835_firmwarewcn3980qca6584au_firmwareqdx1010snapdragon_8_gen_1_mobile_firmwareSnapdragonqam8255p_firmwareqca9377_firmwaresnapdragon_850_mobile_compute_platform_firmwaresnapdragon_662_mobile_platform_firmwaresa6150p_firmwaresa8145p_firmwaresxr2230p_firmwareqcs2290_firmwaresnapdragon_x24_lte_modem_firmwaresg8275p_firmwareqca6431_firmwareflight_rb5_5g_platform_firmwareqcn6224_firmwarewcn3950_firmwaresnapdragon_888_5g_mobile_platform_firmwaresa8150p_firmwareqca6420_firmwareqca6595au_firmwarecsra6620_firmwaresd_675_firmwaresd675_firmwarecsra6640_firmwareqcm5430_firmwaresnapdragon_460_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwareqca6584au_firmwarewcn3990_firmwareqrb5165n_firmwareqca9984_firmwarequalcomm_video_collaboration_vc3_platform_firmwaresd_8cx_firmwarewcd9385_firmwareqcn6024_firmwarewcd9326_firmwaresd_8_gen1_5g_firmwareqsm8350_firmwaresd460_firmwareqam8295p_firmwareqcn9011_firmwaresa9000p_firmwaresm7315_firmwaresnapdragon_695_5g_mobile_platform_firmwareqca6574au_firmwaresdx55_firmwarewcd9375_firmwareqca8081_firmwaresa6155_firmwarewcn3999_firmwaresm7250p_firmwarewsa8845h_firmwareqca6436_firmwaresnapdragon_680_4g_mobile_platform_firmwareqca6564au_firmwaresa6155p_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareqcm8550_firmwaresmart_audio_400_platform_firmwaresa8775p_firmwaresnapdragon_x70_modem-rf_system_firmwareqrb5165m_firmwarewsa8840_firmwaresa4155p_firmwaresa8155_firmwarerobotics_rb3_platform_firmwareqca4004_firmwareqcs8550_firmwaresc8380xp_firmwaresd662_firmwarevision_intelligence_300_platform_firmwarewcn3988_firmwareqru1062_firmwaresa6145p_firmwarewcd9306_firmwarefastconnect_6700_firmwarewsa8810_firmwarefsm10056_firmwaresnapdragon_ar2_gen_1_platform_firmwaresa8255p_firmwarewcd9395_firmwareqdu1000_firmwareqca6698aq_firmwareqca6174a_firmwareqcs4290_firmwaresa8770p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqam8775p_firmwaresnapdragon_wear_1300_platform_firmwaresxr2130_firmwareqca6696_firmwareqcs6490_firmwaresnapdragon_665_mobile_platform_firmwareqru1052_firmwarewcn3910_firmwaresnapdragon_855_mobile_platform_firmwareqcc710_firmwarevision_intelligence_400_platform_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewsa8815_firmwarewsa8835_firmwaresnapdragon_780g_5g_mobile_platform_firmwaresa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwarefastconnect_6800_firmwareqcn7606_firmwaresa8295p_firmwaresg4150p_firmwaresnapdragon_8_gen_2_mobile_platform_firmwaresnapdragon_675_mobile_platform_firmwareqcm2290_firmwarerobotics_rb5_platform_firmwareqca8337_firmwarewcd9380_firmwaresnapdragon_778g_5g_mobile_platform_firmwareqcs7230_firmwareqdu1010_firmwaresnapdragon_670_mobile_platform_firmwaresd670_firmwaresxr1230p_firmwareqdu1110_firmwaresa8540p_firmwaresnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaressg2125p_firmwareqca6310_firmwareqca6430_firmwareqcn9012_firmwareqfw7114_firmwarewcd9335_firmwareqca6335_firmwareqcm4325_firmwareqca6574_firmwarewcd9340_firmwaresm4125_firmwaresm7325p_firmwaresdx57m_firmwareqru1032_firmwaresnapdragon_xr2_5g_platform_firmwarewsa8845_firmwareqca6426_firmwareqca6574a_firmwarefastconnect_6200_firmwarewcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresnapdragon_x50_5g_modem-rf_system_firmwareqca6421_firmware9205_lte_modem_firmwareaqt1000_firmwarewcn6740_firmwareqcm4490_firmwaresnapdragon_845_mobile_platform_firmwareqcn6274_firmwareqcs4490_firmwarear8031_firmwareqcm6490_firmwarewsa8832_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900_firmwareqca6797aq_firmwaresa8155p_firmwareqdx1011_firmwareqca6564a_firmwareqcn9024_firmwareqcs8250_firmwarewcd9341_firmwarefastconnect_7800_firmwareqcm4290_firmwareqdx1010_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareqam8650p_firmwareqca6564_firmwareqca6595_firmwareqcs5430_firmwareqca6391_firmwaresa4150p_firmwarewcd9370_firmwaresm8550p_firmwarequalcomm_video_collaboration_vc5_platform_firmwaresd888_firmwarewcd9390_firmwaressg2115p_firmwareqcs8155_firmwareqfw7124_firmwareqdu1210_firmwarear8035_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-43540
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.12% / 31.79%
||
7 Day CHG~0.00%
Published-04 Mar, 2024 | 10:48
Updated-10 Jan, 2025 | 17:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in Bluetooth HOST

Memory corruption while processing the IOCTL FM HCI WRITE request.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_8c_compute_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_7c_gen_2_computeqca6391_firmwarewcd9380_firmwarewcd9385_firmwarefastconnect_6800_firmwaresnapdragon_8c_computesm6250_firmwarewsa8830fastconnect_7800wsa8845hsnapdragon_8cx_gen_3_firmwaresnapdragon_7c_gen_2_compute_firmwaresnapdragon_8cx_computewsa8840fastconnect_6700qca6420snapdragon_8cx_gen_2_5g_firmwarewcd9385fastconnect_6200wcd9380wsa8815sc8380xpwsa8845snapdragon_7c\+_gen_3_compute_firmwarewsa8810fastconnect_6900_firmwarefastconnect_6800snapdragon_8cx_compute_firmwarewcd9340snapdragon_7c_computewcd9341wsa8845_firmwarefastconnect_6900sc8380xp_firmwareqca6430_firmwarewsa8815_firmwarewsa8830_firmwareqca6391snapdragon_8cx_gen_3wsa8845h_firmwareaqt1000_firmwarefastconnect_7800_firmwarefastconnect_6200_firmwaresm6250snapdragon_7c_compute_firmwarewsa8835_firmwarewsa8835wsa8840_firmwareqca6430aqt1000qca6420_firmwarefastconnect_6700_firmwaresnapdragon_8cx_gen_2_5gwcd9340_firmwarewcd9341_firmwarewsa8810_firmwareSnapdragonfastconnect_7800_firmwarewcd9341_firmwarewsa8845h_firmwarewsa8830_firmwarefastconnect_6200_firmwaresm6250_firmwareqca6420_firmwareqca6430_firmwarewcd9340_firmwarewsa8845_firmwarefastconnect_6800_firmwareqca6391_firmwarewsa8835_firmwaresc8380xp_firmwarefastconnect_6900_firmwarewcd9385_firmwarefastconnect_6700_firmwarewsa8840_firmwarewsa8815_firmwarewcd9380_firmwarewsa8810_firmwareaqt1000_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-43515
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.05% / 14.61%
||
7 Day CHG~0.00%
Published-01 Apr, 2024 | 15:05
Updated-13 Jan, 2025 | 21:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer copy without checking size of input (Classic buffer overflow) in HLOS

Memory corruption in HLOS while running kernel address sanitizers (syzkaller) on tmecom with DEBUG_FS enabled.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wsa8830_firmwarewcd9380fastconnect_6900wsa8835fastconnect_7800snapdragon_8_gen_1_mobilewsa8830fastconnect_7800_firmwarewcd9380_firmwarefastconnect_6900_firmwarewsa8835_firmwaresnapdragon_8_gen_1_mobile_firmwareSnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-43525
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 12.41%
||
7 Day CHG~0.00%
Published-06 May, 2024 | 14:32
Updated-16 Dec, 2025 | 18:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Audio

Memory corruption while copying the sound model data from user to kernel buffer during sound model register.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-Snapdragonsa8255p_firmwaresa8770p_firmwareqam8650p_firmwaresa8775p_firmwarear8035_firmwaresrv1h_firmwaresa9000p_firmwareqca6698aq_firmwaresa8150p_firmwareqfw7114_firmwareqam8255p_firmwareqcn6274_firmwareqca8081_firmwaresa8650p_firmwareqamsrv1m_firmwareqam8295p_firmwaresa6150p_firmwareqam8775p_firmwareqamsrv1h_firmwarefastconnect_7800_firmwareqcn6224_firmwaresa8195p_firmwareqcc710_firmwaresa6155p_firmwaresa6145p_firmwaresrv1m_firmwareqca6574au_firmwaresa8620p_firmwaresa8295p_firmwaresa8145p_firmwareqca6584au_firmwareqfw7124_firmwaresa7255p_firmwareqca6696_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqca8337_firmwaresa8155p_firmwarewcd9340_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-43526
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 12.41%
||
7 Day CHG~0.00%
Published-06 May, 2024 | 14:32
Updated-15 Jan, 2025 | 16:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Audio

Memory corruption while querying module parameters from Listen Sound model client in kernel from user space.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-Snapdragonqam8255p_firmwaresa8620p_firmwaresa6155p_firmwareqca8337_firmwaresa6150p_firmwareqcn6274_firmwaresnapdragon_x72_5g_modem-rf_systemsa8775p_firmwaresa8650p_firmwaresrv1h_firmwareqcn6224_firmwaresa6145p_firmwaresa8155p_firmwaresa7255p_firmwarefastconnect_7800_firmwaresa8255p_firmwareqamsrv1m_firmwaresrv1m_firmwareqam8650p_firmwaresa8770p_firmwareqam8775p_firmwareqca6696_firmwareqfw7114_firmwareqca6391_firmwareqamsrv1h_firmwarewcd9340_firmwareqcc710_firmwareqam8295p_firmwaresa9000p_firmwareqca6574au_firmwaresa8195p_firmwareqca8081_firmwareqfw7124_firmwaresa8295p_firmwarear8035_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-43524
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 12.41%
||
7 Day CHG~0.00%
Published-06 May, 2024 | 14:32
Updated-15 Jan, 2025 | 16:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Audio

Memory corruption when the bandpass filter order received from AHAL is not within the expected range.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-Snapdragonqam8255p_firmwareqca9377_firmwaresa6155p_firmwareqca8337_firmwareqca9367_firmwaresa6150p_firmwareqamsrv1m_firmwareqam8650p_firmwareqcn6274_firmwareqam8775p_firmwareqca6584au_firmwareqca6696_firmwareqfw7114_firmwareqca6391_firmwarefastconnect_6900_firmwareqamsrv1h_firmwareqcc710_firmwareqcn6224_firmwaresa6145p_firmwareqam8295p_firmwareqca6426_firmwareqca6574au_firmwarefastconnect_7800_firmwareqca8081_firmwarefastconnect_6800_firmwareqfw7124_firmwareqca6436_firmwarear8035_firmwareqca6698aq_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-43538
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.06% / 17.16%
||
7 Day CHG~0.00%
Published-03 Jun, 2024 | 10:05
Updated-27 Jan, 2025 | 19:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in TZ Secure OS

Memory corruption in TZ Secure OS while Tunnel Invoke Manager initialization.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qsm8350sg8275p_firmwaresnapdragon_888_5g_mobilesc8280xp-abbb_firmwaresc8180xp-ad_firmwareqdx1010_firmwareqca6421_firmwaresnapdragon_ar2_gen_1sxr2130qca6595au_firmwaresd_8cxqca6564ausnapdragon_865_5g_mobile_firmwaresa9000p_firmwaresa8540psnapdragon_845_mobileqca6564a_firmwareqru1032qca6310_firmwareqcm8550wcn3980_firmwaresc8180xp-aaab_firmwaresnapdragon_xr2_5g_firmwaresd855sa8150p_firmwareqca6595qca9377_firmwareqca6574a_firmwaresnapdragon_765g_5g_mobilesnapdragon_765g_5g_mobile_firmwarewsa8830_firmwareqdu1000_firmwareqam8775p_firmwaresm8550p_firmwarewsa8832_firmwaresc8180x-aaab_firmwaresnapdragon_860_mobile_firmwaresnapdragon_xr2_5gqca6420sa8155qdx1011_firmwaresc8380xp_firmwaresxr2130_firmwareqcn6224qdu1210snapdragon_675_mobile_firmwaresdx55snapdragon_8_gen_1_mobile_firmwaresm7250pwsa8810_firmwaresnapdragon_auto_5g_modem-rf_gen_2wsa8840snapdragon_x24_lte_modemsxr2230p_firmwaresnapdragon_678_mobile_firmwarewsa8810snapdragon_670_mobile_firmwaresnapdragon_850_mobile_compute_firmwarewsa8845h_firmwareqfw7124qam8650psa8150psa8255pqca6574_firmwaresnapdragon_865_5g_mobilesa6155qam8775pqca6564aqca6797aq_firmwaresa6155pssg2125p_firmwaresnapdragon_768g_5g_mobilewcd9395_firmwaresm7250p_firmwaresxr1230p_firmwareqdu1000sa8770p_firmwaresd_675qca9377qca6335snapdragon_8_gen_2_mobilefastconnect_6200_firmwaresnapdragon_8_gen_1_mobilesnapdragon_865\+_5g_mobile_firmwarevision_intelligence_300_firmwareqcn6274_firmwarerobotics_rb3snapdragon_888\+_5g_mobilewcd9341_firmwaresnapdragon_x55_5g_modem-rf_firmwarewcd9340wcd9380_firmwaresc8180xp-acafsdx57msnapdragon_x50_5g_modem-rf_firmwaresa8540p_firmwareqca6430_firmwaresnapdragon_675_mobilesa8770pqca6436_firmwareqru1052_firmwarefastconnect_6800_firmwareqcm8550_firmwaresd_675_firmwaresa9000probotics_rb3_firmwarewcd9390_firmwareqca6584ausa6155p_firmwareqru1052sa8295p_firmwaresnapdragon_845_mobile_firmwaresnapdragon_x75_5g_modem-rfsnapdragon_870_5g_mobile_firmwaresd675snapdragon_870_5g_mobilewcn3990_firmwarewcd9385sd670_firmwareqdx1011snapdragon_8_gen_2_mobile_firmwareqca6421sa8155psnapdragon_x65_5g_modem-rf_firmwarewcd9375wcn3950_firmwareqdu1010_firmwareqca8337qca6335_firmwareqca6574awcn3980sc8180x-aaabsd865_5gsnapdragon_678_mobilesd670qca6574au_firmwarewcd9380qca6426_firmwareqca6584au_firmwaresm8550psxr2230pwcd9385_firmwareqca6174a_firmwareaqt1000ssg2125pqcn6224_firmwarevision_intelligence_400_firmwaresc8180x-adfastconnect_7800fastconnect_6900_firmwarear8035wcd9370sa8155p_firmwaresnapdragon_855\+_mobileqcs8550_firmwaresnapdragon_765_5g_mobilesdx57m_firmwareqdu1110_firmwarefastconnect_6800sd675_firmwaresnapdragon_768g_5g_mobile_firmwarevision_intelligence_300wsa8840_firmwarear8035_firmwareqcs8550qdu1210_firmwareqcn6274snapdragon_8\+_gen_2_mobileqdu1110wcd9390snapdragon_765_5g_mobile_firmwareqru1062_firmwareqfw7124_firmwareqca8081_firmwarewsa8815_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqfw7114_firmwarewsa8815sa8295pqam8650p_firmwaresnapdragon_855_mobile_firmwareqca6174asg8275psnapdragon_860_mobilesa8255p_firmwareqam8295p_firmwaresa8775pqca6595_firmwareqca6420_firmwaresc8280xp-abbbwsa8832vision_intelligence_400sa6155_firmwareqca6310sdx55_firmwaresc8180x-acafqca6574wcd9340_firmwaresc8180xp-adqca6696snapdragon_855\+_mobile_firmwareqca6391snapdragon_855_mobilefastconnect_6200qca8337_firmwarewsa8830qcc710wsa8845hqca6698aqqdu1010wcd9370_firmwaresxr1230psc8180x-acaf_firmwaresa8155_firmwareqca6797aqqfw7114qca6426sd_8_gen1_5g_firmwareqca6431_firmwaressg2115pqru1032_firmwaresc8180xp-acaf_firmwaresd_8_gen1_5gsd855_firmwareqam8255p_firmwaresnapdragon_x50_5g_modem-rfsnapdragon_x55_5g_modem-rfqca6431qdx1010sa8775p_firmwaresnapdragon_670_mobileqca6391_firmwarewsa8835snapdragon_x24_lte_modem_firmwarewsa8835_firmwaresnapdragon_865\+_5g_mobileqca6436qca6696_firmwaresnapdragon_888_5g_mobile_firmwarewcd9326_firmwarewcd9375_firmwarefastconnect_6900qca8081sd_8cx_firmwarewcn3990wcn3950qam8295psc8180xp-aaabqca6698aq_firmwaresnapdragon_850_mobile_computeqam8255pfastconnect_7800_firmwaresc8180x-ad_firmwaresnapdragon_8\+_gen_2_mobile_firmwaresnapdragon_x75_5g_modem-rf_firmwareqca6564au_firmwaresc8380xpqca6430snapdragon_x65_5g_modem-rfwsa8845aqt1000_firmwarewsa8845_firmwareqcc710_firmwarewcd9326wcd9395wcd9341qru1062qsm8350_firmwareqca6574ausnapdragon_ar2_gen_1_firmwareqca6595ausd865_5g_firmwaresnapdragon_888\+_5g_mobile_firmwaressg2115p_firmwareSnapdragonqam8255p_firmwareqca9377_firmwaresnapdragon_850_mobile_compute_platform_firmwareqca8337_firmwarewcd9380_firmwaresxr2230p_firmwaresnapdragon_x24_lte_modem_firmwaresg8275p_firmwareqca6431_firmwareqdu1010_firmwaresnapdragon_670_mobile_platform_firmwarear8035_firmwareqcn6224_firmwaresd670_firmwaresxr1230p_firmwareqdu1110_firmwarewcn3950_firmwaresa8540p_firmwaresnapdragon_888_5g_mobile_platform_firmwaresa8150p_firmwareqca6420_firmwareqca6595au_firmwaressg2125p_firmwaresd_675_firmwaresd675_firmwareqca6584au_firmwarewcn3990_firmwareqca6310_firmwareqca6430_firmwareqfw7114_firmwaresd_8cx_firmwarewcd9385_firmwareqca6335_firmwarewcd9326_firmwareqca6574_firmwaresd_8_gen1_5g_firmwarewcd9340_firmwareqsm8350_firmwaresdx57m_firmwareqru1032_firmwareqam8295p_firmwaresnapdragon_xr2_5g_platform_firmwarewsa8845_firmwareqca6426_firmwaresa9000p_firmwareqca6574a_firmwarefastconnect_6200_firmwareqca6574au_firmwaresdx55_firmwarewcd9375_firmwareqca8081_firmwaresa6155_firmwarewsa8845h_firmwaresm7250p_firmwarewcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwareqca6436_firmwaresnapdragon_x50_5g_modem-rf_system_firmwareqca6421_firmwareaqt1000_firmwareqca6564au_firmwaresa6155p_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareqcm8550_firmwaresnapdragon_845_mobile_platform_firmwareqcn6274_firmwaresa8775p_firmwarewsa8840_firmwarewsa8832_firmwaresnapdragon_x75_5g_modem-rf_system_firmwaresa8155_firmwarefastconnect_6900_firmwarerobotics_rb3_platform_firmwareqcs8550_firmwaresc8380xp_firmwarevision_intelligence_300_platform_firmwareqca6797aq_firmwareqru1062_firmwaresa6145p_firmwaresa8155p_firmwareqdx1011_firmwareqca6564a_firmwarewsa8810_firmwarewcd9341_firmwarefastconnect_7800_firmwaresnapdragon_ar2_gen_1_platform_firmwaresa8255p_firmwarewcd9395_firmwareqdx1010_firmwareqdu1000_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareqca6698aq_firmwareqca6174a_firmwareqam8650p_firmwaresa8770p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqam8775p_firmwaresxr2130_firmwareqca6696_firmwareqca6595_firmwareqca6391_firmwareqru1052_firmwaresnapdragon_855_mobile_platform_firmwarewcd9370_firmwaresm8550p_firmwareqcc710_firmwarevision_intelligence_400_platform_firmwarewcd9390_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewsa8815_firmwarewsa8835_firmwaresnapdragon_865_5g_mobile_platform_firmwaressg2115p_firmwarefastconnect_6800_firmwareqfw7124_firmwaresa8295p_firmwareqdu1210_firmwaresnapdragon_8_gen_2_mobile_platform_firmwaresnapdragon_675_mobile_platform_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2022-25712
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 18.84%
||
7 Day CHG~0.00%
Published-13 Dec, 2022 | 00:00
Updated-22 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory corruption in camera due to buffer copy without checking size of input in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Mobile, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380_firmwarewcd9340_firmwareqca6310qualcomm215_firmwarewsa8835mdm9150_firmwaresdx55msd855_firmwarewcn3998wcn6850_firmwarewsa8810_firmwarewsa8815_firmwarewcn3610_firmwareqca6436qca6426_firmwarewcn3660bwcn3660b_firmwaresd710_firmwareqcs410_firmwaresd205_firmwarewsa8810sdxr1sd210wcd9341_firmwarewsa8830sw5100p_firmwarewsa8815qca6390sda429w_firmwarewcn3680baqt1000_firmwarewsa8835_firmwareqca6430sw5100sd855qca6391wcn3998_firmwarewcd9340wcn6850wcn6851wcn3950wcd9370_firmwaresdxr2_5g_firmwareqca6420_firmwaresda429wqcc5100_firmwaresd210_firmwarewsa8830_firmwarewcn3680b_firmwaresdxr2_5gsd865_5g_firmwarewcd9341wcn3980_firmwarewcn6851_firmwarewcd9326qcs610qcs610_firmwarequalcomm215qca6391_firmwaresd205wcd9326_firmwareqcc5100wcd9380wcn3610qca6335sw5100_firmwareqca6430_firmwaresd865_5gqca6426sd870qca6335_firmwaresdx55m_firmwareaqt1000wcn3990_firmwarewcn3950_firmwarewcn3988mdm9150qca6390_firmwareqca6420wcn3988_firmwareqca6310_firmwaresd710sd870_firmwaresw5100psd845_firmwaresdxr1_firmwareqca6436_firmwaresd845wcd9370qcs410wcn3990wcn3980Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Mobile, Snapdragon Wearables
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2022-25655
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.06% / 18.82%
||
7 Day CHG~0.00%
Published-07 Mar, 2023 | 04:43
Updated-03 Aug, 2024 | 04:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer copy without checking the size of input in WLAN HAL.

Memory corruption in WLAN HAL while arbitrary value is passed in WMI UTF command payload.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaremdm9640_firmwaresm6250p_firmwaresa6150p_firmwareqcs610ipq4028_firmwareqcn5550ar9380ipq8173_firmwarewcd9360_firmwareqca9561_firmwareqcn5124qca4024_firmwaremsm8992_firmwarewcn3950_firmwaresc8180x\+sdx55ipq8078aipq5028_firmwaresa8150p_firmwareqcs2290qca6595au_firmwaresa6155qca6335qcn5064mdm8215sd_455_firmwarecsra6620_firmwareapq8076qcs605_firmwaresd_675_firmwarecsra6640_firmwareqcs6125_firmwareqca9987_firmwaresa415mwcn3998qca6554a_firmwarewcd9371_firmwarewcn3950qcn6024_firmwaresd720gsm4125mdm9206_firmwaresd_8cx_gen2_firmwareipq8076amdm9628wcn3660bsd710_firmwaresd460_firmwareqca4020qca6428qca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwareqca8081_firmwarewcn3998_firmwaresa6155_firmwareqca6420wcd9360sdx20mqca6438_firmwareqca9986sd680_firmwareipq8070_firmwareqca9367_firmwareipq8065ipq8078a_firmwarewcn3999sd_8cx_gen2ipq5028qca7500ipq8072_firmwareipq4029_firmwareqcs6125sa8155_firmwareipq6010sd662_firmwareipq8068qcs405qca6430wcd9340qcn6132sd765gqca1990_firmwaresw5100sd680qca4020_firmwaresa6155pqcs603_firmwaremdm9250_firmwareqca9888_firmwareqcn6122wcd9341ipq8068_firmwareqca6696_firmwarewcd9371sd750gqcn5154_firmwaremdm8215_firmwarewcn3910_firmwaresd_8cxsa8150pqfe1922wsa8830_firmwaremdm9330_firmwareqca9992_firmwaresd660sd855_firmwaresnapdragon_4_gen_1sd712wcn3988qca6438sd660_firmwaresa8195p_firmwareqcn5121qcn5022_firmwareqca9898ipq4028qca4010_firmwarewcn3610mdm9640qca6428_firmwareipq5018_firmwareqca9985_firmwarewcn3991ipq4018_firmwarewcd9380_firmwareipq8072aqca7500_firmwareqca9980_firmwaresw5100pmsm8996au_firmwarewcd9330ipq8076a_firmwareipq8078qca6564ausdx55m_firmwareipq8173qcn5164qca9558msm8976_firmwareqca6574sd670_firmwarecsr8811_firmwarewcd9380qcn5054_firmwareqcs410qcn5024sd690_5g_firmwareipq4019_firmwaresdx50m_firmwareqca9379_firmwareqca9985qcn9012_firmwareqca6174qca6430_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980qca6335_firmwareipq6018_firmwareqcm4325_firmwareqcs605wcd9340_firmwarewsa8815sd7cwcn3910qca6320qca6584_firmwaremdm9650_firmwareqca9986_firmwaremdm9215_firmwarewcn3660b_firmwaresd695ipq6028ipq8064sd835qca9984qcn9024qca1990wcn3980_firmwaresd730qcn5550_firmwarewcd9330_firmwaresdx55mipq8064_firmwareqcc5100_firmwareqcn5064_firmwaresd678_firmwarear8031_firmwareipq8078_firmwareqcn5054qcs603ipq8070qca9994qca6164_firmwareqca9887_firmwareqca9980sd670qcn9024_firmwareipq8174_firmwaresd_636_firmwareqca6564a_firmwareqca9880qcm4290_firmwaresd480qcn5121_firmwaresw5100p_firmwareqcs610_firmwareapq8084_firmwaresa6145pipq6018qca9886_firmwaresd695_firmwaresdxr1ar8031apq8096auqca6595_firmwareqcs405_firmwaresa8145pqca6164sdm630_firmwaresd820_firmwareqca6391_firmwareqca4024wcd9370_firmwaresdx55qcn5021_firmwaresa8155pcsra6640sd675qca9531_firmwareqca9379qcm2290qcn5024_firmwarewcn3991_firmwarewsa8830sd678qca9561qcn9070sa8145p_firmwareqcs2290_firmwaresd7c_firmwarecsrb31024mdm9628_firmwaresnapdragon_4_gen_1_firmwaremdm9650sd_636csra6620qca9987qcn9072qca9880_firmwareqca9992qcs4290mdm9250sd765g_firmwareqca6420_firmwareipq8069_firmwareapq8009_firmwareqca6390_firmwaresd690_5gipq6000qca6174_firmwaremdm9310_firmwaresd730_firmwaresd675_firmwarewcd9370ipq8072qcn5152_firmwareqca6564qca6584au_firmwarewcn3990_firmwareapq8076_firmwareqcn9000_firmwareqca9984_firmwareqca9377ipq5018sd_8cx_firmwarewcd9385_firmwarewcd9326_firmwarewcn3615_firmwareipq8074asd662qcn5124_firmwareqca9982qfe1952_firmwareapq8094sa8155qca6320_firmwareqca6584wcn3680b_firmwareqcn5122_firmwaresdx55_firmwarewcn3615qcn6023_firmwareqca6595auwcn3999_firmwaresm7250p_firmwarewcn3610_firmwareipq5010qca6564au_firmwareqca6584ausa6155p_firmwareqfe1952qca6310ipq8174sa515m_firmwareqca9990qcn5052qca9367mdm9235m_firmwareapq8092apq8084sdm630mdm9607_firmwaresa415m_firmwarewcn3988_firmwaremsm8994_firmwareqcn9074sa6145p_firmwaremsm8992sm6250sd712_firmwaresa8195papq8017_firmwarewsa8810_firmwaresd765_firmwarewcd9326wcd9335qca4010sg4150pqca8081qca9982_firmwareqcn6023ipq8071aqca6174a_firmwareipq8071a_firmwareqcs4290_firmwarewcd9385qca6390qca9898_firmwaresd750g_firmwareaqt1000msm8976wcd9375sc8180x\+sdx55_firmwaresm6250_firmwarecsr8811ipq4019qcn9100_firmwaremsm8994apq8092_firmwareipq5010_firmwareipq8074a_firmwarewsa8815_firmwaresd820wsa8835_firmwareapq8017qca6564amdm9235msg4150p_firmwareqcm6125_firmwareqcm4325qca9882qcm2290_firmwaremdm9635m_firmwarewcn3990qcn9000sd_675qca6554aqca6595ar9380_firmwareqcc5100qcn9012qca9558_firmwareqcn6122_firmwareipq8065_firmwarewsa8835msm8996ausd665_firmwaresm6250pqcn5154qca8075_firmwareipq4018qca6574aipq6005_firmwaremdm9206qca9889qca6174aqcn6132_firmwareqca9888qca6310_firmwareipq8074apq8094_firmwareqca9994_firmwaremdm9635mipq8070a_firmwaremdm9615ipq8076_firmwaresa515mqca6574_firmwareqca9886sd855sm4125_firmwaresd665ipq8076qfe1922_firmwareqca6175asd765qca9887qca6574a_firmwareqcn5021ipq8069qcn5152sd768g_firmwaresd850_firmwareapq8009sd460qca6391sdxr1_firmwaremdm9310ipq6005aqt1000_firmwareqcn9100qcm4290csrb31024_firmwaresdx50mqca9882_firmwareqcn9070_firmwaresd480_firmwareipq6028_firmwareipq8072a_firmwaremdm9215sd_455qca9531ipq8074_firmwareqca6574auqca9889_firmwaresd710mdm9607qcn5122sa8155p_firmwarewcd9341_firmwaresdx20m_firmwareqcm6125wsa8810qcn5022wcn3680bsd835_firmwareqca6564_firmwaresd768gipq6010_firmwareqca6696sd845_firmwaresa6150pqca8075qcn9022_firmwareapq8096au_firmwareqcn6024qcn9022sd845mdm9615_firmwareqca9990_firmwareipq8070aqcn9072_firmwaresm7250pipq6000_firmwaresd720g_firmwareipq8071_firmwareqcn9074_firmwareqcs410_firmwaresw5100_firmwaremdm9330ipq4029qca6175a_firmwaresd850Snapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2022-22082
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.04% / 12.27%
||
7 Day CHG~0.00%
Published-14 Jun, 2022 | 09:40
Updated-03 Aug, 2024 | 03:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory corruption due to possible buffer overflow while parsing DSF header with corrupted channel count in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresm6250p_firmwareqcs610sdx65wcn3950_firmwareqcs2290qca6595au_firmwaresa6155qca6335msm8917csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwaresd632wcn3998wcd9371_firmwarewcn3950sm4125mdm9628sd720gmdm9206_firmwaresd_8_gen1_5g_firmwarewcn3660bsd450_firmwaresd710_firmwaresd460_firmwareqca4020sm7315_firmwarewcn7850qca6574au_firmwarewcd9375_firmwarewcn3998_firmwaresa6155_firmwaremsm8909wapq8009w_firmwareqca6420apq8053_firmwaresm7450_firmwaresd680_firmwareqca9367_firmwarewcn3999sa8155_firmwaresd662_firmwareqcs405qca6430wcd9340qualcomm215_firmwaresd765gsw5100qca4020_firmwareqca6436sd680sa6155pwcn6851qcs603_firmwarewcn7851_firmwaremsm8937mdm9250_firmwarewcn3660_firmwarewcd9341pm8937_firmwareqca6696_firmwarewcd9371sd750gsd870_firmwarewcn3910_firmwarewsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwarewcn3988sd660_firmwarewcn7850_firmwaresa8195p_firmwaresm8475wcn6750_firmwaresd450wcn3610wcn3991wcd9380_firmwaresdm429wmsm8996au_firmwaresw5100pwcd9330qca6564ausdx55m_firmwarewcn6856_firmwaresd670_firmwareqca6574sd632_firmwarewcd9380qualcomm215qcs410sd690_5g_firmwaresdx50m_firmwareqca9379_firmwareqca6430_firmwarewcd9335_firmwarewcn3980sd439_firmwareqca6335_firmwareqcs605wcd9340_firmwarewsa8815wcn6850wcn3910qca6320msm8937_firmwaremdm9650_firmwareqca6426_firmwarewcn3660b_firmwarewcn3680sd835wcn3980_firmwaresd730wcd9330_firmwaresdx55msm8475_firmwarewcn6740_firmwaremsm8953sd678_firmwarear8031_firmwarewcn3680_firmwarewcn6851_firmwareqcs603sd_636_firmwaresd670qca6564a_firmwareapq8009wqcm4290_firmwaresd480sd870wcn6855wsa8832sw5100p_firmwareqcs610_firmwaresa6145psdxr1apq8096auar8031qcs405_firmwaresdm630_firmwaresd820_firmwareqca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55sd888_firmwareapq8053sa8155pcsra6640sd675sd439wcn3660sm8475p_firmwareqca9379qcm2290wcn3991_firmwarewsa8830sd678qcs2290_firmwaremdm9628_firmwaremdm9650sd_636csra6620qcs4290mdm9250sd765g_firmwareqca6420_firmwareqca6390_firmwareapq8009_firmwaresd690_5gsd730_firmwarewcd9370sd675_firmwareqca6564qca6426wcn3990_firmwareqca9377sdw2500_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwarewcn3615_firmwaresd662sa8155qca6320_firmwarewcn3680b_firmwaresdx55_firmwareqca6595auwcn3615wcn3999_firmwaresm7250p_firmwarewcn3610_firmwareqca6436_firmwareqca6564au_firmwaresd778gsa6155p_firmwareqca6310pm8937wcn7851qcs6490sd429sdxr2_5gqca9367sdm630mdm9607_firmwarewcn3988_firmwaresa6145p_firmwaresd429_firmwaresm6250sd778g_firmwaresa8195papq8017_firmwarewsa8810_firmwaresd765_firmwarewcd9326wcd9335qca6174a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwareqca6390wcd9375sd750g_firmwareaqt1000sm6250_firmwaremsm8953_firmwaremsm8917_firmwarewcn3620_firmwaresd820qcm6490sd888_5g_firmwarewsa8835_firmwaresdx20_firmwarewcn3620wcn6850_firmwarewsa8815_firmwaresm7450apq8017qca6564aqcm2290_firmwarewcn3990sd_675sd780gsd865_5gsd888msm8909w_firmwarewsa8835msm8996ausdm429w_firmwaresd888_5gsm6250pqca6574amdm9206wcn6855_firmwareqca6174asm7325pqca6310_firmwarewcn6750qca6574_firmwaresd855sm4125_firmwaresm7325p_firmwaresd765qca6574a_firmwaresd768g_firmwaresm7315apq8009qca6391sd460sdxr1_firmwareaqt1000_firmwaresdx65_firmwaremdm9626qcm4290qcm6490_firmwaresdx50mwsa8832_firmwaresdx20sd480_firmwaremdm9626_firmwareqca6574ausa8155p_firmwaresd710mdm9607wcd9341_firmwarewsa8810wcn6856wcn3680bsd835_firmwareqca6564_firmwaresd768gwcn6740qca6696sd845_firmwaresdw2500apq8096au_firmwaresd845sm7250psd720g_firmwaresw5100_firmwareqcs410_firmwaresm8475pSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-47341
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 5.16%
||
7 Day CHG+0.01%
Published-09 Oct, 2025 | 03:18
Updated-05 Nov, 2025 | 18:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in Camera

memory corruption while processing an image encoding completion event.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcc2072x2000094_firmwareqcs6490wcd9375video_collaboration_vc3_platformwcd9380_firmwarex2000090x2000086_firmwaresc8380xp_firmwareqcs5430x2000090_firmwarewsa8845snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwarewcd9385x2000077_firmwarewsa8835_firmwarefastconnect_7800sc8380xpfastconnect_7800_firmwarewsa8835wcd9370xg101039fastconnect_6900qcc2072_firmwareqcm6490_firmwaresnapdragon_7c\+_gen_3_computex2000086wsa8845hx2000092snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwarexg101039_firmwarexg101002fastconnect_6700snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)snapdragon_7c\+_gen_3_compute_firmwareqcs5430_firmwareqcm6490wsa8830wsa8840wsa8845_firmwarewcd9370_firmwarewsa8840_firmwarewcd9378cxg101032wcd9385_firmwarewcd9378c_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)video_collaboration_vc3_platform_firmwarex2000077wsa8830_firmwarex2000094fastconnect_6900_firmwarexg101032_firmwarefastconnect_6700_firmwareqcm5430_firmwareqcm5430wcd9375_firmwarex2000092_firmwarexg101002_firmwareqcs6490_firmwarewcd9380wsa8845h_firmwareSnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-47399
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.28%
||
7 Day CHG-0.00%
Published-02 Feb, 2026 | 15:20
Updated-11 Feb, 2026 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in Camera

Memory Corruption while processing IOCTL call to update sensor property settings with invalid input parameters.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800x2000090x2000077wcd9378cwsa8840x2000086_firmwarecolognexg101002_firmwarewsa8845wsa8845hx2000077_firmwarexg101032_firmwarewsa8845_firmwarex2000094x2000090_firmwarewsa8840_firmwarecologne_firmwarex2000092xg101002xg101039x2000092_firmwarex2000086fastconnect_7800_firmwarex2000094_firmwarewcd9378c_firmwarewsa8845h_firmwarexg101032xg101039_firmwareSnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-47394
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.48%
||
7 Day CHG~0.00%
Published-06 Jan, 2026 | 22:48
Updated-27 Jan, 2026 | 19:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in DSP Service

Memory corruption when copying overlapping buffers during memory operations due to incorrect offset calculations.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9375_firmwaresm8735_firmwarewcn3988_firmwaresm7435_firmwaresnapdragon_w5\+_gen_1_wearable_platformsw5100fastconnect_6200sw5100_firmwaresm8735sxr2350pwcd9375sw5100pwcn7860_firmwaresnapdragon_4_gen_2_mobile_platform_firmwarewcn7861wcn3980_firmwaresnapdragon_4_gen_2_mobile_platformfastconnect_6900sm8750pwcn7880wsa8832video_collaboration_vc1_platform_firmwarewcd9370sg6150wcn6755fastconnect_7800wsa8832_firmwarewcn3980wsa8845_firmwarevideo_collaboration_vc1_platformvideo_collaboration_vc3_platform_firmwarewsa8840sm8750_firmwarewcn7750sg6150_firmwaresm7435snapdragon_6_gen_1_mobile_platform_firmwarewsa8830wcd9395_firmwarewcn7881_firmwareqmp1000wcd9385sm8750qcs610_firmwarewsa8810_firmwaresm6475fastconnect_7800_firmwarewsa8830_firmwareqcs610qmp1000_firmwaresm8750p_firmwarewsa8840_firmwarewsa8815_firmwarewsa8835wcn7860wcn7880_firmwaresxr2330psg6150p_firmwarewcd9385_firmwaresw5100p_firmwarewsa8835_firmwaresnapdragon_6_gen_1_mobile_platformwcn7881wcd9380_firmwarewcn3988sxr2330p_firmwarevideo_collaboration_vc3_platformsg6150pfastconnect_6200_firmwarewsa8815wcd9378_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwarewcd9370_firmwarewsa8810wcn6755_firmwarewsa8845sm6475_firmwarewsa8845hwsa8845h_firmwarewcd9395wcd9378sxr2350p_firmwarewcn3950_firmwarewcn7750_firmwarewcd9380wcn3950fastconnect_6700_firmwarefastconnect_6700wcn7861_firmwarefastconnect_6900_firmwareSnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-47321
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.48%
||
7 Day CHG~0.00%
Published-18 Dec, 2025 | 05:29
Updated-27 Jan, 2026 | 19:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in Core Services

Memory corruption while copying packets received from unix clients.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9375_firmwaresm8735_firmwareqcm5430wcn3988_firmwaresa7255p_firmwaresw5100qca6595au_firmwareqam8255pwcd9375qcm6125_firmwareqca6574wcn7860_firmwaresnapdragon_4_gen_2_mobile_platform_firmwarewcn7861qca6574au_firmwaresm7635psa8650p_firmwareqca8081qam8775p_firmwaresm6650_firmwarewcn7880qca2066_firmwareqca6174asa4155psa6155p_firmwaresnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)snapdragon_765g_5g_mobile_platform_\(sm7250-ab\)smart_audio_400_platformwcn3980wsa8845_firmwareqca6391_firmwarevideo_collaboration_vc3_platform_firmwaresmart_audio_400_platform_firmwareqamsrv1msnapdragon_ar1_gen_1_platform_\"luna1\"_firmwareqamsrv1h_firmwaresxr2250p_firmwarewcn7750qcn9011qcs8550_firmwaresnapdragon_680_4g_mobile_platformqca6574awcd9395_firmwarewcn7881_firmwaresm8750sa9000pqam8255p_firmwaresa8195p_firmwarewsa8810_firmwaresdx61_firmwareqcn9012_firmwareqca8081_firmwareqca6174a_firmwareqca6595ausrv1h_firmwaresxr1230pqca6696_firmwarerobotics_rb2_platform_firmwaresa8155p_firmwaresm6650psm8750p_firmwaresnapdragon_765_5g_mobile_platform_\(sm7250-aa\)_firmwaresnapdragon_x35_5g_modem-rf_systemsnapdragon_ar1_gen_1_platform_firmwarewcn7860qcs5430ssg2115psa7775psw5100p_firmwareqcm8550snapdragon_685_4g_mobile_platform_\(sm6225-ad\)snapdragon_6_gen_1_mobile_platformssg2115p_firmwareqcm5430_firmwarewsa8835_firmwarewcn7881snapdragon_x65_5g_modem-rf_system_firmwaresa8775pqcn6024sm6650p_firmwareqcm8550_firmwarefastconnect_6200_firmwaresrv1mwcd9335qam8650pqca6574_firmwareqcn9011_firmwareqam8650p_firmwarewsa8810ssg2125pqca6574auwcn6755_firmwareqca6574a_firmwaresxr1230p_firmwarecsra6620wsa8845hsm7250p_firmwareqam8775pssg2125p_firmwareqca8337_firmwaresm7635_firmwarewcn3950_firmwarewcn7750_firmwareqcs6125wcn3950sm6650sm7635p_firmwaresxr2250pfastconnect_6700_firmwareqcm6125sa8650pfastconnect_6900_firmwareqcn6024_firmwareqcs6125_firmwaresxr2230p_firmwareqcn9012srv1m_firmwaresa4150p_firmwarewcn6740_firmwarewcn6650qcm6490_firmwarear8031_firmwaresm7435_firmwaresnapdragon_w5\+_gen_1_wearable_platformwcd9340_firmwarefastconnect_6200sw5100_firmwaresrv1hsm8735robotics_rb2_platformsw5100psm7635snapdragon_765_5g_mobile_platform_\(sm7250-aa\)sa4150pwcn6650_firmwaresnapdragon_680_4g_mobile_platform_firmwarewcn3980_firmwareqcs8550snapdragon_4_gen_2_mobile_platformfastconnect_6900sa8155pqep8111sm8750pqep8111_firmwarewcn6740wsa8832video_collaboration_vc1_platform_firmwaresa8775p_firmwarewcd9370wcn6755fastconnect_7800wsa8832_firmwaresm7250pvideo_collaboration_vc1_platformqamsrv1hqca6391sa8255pwsa8840sa7255psm8750_firmwaresa6155psnapdragon_x32_5g_modem-rf_system_firmwaresnapdragon_x65_5g_modem-rf_systemqcn9024sm7435ar8035snapdragon_6_gen_1_mobile_platform_firmwarewsa8830qmp1000wcd9385snapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmwareqcs5430_firmwaresnapdragon_ar2_gen_1_platform_firmwaresnapdragon_ar2_gen_1_platformsnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)_firmwarewcd9340sa8770p_firmwaresm6475fastconnect_7800_firmwareqcs6490qcn9024_firmwaresdx61qca2066snapdragon_ar1_gen_1_platformsnapdragon_x35_5g_modem-rf_system_firmwarewsa8830_firmwareqamsrv1m_firmwaresa9000p_firmwareqmp1000_firmwarear8031wcd9335_firmwarewsa8815_firmwarewsa8835wsa8840_firmwarewcn7880_firmwarewcd9385_firmwareqca8337sa8620psxr2230pqca6696wcd9380_firmwarecsra6620_firmwarewcn3988video_collaboration_vc3_platformqcm6490snapdragon_765g_5g_mobile_platform_\(sm7250-ab\)_firmwareqcs6490_firmwarewsa8815wcd9378_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwarewcd9370_firmwaresa8195par8035_firmwarewsa8845sa8620p_firmwaresm6475_firmwaresnapdragon_x32_5g_modem-rf_systemwsa8845h_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"wcd9395wcd9378sa8770pwcd9380sa7775p_firmwaresa8255p_firmwarefastconnect_6700wcn7861_firmwaresa4155p_firmwarecsra6640csra6640_firmwareSnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-27052
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.03%
||
7 Day CHG~0.00%
Published-08 Jul, 2025 | 12:49
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in Core Services

Memory corruption while processing data packets in diag received from Unix clients.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sw5100pqcm8550_firmwarewcn6650sm8735qca6595wcd9335wcd9370qca8081_firmwareqca6696qam8620p_firmwarewcn7880_firmwarewcd9340_firmwarewcd9341_firmwaresxr2330p_firmwarewcd9395_firmwarewcn7881_firmwarewcn7750wcn6450qcc710_firmwarefastconnect_6700snapdragon_685_4g_mobilesa4150pwsa8832_firmwareqca8337wcd9395qca6574au_firmwaresnapdragon_x72_5g_modem-rfqam8295pwcd9341qca6574auwcd9390sa8620p_firmwarewsa8810_firmwarewsa8845h_firmwaresa9000p_firmwaresrv1hsm8650q_firmwarewcn3660b_firmwareqcs9100qcs5430wcn7860qcm5430qcm5430_firmwarevideo_collaboration_vc1_platform_firmwaresa4155psa8770pqcm6125_firmwareqcc710snapdragon_x32_5g_modem-rf_firmwarefastconnect_6900snapdragon_w5\+_gen_1_wearable_firmwarevideo_collaboration_vc1_platformqep8111sm8635sa7255pqfw7114wcd9385_firmwareqam8255p_firmwaresnapdragon_680_4g_mobilewsa8845sa6155pqcm6125qca6564au_firmwarewsa8810qam8650pvideo_collaboration_vc5_platform_firmwaresa9000psrv1h_firmwareqca6595ausxr2250p_firmwaresnapdragon_662_mobile_firmwaresnapdragon_685_4g_mobile_firmwaresa6155p_firmwarewsa8840snapdragon_ar1_gen_1srv1m_firmwaresnapdragon_x35_5g_modem-rf_firmwareqcs8550_firmwareqca6698ausnapdragon_8_gen_2_mobile_firmwareqfw7124_firmwaresm8750pqcn9012snapdragon_695_5g_mobile_firmwarewcn3910_firmwaresm8635psnapdragon_460_mobilesnapdragon_8_gen_2_mobileqmp1000wcn3910wcd9370_firmwareqca9367wcn3660bsnapdragon_x72_5g_modem-rf_firmwaresm7635p_firmwareqca6574asa7255p_firmwaresnapdragon_8\+_gen_2_mobileqca6174asa8195pwcd9340qcs8250_firmwareqcm2290snapdragon_auto_5g_modem-rf_gen_2qcm6490sm8550p_firmwaresxr2250pqcm8550wcn3988snapdragon_662_mobileqcn9274sa8775pqca6574sxr2230p_firmwareqca6698au_firmwareqcn9011sa8775p_firmwareqamsrv1hwsa8845hsm8650qqcm2290_firmwaresa8155p_firmwareqca6564asa8155pwsa8830sm8550psm7675_firmwaresa8255p_firmwarear8035sm7635_firmwareqamsrv1m_firmwarewcn7750_firmwaresa8650p_firmwaresm7635pwcn6450_firmwareqcm4325srv1l_firmwareqcs9100_firmwareqcn6224qcs615qca6698aqwcn3950_firmwaresa7775p_firmwaresm7635qrb5165nsnapdragon_480\+_5g_mobilefastconnect_6200wcn3680bwcd9378snapdragon_480_5g_mobile_firmwaresm8635p_firmwaresm6650p_firmwarefastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwarewcn3990snapdragon_x75_5g_modem-rf_firmwaresnapdragon_8_gen_3_mobileqcs6490snapdragon_695_5g_mobileqcs8250fastconnect_6200_firmwarewsa8830_firmwaresnapdragon_460_mobile_firmwareqcn6224_firmwareqca6678aq_firmwarewsa8845_firmwarewsa8832wcd9378_firmwaresnapdragon_480_5g_mobilesrv1lsm7675psrv1mqca6678aqsnapdragon_x35_5g_modem-rfar8035_firmwarewcn7860_firmwaresa4150p_firmwareqca6564auqcs6125_firmwaresm4635wsa8815_firmwaresa8195p_firmwareqca8337_firmwaresg8275p_firmwareqca9377_firmwareqcm6490_firmwaresm4635_firmwarevision_intelligence_400_firmwarewcn3950qcs6125flight_rb5_5gsm8750snapdragon_auto_5g_modem-rf_gen_2_firmwareqca6797aq_firmwaresa8295p_firmwaresa4155p_firmwareqca6584auqcn6274_firmwarewcn6755_firmwareqcn9011_firmwaresw5100_firmwarewcn6650_firmwaresnapdragon_8_gen_3_mobile_firmwareqfw7114_firmwareqcs7230qca6595_firmwarefastconnect_7800_firmwaresm8635_firmwarefastconnect_6900_firmwarerobotics_rb5_firmwarewcd9380qam8255psxr2230pqmp1000_firmwarewcn7880sxr2330pwcn6755wcn7881sm6650sw5100video_collaboration_vc3_platformsnapdragon_4_gen_1_mobile_firmwaresm6650pqca6688aqqam8295p_firmwarewcn3990_firmwareqca6698aq_firmwareqcs2290qca6564a_firmwarewcd9385qcs2290_firmwaresnapdragon_8_gen_1_mobileqca9367_firmwaresnapdragon_680_4g_mobile_firmwaresa8255pqcs7230_firmwarewcd9390_firmwareqep8111_firmwareqcs615_firmwaresg8275psm8750_firmwareflight_rb5_5g_firmwaresnapdragon_480\+_5g_mobile_firmwareqamsrv1mrobotics_rb5qca6174a_firmwarewcn7861_firmwarewcn7861qam8650p_firmwarevideo_collaboration_vc5_platformqcs6490_firmwaresm6650_firmwarewcd9335_firmwareqam8620pqrb5165n_firmwarewcn3980_firmwareqca6584au_firmwareqcn6274wsa8835wsa8840_firmwareqca6391_firmwareqfw7124qca6595au_firmwareqcs8300_firmwaresw5100p_firmwareqca6696_firmwareqcs8300wcd9380_firmwareqca6574_firmwarewsa8815qca8081sg4150pmdm9628qam8775pqca9377qca6797aqmdm9628_firmwaresnapdragon_x75_5g_modem-rfqcm4325_firmwaresa8620psnapdragon_4_gen_1_mobileqca6574a_firmwarewcd9375_firmwaresa7775pqca6391snapdragon_ar1_gen_1_firmwareqcn9274_firmwareqcn9012_firmwareqcs5430_firmwaresnapdragon_x32_5g_modem-rfsg4150p_firmwaresa8770p_firmwaresa8295pqcs8550sm8735_firmwarefastconnect_7800sa8650pqam8775p_firmwaresm8750p_firmwarewcd9375snapdragon_8\+_gen_2_mobile_firmwareqca6688aq_firmwarewcn3988_firmwareqamsrv1h_firmwaresm7675vision_intelligence_400wsa8835_firmwarewcn3980sm7675p_firmwarewcn3680b_firmwaresnapdragon_w5\+_gen_1_wearablesnapdragon_8_gen_1_mobile_firmwareSnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-27043
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.03%
||
7 Day CHG~0.00%
Published-08 Jul, 2025 | 12:49
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in Video

Memory corruption while processing manipulated payload in video firmware.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qdx1010_firmwaresw5100pwcn6650qcm8550_firmwaresd865_5gqcs410_firmwaresa6150p_firmwaresm8735qca6595wcd9335qcs610_firmwarewcd9370qca8081_firmwareqcn5224qca6696qam8620p_firmwarewcn7880_firmwarewcd9340_firmwarewcd9341_firmwaresxr2330p_firmwarewcd9395_firmwarewcn7881_firmwareqcn6024wcn7750wcn6450qcc710_firmwareipq8076fastconnect_6700snapdragon_685_4g_mobileqcn6023sa4150pqcn5124_firmwarewsa8832_firmwareqca8337qdu1110wcd9395qca6574au_firmwareipq8078asnapdragon_x72_5g_modem-rfipq8078a_firmwaresm6370qam8295pwcd9341qca6574auwcd9390snapdragon_888\+_5g_mobile_firmwaresa8620p_firmwarewsa8810_firmwarewsa8845h_firmwaresa9000p_firmwaresrv1hsm8650q_firmwareqcs9100qcs5430wcn7860qcn6024_firmwareqcm5430qcm5430_firmwarevideo_collaboration_vc1_platform_firmwaresa4155psa8770pqcm6125_firmwareqcc710snapdragon_x32_5g_modem-rf_firmwaresnapdragon_xr2_5g_firmwareqca8101fastconnect_6900snapdragon_w5\+_gen_1_wearable_firmwarevideo_collaboration_vc1_platformimmersive_home_326_firmwareqru1032_firmwareqep8111sm8635sa7255pqfw7114wcd9385_firmwareqam8255p_firmwareipq8074a_firmwareipq8076aqcn5164snapdragon_680_4g_mobilewsa8845sa6155pqcm6125csr8811_firmwarewsa8810qam8650pvideo_collaboration_vc5_platform_firmwaresa9000pqdu1000_firmwaresrv1h_firmwareqca8085snapdragon_888_5g_mobile_firmwareqca6595ausnapdragon_888_5g_mobileqdu1010snapdragon_662_mobile_firmwaresnapdragon_685_4g_mobile_firmwaresa6155p_firmwarewsa8840snapdragon_ar1_gen_1snapdragon_x35_5g_modem-rf_firmwareqcs8550_firmwareqca6698auqdu1210_firmwaresnapdragon_8_gen_2_mobile_firmwareqfw7124_firmwaresm8750pqcn9012ipq8070a_firmwaresnapdragon_695_5g_mobile_firmwareqcn9070qcf8001wcn3910_firmwareqca8384qca8084sm8635psnapdragon_460_mobilesnapdragon_8_gen_2_mobileqmp1000wcn3910wcd9370_firmwareqca9367qdu1110_firmwareqdu1000sa7255p_firmwareqca6574asm7635p_firmwaresnapdragon_x72_5g_modem-rf_firmwaresnapdragon_8\+_gen_2_mobileqca6174asa8195pwcd9340qcs8250_firmwareqcm2290qdu1210snapdragon_auto_5g_modem-rf_gen_2qcm6490qcn5154_firmwaresm8550p_firmwarewcn3988qcm8550sm6370_firmwaresnapdragon_662_mobileqcn9274ipq8076a_firmwareqca8384_firmwareqca6574sa8775pqca6698au_firmwareqcn9011sa8775p_firmwareqamsrv1hwsa8845hqca8082sa6150psm8650qqcm2290_firmwareqcs410sa8155p_firmwaresa8155pwsa8830sm8550psa6145pqcn9074_firmwareipq8174sm7675_firmwaresa8255p_firmwareipq8174_firmwarear8035ipq8072asm7635_firmwareqamsrv1m_firmwarewcn7750_firmwaresa8650p_firmwaresm7635pwcn6450_firmwareqcm4325srv1l_firmwareqcs9100_firmwareqcn6224ipq8071aqcs615qca6698aqwcn3950_firmwaresa7775p_firmwaresm7635qrb5165nsnapdragon_480\+_5g_mobilefastconnect_6200sa8145p_firmwarewcd9378snapdragon_480_5g_mobile_firmwaresnapdragon_660_mobile_firmwaresm8635p_firmwaresm6650p_firmwareqdx1011sa8150p_firmwarefastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwarewcn3990qcn6023_firmwareqcn5164_firmwaresnapdragon_x75_5g_modem-rf_firmwareipq8078snapdragon_8_gen_3_mobileqcs6490snapdragon_695_5g_mobileqcs8250fastconnect_6200_firmwareqcn9072wsa8830_firmwaresnapdragon_460_mobile_firmwareqcn6224_firmwareqca6678aq_firmwarewsa8845_firmwaresd660_firmwareqca8386_firmwarewsa8832qca8082_firmwarewcd9378_firmwaresnapdragon_480_5g_mobilesrv1lsm7675pqca6678aqsnapdragon_x35_5g_modem-rfar8035_firmwarewcn7860_firmwaresa4150p_firmwareqca4024_firmwareqcs6125_firmwaresm4635qcn9074wsa8815_firmwaresa8195p_firmwareqca8337_firmwareqca9888snapdragon_xr2\+_gen_1qca9377_firmwareipq8173qcm6490_firmwareipq8072a_firmwaresm4635_firmwareqru1032wcn3950qcs6125flight_rb5_5gsm8750qca8385snapdragon_auto_5g_modem-rf_gen_2_firmwareqca6797aq_firmwareqca8085_firmwareqcf8001_firmwareqcn9070_firmwaresa8295p_firmwaresa4155p_firmwareqca8101_firmwareqca6584auqcn6274_firmwarewcn6755_firmwareqcn9011_firmwareqru1062_firmwaresw5100_firmwarewcn6650_firmwareqru1062ipq5424snapdragon_8_gen_3_mobile_firmwareqcn5224_firmwareqfw7114_firmwareqca4024qcs7230qca6595_firmwarefastconnect_7800_firmwaresm8635_firmwareipq8070afastconnect_6900_firmwarerobotics_rb5_firmwarewcd9380sa6145p_firmwareqam8255pqca8080qmp1000_firmwaresnapdragon_xr2_5gwcn7880sa8150psxr2330pwcn6755immersive_home_3210snapdragon_auto_5g_modem-rf_firmwarewcn7881sm6650sw5100video_collaboration_vc3_platformsnapdragon_4_gen_1_mobile_firmwareqca8385_firmwaresm6650pqca6688aqqam8295p_firmwarewcn3990_firmwaresnapdragon_660_mobileqca6698aq_firmwareqcs2290wcd9385snapdragon_888\+_5g_mobileqcs2290_firmwaresnapdragon_xr2\+_gen_1_firmwaresnapdragon_8_gen_1_mobileqca9367_firmwareqca8084_firmwareipq5424_firmwaresnapdragon_680_4g_mobile_firmwaresa8255pqcs7230_firmwarewcd9390_firmwareqcn5024qep8111_firmwareqcs615_firmwareimmersive_home_326qdx1011_firmwareipq8071a_firmwaresm8750_firmwaresnapdragon_auto_5g_modem-rfflight_rb5_5g_firmwareqca8080_firmwareqru1052snapdragon_480\+_5g_mobile_firmwareqamsrv1mrobotics_rb5qca6174a_firmwarewcn7861_firmwarewcn7861qam8650p_firmwarevideo_collaboration_vc5_platformqcs6490_firmwaresm6650_firmwareipq8076_firmwareqam8620pwcd9335_firmwarewcn3980_firmwareqrb5165n_firmwareqca6584au_firmwareqcn6274wsa8835wsa8840_firmwareqca6391_firmwareqfw7124qca6595au_firmwareqcs610qdu1010_firmwareqcs8300_firmwaresw5100p_firmwareqca6696_firmwareqcs8300wcd9380_firmwareqca6574_firmwareqca8081sd660wsa8815sg4150pqcn5124qam8775pqca9377qca6797aqsnapdragon_x75_5g_modem-rfqcm4325_firmwaresa8620psnapdragon_4_gen_1_mobileqca6574a_firmwareqcn9072_firmwareqca9888_firmwareipq8074aimmersive_home_3210_firmwareqca9889qcn5024_firmwarewcd9375_firmwareqca8386qca6391snapdragon_ar1_gen_1_firmwaresa7775pqcn9274_firmwareipq8173_firmwareqcs5430_firmwaresnapdragon_x32_5g_modem-rfsg4150p_firmwareqcn9012_firmwareqru1052_firmwaresa8770p_firmwaresa8295pqcs8550sm8735_firmwarefastconnect_7800sa8650pqam8775p_firmwaresd865_5g_firmwaresm8750p_firmwarewcd9375snapdragon_8\+_gen_2_mobile_firmwareipq8078_firmwareqca6688aq_firmwareqca9889_firmwarewcn3988_firmwareqamsrv1h_firmwaresm7675qcn5154sa8145pwsa8835_firmwarecsr8811wcn3980sm7675p_firmwareqdx1010snapdragon_w5\+_gen_1_wearablesnapdragon_8_gen_1_mobile_firmwareSnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-21426
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.02% / 3.66%
||
7 Day CHG~0.00%
Published-08 Jul, 2025 | 12:48
Updated-21 Jul, 2025 | 19:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Camera_Linux

Memory corruption while processing camera TPG write request.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wsa8830ssg2115p_firmwarewcd9385_firmwarefastconnect_7800sxr1230p_firmwarewsa8830_firmwaresxr1230pwsa8835wsa8832_firmwaresnapdragon_ar1_gen_1_platform_firmwarewsa8835_firmwarewcd9380_firmwarefastconnect_7800_firmwaressg2125p_firmwaressg2115pwcd9385ssg2125pwcd9380wsa8832snapdragon_ar1_gen_1_platformSnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-1984
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.10% / 27.12%
||
7 Day CHG~0.00%
Published-20 Oct, 2021 | 06:31
Updated-03 Aug, 2024 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible buffer overflow due to improper validation of index value while processing the plugin block in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewsa8830sd678sm7250sm6250p_firmwareqcs610qcs2290_firmwaresm7250_firmwaresd_636qcs4290wcn3950_firmwaresd765g_firmwareqca6420_firmwareqcs2290qca6390_firmwareqca6335msm8917sd690_5gsd730_firmwaresd_455_firmwarewcd9370qcs605_firmwaresd_675_firmwaresd675_firmwareqcs6125_firmwareqca6426sd632wcn3998wcd9371_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcn3950sm4125sd720gwcn3615_firmwarewcn3660bsd662sd460_firmwareqca6320_firmwareqca6574au_firmwaresdx55_firmwarewcn3680b_firmwarewcd9375_firmwarewcn3615wcn3998_firmwarewcn3610_firmwareqca6420qca6436_firmwareapq8053_firmwareqca6564au_firmwaresd778gqca6310qcs6490sd429sdxr2_5gqcs6125sd662_firmwaresdm630wcn3988_firmwareqca6430sd205sd429_firmwaresm6250sd778g_firmwareapq8017_firmwarequalcomm215_firmwaresd765gsd765_firmwareqca6436wcn6851qcs603_firmwareqcs4290_firmwarewcd9385qcs6490_firmwarewcd9371sd750gsd870_firmwareqca6390wcd9375sd750g_firmwareaqt1000apq8064auwcn3910_firmwaresm6250_firmwaremsm8953_firmwarewsa8830_firmwaremsm8917_firmwaresd210sd855_firmwaresd865_5g_firmwareqcm6490sd888_5g_firmwarewcn3988wcn6850_firmwarewsa8835_firmwareapq8017qca6564awcn6750_firmwarewcn3610qcm6125_firmwareqcm2290_firmwarewcn3991wcd9380_firmwaresd_675msm8996au_firmwaresd780gsd865_5gqca6564ausdx55m_firmwarewcn6856_firmwaresd888wsa8835sd632_firmwaremsm8996ausd665_firmwarewcd9380sd888_5gsm6250pqualcomm215qca6574asd690_5g_firmwaresdx50m_firmwarewcn6855_firmwareqca6310_firmwaresm7325qca6430_firmwarewcn6750sd439_firmwareqca6335_firmwareqcs605sd855sm4125_firmwarewcn6850sd665wcn3910qca6320sd765qca6426_firmwarewcn3660b_firmwarewcn3680qca6574a_firmwaresd768g_firmwaresd460qca6391sd730sdx55msdxr1_firmwareaqt1000_firmwarewcn6740_firmwaremsm8953sd678_firmwareapq8064au_firmwareqcm4290qcm6490_firmwaresdx50mwcn3680_firmwaresd480_firmwareqcs603wcn6851_firmwaresd_455qca6574ausd_636_firmwaresd205_firmwareqca6564a_firmwareqcm6125qcm4290_firmwaresd480sd870wcn6855sd210_firmwareqcs610_firmwarewcn6856wcn3680bsdxr1sd768gapq8096auwcn6740sdm630_firmwareqca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55sd888_firmwareapq8053apq8096au_firmwaresd675sd439sd720g_firmwareqcm2290sm7325_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wearables
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-21444
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.03%
||
7 Day CHG~0.00%
Published-08 Jul, 2025 | 12:48
Updated-21 Jul, 2025 | 19:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Data HLOS - QX

Memory corruption while copying the result to the transmission queue in EMAC.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6574au_firmwareqamsrv1h_firmwareqam8650pqam8620psa8255pqam8650p_firmwareqca6595qca6595au_firmwaresa8650p_firmwaresrv1m_firmwaresa7775psrv1mqca6696_firmwareqca6698aqsa8295psa8650pqca6696qam8295p_firmwareqam8775psa9000p_firmwaresa8540p_firmwaresrv1lqca6688aq_firmwaresrv1l_firmwaresa7255p_firmwareqca6595_firmwaresa8295p_firmwareqca6797aq_firmwaresa8620p_firmwaresa8775p_firmwaresrv1h_firmwareqca6698aq_firmwaresa8775pqam8620p_firmwaresa8770psrv1hqamsrv1msa7255pqam8295psa8255p_firmwareqca6574ausa8770p_firmwareqamsrv1m_firmwaresa8620pqamsrv1hqam8775p_firmwareqca6797aqsa9000pqca6688aqsa8540psa7775p_firmwareqam8255pqca6595auqam8255p_firmwareSnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-21443
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.89%
||
7 Day CHG~0.00%
Published-07 Apr, 2025 | 10:16
Updated-19 Aug, 2025 | 16:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Automotive Vehicle Networks

Memory corruption while processing message content in eAVB.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa7775psa8620psrv1h_firmwaresa7255pqca6595au_firmwaresa8540p_firmwareqamsrv1m_firmwaresa6145p_firmwaresa8255psa6155p_firmwaresa8195pqca6698aqsa8295psa8145p_firmwaresa8155_firmwaresa8295p_firmwaresa8150psa8775psa6150p_firmwareqam8295p_firmwareqam8620pqca6574au_firmwaresa8145pqamsrv1msa6155_firmwaresa8540psa8770psa6150psrv1m_firmwareqca6696qamsrv1h_firmwareqca6574ausa8775p_firmwareqca6595_firmwareqca6688aq_firmwareqam8295psa6155srv1l_firmwareqca6696_firmwaresa8770p_firmwaresa6155psa8155qca6595auqca6574a_firmwaresrv1hqca6688aqsa6145pqca6574aqamsrv1hqca6595qam8775pqam8255pqam8650p_firmwaresa8255p_firmwareqam8620p_firmwaresa9000psa7255p_firmwaresa8620p_firmwaresrv1lsa8650psa8155p_firmwaresa9000p_firmwaresa8155pqam8775p_firmwaresa8650p_firmwareqam8255p_firmwaresa7775p_firmwareqca6698aq_firmwaresa8150p_firmwaresrv1mqam8650psa8195p_firmwareSnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-21445
Matching Score-10
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-10
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.03%
||
7 Day CHG~0.00%
Published-08 Jul, 2025 | 12:48
Updated-21 Jul, 2025 | 19:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Data HLOS - QX

Memory corruption while copying the result to the transmission queue which is shared between the virtual machine and the host.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6574au_firmwareqamsrv1h_firmwareqam8650pqam8620psa8255pqam8650p_firmwareqca6595qca6595au_firmwaresa8650p_firmwaresrv1m_firmwaresa7775psrv1mqca6696_firmwareqca6698aqsa8295psa8650pqca6696qam8295p_firmwareqam8775psa9000p_firmwaresa8540p_firmwaresrv1lqca6688aq_firmwaresrv1l_firmwaresa7255p_firmwareqca6595_firmwaresa8295p_firmwareqca6797aq_firmwaresa8620p_firmwaresa8775p_firmwaresrv1h_firmwareqca6698aq_firmwaresa8775pqam8620p_firmwaresa8770psrv1hqamsrv1msa7255pqam8295psa8255p_firmwareqca6574ausa8770p_firmwareqamsrv1m_firmwaresa8620pqamsrv1hqam8775p_firmwareqca6797aqsa9000pqca6688aqsa8540psa7775p_firmwareqam8255pqca6595auqam8255p_firmwareSnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 23
  • 24
  • Next
Details not found