Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-59600

Summary
Assigner-qualcomm
Assigner Org ID-2cfc7d3e-20d3-47ac-8db7-1b7285aff15f
Published At-02 Mar, 2026 | 16:53
Updated At-03 Mar, 2026 | 04:56
Rejected At-
Credits

Buffer Over-read in Graphics

Memory Corruption when adding user-supplied data without checking available buffer space.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:qualcomm
Assigner Org ID:2cfc7d3e-20d3-47ac-8db7-1b7285aff15f
Published At:02 Mar, 2026 | 16:53
Updated At:03 Mar, 2026 | 04:56
Rejected At:
â–¼CVE Numbering Authority (CNA)
Buffer Over-read in Graphics

Memory Corruption when adding user-supplied data without checking available buffer space.

Affected Products
Vendor
Qualcomm Technologies, Inc.Qualcomm, Inc.
Product
Snapdragon
Platforms
  • Snapdragon Auto
  • Snapdragon Compute
  • Snapdragon Connectivity
  • Snapdragon Consumer IOT
  • Snapdragon Industrial IOT
  • Snapdragon Mobile
  • Snapdragon Voice & Music
  • Snapdragon WBC
  • Snapdragon Wearables
Default Status
unaffected
Versions
Affected
  • AR8031
  • AR8035
  • CSRA6620
  • CSRA6640
  • FastConnect 6200
  • FastConnect 6700
  • FastConnect 6900
  • FastConnect 7800
  • G1 Gen 1
  • G2 Gen 1
  • IQ6 Series Platform
  • IQ8 Series Platform
  • IQ9 Series Platform
  • LeMans_AU_LGIT
  • LeMansAU
  • MDM9628
  • Milos
  • Monaco_IOT
  • Netrani
  • Orne
  • Palawan25
  • Pandeiro
  • QAM8255P
  • QAMSRV1H
  • QAMSRV1M
  • QCA2066
  • QCA6174A
  • QCA6391
  • QCA6564A
  • QCA6564AU
  • QCA6574
  • QCA6574A
  • QCA6574AU
  • QCA6595
  • QCA6595AU
  • QCA6688AQ
  • QCA6696
  • QCA6698AQ
  • QCA8081
  • QCA8337
  • QCM2290
  • QCM4325
  • QCM4490
  • QCM5430
  • QCM6125
  • QCM6490
  • QCN6024
  • QCN9011
  • QCN9012
  • QCN9024
  • QCS2290
  • QCS4290
  • QCS4490
  • QCS8550
  • QLN1083BD
  • QLN1086BD
  • QMP1000
  • QPA1083BD
  • QPA1086BD
  • Qualcomm Video Collaboration VC1 Platform
  • Qualcomm Video Collaboration VC3 Platform
  • Qualcomm Video Collaboration VC5 Platform
  • QXM1083
  • QXM1086
  • QXM1093
  • QXM1094
  • QXM1095
  • QXM1096
  • SA4150P
  • SA4155P
  • SA6145P
  • SA6150P
  • SA6155P
  • SA7255P
  • SA7775P
  • SA8145P
  • SA8150P
  • SA8155P
  • SA8195P
  • SA8255P
  • SA8620P
  • SA8770P
  • SA9000P
  • SAR1165P
  • SAR1250P
  • SAR2130P
  • SAR2230P
  • SC8380XP
  • SD662
  • SD865 5G
  • SDX61
  • SM6225P
  • SM6650P
  • SM7435
  • SM7635P
  • SM7675
  • SM7675P
  • SM8635
  • SM8635P
  • SM8650Q
  • SM8750P
  • Smart Audio 400 Platform
  • Snapdragon 4 Gen 1 Mobile Platform
  • Snapdragon 4 Gen 2 Mobile Platform
  • Snapdragon 460 Mobile Platform
  • Snapdragon 480 5G Mobile Platform
  • Snapdragon 480+ 5G Mobile Platform
  • Snapdragon 6 Gen 1 Mobile Platform
  • Snapdragon 6 Gen 3 Mobile Platform
  • Snapdragon 6 Gen 4 Mobile Platform
  • Snapdragon 662 Mobile Platform
  • Snapdragon 680 4G Mobile Platform
  • Snapdragon 685 4G Mobile Platform
  • Snapdragon 695 5G Mobile Platform
  • Snapdragon 7s Gen 3 Mobile Platform
  • Snapdragon 8 Elite
  • Snapdragon 8 Elite Gen 5
  • Snapdragon 8 Gen 3 Mobile Platform
  • Snapdragon AR1 Gen 1 Platform
  • Snapdragon AR1+ Gen 1 Platform
  • Snapdragon W5+ Gen 1 Wearable Platform
  • Snapdragon X65 5G Modem-RF System
  • Snapdragon XR2 5G Platform
  • Snapdragon XR2+ Gen 1 Platform
  • SRV1H
  • SRV1M
  • SW5100
  • SW5100P
  • SW6100
  • SW6100P
  • SXR2230P
  • SXR2250P
  • SXR2330P
  • SXR2350P
  • Themisto
  • WCD9335
  • WCD9370
  • WCD9375
  • WCD9378
  • WCD9380
  • WCD9385
  • WCD9390
  • WCD9395
  • WCN3910
  • WCN3950
  • WCN3980
  • WCN3988
  • WCN6450
  • WCN6650
  • WCN6755
  • WCN7860
  • WCN7861
  • WCN7880
  • WCN7881
  • WSA8810
  • WSA8815
  • WSA8830
  • WSA8832
  • WSA8835
  • WSA8840
  • WSA8845
  • WSA8845H
Problem Types
TypeCWE IDDescription
CWECWE-126CWE-126 Buffer Over-read
Type: CWE
CWE ID: CWE-126
Description: CWE-126 Buffer Over-read
Metrics
VersionBase scoreBase severityVector
3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2026-bulletin.html
N/A
Hyperlink: https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2026-bulletin.html
Resource: N/A
â–¼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:product-security@qualcomm.com
Published At:02 Mar, 2026 | 17:16
Updated At:03 Mar, 2026 | 21:01

Memory Corruption when adding user-supplied data without checking available buffer space.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_6200_firmware>>-
cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_6200>>-
cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_6700_firmware>>-
cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_6700>>-
cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_6900_firmware>>-
cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_6900>>-
cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_7800_firmware>>-
cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>fastconnect_7800>>-
cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>g1_gen_1_firmware>>-
cpe:2.3:o:qualcomm:g1_gen_1_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>g1_gen_1>>-
cpe:2.3:h:qualcomm:g1_gen_1:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>g2_gen_1_firmware>>-
cpe:2.3:o:qualcomm:g2_gen_1_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>g2_gen_1>>-
cpe:2.3:h:qualcomm:g2_gen_1:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>iq-615_firmware>>-
cpe:2.3:o:qualcomm:iq-615_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>iq-615>>-
cpe:2.3:h:qualcomm:iq-615:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>iq-8275_firmware>>-
cpe:2.3:o:qualcomm:iq-8275_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>iq-8275>>-
cpe:2.3:h:qualcomm:iq-8275:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>iq-8300_firmware>>-
cpe:2.3:o:qualcomm:iq-8300_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>iq-8300>>-
cpe:2.3:h:qualcomm:iq-8300:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>iq-9075_firmware>>-
cpe:2.3:o:qualcomm:iq-9075_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>iq-9075>>-
cpe:2.3:h:qualcomm:iq-9075:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>iq-9100_firmware>>-
cpe:2.3:o:qualcomm:iq-9100_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>iq-9100>>-
cpe:2.3:h:qualcomm:iq-9100:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>lemans_au_lgit_firmware>>-
cpe:2.3:o:qualcomm:lemans_au_lgit_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>lemans_au_lgit>>-
cpe:2.3:h:qualcomm:lemans_au_lgit:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>lemansau_firmware>>-
cpe:2.3:o:qualcomm:lemansau_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>lemansau>>-
cpe:2.3:h:qualcomm:lemansau:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>mdm9628_firmware>>-
cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>mdm9628>>-
cpe:2.3:h:qualcomm:mdm9628:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>milos_firmware>>-
cpe:2.3:o:qualcomm:milos_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>milos>>-
cpe:2.3:h:qualcomm:milos:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>monaco_iot_firmware>>-
cpe:2.3:o:qualcomm:monaco_iot_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>monaco_iot>>-
cpe:2.3:h:qualcomm:monaco_iot:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>netrani_firmware>>-
cpe:2.3:o:qualcomm:netrani_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>netrani>>-
cpe:2.3:h:qualcomm:netrani:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>orne_firmware>>-
cpe:2.3:o:qualcomm:orne_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>orne>>-
cpe:2.3:h:qualcomm:orne:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>palawan25_firmware>>-
cpe:2.3:o:qualcomm:palawan25_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>palawan25>>-
cpe:2.3:h:qualcomm:palawan25:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>pandeiro_firmware>>-
cpe:2.3:o:qualcomm:pandeiro_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>pandeiro>>-
cpe:2.3:h:qualcomm:pandeiro:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qam8255p_firmware>>-
cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qam8255p>>-
cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qamsrv1h_firmware>>-
cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qamsrv1h>>-
cpe:2.3:h:qualcomm:qamsrv1h:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qamsrv1m_firmware>>-
cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qamsrv1m>>-
cpe:2.3:h:qualcomm:qamsrv1m:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca2066_firmware>>-
cpe:2.3:o:qualcomm:qca2066_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca2066>>-
cpe:2.3:h:qualcomm:qca2066:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6174a_firmware>>-
cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*
Qualcomm Technologies, Inc.
qualcomm
>>qca6174a>>-
cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-126Primaryproduct-security@qualcomm.com
CWE ID: CWE-126
Type: Primary
Source: product-security@qualcomm.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2026-bulletin.htmlproduct-security@qualcomm.com
Patch
Vendor Advisory
Hyperlink: https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2026-bulletin.html
Source: product-security@qualcomm.com
Resource:
Patch
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

1035Records found

CVE-2023-33078
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-5.1||MEDIUM
EPSS-0.03% / 8.37%
||
7 Day CHG~0.00%
Published-04 Mar, 2024 | 10:48
Updated-10 Jan, 2025 | 17:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in DSP Services

Information Disclosure while processing IOCTL request in FastRPC.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_7c\+_gen_3_compute_firmwarefastconnect_6900_firmwaresnapdragon_7c\+_gen_3_computewcd9380_firmwarewcd9385_firmwarewsa8830wsa8845_firmwarefastconnect_7800fastconnect_6900sc8380xp_firmwarewsa8845hwsa8830_firmwarewsa8845h_firmwaresnapdragon_8cx_gen_3_compute_firmwarewsa8840fastconnect_7800_firmwarefastconnect_6700wsa8835_firmwarewsa8835wcd9385wsa8840_firmwarewcd9380snapdragon_8cx_gen_3_computefastconnect_6700_firmwaresc8380xpwsa8845Snapdragon
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-33064
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 6.22%
||
7 Day CHG~0.00%
Published-06 Feb, 2024 | 05:47
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in Audio

Transient DOS in Audio when invoking callback function of ASM driver.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sdm429w_firmwareqcs410_firmwaresa6150p_firmwaresd865_5gsnapdragon_429_mobile_platform_firmwareqcs610_firmwarewcd9335sxr2130_firmwaresrv1mqca8081_firmwarewcd9370ar8035_firmwareqca6696wcd9340_firmwarewcd9341_firmwareqca6320qcc710_firmwareqca6426qca6564auwcn3610qcn9074wsa8815_firmwaresa8195p_firmwareqca8337_firmwareqca8337qca6426_firmwareqca6574au_firmwareqam8295pwcd9341qca6574ausnapdragon_855_mobile_platformwcn3950wsa8810_firmwaresnapdragon_xr2_5g_platformsnapdragon_429_mobile_platformsa9000p_firmwaresrv1hsnapdragon_835_mobile_pc_platform_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwarewcn3660b_firmwarefastconnect_6800_firmwaresa8295p_firmwaresd835_firmwarevideo_collaboration_vc1_platform_firmwaresa8770pc-v2x_9150qca6584auqca6320_firmwareqcn6274_firmwareqcc710qca6310_firmwarefastconnect_6800qfw7114_firmwarefastconnect_7800_firmwarefastconnect_6900video_collaboration_vc1_platformqfw7114snapdragon_x55_5g_modem-rf_systemfastconnect_6900_firmwareqca6310qam8255p_firmwarewcd9380sa6145p_firmwareqam8255psnapdragon_xr2_5g_platform_firmwaresa8150pmsm8996au_firmwaresa6155psnapdragon_835_mobile_pc_platformqca6564au_firmwarewsa8810qam8650psnapdragon_865\+_5g_mobile_platformsa9000psrv1h_firmwarevideo_collaboration_vc3_platformaqt1000snapdragon_865_5g_mobile_platform_firmwarec-v2x_9150_firmwaresa6155p_firmwareqam8295p_firmwaresrv1m_firmwaresd855sd835wcn3990_firmwaresnapdragon_870_5g_mobile_platform_firmwareqfw7124_firmwareqca6564a_firmwareqca6436_firmwareqca6698aq_firmwaresnapdragon_wear_4100\+_platform_firmwaremdm9650_firmwarewcn3610_firmwaresa8255psnapdragon_855\+\/860_mobile_platform_firmwareqca6420snapdragon_865\+_5g_mobile_platform_firmwareqca6430wcd9370_firmwaremdm9650snapdragon_x55_5g_modem-rf_system_firmwarewcn3660bqca6574asxr2130wcn3620_firmwaresa8195pwcd9340qamsrv1msnapdragon_820_automotive_platform_firmwaresnapdragon_auto_5g_modem-rf_gen_2qam8650p_firmwaresnapdragon_855_mobile_platform_firmwareqca6420_firmwareaqt1000_firmwaresdm429wqca6584au_firmwaresd855_firmwareqcn6274qca6436qfw7124sa8775psnapdragon_x75_5g_modem-rf_systemwcd9335_firmwareqca6391_firmwarewcn3980_firmwareqca6430_firmwaresnapdragon_870_5g_mobile_platformsa8775p_firmwareqamsrv1hqca6696_firmwaresnapdragon_865_5g_mobile_platformwcd9380_firmwaresa6150pqcs410sa8155p_firmwareqca8081qca6564awsa8815mdm9628sa8155pqam8775pmdm9628_firmwaresa6145pqcn9074_firmwaresa8255p_firmwarear8035qca6574a_firmwareqamsrv1m_firmwaremsm8996ausa8650p_firmwarewcn3620qca6391qcn6224qca6698aqwcn3950_firmwaresa8770p_firmwaresa8295pfastconnect_6200fastconnect_7800sa8145p_firmwaresa8650pqam8775p_firmwaresd865_5g_firmwarewcn3680bsa8150p_firmwaresnapdragon_855\+\/860_mobile_platformqamsrv1h_firmwarevideo_collaboration_vc3_platform_firmwaresa8145pwcn3990snapdragon_wear_4100\+_platformsnapdragon_x75_5g_modem-rf_system_firmwarewcn3980snapdragon_820_automotive_platformfastconnect_6200_firmwarewcn3680b_firmwareqcn6224_firmwareqcs610Snapdragon
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-126
Buffer Over-read
CVE-2023-33060
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-7.1||HIGH
EPSS-0.03% / 8.63%
||
7 Day CHG~0.00%
Published-06 Feb, 2024 | 05:47
Updated-02 Aug, 2024 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in Core

Transient DOS in Core when DDR memory check is called while DDR is not initialized.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_8_gen_1_mobile_platformwsa8830qca8337_firmwarewcd9380_firmwareqca8337qfw7124sg8275p_firmwareqcm8550ar8035_firmwareqcn6224_firmwarewsa8840wsa8835wcn3950_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwareqcn6274wcd9380fastconnect_6700snapdragon_x70_modem-rf_systemwcd9370snapdragon_4_gen_2_mobile_platform_firmwareqca6584au_firmwaresg8275psnapdragon_8_gen_2_mobile_platformqfw7114_firmwarewcd9385_firmwarewsa8845wcn3950qcn6024_firmwarewcd9340_firmwarewsa8815wsa8845_firmwaresnapdragon_4_gen_2_mobile_platformqcn9024wsa8845h_firmwareqca8081_firmwaresnapdragon_8_gen_3_mobile_platformqfw7114fastconnect_7800qca6584ausnapdragon_x65_5g_modem-rf_system_firmwareqcm8550_firmwareqcm4490_firmwareqcn6274_firmwareqcs4490_firmwaresnapdragon_x70_modem-rf_system_firmwaresnapdragon_x65_5g_modem-rf_systemwsa8840_firmwareqca6698aqwsa8832_firmwarefastconnect_6900snapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900_firmwareqcs8550_firmwarewcn3988_firmwaresnapdragon_8\+_gen_1_mobile_platformfastconnect_6700_firmwarewcd9340qcn9024_firmwarewsa8810_firmwareqcn6224fastconnect_7800_firmwaresnapdragon_8\+_gen_2_mobile_platformwsa8810wsa8845hwsa8832wcd9395_firmwaresnapdragon_x75_5g_modem-rf_systemqca8081sm8550psnapdragon_8_gen_1_mobile_platform_firmwareqca6698aq_firmwareqcm4490snapdragon_auto_5g_modem-rf_gen_2snapdragon_auto_5g_modem-rf_gen_2_firmwarewcd9385qcc710qcs4490wcd9395qcs8550ar8035wcd9370_firmwaresm8550p_firmwarewcd9390qcc710_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewcd9390_firmwarewsa8830_firmwareqcn6024wcn3988wsa8815_firmwarewsa8835_firmwaresnapdragon_8\+_gen_1_mobile_platform_firmwareqfw7124_firmwaresnapdragon_8_gen_2_mobile_platform_firmwareSnapdragon
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-33098
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.19% / 40.66%
||
7 Day CHG~0.00%
Published-05 Dec, 2023 | 03:04
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in WLAN Firmware

Transient DOS while parsing WPA IES, when it is passed with length more than expected size.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd865_5gqca6595ipq6028_firmwareimmersive_home_214_platformqca8081_firmwareqcn9001wcd9340_firmwareipq5028_firmwarewcd9395_firmwareqcn6024ar9380snapdragon_sc8180xp-aa_firmwareqcc710_firmwareqca6426fastconnect_6700snapdragon_768g_5g_mobile_platform_firmwaresa4150pqcn5124_firmwarewsa8832_firmwareqca8337qca6426_firmwarewcd9395qcn7605qca6574au_firmwareqcn7606_firmwareipq8078a_firmwareqam8295pwcd9341wsa8810_firmwarewsa8845h_firmwaresa9000p_firmwareqca2064_firmwarefastconnect_6800_firmwareqcs5430snapdragon_4_gen_2_mobile_platform_firmwareqcm5430_firmwaresa4155psnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_778g\+_5g_mobile_platformsa8770pqcn9000qca2062_firmwaresnapdragon_480\+_5g_mobile_platform_firmwaresnapdragon_695_5g_mobile_platform_firmwareqsm8250_firmwareqsm8350_firmwaresnapdragon_765g_5g_mobile_platformwcd9385_firmwareqca6421ipq8074a_firmwareipq8076awcd9360snapdragon_ar2_gen_1_platform_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareimmersive_home_3210_platform_firmwaresa6155psnapdragon_sc8180x-aaqca6564au_firmwaresnapdragon_768g_5g_mobile_platformqca8075qam8650pvideo_collaboration_vc5_platform_firmwaresa9000psa6155p_firmwaresnapdragon_870_5g_mobile_platform_firmwareqca6436_firmwaresnapdragon_8\+_gen_1_mobile_platformipq8070a_firmwareqcn5021_firmwareqcn9070snapdragon_8_gen_2_mobile_platformsnapdragon_7c\+_gen_3_compute_firmwareqca8084qca6420wcn3910csrb31024snapdragon_x55_5g_modem-rf_system_firmwareqcc2076snapdragon_660_mobile_platformqca6574awcd9340qcs8250_firmwareqcm2290snapdragon_auto_5g_modem-rf_gen_2qcn6122_firmwareqcn5154_firmwaresm8550p_firmwareqcm8550wcn3988qcn5122_firmwareqcn9024pmp8074qca6574snapdragon_x75_5g_modem-rf_systemqca2066_firmwareqca8082qcm2290_firmwaresa8155pqca8072_firmwarewsa8830sm8550pqcf8000_firmwaresa6145psnapdragon_8\+_gen_1_mobile_platform_firmwareqcn6122sa8255p_firmwareqcc2073qrb5165m_firmwareqca9985ipq8071aqcn6112wcn3950_firmwareqrb5165nsnapdragon_8_gen_1_mobile_platformqca1062_firmwarefastconnect_6200sm7325p_firmwarewcd9360_firmwaresnapdragon_sc8280xp-ab_firmwaresmart_audio_400_platformvideo_collaboration_vc3_platform_firmwareqcn6023_firmwareqcn5164_firmwareimmersive_home_326_platform_firmwaresnapdragon_750g_5g_mobile_platformqcn9072qcn6224_firmwareqca6431sd660_firmwareqca8082_firmwaresxr2130_firmwarear8035_firmwareqrb5165msnapdragon_888_5g_mobile_platformsc8380xpqca1064snapdragon_w5\+_gen_1_wearable_platform_firmwareqca4024_firmwareqca0000_firmwaresd888_firmwareqca9992_firmwareqca9990ipq9008_firmwareqcn9074wsa8815_firmwareqca8337_firmwareipq8173sm7250p_firmwarewcn3999ipq6010_firmwarewcn3950snapdragon_x65_5g_modem-rf_system_firmwareqca6797aq_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_765g_5g_mobile_platform_firmwareipq5028qca9986qcf8001_firmwareqcn9070_firmwaresnapdragon_780g_5g_mobile_platformsa8295p_firmwaresa4155p_firmwareqca9984ipq5010_firmwareqcn9022_firmwaresm7250pcsrb31024_firmwareipq6018sa8155sd888snapdragon_4_gen_2_mobile_platformsc8380xp_firmwareipq8065fastconnect_6800qcs7230qcn9001_firmwaresnapdragon_782g_mobile_platform_firmwarefastconnect_6900_firmwaresnapdragon_xr2_5g_platform_firmwaresnapdragon_sc8280xp-abqca8075_firmwareqcf8000snapdragon_865\+_5g_mobile_platformqca2065_firmwaresnapdragon_sc8180x-ad_firmwaresdx65m_firmwarevideo_collaboration_vc3_platformsnapdragon_sc8180xp-ad_firmwaresnapdragon_865_5g_mobile_platform_firmwareqca9980_firmwareqca9985_firmwareqca6431_firmwareqca6698aq_firmwareqcs2290qcn7606qcs2290_firmwarewcn3999_firmwareqca8084_firmwareqcn7605_firmwaresa8255pqcs7230_firmwarewcd9390_firmwareimmersive_home_318_platform_firmwareqcn5024snapdragon_690_5g_mobile_platformqca6430snapdragon_auto_5g_modem-rfssg2125pcsra6640_firmwareimmersive_home_326_platformqam8650p_firmwareqcn9013_firmwarevideo_collaboration_vc5_platformqca2062qca6420_firmwareqcs6490_firmwaresnapdragon_x65_5g_modem-rf_systemipq8076_firmwarewcd9335_firmwarewcn3980_firmwareqrb5165n_firmwareqca6436snapdragon_sc8180x-aa_firmwarewsa8835wsa8840_firmwareqca6391_firmwareipq8068qcs4290_firmwaresnapdragon_865_5g_mobile_platformcsra6620qca8081sd660wsa8815qam8775pqca9377qcm4290_firmwareqca9888_firmwareqca9889qca1062qcn5024_firmwareqcn9002_firmwareipq5010qcn9274_firmwaresmart_audio_400_platform_firmwareqcs5430_firmwaresnapdragon_778g_5g_mobile_platform_firmwaresnapdragon_480_5g_mobile_platformcsra6620_firmwareqcs8550ipq8068_firmwareqam8775p_firmwaresd865_5g_firmwarepmp8074_firmwarewcd9375qca9889_firmwaresa8145pimmersive_home_316_platformsnapdragon_888\+_5g_mobile_platform_firmwareqca2066csr8811qcm8550_firmwaresa6150p_firmwaresw5100pipq9574qcn9000_firmwareqcn6102_firmwareqcn9022wcd9335wcd9370qca8072qca6696wcd9341_firmwareqcn9003_firmwareqcc2073_firmwareipq8076wcn6740_firmwareqca1064_firmwareipq6018_firmwareqca9984_firmwareqcn6023immersive_home_216_platformqca9994_firmwareipq6000snapdragon_auto_4g_modemipq8078aqca6574auwcd9390csra6640qcn9100_firmwareqcn5122qca6554aqcn6024_firmwareqca9886_firmwareqcm5430snapdragon_695_5g_mobile_platformssg2115pqcc710qcn6132_firmwareqcn5054315_5g_iot_modem_firmwarefastconnect_6900ipq5332_firmwareqcn5052qca9980qfw7114315_5g_iot_modemipq9574_firmwaresnapdragon_x55_5g_modem-rf_systemqam8255p_firmwareipq8064sa8155_firmwareqcn5164snapdragon_888_5g_mobile_platform_firmwareqcs4490snapdragon_8\+_gen_2_mobile_platform_firmwarewsa8845qcn6100_firmwareqca6421_firmwarecsr8811_firmwaresnapdragon_sc8180xp-aawsa8810qcn5021qca8085qsm8250snapdragon_8\+_gen_2_mobile_platformqcn6100qca6595ausm7315_firmwarewsa8840qcs8550_firmwareqca9986_firmwareqfw7124_firmwareqcn9012snapdragon_sc8180x-adqcs4490_firmwareqcf8001wcn3910_firmwaresdx65mwcd9370_firmwaresnapdragon_750g_5g_mobile_platform_firmwareipq9570sa8195pqcm6490immersive_home_316_platform_firmwareimmersive_home_3210_platformqcn9274ipq8076a_firmwaresa8775pipq9570_firmwaresxr2230p_firmwarear9380_firmwareqca6430_firmwaresnapdragon_870_5g_mobile_platformqcn9011sa8775p_firmwareqcn9024_firmwarewsa8845hsa6150psa8155p_firmwaresnapdragon_sc8180x-acqcn9074_firmwareipq8174sc8180x\+sdx55_firmwaresnapdragon_765_5g_mobile_platformflight_rb5_5g_platform_firmwareipq8174_firmwarear8035ipq8072asa6155qca2065robotics_rb5_platformqcn6224sc8180x\+sdx55qca6698aqssg2125p_firmwaresa8145p_firmwaresnapdragon_888\+_5g_mobile_platformsa8150p_firmwaresnapdragon_w5\+_gen_1_wearable_platformfastconnect_6700_firmwarewcn3990qcn9002ipq8078qcs6490qcs8250ipq9554_firmwarefastconnect_6200_firmwarear8031_firmwaresnapdragon_sc8180xp-acwsa8830_firmwareqca6678aq_firmwareqca8386_firmwarewsa8845_firmwarewsa8832snapdragon_auto_4g_modem_firmwareqcc2076_firmwareqca6678aqqcn5022_firmwareqca9992sa4150p_firmwareipq9008ipq9554qca6564auimmersive_home_214_platform_firmwaresa8195p_firmwareqcm4290qcn5054_firmwareqca9888ipq5332qcn9013ar8031sg8275p_firmwareqca9377_firmwareqcm6490_firmwareipq8072a_firmwareqcm4490_firmwareflight_rb5_5g_platformsnapdragon_xr2_5g_platformqcn6112_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_xr2\+_gen_1_platform_firmwareqca8085_firmwareqca9886qcn6132qcn6102snapdragon_780g_5g_mobile_platform_firmwareqca6584auqcn6274_firmwareqcn9011_firmwaresw5100_firmwaresnapdragon_765_5g_mobile_platform_firmwarewcn6740qfw7114_firmwareqca4024qca6595_firmwarefastconnect_7800_firmwareimmersive_home_216_platform_firmwareipq8070awcd9380sa6145p_firmwareqam8255psa6155_firmwaresxr2230pqca9990_firmwaresnapdragon_4_gen_1_mobile_platformsa8150pqcn9003snapdragon_778g_5g_mobile_platformqcn5052_firmwaresnapdragon_auto_5g_modem-rf_firmwareqca2064sxr1230pipq6010sw5100aqt1000qam8295p_firmwarewcn3990_firmwaresm7315wcd9385qca9994qsm8350qcs4290sxr1230p_firmwaresnapdragon_778g\+_5g_mobile_platform_firmwaresnapdragon_865\+_5g_mobile_platform_firmwaresg8275psdx55_firmwareipq8071a_firmwareqca6554a_firmwaresnapdragon_sc8180x-ac_firmwaresxr2130ipq6028qcm4490qcn9100snapdragon_xr2\+_gen_1_platformsm7325paqt1000_firmwareqca6584au_firmwareqcn5152_firmwareqcn6274snapdragon_480_5g_mobile_platform_firmwareqfw7124qca6595au_firmwareqca0000sw5100p_firmwaresnapdragon_sc8180xp-ac_firmwaresnapdragon_ar2_gen_1_platformsnapdragon_782g_mobile_platformqca6696_firmwarewcd9380_firmwareqca6574_firmwaresd_8_gen1_5gqcn5124ipq8064_firmwareqca6797aqqcn5152ipq8065_firmwareqca6574a_firmwaresdx55qcn9072_firmwaresnapdragon_480\+_5g_mobile_platformipq8074aimmersive_home_318_platformsd_8_gen1_5g_firmwarewcd9375_firmwareqca8386qca6391snapdragon_sc8180xp-adipq8173_firmwareqcn9012_firmwaresa8770p_firmwaresa8295psnapdragon_8_gen_2_mobile_platform_firmwarerobotics_rb5_platform_firmwareipq6000_firmwarefastconnect_7800ipq8078_firmwarewcn3988_firmwareqcn5154wsa8835_firmwaressg2115p_firmwareqcn5022snapdragon_660_mobile_platform_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewcn3980snapdragon_690_5g_mobile_platform_firmwareSnapdragon
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-126
Buffer Over-read
CVE-2023-33065
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.03% / 7.42%
||
7 Day CHG~0.00%
Published-06 Feb, 2024 | 05:47
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in Audio

Information disclosure in Audio while accessing AVCS services from ADSP payload.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sdm429w_firmwareqcs410_firmwaresa6150p_firmwaresd865_5gsnapdragon_429_mobile_platform_firmwareqcs610_firmwarewcd9335sxr2130_firmwaresrv1mqca8081_firmwarewcd9370ar8035_firmwareqca6696wcd9340_firmwaresnapdragon_888_5g_mobile_platformwcd9341_firmwareqca6320sd888_firmwareqcc710_firmwareqca6426wcn6740_firmwarefastconnect_6700qca6564auwcn3610qcn9074wsa8815_firmwaresa8195p_firmwareqca8337_firmwareqca8337qca6426_firmwareqca6574au_firmwareqam8295pwcd9341qca6574ausnapdragon_855_mobile_platformwcn3950wsa8810_firmwaresnapdragon_xr2_5g_platformsnapdragon_429_mobile_platformsa9000p_firmwaresrv1hsnapdragon_835_mobile_pc_platform_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_7c\+_gen_3_computewcn3660b_firmwaresnapdragon_780g_5g_mobile_platformfastconnect_6800_firmwaresa8295p_firmwaresd835_firmwarevideo_collaboration_vc1_platform_firmwaresnapdragon_778g\+_5g_mobile_platformsa8770psnapdragon_780g_5g_mobile_platform_firmwarec-v2x_9150qca6584auqca6320_firmwareqcn6274_firmwaresd888qcc710wcn6740qca6310_firmwarefastconnect_6800qfw7114_firmwarefastconnect_7800_firmwarefastconnect_6900video_collaboration_vc1_platformqfw7114snapdragon_782g_mobile_platform_firmwarewcd9385_firmwaresnapdragon_x55_5g_modem-rf_systemfastconnect_6900_firmwareqca6310qam8255p_firmwarewcd9380sa6145p_firmwareqam8255psnapdragon_888_5g_mobile_platform_firmwaresnapdragon_xr2_5g_platform_firmwaresa8150psnapdragon_778g_5g_mobile_platformmsm8996au_firmwaresa6155psnapdragon_835_mobile_pc_platformqca6564au_firmwarewsa8810qam8650psnapdragon_865\+_5g_mobile_platformsa9000psrv1h_firmwarevideo_collaboration_vc3_platformaqt1000sm7315_firmwaresnapdragon_865_5g_mobile_platform_firmwarec-v2x_9150_firmwaresa6155p_firmwareqam8295p_firmwaresrv1m_firmwaresd855sd835wcn3990_firmwaresm7315snapdragon_870_5g_mobile_platform_firmwareqfw7124_firmwareqca6564a_firmwareqca6436_firmwareqca6698aq_firmwaresnapdragon_wear_4100\+_platform_firmwarewcd9385mdm9650_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewcn3610_firmwaresa8255psnapdragon_855\+\/860_mobile_platform_firmwaresnapdragon_778g\+_5g_mobile_platform_firmwareqca6420snapdragon_865\+_5g_mobile_platform_firmwareqca6430wcd9370_firmwaremdm9650snapdragon_x55_5g_modem-rf_system_firmwarewcn3660bqca6574asxr2130wcn3620_firmwaresa8195pwcd9340qamsrv1msnapdragon_820_automotive_platform_firmwaresnapdragon_auto_5g_modem-rf_gen_2sm7325pqam8650p_firmwaresnapdragon_855_mobile_platform_firmwareqca6420_firmwareaqt1000_firmwaresdm429wqca6584au_firmwaresd855_firmwareqcn6274qca6436qfw7124sa8775psnapdragon_x75_5g_modem-rf_systemwcd9335_firmwareqca6391_firmwarewcn3980_firmwarewsa8835qca6430_firmwaresnapdragon_870_5g_mobile_platformsa8775p_firmwaresnapdragon_782g_mobile_platformqamsrv1hqca6696_firmwaresnapdragon_865_5g_mobile_platformwcd9380_firmwaresa6150pqcs410sa8155p_firmwareqca8081qca6564awsa8815sa8155pwsa8830qam8775psa6145pqcn9074_firmwaresa8255p_firmwarear8035qca6574a_firmwareqamsrv1m_firmwaremsm8996ausa8650p_firmwarewcn3620wcd9375_firmwareqca6391qcn6224snapdragon_778g_5g_mobile_platform_firmwareqca6698aqwcn3950_firmwaresa8770p_firmwaresa8295pfastconnect_6200fastconnect_7800sa8145p_firmwaresa8650pqam8775p_firmwaresd865_5g_firmwaresm7325p_firmwarewcn3680bsnapdragon_888\+_5g_mobile_platformwcd9375sa8150p_firmwaresnapdragon_855\+\/860_mobile_platformfastconnect_6700_firmwareqamsrv1h_firmwarevideo_collaboration_vc3_platform_firmwaresa8145pwcn3990snapdragon_wear_4100\+_platformsnapdragon_888\+_5g_mobile_platform_firmwarewsa8835_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewcn3980snapdragon_820_automotive_platformfastconnect_6200_firmwarewsa8830_firmwarewcn3680b_firmwareqcn6224_firmwareqcs610Snapdragonqam8255p_firmwarequalcomm_video_collaboration_vc1_platform_firmwareqca8337_firmwarewcd9380_firmwaresa6150p_firmwaresnapdragon_778g_5g_mobile_platform_firmwaresa8145p_firmwaremsm8996au_firmwaresnapdragon_820_automotive_platform_firmwareqcn6224_firmwaresdm429w_firmwarewcn3950_firmwaresnapdragon_888_5g_mobile_platform_firmwaresa8150p_firmwareqca6420_firmwareqca6584au_firmwarewcn3990_firmwarec-v2x_9150_firmwareqca6310_firmwareqca6430_firmwarewcd9335_firmwareqfw7114_firmwarequalcomm_video_collaboration_vc3_platform_firmwarewcd9385_firmwareqamsrv1h_firmwarewcd9340_firmwaresm7325p_firmwareqam8295p_firmwaremdm9650_firmwaresnapdragon_xr2_5g_platform_firmwareqca6426_firmwarewcn3660b_firmwaresa9000p_firmwareqca6320_firmwaresm7315_firmwareqca6574au_firmwaresnapdragon_429_mobile_platform_firmwaresnapdragon_835_mobile_pc_platform_firmwarewcn3680b_firmwarewcd9375_firmwareqca8081_firmwareqca6574a_firmwarefastconnect_6200_firmwarewcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcn3610_firmwareqca6436_firmwareaqt1000_firmwareqca6564au_firmwarewcn6740_firmwaresa6155p_firmwareqcn6274_firmwaresa8775p_firmwaresa8650p_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900_firmwaresrv1h_firmwaresa6145p_firmwaresa8155p_firmwarefastconnect_6700_firmwareqca6564a_firmwarewsa8810_firmwarewcd9341_firmwarefastconnect_7800_firmwaresa8255p_firmwareqcs610_firmwareqca6698aq_firmwareqamsrv1m_firmwaresrv1m_firmwaresd835_firmwareqam8650p_firmwaresa8770p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqam8775p_firmwaresxr2130_firmwareqca6696_firmwareqca6391_firmwaresnapdragon_855_mobile_platform_firmwarewcd9370_firmwaresd888_firmwareqcc710_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3620_firmwarewsa8815_firmwarewsa8835_firmwaresnapdragon_780g_5g_mobile_platform_firmwaresa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwareqcn9074_firmwarefastconnect_6800_firmwareqcs410_firmwaresa8295p_firmwareqfw7124_firmwarear8035_firmware
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-126
Buffer Over-read
CVE-2023-33116
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.32% / 54.97%
||
7 Day CHG~0.00%
Published-02 Jan, 2024 | 05:38
Updated-17 Jun, 2025 | 19:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer over-read without Checking Size of Input in WLAN Host

Transient DOS while parsing ieee80211_parse_mscs_ie in WIN WLAN driver.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcn5024_firmwareqcn9070ipq4028_firmwareqca8337qfw7124ar9380ipq8173_firmwareqcf8001flight_rb5_5g_platformflight_rb5_5g_platform_firmwareqcn6224_firmwareqcn5124qca4024_firmwareqca8082qcn9072qca8386qca9880_firmwareqca9992immersive_home_318_platform_firmwareipq8078aipq5028_firmwareipq6000qcn5152_firmwareqca0000_firmwareqrb5165n_firmwareqcn9000_firmwareqca9984_firmwarewcd9385_firmwareimmersive_home_216_platformipq8076aimmersive_home_316_platformimmersive_home_316_platform_firmwareqca8386_firmwareqcn6024_firmwareqca8084_firmwareimmersive_home_318_platformipq8074aqcn5124_firmwareqcn9011_firmwareqca8082_firmwareqcn5164_firmwareqcn5122_firmwaresdx55_firmwareqca8081_firmwareqcn6023_firmwareqfw7114qrb5165nipq5010ipq8070_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareipq8065ipq8078a_firmwareqcn9274ipq8174qca9990qrb5165m_firmwareipq5028qca7500ipq4029_firmwareqcn5052qca0000qcf8001_firmwareipq6010ipq8068qcn6112_firmwareqcn9074qca8085sdx65mwcd9340qcn6132qcn6224qcn9013snapdragon_x75_5g_modem-rf_systemqca8081ipq8071aqcn6023sdx65m_firmwareipq8071a_firmwareimmersive_home_3210_platformqca8085_firmwareqca9888_firmwareipq8068_firmwareqcn6122wcd9385ipq9008_firmwareipq9570qcn5154_firmwarear8035csr8811qca9898_firmwareipq4019qcc710_firmwareqcn9100_firmwarerobotics_rb5_platformqca9992_firmwareipq5010_firmwareipq8074a_firmwareqca9898qcn5022_firmwareipq4028immersive_home_216_platform_firmwareqca9985_firmwarerobotics_rb5_platform_firmwareipq4018_firmwareqca8337_firmwarewcd9380_firmwareqcn9000ipq8072aqca7500_firmwareqca9980_firmwareipq8076a_firmwarear9380_firmwareipq8078qca8084ipq8173ipq9008qcn9012qcn5164immersive_home_326_platform_firmwareqcn6122_firmwareipq8065_firmwarecsr8811_firmwareqcn6274wcd9380qcn5154qca8075_firmwareipq4018ipq4019_firmwareqcn5024qca9889qcn6132_firmwareqca9888qca9985qca9994_firmwareqcn5052_firmwareqcn9012_firmwareqcn9274_firmwareipq8070a_firmwareqfw7114_firmwarewcn3980ipq6018_firmwareipq8076_firmwareqca9886wcd9340_firmwareqcn6112ipq8076qca9984ipq6028ipq8064qcn5152qcn9024qrb5165mipq9574_firmwarewcn3980_firmwareimmersive_home_3210_platform_firmwareqca6391ipq8064_firmwarefastconnect_7800qcn9100qcn6274_firmwaresnapdragon_x65_5g_modem-rf_systemipq8078_firmwareipq9570_firmwarefastconnect_6900qcn9070_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900_firmwareipq8070ipq6028_firmwareipq8072a_firmwareqcn9011qca9994qca9889_firmwareipq9574qca9980qcn5122ipq8174_firmwareqcn9024_firmwareqca9880fastconnect_7800_firmwareimmersive_home_326_platformipq6018qcn5022qcn9013_firmwareqca9886_firmwareqcc710ipq6010_firmwareimmersive_home_214_platformqca6391_firmwareimmersive_home_214_platform_firmwareqca4024sdx55qca8075qcn9022_firmwareqcn6024qcn9022qca9990_firmwareipq8070aqcn9072_firmwareipq6000_firmwareqcn9074_firmwareqfw7124_firmwareipq4029ar8035_firmwareSnapdragon
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-33080
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.19% / 41.34%
||
7 Day CHG~0.00%
Published-05 Dec, 2023 | 03:04
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer over-read in WLAN Firmware

Transient DOS while parsing a vender specific IE (Information Element) of reassociation response management frame.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_x20_lte_modemsd865_5gmdm9215_firmwareqca6595snapdragon_xr1_platformipq6028_firmwareimmersive_home_214_platformqca8081_firmwareqcn9001sm7250-absnapdragon_x50_5g_modem-rf_systemwcd9340_firmwareipq5028_firmwarewcd9395_firmwareqcn6024sdm845ar9380qcc710_firmwareqca6426sc8180x-abwcn3610sa4150pqcn5124_firmwaresm7325-ae_firmwarewsa8832_firmwareqca8337qca6426_firmwarewcd9395qcn7605qca6574au_firmwareqcn7606_firmwareipq8078a_firmwarewcn785x-5qca6564_firmwareqam8295pwcd9341sd626_firmwaresnapdragon_x12_lte_modemwsa8810_firmwaresd730_firmwarewsa8845h_firmwareqca2064_firmwaresdm670sm8150-acsm6375_firmwaresd835_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaresm7150-acvideo_collaboration_vc1_platform_firmwaresa4155pqcn9000sd821qca2062_firmwaresm6375sm7250-aa_firmwaresc8180xp-acqsm8350_firmwarevideo_collaboration_vc1_platformwcd9385_firmwareqca6421qca6310snapdragon_630_mobile_platformipq8074a_firmwareipq8076awcd9360snapdragon_ar2_gen_1_platform_firmwareapq8053-aa_firmwaresd821_firmwareimmersive_home_3210_platform_firmwaresa6155psm7150-ac_firmwareqca6564au_firmwaresd820qca8075qam8650pvideo_collaboration_vc5_platform_firmwaresm7325_firmwaresa6155p_firmwaremdm9640_firmwareqca6390_firmwaresd835qca6436_firmwareipq8070a_firmwareqcn5021_firmwareqcn9070sc8180x-afsnapdragon_8_gen_2_mobile_platformsnapdragon_7c\+_gen_3_compute_firmwareqca8084sm4125_firmwaresm8250-ac_firmwareqca6420qca6174_firmwarewcn3910apq8064au_firmwarecsrb31024qca9367mdm9250_firmwareqcc2076snapdragon_x55_5g_modem-rf_system_firmwarewcn3660bqca6574asm7325-aeqca6174aqca6584_firmwareqca9898_firmwarewcd9340qcs8250_firmwareqcm2290snapdragon_630_mobile_platform_firmwaresm6150-acsm6225sc8180xp-aa_firmwareqcn6122_firmwareqcn5154_firmwaresm8150-ac_firmwareipq8074sm8550p_firmwarewcn3998_firmwareqcm8550snapdragon_x20_lte_modem_firmwarewcn3988qcn5122_firmwarepmp8074qcn9024qca6574sm7325-afsnapdragon_x75_5g_modem-rf_systemqca2066_firmwaresdm710_firmwaresc8180xp-ac_firmwareqca8082qcs410qcm2290_firmwaresa8155pqca8072_firmwarewsa8830sm8550psa6145pqcn6122sa8255p_firmwareqcc2073wcn785x-1_firmwaremdm8215msm8996auqrb5165m_firmwaremdm9645qca9985snapdragon_x5_lte_modemipq8071aapq8064auqcn6112wcn3950_firmwareqrb5165nqca1062_firmwaresc7180-acsm7325p_firmwaresd460wcd9360_firmwares820a_firmwarevideo_collaboration_vc3_platform_firmwareqcn6023_firmwareqcn5164_firmwaresd670_firmwareimmersive_home_326_platform_firmwareqca6438_firmwaresc8280xp-bb_firmwareqcn9072sm7150-aaipq4028_firmwareqcn6224_firmwareqca6431sd660_firmwareqca8082_firmwareqca4020_firmwareqca9379_firmwaresm6350sxr2130_firmwarear8035_firmwareapq8009_firmwareqrb5165mqca1064qca6320snapdragon_w5\+_gen_1_wearable_platform_firmwareqca4024_firmwareqca0000_firmwaresd888_firmwaremdm9215snapdragon_662_mobile_platform_firmwareqcs6125_firmwareqca9992_firmwareqca6428qca9990ipq8070ipq9008_firmwareqcn9074sdm712_firmwarewsa8815_firmwaresm8250-abqca8337_firmwaresnapdragon_x12_lte_modem_firmwaresm7325ipq8173sm8350-ac_firmwaresm7250p_firmwarewcn3999ipq6010_firmwarewcn785x-5_firmwarewcn3950sm4250-aasnapdragon_x65_5g_modem-rf_system_firmwareqca6797aq_firmwaresm4350_firmwaresm7350-ab_firmwareipq5028qca9986wcn3991qcn9070_firmwaresa8295p_firmwaresd_675_firmwaresa4155p_firmwareqca9984ipq5010_firmwareqcn9022_firmwaresm7250pcsrb31024_firmwareipq6018sa8155sd_8cx_firmwaresm7150-aa_firmwaresd888sd460_firmwaresnapdragon_4_gen_2_mobile_platformipq8069wcn685x-5ipq8065qca6310_firmwaresd626qcs7230sm8250-acs820awcd9371qcn9001_firmwaresc8180xp-aasnapdragon_xr2_5g_platform_firmwareqca8075_firmwarevision_intelligence_300_platform_firmwaremdm9645_firmwaresm7350-abqrb5165_firmwaresm8350_firmwareqca2065_firmwaresdx65m_firmwarevideo_collaboration_vc3_platformqca9980_firmwareqca9985_firmwareqca6431_firmwaresm7225_firmwareqca6175a_firmwaresm6125qca6698aq_firmwareqcs2290qcn76068998_firmwareqcs2290_firmwaresc8280xp-bbwcn3615qca9367_firmwareqca8084_firmwarewcn3999_firmwareqcn7605_firmwaresa8255pqcs7230_firmwarewcd9390_firmwareimmersive_home_318_platform_firmwaresc8180xp-abwcn6750qcn5024qca6430wcn6750_firmwaremdm9650sc8180xp-ad_firmwaresnapdragon_auto_5g_modem-rfsm7250-ab_firmwaressg2125p9206_lte_modem_firmwarecsra6640_firmwaresm4350immersive_home_326_platformqam8650p_firmwarewcn3998qcn9013_firmwareqca2062video_collaboration_vc5_platformqca6420_firmwareqcs6490_firmwaresm8450snapdragon_x65_5g_modem-rf_systemipq8076_firmwaresd855_firmwarewcd9335_firmwaremdm9640qca6436qrb5165n_firmwaresnapdragon_1200_wearable_platformsnapdragon_x24_lte_modem_firmwarewcn3980_firmwareqca6391_firmwarewsa8835wsa8840_firmwaresm4250-aa_firmwaremdm9310_firmwareipq8068qcs4290_firmwarecsra6620qca8081sd660mdm9628sm4375sdm670_firmwareqam8775pqca9377wsa8815qcm4325_firmwaresm7125_firmwareipq8069_firmwareqcm4290_firmwareqca9888_firmwareqca9889qca6175aqca1062qcn5024_firmwareqcn9002_firmwareipq5010qrb5165qcn9274_firmwaremdm9615_firmwaresg4150p_firmwaresc8180xp-af_firmwarecsra6620_firmwaresnapdragon_820_mobile_platform_firmwareqcs8550ipq8068_firmwaremdm8215_firmwareqam8775p_firmwaresd865_5g_firmwarepmp8074_firmwaresc7180-ad_firmwarewcd9375sdm712qca9889_firmwaresa8145psd_675immersive_home_316_platformsm4350-ac_firmwareqca2066csr8811apq8053-aasc7180-ac_firmwaresm7250-ac_firmwarewcn685x-1_firmwarewcn3680b_firmwareqcm8550_firmwareapq8017qcs410_firmwaresa6150p_firmwaresw5100pipq9574qcn9000_firmwareqcn6102_firmwaresxr1120vision_intelligence_300_platformqcn9022qcs610_firmwarewcd9335wcd9370qca8072qca6696wcd9341_firmware8998qcn9003_firmwareqca6390qcc2073_firmwareipq8076wcn6740_firmwareqca1064_firmwareipq6018_firmwareqca9984_firmwareqcn6023immersive_home_216_platformqca9994_firmwareipq6000snapdragon_auto_4g_modemipq8078asm8150_firmwareqca6574auwcd9390csra6640sc8180x-af_firmwareqcn9100_firmwarewcn3660b_firmwareqcn5122sd730qca6554aqcn6024_firmwaresdx20mqca9886_firmwaresm8350qcm6125_firmwaressg2115pqcc710snapdragon_850_mobile_compute_platformqcn6132_firmwaremdm9615sxr1120_firmwaresnapdragon_x5_lte_modem_firmwareqcn5054robotics_rb3_platform315_5g_iot_modem_firmwaresm8450_firmwareipq5332_firmwareqcn5052qca9980qfw7114315_5g_iot_modemipq9574_firmwaresnapdragon_x55_5g_modem-rf_systemqam8255p_firmwaresnapdragon_821_mobile_platform_firmwareipq8064sa8155_firmwareqcn5164sm7150-abqca6335qcs4490sc7180-adsc8180xp-afmdm9250snapdragon_8\+_gen_2_mobile_platform_firmwarewsa8845qcn6100_firmwareqca6421_firmwareqcm6125sc8180x-adcsr8811_firmwaresm7125wsa8810qcn5021qca8085snapdragon_8\+_gen_2_mobile_platformsm8350-acqcn6100qca6595ausm7315_firmwarewcd9326_firmwarewsa8840qcs8550_firmwareqca9986_firmwareqfw7124_firmwareqcn9012mdm9650_firmwaresnapdragon_821_mobile_platformwcd9371_firmwareqcs4490_firmwarewcn3910_firmwareapq8009qca4531_firmwaresdx65mwcd9370_firmwareipq9570mdm9310sa8195pqca6335_firmwareqcm6490immersive_home_316_platform_firmwareimmersive_home_3210_platformqcn9274qca9379ipq8076a_firmwareipq9570_firmwaresxr2230p_firmwarear9380_firmwaresd675_firmwareqca6430_firmwaresc8180x-aaipq4029_firmwareqcn9011qcn9024_firmwarewsa8845hsa6150psm7250-aawcd9326sa8155p_firmwareqca6564asnapdragon_675_mobile_platformsnapdragon_662_mobile_platformqcn9074_firmwarevision_intelligence_400_platform_firmwareipq8174sc8180x\+sdx55_firmwareflight_rb5_5g_platform_firmwareipq8174_firmwarear8035ipq8072aqca6564sa6155qca2065qcm4325qcn6224sc8280xp-absm8475_firmwaresc8180x\+sdx55qca6698aqssg2125p_firmwaresm6250sm7250-acsc8180x-aa_firmwaresd670wcn685x-1sa8145p_firmwarewcn3680bsnapdragon_820_mobile_platformsa8150p_firmwaresnapdragon_w5\+_gen_1_wearable_platformsnapdragon_636_mobile_platform_firmwarewcn3990qca6428_firmwareqcn9002ipq8078qcs6490qcs8250ipq9554_firmwarear8031_firmwarewsa8830_firmwareqca6678aq_firmwareqca8386_firmwaresnapdragon_850_mobile_compute_platform_firmwarewsa8845_firmwarewsa8832snapdragon_auto_4g_modem_firmwareqcc2076_firmwareqca6678aqsnapdragon_675_mobile_platform_firmwareqcn5022_firmwaresm8475qca9992sm8250-ab_firmwaresa4150p_firmwareqca9898ipq9008ipq9554qca6564ausm6225_firmwaresc8180xp-adsm6250p_firmwareimmersive_home_214_platform_firmwaresm7325-af_firmwaresa8195p_firmwareapq8053-ac_firmwareqcm4290qcn5054_firmwareqca9888ipq5332sd_455_firmwaresm6125_firmwareqcn9013ar8031snapdragon_1200_wearable_platform_firmwareqca9377_firmwareqcm6490_firmwareipq8072a_firmwaresm4125qcm4490_firmwarerobotics_rb3_platform_firmwareflight_rb5_5g_platformsnapdragon_xr2_5g_platformqcn6112_firmwareqcs6125apq5053-aa_firmwaresnapdragon_7c\+_gen_3_computeqca8085_firmwareapq5053-aasdm710sd_455qca9886qcn6132sm6250_firmwaresc8180x-ad_firmwareqcn6102qca6584auqca6320_firmwareqcn6274_firmwareqcn9011_firmwaresw5100_firmwarewcn6740sm6225-ad_firmwareqfw7114_firmwareqca4024sc8280xp-ab_firmwareqca6595_firmwaresm8250_firmwareimmersive_home_216_platform_firmwareipq8070asm7225apq8017_firmwarewcd9380ipq4028qam8255psa6145p_firmwaresa6155_firmwaresxr2230pqca9990_firmwaresa8150pqcn9003snapdragon_x24_lte_modemmsm8996au_firmwareqcn5052_firmwaresnapdragon_auto_5g_modem-rf_firmwareqca2064sxr1230psm6225-adsd662_firmwaresm4350-acipq6010sdm660_firmwaresw5100aqt1000sm8150wcn3991_firmwareqam8295p_firmwaresd855sdm660sc8180x-ab_firmwareqca6174wcd9330_firmwarewcn3990_firmwaresm7315qca6564a_firmwaresdx20m_firmwareqca9994qsm8350sc8180xp-ab_firmwarewcd9385wcd9330sd662wcn3610_firmwareqcs4290sxr1230p_firmwareipq4018sd820_firmwaresm6250psdx55_firmwareipq8071a_firmwareqca6438wcn3615_firmwareqca6554a_firmwaresxr2130ipq6028qcm44908098_firmwaresnapdragon_636_mobile_platformqcn9100sm7150-ab_firmwareqca4020ipq4029qca6174a_firmwaresm7325paqt1000_firmwareipq4018_firmwaresm6150-ac_firmwareqca6584au_firmwareqcn5152_firmwareqcn6274sc8180x-acqfw7124ipq8074_firmwareqca6595au_firmwareqca0000sc8180x-ac_firmwaresw5100p_firmwaresm8250snapdragon_ar2_gen_1_platformqca6696_firmwareapq8053-acwcd9380_firmwareqca6574_firmwaresg4150psd_8_gen1_5gqcn5124ipq8064_firmwaremdm9628_firmwareqca6797aqqcn5152ipq8065_firmwaresm4375_firmwarevision_intelligence_400_platform9206_lte_modemqca6574a_firmwaresdx55qcn9072_firmwaresdm845_firmwareipq8074aimmersive_home_318_platformsd675sm6350_firmwaresd_8_gen1_5g_firmwarewcd9375_firmwareqca4531qca6391qca8386wcn785x-1ipq8173_firmwareqcn9012_firmwareqca6584snapdragon_8_gen_2_mobile_platform_firmwaresa8295p8098snapdragon_xr1_platform_firmwaresnapdragon_x50_5g_modem-rf_system_firmwareipq6000_firmwareipq8078_firmwarewcn685x-5_firmwarewcn3988_firmwareipq8070_firmwareqcn5154sd_8cxwsa8835_firmwaressg2115p_firmwareqcn5022snapdragon_x75_5g_modem-rf_system_firmwarewcn3980qcs610Snapdragonsnapdragon
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-126
Buffer Over-read
CVE-2023-33097
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.15% / 35.06%
||
7 Day CHG~0.00%
Published-05 Dec, 2023 | 03:04
Updated-02 Aug, 2024 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in WLAN Firmware

Transient DOS in WLAN Firmware while processing a FTMR frame.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcn5024_firmwareqam8255p_firmwaresnapdragon_8_gen_1_mobile_platformwsa8830qcn9070sxr2230p_firmwareqca8337qam8650pqfw7124sg8275p_firmwareipq8173_firmwareqam8775pqcf8001qcn6224_firmwareqcn5124qca4024_firmwareqca8082qcn9072qca8386wsa8840immersive_home_318_platform_firmwareipq8078aipq5028_firmwareqca6595au_firmwareipq6000ssg2115pqcn5152_firmwareqca0000_firmwareqca6584au_firmwareqcn9000_firmwaresnapdragon_8_gen_2_mobile_platformipq9554qca6554a_firmwarewcd9385_firmwareimmersive_home_216_platformipq8076aimmersive_home_316_platformimmersive_home_316_platform_firmwareqca8386_firmwareqcn6024_firmwaresd_8_gen1_5g_firmwareqca8084_firmwareimmersive_home_318_platformipq8074aqcn5124_firmwareqca8082_firmwareqca6574au_firmwareqcn5122_firmwareqcn5164_firmwaresdx55_firmwareqca6595auqca8081_firmwareqcn6023_firmwareqfw7114wsa8845h_firmwareqcn9002ipq5010qca6564au_firmwareqca6584ausnapdragon_x65_5g_modem-rf_system_firmwareqcm8550_firmwareipq8078a_firmwareqcn9274ipq8174qcn9001ipq5028wsa8840_firmwareqca6698aqqcn5052qca0000qcf8001_firmwareipq6010qcs8550_firmwaresc8380xp_firmwareqcn6112_firmwareqcn9074qca8085sdx65mwcd9340qcn6132qcn6224qcn9013wsa8845hsnapdragon_ar2_gen_1_platform_firmwaresnapdragon_x75_5g_modem-rf_systemwcd9395_firmwareqca8081qcf8000qca6698aq_firmwareipq8071aqcn6023sdx65m_firmwareipq8071a_firmwareimmersive_home_3210_platformqca8085_firmwareqam8775p_firmwareqca9888_firmwareqcn6122wcd9385qca6696_firmwareipq9008_firmwareipq9570qcn5154_firmwareqca6797aqar8035csr8811wcd9390qcc710_firmwareqcn9100_firmwarewsa8830_firmwareipq5010_firmwareipq8074a_firmwarewsa8835_firmwareqcn5022_firmwareimmersive_home_216_platform_firmwaresnapdragon_8_gen_2_mobile_platform_firmwareqca8072qca8337_firmwarewcd9380_firmwaressg2125pqcn9000ipq8072aqcf8000_firmwareqca6554aipq8076a_firmwareqca6595ipq8078qca6564auqca8084ipq8173qcm8550qcn9001_firmwareipq9008qcn9012qcn5164immersive_home_326_platform_firmwareqcn6122_firmwareqca6574sxr1230p_firmwarewsa8835snapdragon_8\+_gen_2_mobile_platform_firmwarecsr8811_firmwaresd_8_gen1_5gqcn6274wcd9380ipq9554_firmwareqcn5054_firmwareqcn5154qca8075_firmwaressg2125p_firmwareqca6574aqcn5024qca9889qcn6132_firmwareqcn9003_firmwaresxr1230pqca9888qca8072_firmwaresg8275pqcn9012_firmwareqcn5052_firmwareqcn9274_firmwareqcc2076_firmwareipq8070a_firmwareqcn9003qfw7114_firmwarewsa8845qcc2073_firmwareipq6018_firmwareipq8076_firmwareqca6574_firmwarewcd9340_firmwareqcn6112sxr2230pipq8076wsa8845_firmwareqca6574a_firmwareqcn5152ipq6028sc8380xpqcn9024ipq9574_firmwareimmersive_home_3210_platform_firmwarefastconnect_7800qcn9100qcn6274_firmwaresnapdragon_x65_5g_modem-rf_systemipq8078_firmwareipq9570_firmwarefastconnect_6900qcn5054qcn9070_firmwarefastconnect_6900_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewsa8832_firmwareipq6028_firmwareipq8072a_firmwareqca6797aq_firmwareqca6574auqca9889_firmwareipq9574qcn5122qcn9024_firmwareipq8174_firmwarefastconnect_7800_firmwaresnapdragon_8\+_gen_2_mobile_platformwsa8832ipq5332_firmwareipq5332sm8550psnapdragon_8_gen_1_mobile_platform_firmwareimmersive_home_326_platformsnapdragon_ar2_gen_1_platformipq6018qcn5022qcn9013_firmwareqam8650p_firmwareqcc710ipq6010_firmwareimmersive_home_214_platformqca6595_firmwarewcd9395qca6696qcs8550immersive_home_214_platform_firmwareqca4024sm8550p_firmwaresdx55qca8075qcn9022_firmwarewcd9390_firmwareqcn6024qcn9022qcc2076ipq8070aqcn9002_firmwareqcn9072_firmwareipq6000_firmwaressg2115p_firmwareqcn9074_firmwareqfw7124_firmwareqam8255pqcc2073ar8035_firmwareSnapdragon
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-33048
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.19% / 41.34%
||
7 Day CHG~0.00%
Published-07 Nov, 2023 | 05:26
Updated-02 Aug, 2024 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer over-read in WLAN Firmware

Transient DOS in WLAN Firmware while parsing t2lm buffers.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcn5024_firmwareqam8255p_firmwarewsa8830qcn9070sxr2230p_firmwareqca8337qam8650pqfw7124ipq8173_firmwarewcn785x-5qam8775pqcf8001qcn6224_firmwareqcn5124qca4024_firmwareqca8082qcn9072qca8386wsa8840immersive_home_318_platform_firmwareipq8078aipq5028_firmwareqca6595au_firmwareipq6000ssg2115pqcn5152_firmwareqca0000_firmwareqca6584au_firmwarewcn685x-1qcn9000_firmwaresnapdragon_8_gen_2_mobile_platformipq9554qca6554a_firmwarewcd9385_firmwareimmersive_home_216_platformipq8076aimmersive_home_316_platformimmersive_home_316_platform_firmwareqca8386_firmwareqcn6024_firmwareqca8084_firmwareimmersive_home_318_platformipq8074aqcn5124_firmwareqca8082_firmwareqca6574au_firmwareqcn5122_firmwareqcn5164_firmwaresdx55_firmwareqca6595auqca8081_firmwareqcn6023_firmwareqfw7114wsa8845h_firmwareipq5010qca6564au_firmwareqca6584ausnapdragon_x65_5g_modem-rf_system_firmwareqcm8550_firmwareipq8078a_firmwareqcn9274ipq8174ipq5028wsa8840_firmwareqca6698aqqcn5052qca0000qcf8001_firmwareipq6010sc8380xp_firmwareqcn6112_firmwareqcn9074qca8085sdx65mwcd9340qcn6132qcn6224qcn9013wsa8845hsnapdragon_ar2_gen_1_platform_firmwaresnapdragon_x75_5g_modem-rf_systemwcd9395_firmwareqca8081qcf8000qca6698aq_firmwareipq8071aqcn6023sdx65m_firmwareipq8071a_firmwarewcn685x-1_firmwareimmersive_home_3210_platformqca8085_firmwareqam8775p_firmwareqca9888_firmwareqcn6122wcd9385qca6696_firmwareipq9008_firmwareipq9570qcn5154_firmwareqca6797aqar8035csr8811wcd9390qcc710_firmwareqcn9100_firmwarewsa8830_firmwareipq5010_firmwareipq8074a_firmwarewsa8835_firmwareqcn5022_firmwareimmersive_home_216_platform_firmwaresnapdragon_8_gen_2_mobile_platform_firmwarewcn785x-1qca8337_firmwarewcd9380_firmwaressg2125pqcn9000ipq8072aqcf8000_firmwareqca6554aipq8076a_firmwareqca6595ipq8078qca6564auqca8084ipq8173qcm8550ipq9008qcn9012qcn5164immersive_home_326_platform_firmwareqcn6122_firmwareqca6574sxr1230p_firmwarewsa8835snapdragon_8\+_gen_2_mobile_platform_firmwarecsr8811_firmwareqcn6274wcd9380ipq9554_firmwareqcn5154qca8075_firmwaressg2125p_firmwareqca6574aqcn5024wcn685x-5_firmwareqca9889qcn6132_firmwaresxr1230pqca9888qcn9012_firmwareqcn5052_firmwareqcn9274_firmwareqcc2076_firmwareipq8070a_firmwareqfw7114_firmwarewsa8845qcc2073_firmwareipq6018_firmwareipq8076_firmwareqca6574_firmwarewcd9340_firmwareqcn6112sxr2230pipq8076wsa8845_firmwareqca6574a_firmwareqcn5152ipq6028sc8380xpqcn9024ipq9574_firmwarewcn785x-5_firmwareimmersive_home_3210_platform_firmwareqcn9100qcn6274_firmwaresnapdragon_x65_5g_modem-rf_systemipq8078_firmwareipq9570_firmwareqcn9070_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewsa8832_firmwarewcn685x-5ipq6028_firmwareipq8072a_firmwareqca6797aq_firmwarewcn785x-1_firmwareqca6574auqca9889_firmwareipq9574qcn5122qcn9024_firmwareipq8174_firmwaresnapdragon_8\+_gen_2_mobile_platformwsa8832ipq5332_firmwareipq5332sm8550pimmersive_home_326_platformsnapdragon_ar2_gen_1_platformipq6018qcn5022qcn9013_firmwareqam8650p_firmwareqcc710ipq6010_firmwareimmersive_home_214_platformqca6595_firmwarewcd9395qca6696immersive_home_214_platform_firmwareqca4024sm8550p_firmwaresdx55qca8075qcn9022_firmwarewcd9390_firmwareqcn6024qcn9022qcc2076ipq8070aqcn9072_firmwareipq6000_firmwaressg2115p_firmwareqcn9074_firmwareqfw7124_firmwareqam8255pqcc2073ar8035_firmwareSnapdragonqcn5024_firmwareqam8255p_firmwareqca8337_firmwarewcd9380_firmwaresxr2230p_firmwareqcf8000_firmwareipq8076a_firmwareipq8173_firmwarear8035_firmwareqcn6224_firmwareqca4024_firmwareimmersive_home_326_platform_firmwareqcn6122_firmwaresxr1230p_firmwareimmersive_home_318_platform_firmwarecsr8811_firmwareipq5028_firmwareqca6595au_firmwareipq9554_firmwareqca8075_firmwaressg2125p_firmwareqcn5152_firmwareqca0000_firmwareqcn6132_firmwareqca6584au_firmwareqcn9000_firmwareqcn9012_firmwareqcn5052_firmwareqcn9274_firmwareqcc2076_firmwareipq8070a_firmwareqca6554a_firmwareqfw7114_firmwarewcd9385_firmwareqcn6024_firmwareqca8386_firmwareqcc2073_firmwareimmersive_home_316_platform_firmwareipq6018_firmwareipq8076_firmwareqca6574_firmwarewcd9340_firmwareqca8084_firmwareqcn5124_firmwarewsa8845_firmwareqca8082_firmwareqca6574a_firmwareqca6574au_firmwareqcn5122_firmwareqcn5164_firmwaresdx55_firmwarewsa8845h_firmwareqca8081_firmwareqcn6023_firmwareipq9574_firmwareimmersive_home_3210_platform_firmwareqca6564au_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareqcm8550_firmwareipq8078a_firmwareqcn6274_firmwarewsa8840_firmwareipq8078_firmwareipq9570_firmwareqcn9070_firmwaresnapdragon_x75_5g_modem-rf_system_firmwareqcf8001_firmwarewsa8832_firmwarefastconnect_6900_firmwareipq6028_firmwaresc8380xp_firmwareipq8072a_firmwareqcn6112_firmwareqca6797aq_firmwareqca9889_firmwareqcn9024_firmwareipq8174_firmwarefastconnect_7800_firmwaresnapdragon_ar2_gen_1_platform_firmwarewcd9395_firmwareipq5332_firmwareqca6698aq_firmwaresdx65m_firmwareqcn9013_firmwareipq8071a_firmwareqam8650p_firmwareqca8085_firmwareqam8775p_firmwareqca9888_firmwareipq6010_firmwareqca6696_firmwareqca6595_firmwareipq9008_firmwareqcn5154_firmwareimmersive_home_214_platform_firmwaresm8550p_firmwareqcc710_firmwareqcn9100_firmwareqcn9022_firmwarewsa8830_firmwarewcd9390_firmwareipq5010_firmwareipq8074a_firmwareqcn9072_firmwarewsa8835_firmwareipq6000_firmwaressg2115p_firmwareqcn9074_firmwareqcn5022_firmwareqfw7124_firmwareimmersive_home_216_platform_firmwaresnapdragon_8_gen_2_mobile_platform_firmware
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-33027
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.19% / 41.34%
||
7 Day CHG~0.00%
Published-03 Oct, 2023 | 05:00
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in WLAN Firmware

Transient DOS in WLAN Firmware while parsing rsn ies.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd865_5gqca6595snapdragon_xr1_platformipq6028_firmwareimmersive_home_214_platformqca8081_firmwareqcn9001sm7250-absnapdragon_x50_5g_modem-rf_systemwcd9340_firmwareipq5028_firmwarewcd9395_firmwareqcn6024ar9380qcc710_firmwareqca6426sc8180x-absa4150pqcn5124_firmwaresm7325-ae_firmwarewsa8832_firmwareqca8337qca6426_firmwarewcd9395qcn7605qca6574au_firmwareqcn7606_firmwareipq8078a_firmwarewcn785x-5qam8295pwcd9341wsa8810_firmwaresd730_firmwarewsa8845h_firmwareqca2064_firmwaresdm670sm8150-acsm6375_firmwaresd835_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaresm7150-acvideo_collaboration_vc1_platform_firmwaresa4155pqcn9000qca2062_firmwaresm6375sm7250-aa_firmwareqsm8250_firmwaresc8180xp-acqsm8350_firmwarevideo_collaboration_vc1_platformwcd9385_firmwareqca6421qca6310snapdragon_630_mobile_platformipq8074a_firmwareipq8076aqcs603_firmwarewcd9360snapdragon_ar2_gen_1_platform_firmwareimmersive_home_3210_platform_firmwaresa6155psm7150-ac_firmwareqca6564au_firmwareqca8075qam8650pvideo_collaboration_vc5_platform_firmwaresm7325_firmwaresa6155p_firmwareqca6390_firmwaresd835qca6436_firmwareipq8070a_firmwareqcn5021_firmwareqcn9070sc8180x-afsnapdragon_8_gen_2_mobile_platformsnapdragon_7c\+_gen_3_compute_firmwareqca8084sm4125_firmwaresm8250-ac_firmwareqca6420wcn3910csrb31024snapdragon_845_mobile_platformsnapdragon_x55_5g_modem-rf_system_firmwareqcc2076snapdragon_660_mobile_platformqca6574asm7325-aeqca9898_firmwarewcd9340qcs8250_firmwareqcm2290snapdragon_630_mobile_platform_firmwaresm6150-acsc8180xp-aa_firmwareqcn6122_firmwareqcn5154_firmwaresm8150-ac_firmwareipq8074sm8550p_firmwarewcn3998_firmwareqcm8550wcn3988qcn5122_firmwareqcn9024pmp8074qca6574sm7325-afsnapdragon_x75_5g_modem-rf_systemqca2066_firmwaresdm710_firmwaresc8180xp-ac_firmwareqca8082qcs410qcm2290_firmwaresa8155pqca8072_firmwarewsa8830sm8550psa6145pqcn6122sa8255p_firmwarewcn785x-1_firmwareqcc2073qrb5165m_firmwareqca9985ipq8071aqcn6112wcn3950_firmwareqrb5165nqca1062_firmwaresc7180-acsm7325p_firmwaresd460wcd9360_firmwarevideo_collaboration_vc3_platform_firmwareqcn6023_firmwareqcn5164_firmwaresd670_firmwareimmersive_home_326_platform_firmwareqca6438_firmwaresc8280xp-bb_firmwareqcn9072sm7150-aaqcn6224_firmwareipq4028_firmwareqca6431sd660_firmwareqca8082_firmwaresm6350sxr2130_firmwarear8035_firmwareqrb5165mqca1064qca6320snapdragon_w5\+_gen_1_wearable_platform_firmwareqca4024_firmwareqca0000_firmwaresd888_firmwaresnapdragon_662_mobile_platform_firmwareqcs6125_firmwareqca9992_firmwareqca6428qca9990ipq8070ipq9008_firmwareqcn9074sdm712_firmwarewsa8815_firmwaresm8250-abqca8337_firmwaresm7325ipq8173sm8350-ac_firmwaresm7250p_firmwarewcn3999ipq6010_firmwarewcn785x-5_firmwarewcn3950sm4250-aasnapdragon_x65_5g_modem-rf_system_firmwareqca6797aq_firmwaresm4350_firmwaresm7350-ab_firmwareipq5028qca9986wcn3991qcf8001_firmwareqcn9070_firmwaresa8295p_firmwaresd_675_firmwaresa4155p_firmwareqca9984ipq5010_firmwareqcn9022_firmwaresm7250pcsrb31024_firmwareipq6018sa8155sd_8cx_firmwaresm7150-aa_firmwaresnapdragon_845_mobile_platform_firmwaresd888sd460_firmwaresnapdragon_4_gen_2_mobile_platformipq8069wcn685x-5ipq8065qca6310_firmwareqcs7230sm8250-acwcd9371qcn9001_firmwaresc8180xp-aasnapdragon_xr2_5g_platform_firmwareqca8075_firmwarevision_intelligence_300_platform_firmwaresm7350-absm8350_firmwareqca2065_firmwaresdx65m_firmwarevideo_collaboration_vc3_platformqca9980_firmwareqca9985_firmwareqca6431_firmwaresm7225_firmwareqca6698aq_firmwareqcs2290qcn76068998_firmwareqcs2290_firmwaresc8280xp-bbwcn3999_firmwareqca8084_firmwareqcn7605_firmwaresa8255pqcs7230_firmwarewcd9390_firmwareimmersive_home_318_platform_firmwaresc8180xp-abwcn6750qcn5024qca6430wcn6750_firmwaresc8180xp-ad_firmwaresnapdragon_auto_5g_modem-rfsm7250-ab_firmwaressg2125pcsra6640_firmwaresm4350immersive_home_326_platformqcn9013_firmwareqam8650p_firmwarewcn3998qca2062video_collaboration_vc5_platformqca6420_firmwareqcs6490_firmwaresm8450snapdragon_x65_5g_modem-rf_systemipq8076_firmwaresd855_firmwarewcd9335_firmwareqrb5165n_firmwareqca6436wcn3980_firmwarewsa8835wsa8840_firmwareqca6391_firmwaresm4250-aa_firmwareipq8068qcs4290_firmwarecsra6620qca8081sd660sdm670_firmwaresm4375wsa8815qam8775pqcm4325_firmwaresm7125_firmwareipq8069_firmwareqcm4290_firmwareqca9888_firmwareqca9889qca1062qcn5024_firmwareqcn9002_firmwareipq5010qcn9274_firmwaresg4150p_firmwaresc8180xp-af_firmwarecsra6620_firmwareqcs8550ipq8068_firmwareqam8775p_firmwaresd865_5g_firmwarepmp8074_firmwaresc7180-ad_firmwarewcd9375sdm712qca9889_firmwaresa8145psd_675immersive_home_316_platformsm4350-ac_firmwareqca2066csr8811sc7180-ac_firmwaresm7250-ac_firmwarewcn685x-1_firmwareqcm8550_firmwareqcs410_firmwaresa6150p_firmwaresw5100psxr1120ipq9574qcn9000_firmwareqcn6102_firmwarevision_intelligence_300_platformqcn9022qcs610_firmwarewcd9335wcd9370qca8072qca6696wcd9341_firmware8998qcn9003_firmwareqca6390qcc2073_firmwareipq8076wcn6740_firmwareqca1064_firmwareipq6018_firmwareqca9984_firmwareqcn6023immersive_home_216_platformqca9994_firmwareipq6000snapdragon_auto_4g_modemipq8078asm8150_firmwareqca6574auwcd9390csra6640sc8180x-af_firmwareqcn9100_firmwareqcn5122sd730qca6554aqcn6024_firmwareqca9886_firmwaresm8350qcm6125_firmwaressg2115pqcc710snapdragon_850_mobile_compute_platformqcn6132_firmwaresxr1120_firmwareqcn5054robotics_rb3_platform315_5g_iot_modem_firmwaresm8450_firmwareipq5332_firmwareqcn5052qca9980qfw7114315_5g_iot_modemipq9574_firmwaresnapdragon_x55_5g_modem-rf_systemqam8255p_firmwareipq8064sa8155_firmwareqcn5164sm7150-abqca6335qcs4490sc7180-adsc8180xp-afsnapdragon_8\+_gen_2_mobile_platform_firmwarewsa8845qcn6100_firmwareqca6421_firmwareqcm6125sc8180x-adcsr8811_firmwaresm7125wsa8810qcn5021qca8085qsm8250snapdragon_8\+_gen_2_mobile_platformsm8350-acqcn6100qca6595ausm7315_firmwarewcd9326_firmwarewsa8840qcs8550_firmwareqca9986_firmwareqfw7124_firmwareqcn9012wcd9371_firmwareqcs4490_firmwareqcf8001wcn3910_firmwaresdx65mwcd9370_firmwareipq9570sa8195pqca6335_firmwareqcm6490immersive_home_316_platform_firmwareimmersive_home_3210_platformqcn9274ipq8076a_firmwareipq9570_firmwaresxr2230p_firmwarear9380_firmwaresd675_firmwareqca6430_firmwaresc8180x-aaipq4029_firmwareqcn9011qcs605qcn9024_firmwarewsa8845hsa6150psm7250-aawcd9326sa8155p_firmwareqca6564asnapdragon_675_mobile_platformsnapdragon_662_mobile_platformqcn9074_firmwareipq8174sc8180x\+sdx55_firmwareflight_rb5_5g_platform_firmwareipq8174_firmwaresnapdragon_665_mobile_platformar8035ipq8072asa6155qca2065qcm4325robotics_rb5_platformqcn6224sc8280xp-absm8475_firmwaresc8180x\+sdx55qca6698aqssg2125p_firmwaresm6250sm7250-acsc8180x-aa_firmwaresd670wcn685x-1sa8145p_firmwaresa8150p_firmwaresnapdragon_w5\+_gen_1_wearable_platformsnapdragon_636_mobile_platform_firmwarewcn3990qca6428_firmwareqcn9002ipq8078snapdragon_680_4g_mobile_platform_firmwareqcs6490qcs8250ipq9554_firmwarear8031_firmwarewsa8830_firmwareqca6678aq_firmwareqca8386_firmwaresnapdragon_850_mobile_compute_platform_firmwarewsa8845_firmwarewsa8832snapdragon_auto_4g_modem_firmwareqcc2076_firmwareqcs603qca6678aqsnapdragon_675_mobile_platform_firmwareqcn5022_firmwaresm8475qca9992sm8250-ab_firmwaresa4150p_firmwareqca9898ipq9008ipq9554qca6564ausc8180xp-adsm6250p_firmwareimmersive_home_214_platform_firmwaresm7325-af_firmwaresa8195p_firmwareqcm4290qcn5054_firmwareqca9888ipq5332snapdragon_680_4g_mobile_platformsd_455_firmwareqcn9013ar8031sg8275p_firmwareqcm6490_firmwareipq8072a_firmwaresm4125qcm4490_firmwarerobotics_rb3_platform_firmwareflight_rb5_5g_platformsnapdragon_xr2_5g_platformqcn6112_firmwareqcs6125apq5053-aa_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_xr2\+_gen_1_platform_firmwareqca8085_firmwareapq5053-aasdm710sd_455qca9886qcn6132sm6250_firmwaresc8180x-ad_firmwareqcn6102qca6584auqca6320_firmwareqcn6274_firmwareqcn9011_firmwaresw5100_firmwarewcn6740sm6225-ad_firmwareqfw7114_firmwareqcs605_firmwareqca4024sc8280xp-ab_firmwareqca6595_firmwaresm8250_firmwareimmersive_home_216_platform_firmwareipq8070asm7225wcd9380ipq4028qam8255psa6145p_firmwaresa6155_firmwaresxr2230pqca9990_firmwaresa8150pqcn9003snapdragon_665_mobile_platform_firmwareqcn5052_firmwaresnapdragon_auto_5g_modem-rf_firmwareqca2064sxr1230psm6225-adsd662_firmwaresm4350-acipq6010sw5100aqt1000sm8150wcn3991_firmwareqam8295p_firmwaresd855sc8180x-ab_firmwarewcn3990_firmwaresm7315qca6564a_firmwarewcd9385qca9994qsm8350sc8180xp-ab_firmwaresd662qcs4290sxr1230p_firmwareipq4018sg8275psm6250psdx55_firmwareipq8071a_firmwareqca6438qca6554a_firmwaresxr2130ipq6028qcm44908098_firmwaresnapdragon_636_mobile_platformqcn9100sm7150-ab_firmwaresnapdragon_xr2\+_gen_1_platformipq4029sm7325paqt1000_firmwareipq4018_firmwaresm6150-ac_firmwareqca6584au_firmwareqcn5152_firmwareqcn6274sc8180x-acqfw7124ipq8074_firmwareqca6595au_firmwareqca0000sc8180x-ac_firmwaresw5100p_firmwaresm8250snapdragon_ar2_gen_1_platformqca6696_firmwarewcd9380_firmwareqca6574_firmwaresg4150psd_8_gen1_5gqcn5124ipq8064_firmwareqca6797aqsm4375_firmwareqcn5152ipq8065_firmwareqca6574a_firmwaresdx55qcn9072_firmwareipq8074aimmersive_home_318_platformsd675sm6350_firmwaresd_8_gen1_5g_firmwarewcd9375_firmwareqca8386qca6391wcn785x-1ipq8173_firmwareqcn9012_firmwaresnapdragon_8_gen_2_mobile_platform_firmwaresa8295p8098snapdragon_xr1_platform_firmwarerobotics_rb5_platform_firmwaresnapdragon_x50_5g_modem-rf_system_firmwareipq6000_firmwareipq8078_firmwarewcn685x-5_firmwarewcn3988_firmwareipq8070_firmwareqcn5154sd_8cxwsa8835_firmwaressg2115p_firmwareqcn5022snapdragon_660_mobile_platform_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewcn3980qcs610Snapdragonqam8255p_firmwaresnapdragon_850_mobile_compute_platform_firmwaresa6150p_firmwaresm6250p_firmwareipq4028_firmware315_5g_iot_modem_firmwaresg8275p_firmwareipq8173_firmwareqca6431_firmwarewcd9360_firmwareqca4024_firmwareimmersive_home_318_platform_firmwarewcn3950_firmwareipq5028_firmwaresa8150p_firmwareqca6595au_firmwaresd_455_firmwarecsra6620_firmwaresd_675_firmwarecsra6640_firmwaresnapdragon_460_mobile_platform_firmwareqcs6125_firmwaresnapdragon_480_5g_mobile_platform_firmwareqca6554a_firmwarewcd9371_firmwareqcn6024_firmwareqca8386_firmwareimmersive_home_316_platform_firmwaresd_8_gen1_5g_firmwareqca8084_firmwareqsm8350_firmwaresnapdragon_660_mobile_platform_firmwaresd460_firmwaresm7315_firmwaresnapdragon_695_5g_mobile_platform_firmwareqca6574au_firmwareqcn5164_firmwarewcd9375_firmwareqca8081_firmwaresa6155_firmwareqca6438_firmwaresnapdragon_auto_5g_modem-rf_firmwareipq8070_firmwareipq8078a_firmwareqca6678aq_firmwaresmart_audio_400_platform_firmwareqrb5165m_firmwarewsa8840_firmwareipq4029_firmwaresa4155p_firmwareqcf8001_firmwaresa8155_firmwarerobotics_rb3_platform_firmwaresd662_firmwareqca6698aq_firmwareqca9888_firmwareqam8775p_firmwareipq8068_firmwareqca2066_firmwareqca6696_firmwareipq9008_firmwareqcn5154_firmwarewcn3910_firmwaresnapdragon_855_mobile_platform_firmwareqcc710_firmwarewsa8830_firmwareqca9992_firmwaresd855_firmwaresd865_5g_firmwaresd660_firmwaresnapdragon_780g_5g_mobile_platform_firmwaresa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwarefastconnect_6800_firmwareqcn5022_firmwareqcn7606_firmwaresa8295p_firmwareimmersive_home_216_platform_firmwaresnapdragon_750g_5g_mobile_platform_firmwaresnapdragon_675_mobile_platform_firmwareqca6428_firmwarequalcomm_video_collaboration_vc1_platform_firmwareqca9985_firmwareipq4018_firmwareqca8337_firmwaresnapdragon_778g_5g_mobile_platform_firmwarewcd9380_firmwareqca9980_firmwareipq8076a_firmwareqcn9001_firmwaresnapdragon_670_mobile_platform_firmwaresd670_firmwarecsr8811_firmwareipq9554_firmwareqcn5054_firmwareqca8072_firmwareqca6430_firmwareqcn5052_firmwareqcn9012_firmwareqcn9274_firmwareqfw7114_firmwarewcd9335_firmwareqca6335_firmwareqcc2073_firmwareipq6018_firmwareqcm4325_firmwarewcd9340_firmwarepmp8074_firmwaresnapdragon_630_mobile_platform_firmwareqca9986_firmwareqca6426_firmwareipq9574_firmwarewcn3980_firmwareimmersive_home_3210_platform_firmwareipq8064_firmwaresnapdragon_x50_5g_modem-rf_system_firmwareqca6421_firmwareqca2062_firmwarewcn6740_firmwareqcs4490_firmwarear8031_firmwareipq8078_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900_firmwareqca6797aq_firmwareqca6564a_firmwareipq8174_firmwareqcn9024_firmwareqcm4290_firmwareqcn7605_firmwaresw5100p_firmwareqcs610_firmwareqca9886_firmwareqca6595_firmwareqca6391_firmwaresnapdragon_710_mobile_platform_firmwareimmersive_home_214_platform_firmwaresa4150p_firmwarewcd9370_firmwaresm8550p_firmwarequalcomm_video_collaboration_vc5_platform_firmwaresd888_firmwareqcn5021_firmwaressg2115p_firmwareqfw7124_firmwaresnapdragon_720g_mobile_platform_firmwarear8035_firmwareqsm8250_firmwareqcn5024_firmwaresnapdragon_662_mobile_platform_firmwaresa8145p_firmwaresxr2230p_firmwareqca1062_firmwareqcs2290_firmwareflight_rb5_5g_platform_firmwareqcn6224_firmwaresnapdragon_888_5g_mobile_platform_firmwareqca6420_firmwareipq8069_firmwareqca2064_firmwaresd730_firmwaresnapdragon_auto_4g_modem_firmwaresd675_firmwareqcn5152_firmwareqca0000_firmwareqca6584au_firmwarewcn3990_firmwareqrb5165n_firmwareqcn9000_firmwareqca9984_firmwarequalcomm_video_collaboration_vc3_platform_firmwaresd_8cx_firmwarewcd9385_firmwarewcd9326_firmwareqcn5124_firmwareqam8295p_firmwareqcn6100_firmwareqcn6102_firmwareqcn9011_firmwareqca8082_firmwareqca6320_firmwaresnapdragon_835_mobile_pc_platform_firmwareqcn5122_firmwaresdx55_firmwarewcn3999_firmwareqcn6023_firmwarewsa8845h_firmwaresm7250p_firmwareqca6436_firmwaresnapdragon_680_4g_mobile_platform_firmwareqca6564au_firmwaresa6155p_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareqcm8550_firmwareqcs8550_firmwarevision_intelligence_300_platform_firmwareqcn6112_firmwarewcn3988_firmwaresa6145p_firmwarefastconnect_6700_firmwarewsa8810_firmwaresnapdragon_ar2_gen_1_platform_firmwaresa8255p_firmwarewcd9395_firmwaresdx65m_firmwareipq8071a_firmwareqcs4290_firmwareqca8085_firmwaresxr2130_firmwareqca2065_firmwareqcs6490_firmwaresnapdragon_665_mobile_platform_firmwareqca9898_firmwaresm6250_firmwareqcn9100_firmwaresnapdragon_712_mobile_platform_firmwarevision_intelligence_400_platform_firmwareipq5010_firmwareipq8074a_firmwarewsa8815_firmwarewsa8835_firmwaresnapdragon_636_mobile_platform_firmwaresxr1120_firmwaresg4150p_firmwaresnapdragon_8_gen_2_mobile_platform_firmwareqcm6125_firmwareqcm2290_firmwarerobotics_rb5_platform_firmwarear9380_firmwareqcs7230_firmwareimmersive_home_326_platform_firmwareqcn6122_firmwareipq8065_firmwaresxr1230p_firmwaresnapdragon_4_gen_1_mobile_platform_firmwareqca8075_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaressg2125p_firmwareqcn6132_firmwareqcn9003_firmwareqca6310_firmwareqca9994_firmwareqcc2076_firmwareipq8070a_firmwareipq8076_firmwareqca6574_firmwaresm4125_firmwaresm7325p_firmwarewsa8845_firmwaresnapdragon_xr2_5g_platform_firmwareqca6574a_firmwarefastconnect_6200_firmwaresnapdragon_x55_5g_modem-rf_system_firmwareaqt1000_firmwareqcm4490_firmwaresnapdragon_690_5g_mobile_platform_firmwaresnapdragon_845_mobile_platform_firmwareqcn6274_firmwarecsrb31024_firmwareqcm6490_firmwarewsa8832_firmwareipq9570_firmwareqcn9070_firmwareipq6028_firmwareipq8072a_firmwareipq8074_firmwareqca9889_firmwaresa8155p_firmwareqcs8250_firmwarewcd9341_firmwarefastconnect_7800_firmwareipq5332_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareqcn9013_firmwaresd835_firmwareqam8650p_firmwareipq6010_firmwareqca1064_firmwareqcn9022_firmwarewcd9390_firmwareqca9990_firmwareqcn9002_firmwareqcn9072_firmwareipq6000_firmwaresw5100_firmwareqcn9074_firmwareqcs410_firmwaresnapdragon_xr1_platform_firmware
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-126
Buffer Over-read
CVE-2023-33016
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.09% / 25.75%
||
7 Day CHG~0.00%
Published-05 Sep, 2023 | 06:24
Updated-02 Aug, 2024 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in WLAN Firmware

Transient DOS in WLAN firmware while parsing MLO (multi-link operation).

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcn5024_firmwarewsa8830qcn9070sxr2230p_firmwareimmersive_home_318_firmwareipq8173_firmwareqcn5124qca4024_firmwareqca8082qcn9072qca8386snapdragon_8_gen_1ipq8078aipq5028_firmwareipq6000immersive_home_216ssg2115pqcn5152_firmwareqcn9000_firmwarewcd9385_firmwareipq8076aqca8386_firmwareqcn6024_firmwaresd_8_gen1_5g_firmwareqca8084_firmwareipq8074aqcn5124_firmwareqca8082_firmwareqcn5164_firmwareqcn5122_firmwareqca8081_firmwareqcn6023_firmwareipq5010immersive_home_214ipq8078a_firmwareqcn9274ipq8174ipq5028qcn5052ipq6010qcs8550_firmwareqcn9074qca8085qcn6132qca8081ipq8071aqcn6023ipq8071a_firmwarewcd9385qca8085_firmwareqca9888_firmwareqcn6122immersive_home_316_firmwareqcn5154_firmwarecsr8811qcn9100_firmwarewsa8830_firmwareipq5010_firmwareipq8074a_firmwarewsa8835_firmwareqcn5022_firmwareimmersive_home_216_firmwarewcd9380_firmwaressg2125pqcn9000ipq8072aimmersive_home_214_firmwareipq8076a_firmwareipq8078qca8084ipq8173snapdragon_8_gen_1_firmwareqcn5164snapdragon_ar2_gen_1qcn6122_firmwarewsa8835sxr1230p_firmwarecsr8811_firmwaresd_8_gen1_5gwcd9380qcn5154qca8075_firmwaressg2125p_firmwareqcn5024qca9889qcn6132_firmwaresxr1230pqca9888qcn5052_firmwareqcn9274_firmwareipq8070a_firmwareipq6018_firmwareipq8076_firmwaresxr2230pipq8076qcn5152ipq6028qcn9024ipq9574_firmwarefastconnect_7800qcn9100snapdragon_ar2_gen_1_firmwareipq8078_firmwarewsa8832_firmwarefastconnect_6900qcn9070_firmwarefastconnect_6900_firmwareimmersive_home_318ipq6028_firmwareipq8072a_firmwareimmersive_home_316qca9889_firmwareipq9574qcn5122qcn9024_firmwareipq8174_firmwarefastconnect_7800_firmwarewsa8832ipq6018qcn5022ipq6010_firmwareqcs8550qca4024qca8075qcn9022_firmwareqcn6024qcn9022ipq8070aqcn9072_firmwareipq6000_firmwaressg2115p_firmwareqcn9074_firmwareSnapdragon
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-33058
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-8.2||HIGH
EPSS-0.08% / 23.98%
||
7 Day CHG~0.00%
Published-06 Feb, 2024 | 05:47
Updated-02 Aug, 2024 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in Modem

Information disclosure in Modem while processing SIB5.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_8_gen_1_mobile_platformwsa8830qca8337_firmwarewcd9380_firmwareqca8337qfw7124sg8275p_firmwareqcm8550ar8035_firmwareqcn6224_firmwarewsa8840wsa8835wcn3950_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwareqcn6274wcd9380fastconnect_6700snapdragon_x70_modem-rf_systemwcd9370snapdragon_4_gen_2_mobile_platform_firmwareqca6584au_firmwaresg8275psnapdragon_8_gen_2_mobile_platformqfw7114_firmwarewcd9385_firmwarewsa8845wcn3950qcn6024_firmwarewcd9340_firmwarewsa8815wsa8845_firmwaresnapdragon_4_gen_2_mobile_platformqcn9024wsa8845h_firmwareqca8081_firmwaresnapdragon_8_gen_3_mobile_platformqfw7114fastconnect_7800qca6584ausnapdragon_x65_5g_modem-rf_system_firmwareqcm8550_firmwareqcm4490_firmwareqcn6274_firmwareqcs4490_firmwaresnapdragon_x70_modem-rf_system_firmwaresnapdragon_x65_5g_modem-rf_systemwsa8840_firmwareqca6698aqwsa8832_firmwarefastconnect_6900snapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900_firmwareqcs8550_firmwarewcn3988_firmwaresnapdragon_8\+_gen_1_mobile_platformfastconnect_6700_firmwarewcd9340qcn9024_firmwarewsa8810_firmwareqcn6224fastconnect_7800_firmwaresnapdragon_8\+_gen_2_mobile_platformwsa8810wsa8845hwsa8832wcd9395_firmwaresnapdragon_x75_5g_modem-rf_systemqca8081sm8550psnapdragon_8_gen_1_mobile_platform_firmwareqca6698aq_firmwareqcm4490snapdragon_auto_5g_modem-rf_gen_2snapdragon_auto_5g_modem-rf_gen_2_firmwarewcd9385qcc710qcs4490wcd9395qcs8550ar8035wcd9370_firmwaresm8550p_firmwarewcd9390qcc710_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewcd9390_firmwarewsa8830_firmwareqcn6024wcn3988wsa8815_firmwarewsa8835_firmwaresnapdragon_8\+_gen_1_mobile_platform_firmwareqfw7124_firmwaresnapdragon_8_gen_2_mobile_platform_firmwareSnapdragon
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-33112
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.23% / 45.55%
||
7 Day CHG~0.00%
Published-02 Jan, 2024 | 05:38
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in WLAN Firmware

Transient DOS when WLAN firmware receives "reassoc response" frame including RIC_DATA element.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qdx1010_firmwareqcm8550_firmwareqcs410_firmwaresa6150p_firmwaresw5100pwsa8832wsa8845_firmwareqca6595qcs610_firmwarewcd9335wcd9370qca8081_firmwaressg2125p_firmwarear8035_firmwareqca6696wsa8830_firmwareqrb5165msnapdragon_888_5g_mobile_platformwcd9341_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwaresa4150p_firmwarewcd9395_firmwareqcn6024sd888_firmwarewcn6740_firmwarefastconnect_6700qca6564ausa4150pwsa8815_firmwarewsa8832_firmwaresa8195p_firmwareqca8337_firmwaresnapdragon_x12_lte_modem_firmwareqca8337qdu1110wcd9395snapdragon_680_4g_mobile_platformsg8275p_firmwareqca9377_firmwareqcm6490_firmwareqca6574au_firmwareqam8295pwcd9341qcm4490_firmwareqca6574auqru1032snapdragon_x12_lte_modemflight_rb5_5g_platformwcd9390wcn3950wsa8810_firmwarewsa8845h_firmwarecsra6640snapdragon_x65_5g_modem-rf_system_firmwareqca6797aq_firmwaresnapdragon_7c\+_gen_3_computeqca6554asnapdragon_780g_5g_mobile_platformsa8295p_firmwareqcn6024_firmwaresa4155p_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaresnapdragon_695_5g_mobile_platformsnapdragon_4_gen_1_mobile_platform_firmwarevideo_collaboration_vc1_platform_firmwaresa4155psnapdragon_778g\+_5g_mobile_platformsnapdragon_780g_5g_mobile_platform_firmwareqca6584ausd888ssg2115pqcn9011_firmwareqru1062_firmwaresnapdragon_4_gen_2_mobile_platformsw5100_firmwarewcn6740snapdragon_480\+_5g_mobile_platform_firmwareqru1062snapdragon_695_5g_mobile_platform_firmwareqca6595_firmwareqcs7230fastconnect_7800_firmwarefastconnect_6900snapdragon_685_4g_mobile_platform_firmwarevideo_collaboration_vc1_platformqru1032_firmwaresnapdragon_782g_mobile_platform_firmwarewcd9385_firmwarefastconnect_6900_firmwareqam8255p_firmwarewcd9380sa6145p_firmwareqam8255psxr2230psnapdragon_888_5g_mobile_platform_firmwaresnapdragon_4_gen_1_mobile_platformsa8150psnapdragon_ar2_gen_1_platform_firmwareqcs4490snapdragon_8_gen_1_mobile_platform_firmwaresnapdragon_778g_5g_mobile_platformsnapdragon_685_4g_mobile_platformsnapdragon_8\+_gen_2_mobile_platform_firmwarewsa8845sa6155psnapdragon_auto_5g_modem-rf_firmwareqca6564au_firmwaresxr1230pwsa8810qam8650pqdu1000_firmwarevideo_collaboration_vc5_platform_firmwaresnapdragon_8\+_gen_2_mobile_platformwcn3950_firmwaresw5100qca6595auvideo_collaboration_vc3_platformsm7315_firmwareqdu1010sa6155p_firmwarewsa8840qam8295p_firmwareqcs8550_firmwareqdu1210_firmwaresm7315qca6698aq_firmwarewcd9385qcn9012snapdragon_8\+_gen_1_mobile_platformmdm9650_firmwareqcs4490_firmwaresnapdragon_8_gen_2_mobile_platformsnapdragon_7c\+_gen_3_compute_firmwaresa8255pqcs7230_firmwaresxr1230p_firmwarewcd9390_firmwaresnapdragon_778g\+_5g_mobile_platform_firmwaresg8275pwcd9370_firmwaremdm9650qdx1011_firmwaresnapdragon_auto_5g_modem-rfqdu1110_firmwareqdu1000qca6554a_firmwaressg2125pqca6574aqru1052qcm4490qca6174asa8195pcsra6640_firmwareqcs8250_firmwareqdu1210snapdragon_820_automotive_platform_firmwareqca6174a_firmwareqcm6490sm7325pqam8650p_firmwarevideo_collaboration_vc5_platformsm8550p_firmwareqcm8550wcn3988qcs6490_firmwaresnapdragon_x65_5g_modem-rf_systemqcn9024qca6584au_firmwarewcd9335_firmwareqrb5165n_firmwareqca6574snapdragon_480_5g_mobile_platform_firmwarewcn3980_firmwarewsa8835qca6595au_firmwareqca6391_firmwaresxr2230p_firmwarewsa8840_firmwareqdu1010_firmwaresw5100p_firmwareqcn9011snapdragon_ar2_gen_1_platformsnapdragon_782g_mobile_platformqca6696_firmwareqcn9024_firmwarewsa8845hwcd9380_firmwaresa6150pqca6574_firmwareqcs410sa8155p_firmwarecsra6620qca8081wsa8815sa8155psd_8_gen1_5gwsa8830qam8775pqca6797aqqca9377sm8550psa6145psnapdragon_8\+_gen_1_mobile_platform_firmwareqcm4325_firmwaresa8255p_firmwareflight_rb5_5g_platform_firmwarear8035qca6574a_firmwaresnapdragon_480\+_5g_mobile_platformqrb5165m_firmwareqcm4325sd_8_gen1_5g_firmwarerobotics_rb5_platformwcd9375_firmwareqca6391qcn9012_firmwaresmart_audio_400_platform_firmwareqca6698aqsnapdragon_778g_5g_mobile_platform_firmwaresnapdragon_480_5g_mobile_platformqru1052_firmwareqrb5165ncsra6620_firmwaresa8295psnapdragon_8_gen_1_mobile_platformrobotics_rb5_platform_firmwareqcs8550snapdragon_8_gen_2_mobile_platform_firmwarefastconnect_6200fastconnect_7800sa8145p_firmwaresm7325p_firmwareqam8775p_firmwaresnapdragon_888\+_5g_mobile_platformqdx1011wcd9375sa8150p_firmwaresmart_audio_400_platformsnapdragon_w5\+_gen_1_wearable_platformwcn3988_firmwarefastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwaresa8145psnapdragon_888\+_5g_mobile_platform_firmwarewsa8835_firmwaressg2115p_firmwaresnapdragon_680_4g_mobile_platform_firmwareqcs6490qcs8250snapdragon_820_automotive_platformwcn3980fastconnect_6200_firmwareqdx1010qcs610Snapdragonsnapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2025-21428
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.35% / 57.29%
||
7 Day CHG~0.00%
Published-07 Apr, 2025 | 10:15
Updated-26 Feb, 2026 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in WLAN Host

Memory corruption occurs while connecting a STA to an AP and initiating an ADD TS request from the AP to establish a TSpec session.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qep8111_firmwarewcn3615apq8017_firmwaresmart_audio_400_platform_firmwarear8031sa2150pwcd9330ar8031_firmwareqca9379_firmwareqca6595au_firmwarewcn3620fastconnect_6200_firmwareqca6174asnapdragon_x35_5g_modem-rf_system_firmwaresnapdragon_x5_lte_modem_firmwaresnapdragon_auto_5g_modem-rfsnapdragon_625_mobile_platformwcd9335qca6584auqca6574afastconnect_6200qualcomm_205_mobile_platform_firmwarewcn3680wcn3620_firmwaresnapdragon_x5_lte_modemwsa8815_firmwaresmart_display_200_platform_\(apq5053-aa\)snapdragon_820_automotive_platformqca6554avision_intelligence_100_platform_\(apq8053-aa\)_firmwaresdm429w_firmwareqca6595qca6564au_firmwarequalcomm_205_mobile_platformsnapdragon_429_mobile_platform_firmwarecsra6620_firmwareqca6174_firmwaremdm9650_firmwareqca6554a_firmwaresmart_audio_400_platformsnapdragon_210_processor_firmwaresnapdragon_212_mobile_platformsnapdragon_auto_5g_modem-rf_firmwaremdm9628_firmwaremdm9628msm8996ausnapdragon_1200_wearable_platform_firmwaresnapdragon_632_mobile_platform_firmwaresmart_display_200_platform_\(apq5053-aa\)_firmwaremdm9640qca6574ausmart_audio_200_platform_firmwareqca6584wcn3610wcn3660bqca6584_firmwareqca6564amdm9250snapdragon_625_mobile_platform_firmwarewcn3660b_firmwarewcn3680bsnapdragon_212_mobile_platform_firmwareqca6574vision_intelligence_200_platform_\(apq8053-ac\)_firmwareqep8111qca6574au_firmwareqca6574_firmwareqca6584au_firmwarefastconnect_6900qca6175awcd9335_firmwareqca6696csra6640_firmwaresnapdragon_425_mobile_platform_firmwareqca6595_firmwarewcd9326_firmwareqcm21509206_lte_modem_firmwarewsa8810_firmwaremdm9650sa2150p_firmwaresmart_audio_200_platformsd626_firmwaremdm9250_firmware9206_lte_modemqca9377snapdragon_626_mobile_platformsd626qualcomm_215_mobile_platformapq8017snapdragon_x12_lte_modem_firmwaresnapdragon_429_mobile_platformqcm2150_firmwarecsra6640snapdragon_x12_lte_modemwcd9330_firmwaresnapdragon_210_processorvision_intelligence_200_platform_\(apq8053-ac\)c-v2x_9150qca6595ausnapdragon_820_automotive_platform_firmwaresdm429wwcn3680_firmwareqca9377_firmwareqca6564a_firmwaresnapdragon_x35_5g_modem-rf_systemwcn3980_firmwarecsra6620msm8996au_firmwarewcn3980wsa8815mdm9640_firmwareqca6564auqca9367_firmwaresnapdragon_632_mobile_platformqca9379wcd9340_firmwaresnapdragon_439_mobile_platform_firmwarewcd9340wcn3610_firmwareqca6175a_firmwarewsa8810wcn3680b_firmwaresnapdragon_425_mobile_platformqualcomm_215_mobile_platform_firmwareqca6174a_firmwaresnapdragon_626_mobile_platform_firmwarevision_intelligence_100_platform_\(apq8053-aa\)fastconnect_6900_firmwarewcn3615_firmwareqca9367snapdragon_439_mobile_platformc-v2x_9150_firmwareqca6574a_firmwareqca6696_firmwaresnapdragon_1200_wearable_platformwcd9326qca6174Snapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2024-49838
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-8.2||HIGH
EPSS-0.13% / 32.83%
||
7 Day CHG~0.00%
Published-03 Feb, 2025 | 16:51
Updated-05 Feb, 2025 | 16:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in WLAN HOST

Information disclosure while parsing the OCI IE with invalid length.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800_firmwaresnapdragon_ar2_gen_1qcm6490_firmwareqcn6224_firmwaresa7775p_firmwaresa8775pqca6574au_firmwareqam8775psa8195pqcs615qca6584ausnapdragon_x65_5g_modem-rf_firmwaresa8255psnapdragon_x62_5g_modem-rfwcd9370_firmwaresxr2230pqcc710_firmwaresa8540p_firmwaresnapdragon_8\+_gen_2_mobilesnapdragon_865\+_5g_mobilesxr2230p_firmwareqep8111_firmwaresm7635_firmwaresd_8_gen1_5g_firmwaresxr2130snapdragon_xr2\+_gen_1qca6574ssg2115p_firmwareqcm8550sa8650psa8770p_firmwaretalynplusqca6698aq_firmwaresa8775p_firmwaresnapdragon_x55_5g_modem-rf_firmwareqamsrv1m_firmwaresnapdragon_865_5g_mobiletalynplus_firmwareqca6688aqsnapdragon_xr2_5gqcm4490fastconnect_6800qcs8250sa8530p_firmwarewsa8810mdm9628snapdragon_8_gen_3_mobile_firmwareqam8255p_firmwarewcd9375sdx61sm6650snapdragon_870_5g_mobile_firmwaresnapdragon_w5\+_gen_1_wearable_firmwarefastconnect_6200_firmwaresa6155pvideo_collaboration_vc3_platformsnapdragon_480\+_5g_mobileqamsrv1h_firmwaresw5100pwsa8830_firmwareqca8081sg4150psc8380xpwcd9385wsa8840_firmwareqfw7124_firmwaresxr2250p_firmwarewsa8840qca6426qfw7124qca6696sa8155p_firmwareqca6595snapdragon_460_mobileqca8337qca8337_firmwarevideo_collaboration_vc1_platform_firmwareqam8650pqcs8300sxr1230p_firmwaresxr2330pvision_intelligence_400_firmwaresrv1mqcs5430_firmwaresdx61_firmwareqam8775p_firmwarevideo_collaboration_vc5_platformsnapdragon_ar1_gen_1sm8635p_firmwaresnapdragon_685_4g_mobileqcm5430qcs9100wcd9378qcs7230_firmwaresm7675_firmwaresa8295p_firmwaresm8750pqca9377sa9000pwsa8835snapdragon_4_gen_2_mobile_firmwaresm8750p_firmwareqcn9024qca8081_firmwaresnapdragon_480_5g_mobile_firmwareqca6797aq_firmwarefastconnect_7800wcd9340snapdragon_xr2_5g_firmwaresnapdragon_8_gen_2_mobileqca6174aqcm6125_firmwarewcd9378_firmwarewcd9335_firmwareqca6574auqcn9024_firmwaresm6650_firmwaresnapdragon_auto_5g_modem-rf_gen_2qca6584au_firmwareqca6777aqwcn3990fastconnect_6700qca6696_firmwareqcc2073snapdragon_x72_5g_modem-rf_firmwareqcs9100_firmwaresrv1m_firmwarewsa8832fastconnect_6700_firmwarewcd9390_firmwareqcn6274qcs615_firmwaresm8635snapdragon_695_5g_mobile_firmwareqca6554a_firmwareqcc2073_firmwareqca9367sm8635_firmwareqca6787aqwsa8815sxr1230pqca6574a_firmwaresa8620psm8750_firmwaresrv1lqca6554asa8530psrv1h_firmwareqcs8300_firmwareqcs6490sa8540psa9000p_firmwaresm8550psa7775psnapdragon_auto_5g_modem-rf_gen_2_firmwarewsa8835_firmwareqep8111sa7255psnapdragon_x35_5g_modem-rfwcn7860qamsrv1mqcs5430qam8295p_firmwareqca6787aq_firmwarewcn7881_firmwareqcs8550_firmwareqca9367_firmwareqcm6490wcn7881ssg2125p_firmwaresa8650p_firmwareqcn6274_firmwarewcn3950_firmwareqca6391sm8750snapdragon_x65_5g_modem-rfvision_intelligence_400qcn9274_firmwareqca6564aqca6688aq_firmwarewcn6650snapdragon_480_5g_mobilevideo_collaboration_vc3_platform_firmwaresw5100wcn3950wsa8845_firmwaresnapdragon_w5\+_gen_1_wearablesnapdragon_x55_5g_modem-rfqca6574_firmwareqcm8550_firmwaresw5100p_firmwarewcn6755_firmwarear8035qca6564a_firmwarevideo_collaboration_vc5_platform_firmwaresrv1l_firmwarewsa8845hsa6155p_firmwaresnapdragon_4_gen_1_mobilesnapdragon_680_4g_mobilewcd9341wcn7880_firmwarewcn3988wcd9395_firmwarewcn3990_firmwareqcs6125sm7635snapdragon_680_4g_mobile_firmwareqcc2076fastconnect_6900wcn3988_firmwareqca6574awcd9335wcd9375_firmwarewcd9385_firmwareqam8650p_firmwareqcn9274sa8295psnapdragon_685_4g_mobile_firmwaresa8620p_firmwaresa7255p_firmwareqca6595_firmwareqamsrv1hwcn6740snapdragon_865\+_5g_mobile_firmwarewcd9380snapdragon_x75_5g_modem-rf_firmwaresnapdragon_480\+_5g_mobile_firmwareqca6436_firmwaresa8155pwcn7861_firmwaresnapdragon_4_gen_2_mobilewsa8832_firmwarewcn6755qca6564ausxr2130_firmwaresnapdragon_8_gen_2_mobile_firmwareqcs6490_firmwareqca6595au_firmwareqcn6224sa8255p_firmwareqca6595auqam8255psm4635srv1hqam8620psm8550p_firmwarear8035_firmwaresc8380xp_firmwaresg4150p_firmwaresd865_5gsa8195p_firmwaresd865_5g_firmwaresm7675wsa8845h_firmwaresnapdragon_x62_5g_modem-rf_firmwarewsa8845qcm6125wcn6650_firmwaresnapdragon_ar2_gen_1_firmwarewcd9380_firmwareqca6391_firmwaresnapdragon_662_mobile_firmwareqca6174a_firmwaresm8635pwcn3980qcs4490wcd9370wcd9340_firmwareqcs4490_firmwareqcm4325_firmwareqca6426_firmwaressg2125pqca6678aqsnapdragon_x75_5g_modem-rfwcd9341_firmwaresnapdragon_8_gen_1_mobileqca6564au_firmwareqcc2076_firmwaresnapdragon_865_5g_mobile_firmwaresnapdragon_870_5g_mobileqam8295pqcs8250_firmwaresnapdragon_695_5g_mobilewcn7880sm4635_firmwareqam8620p_firmwareqcn6024qca6797aqqcm4490_firmwaresm7675pqcs7230qcs8550sw5100_firmwaresxr2250pqcm5430_firmwaresnapdragon_8_gen_1_mobile_firmwaresd_8_gen1_5gsm7675p_firmwaresnapdragon_ar1_gen_1_firmwarewsa8810_firmwareqcn6024_firmwareqcc710ssg2115psnapdragon_8_gen_3_mobilesnapdragon_662_mobileqcs6125_firmwaresnapdragon_x72_5g_modem-rfsnapdragon_xr2\+_gen_1_firmwarewcn7861qca9377_firmwarewsa8830wsa8815_firmwaresnapdragon_8\+_gen_2_mobile_firmwaresnapdragon_8\+_gen_1_mobile_firmwaresa8770pwcn7860_firmwareqca6777aq_firmwarefastconnect_6200wcn3980_firmwaresnapdragon_x35_5g_modem-rf_firmwareqca6678aq_firmwarevideo_collaboration_vc1_platformqca6698aqqca6436snapdragon_4_gen_1_mobile_firmwarefastconnect_6900_firmwareqcm4325snapdragon_460_mobile_firmwareqfw7114fastconnect_6800_firmwaresnapdragon_8\+_gen_1_mobilemdm9628_firmwarewcd9390wcd9395qfw7114_firmwarewcn6740_firmwaresxr2330p_firmwareSnapdragon
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-38250
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.25% / 48.52%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 16:53
Updated-31 Dec, 2024 | 23:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Graphics Component Elevation of Privilege Vulnerability

Windows Graphics Component Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2022_23h2windows_server_2016windows_server_2012windows_11_22h2windows_10_1507windows_11_21h2windows_10_1607windows_10_21h1windows_11_23h2office_long_term_servicing_channelwindows_10_1809officewindows_10_22h2windows_server_2022windows_server_2019windows_server_2008Windows Server 2022Windows 10 Version 1607Windows 11 version 22H3Windows 11 version 22H2Windows Server 2019 (Server Core installation)Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2008 Service Pack 2Windows 10 Version 1809Windows Server 2016 (Server Core installation)Windows 11 version 21H2Windows Server 2012 (Server Core installation)Windows Server 2016Windows 10 Version 1507Windows 10 Version 21H2Windows Server 2008 R2 Service Pack 1Windows 11 Version 23H2Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2Microsoft Office LTSC for Mac 2021Microsoft Office for UniversalWindows Server 2019Windows Server 2012Windows Server 2008 Service Pack 2Windows Server 2012 R2 (Server Core installation)Windows 10 Version 22H2Microsoft Office for Android
CWE ID-CWE-126
Buffer Over-read
CVE-2024-38127
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-8.08% / 92.04%
||
7 Day CHG~0.00%
Published-13 Aug, 2024 | 17:30
Updated-10 Jul, 2025 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Hyper-V Elevation of Privilege Vulnerability

Windows Hyper-V Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_server_2016windows_server_2022_23h2windows_server_2012windows_server_2008windows_10_1507windows_11_21h2windows_11_24h2windows_10_22h2windows_server_2022windows_11_22h2windows_server_2019windows_10_1607windows_11_23h2Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2022Windows Server 2012 R2 (Server Core installation)Windows Server 2016 (Server Core installation)Windows Server 2012 R2Windows 11 Version 24H2Windows 11 Version 23H2Windows Server 2008 R2 Service Pack 1Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows 10 Version 1809Windows Server 2019Windows 11 version 22H3Windows Server 2016Windows Server 2012 (Server Core installation)Windows 11 version 22H2Windows Server 2019 (Server Core installation)Windows 11 version 21H2Windows 10 Version 22H2Windows 10 Version 1507Windows Server 2012Windows 10 Version 1607Windows 10 Version 21H2
CWE ID-CWE-126
Buffer Over-read
CVE-2024-38135
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.63% / 70.00%
||
7 Day CHG~0.00%
Published-13 Aug, 2024 | 17:30
Updated-10 Jul, 2025 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability

Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_11_24h2windows_11_22h2windows_server_2022_23h2windows_11_23h2Windows 11 version 22H3Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 version 22H2Windows 11 Version 24H2Windows 11 Version 23H2
CWE ID-CWE-126
Buffer Over-read
CVE-2025-62461
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.24%
||
7 Day CHG~0.00%
Published-09 Dec, 2025 | 17:55
Updated-26 Feb, 2026 | 16:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Projected File System Elevation of Privilege Vulnerability

Buffer over-read in Windows Projected File System Filter Driver allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_22h2windows_11_24h2windows_server_2019windows_11_23h2windows_10_21h2windows_10_1809windows_server_2022windows_server_2025windows_server_2022_23h2windows_11_25h2Windows Server 2019 (Server Core installation)Windows 11 Version 25H2Windows 10 Version 21H2Windows 11 version 22H3Windows 10 Version 22H2Windows 11 Version 23H2Windows Server 2019Windows Server 2022Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2025Windows 11 Version 24H2Windows 10 Version 1809Windows Server 2025 (Server Core installation)
CWE ID-CWE-126
Buffer Over-read
CVE-2025-62462
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.24%
||
7 Day CHG~0.00%
Published-09 Dec, 2025 | 17:55
Updated-26 Feb, 2026 | 16:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Projected File System Elevation of Privilege Vulnerability

Buffer over-read in Windows Projected File System allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_22h2windows_11_24h2windows_server_2019windows_11_23h2windows_10_21h2windows_10_1809windows_server_2022windows_server_2025windows_server_2022_23h2windows_11_25h2Windows Server 2019 (Server Core installation)Windows 11 Version 25H2Windows 10 Version 21H2Windows 11 version 22H3Windows 10 Version 22H2Windows 11 Version 23H2Windows Server 2019Windows Server 2022Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2025Windows 11 Version 24H2Windows 10 Version 1809Windows Server 2025 (Server Core installation)
CWE ID-CWE-126
Buffer Over-read
CVE-2025-62464
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.24%
||
7 Day CHG~0.00%
Published-09 Dec, 2025 | 17:55
Updated-26 Feb, 2026 | 16:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Projected File System Elevation of Privilege Vulnerability

Buffer over-read in Windows Projected File System allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_22h2windows_11_24h2windows_server_2019windows_11_23h2windows_10_21h2windows_10_1809windows_server_2022windows_server_2025windows_server_2022_23h2windows_11_25h2Windows Server 2019 (Server Core installation)Windows 11 Version 25H2Windows 10 Version 21H2Windows 11 version 22H3Windows 10 Version 22H2Windows 11 Version 23H2Windows Server 2019Windows Server 2022Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2025Windows 11 Version 24H2Windows 10 Version 1809Windows Server 2025 (Server Core installation)
CWE ID-CWE-126
Buffer Over-read
CVE-2025-62467
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.09% / 25.59%
||
7 Day CHG~0.00%
Published-09 Dec, 2025 | 17:55
Updated-26 Feb, 2026 | 16:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Projected File System Elevation of Privilege Vulnerability

Integer overflow or wraparound in Windows Projected File System allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_22h2windows_11_24h2windows_server_2019windows_11_23h2windows_10_21h2windows_10_1809windows_server_2022windows_server_2025windows_server_2022_23h2windows_11_25h2Windows Server 2019 (Server Core installation)Windows 11 Version 25H2Windows 10 Version 21H2Windows 11 version 22H3Windows 10 Version 22H2Windows 11 Version 23H2Windows Server 2019Windows Server 2022Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2025Windows 11 Version 24H2Windows 10 Version 1809Windows Server 2025 (Server Core installation)
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-60720
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.24%
||
7 Day CHG~0.00%
Published-11 Nov, 2025 | 17:59
Updated-26 Feb, 2026 | 16:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Transport Driver Interface (TDI) Translation Driver Elevation of Privilege Vulnerability

Buffer over-read in Windows TDX.sys allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_11_24h2windows_11_25h2windows_server_2025windows_10_22h2windows_11_23h2windows_10_1607windows_server_2022windows_server_2019windows_server_2016windows_server_2008windows_server_2022_23h2windows_10_21h2windows_server_2012windows_10_1809Windows Server 2019 (Server Core installation)Windows 11 Version 25H2Windows 10 Version 21H2Windows 10 Version 22H2Windows 11 Version 23H2Windows Server 2012Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2008 Service Pack 2Windows Server 2008 R2 Service Pack 1Windows Server 2012 R2Windows Server 2025 (Server Core installation)Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2016Windows Server 2012 R2 (Server Core installation)Windows 11 version 22H3Windows Server 2019Windows 10 Version 1607Windows Server 2022Windows Server 2025Windows Server 2012 (Server Core installation)Windows Server 2016 (Server Core installation)Windows 11 Version 24H2Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows 10 Version 1809
CWE ID-CWE-126
Buffer Over-read
CVE-2025-59192
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.11% / 28.75%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 17:01
Updated-26 Feb, 2026 | 17:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Storport.sys Driver Elevation of Privilege Vulnerability

Buffer over-read in Storport.sys Driver allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_1507windows_11_22h2windows_10_21h2windows_11_23h2windows_11_24h2windows_server_2022windows_10_1607windows_10_22h2windows_server_2022_23h2windows_10_1809windows_server_2025windows_server_2019windows_11_25h2windows_server_2016Windows Server 2019 (Server Core installation)Windows 11 Version 25H2Windows 10 Version 21H2Windows 10 Version 22H2Windows 11 Version 23H2Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2025 (Server Core installation)Windows 11 version 22H2Windows 11 version 22H3Windows 10 Version 1607Windows Server 2019Windows Server 2022Windows 10 Version 1507Windows Server 2025Windows Server 2016 (Server Core installation)Windows 11 Version 24H2Windows Server 2016Windows 10 Version 1809
CWE ID-CWE-126
Buffer Over-read
CVE-2024-30079
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.93% / 75.85%
||
7 Day CHG-0.03%
Published-09 Jul, 2024 | 17:02
Updated-10 Feb, 2026 | 23:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability

Windows Remote Access Connection Manager Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_server_2016windows_server_2022_23h2windows_server_2012windows_10_1507windows_11_21h2windows_10_22h2windows_server_2022windows_11_22h2windows_server_2019windows_10_1607windows_11_23h2Windows 11 version 21H2Windows 11 Version 23H2Windows 10 Version 1809Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 version 22H3Windows Server 2016 (Server Core installation)Windows 10 Version 22H2Windows Server 2019Windows Server 2022Windows 10 Version 1607Windows Server 2019 (Server Core installation)Windows Server 2016Windows 11 version 22H2Windows 10 Version 21H2Windows 10 Version 1507Windows Server 2012 R2Windows Server 2012 R2 (Server Core installation)
CWE ID-CWE-126
Buffer Over-read
CVE-2024-26176
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.14% / 34.37%
||
7 Day CHG~0.00%
Published-12 Mar, 2024 | 16:58
Updated-03 May, 2025 | 00:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Kernel Elevation of Privilege Vulnerability

Windows Kernel Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_server_2016windows_server_2022_23h2windows_server_2012windows_server_2008windows_10_1507windows_11_21h2windows_10_22h2windows_server_2022windows_11_22h2windows_server_2019windows_10_1607windows_11_23h2Windows 11 version 22H3Windows Server 2012 (Server Core installation)Windows Server 2016 (Server Core installation)Windows Server 2008 Service Pack 2Windows Server 2016Windows 10 Version 1507Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2Windows Server 2012Windows Server 2019Windows 10 Version 21H2Windows 10 Version 1607Windows 11 version 22H2Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 23H2Windows Server 2022Windows 11 version 21H2Windows Server 2008 R2 Service Pack 1Windows Server 2019 (Server Core installation)Windows Server 2008 Service Pack 2Windows 10 Version 1809Windows Server 2012 R2 (Server Core installation)Windows 10 Version 22H2
CWE ID-CWE-126
Buffer Over-read
CVE-2025-49659
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.91%
||
7 Day CHG+0.01%
Published-08 Jul, 2025 | 16:57
Updated-13 Feb, 2026 | 19:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Transport Driver Interface (TDI) Translation Driver Elevation of Privilege Vulnerability

Buffer over-read in Windows TDX.sys allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2012windows_10_22h2windows_server_2022_23h2windows_10_21h2windows_11_24h2windows_server_2019windows_server_2025windows_server_2022windows_10_1607windows_11_23h2windows_10_1809windows_server_2016windows_server_2008windows_10_1507windows_11_22h2Windows Server 2025Windows Server 2008 R2 Service Pack 1Windows 11 Version 23H2Windows Server 2012 (Server Core installation)Windows 10 Version 1809Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 version 22H3Windows Server 2016 (Server Core installation)Windows 10 Version 22H2Windows Server 2019Windows Server 2022Windows 10 Version 1607Windows 11 Version 24H2Windows Server 2025 (Server Core installation)Windows Server 2019 (Server Core installation)Windows Server 2016Windows 11 version 22H2Windows Server 2012 R2Windows 10 Version 1507Windows 10 Version 21H2Windows Server 2008 Service Pack 2Windows Server 2012Windows Server 2012 R2 (Server Core installation)
CWE ID-CWE-126
Buffer Over-read
CVE-2022-1769
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-6.6||MEDIUM
EPSS-0.04% / 13.05%
||
7 Day CHG~0.00%
Published-17 May, 2022 | 00:00
Updated-03 Aug, 2024 | 00:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in vim/vim

Buffer Over-read in GitHub repository vim/vim prior to 8.2.4974.

Action-Not Available
Vendor-Fedora ProjectVimApple Inc.
Product-fedoramacosvimvim/vim
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-32704
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-8.4||HIGH
EPSS-0.42% / 61.83%
||
7 Day CHG+0.03%
Published-13 May, 2025 | 16:59
Updated-26 Feb, 2026 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft Excel Remote Code Execution Vulnerability

Buffer over-read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-excelofficeoffice_long_term_servicing_channel365_appsMicrosoft Excel 2016Microsoft 365 Apps for EnterpriseMicrosoft Office 2019Microsoft Office LTSC 2024Microsoft Office LTSC 2021
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-12745
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.03% / 9.82%
||
7 Day CHG~0.00%
Published-05 Nov, 2025 | 18:32
Updated-08 Jan, 2026 | 21:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
QuickJS quickjs.c js_array_buffer_slice buffer over-read

A weakness has been identified in QuickJS up to eb2c89087def1829ed99630cb14b549d7a98408c. This affects the function js_array_buffer_slice of the file quickjs.c. This manipulation causes buffer over-read. The attack is restricted to local execution. The exploit has been made available to the public and could be exploited. This product adopts a rolling release strategy to maintain continuous delivery Patch name: c6fe5a98fd3ef3b7064e6e0145dfebfe12449fea. To fix this issue, it is recommended to deploy a patch.

Action-Not Available
Vendor-bellardn/a
Product-quickjsQuickJS
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-126
Buffer Over-read
CVE-2024-49088
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.26% / 49.39%
||
7 Day CHG~0.00%
Published-10 Dec, 2024 | 17:49
Updated-13 May, 2025 | 15:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Common Log File System Driver Elevation of Privilege Vulnerability

Windows Common Log File System Driver Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_server_2016windows_server_2022_23h2windows_server_2012windows_server_2008windows_10_1507windows_11_24h2windows_server_2025windows_10_22h2windows_server_2022windows_11_22h2windows_server_2019windows_10_1607windows_11_23h2Windows 10 Version 22H2Windows Server 2012Windows 10 Version 1809Windows 11 version 22H3Windows 11 Version 23H2Windows Server 2008 R2 Service Pack 1Windows 10 Version 1607Windows Server 2016Windows Server 2025 (Server Core installation)Windows 11 Version 24H2Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows 10 Version 21H2Windows Server 2022, 23H2 Edition (Server Core installation)Windows 10 Version 1507Windows Server 2022Windows 11 version 22H2Windows Server 2019Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2025Windows Server 2016 (Server Core installation)Windows Server 2019 (Server Core installation)Windows Server 2008 Service Pack 2Windows Server 2008 Service Pack 2
CWE ID-CWE-126
Buffer Over-read
CVE-2023-38144
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-1.24% / 79.10%
||
7 Day CHG~0.00%
Published-12 Sep, 2023 | 16:58
Updated-30 Oct, 2025 | 18:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Common Log File System Driver Elevation of Privilege Vulnerability

Windows Common Log File System Driver Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_server_2016windows_server_2012windows_server_2008windows_10_1507windows_11_21h2windows_10_22h2windows_server_2022windows_11_22h2windows_server_2019windows_10_1607Windows 11 version 21H2Windows Server 2016 (Server Core installation)Windows Server 2012Windows Server 2008 Service Pack 2Windows Server 2019 (Server Core installation)Windows 10 Version 22H2Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2012 (Server Core installation)Windows Server 2022Windows Server 2019Windows 10 Version 1507Windows 10 Version 1607Windows 10 Version 21H2Windows Server 2008 Service Pack 2Windows Server 2012 R2Windows 10 Version 1809Windows 11 version 22H2Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows Server 2008 R2 Service Pack 1Windows Server 2016
CWE ID-CWE-126
Buffer Over-read
CVE-2025-21271
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.26% / 49.27%
||
7 Day CHG~0.00%
Published-14 Jan, 2025 | 18:03
Updated-26 Feb, 2026 | 19:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_22h2windows_server_2019windows_server_2022windows_10_1809windows_10_21h2Windows Server 2019 (Server Core installation)Windows 10 Version 21H2Windows 10 Version 22H2Windows Server 2019Windows Server 2022Windows 10 Version 1809
CWE ID-CWE-126
Buffer Over-read
CVE-2022-1533
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-6.6||MEDIUM
EPSS-0.12% / 30.95%
||
7 Day CHG~0.00%
Published-29 Apr, 2022 | 10:15
Updated-03 Aug, 2024 | 00:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in bfabiszewski/libmobi

Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11. This vulnerability is capable of arbitrary code execution.

Action-Not Available
Vendor-libmobi_projectbfabiszewski
Product-libmobibfabiszewski/libmobi
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-36904
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.12% / 31.64%
||
7 Day CHG~0.00%
Published-08 Aug, 2023 | 17:08
Updated-01 Jan, 2025 | 01:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_11_22h2windows_11_21h2windows_10_22h2windows_server_2022windows_server_2019Windows Server 2022Windows 10 Version 21H2Windows 11 version 22H2Windows Server 2019 (Server Core installation)Windows 10 Version 1809Windows 11 version 21H2Windows Server 2019Windows 10 Version 22H2
CWE ID-CWE-126
Buffer Over-read
  • Previous
  • 1
  • 2
  • ...
  • 19
  • 20
  • 21
  • Next
Details not found