Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-1679

Summary
Assigner-zephyr
Assigner Org ID-e2e69745-5e70-4e92-8431-deb5529a81ad
Published At-27 Mar, 2026 | 23:21
Updated At-01 Apr, 2026 | 13:52
Rejected At-
Credits

net: eswifi socket send payload length not bounded

The eswifi socket offload driver copies user-provided payloads into a fixed buffer without checking available space; oversized sends overflow `eswifi->buf`, corrupting kernel memory (CWE-120). Exploit requires local code that can call the socket send API; no remote attacker can reach it directly.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:zephyr
Assigner Org ID:e2e69745-5e70-4e92-8431-deb5529a81ad
Published At:27 Mar, 2026 | 23:21
Updated At:01 Apr, 2026 | 13:52
Rejected At:
â–¼CVE Numbering Authority (CNA)
net: eswifi socket send payload length not bounded

The eswifi socket offload driver copies user-provided payloads into a fixed buffer without checking available space; oversized sends overflow `eswifi->buf`, corrupting kernel memory (CWE-120). Exploit requires local code that can call the socket send API; no remote attacker can reach it directly.

Affected Products
Vendor
Zephyr Projectzephyrproject-rtos
Product
Zephyr
Package Name
Zephyr
Repo
https://github.com/zephyrproject-rtos/zephyr
Default Status
unaffected
Versions
Affected
  • From * through 4.3 (git)
Problem Types
TypeCWE IDDescription
CWECWE-120Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Type: CWE
CWE ID: CWE-120
Description: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Metrics
VersionBase scoreBase severityVector
3.17.3HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
Version: 3.1
Base score: 7.3
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-qx3g-5g22-fq5w
N/A
Hyperlink: https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-qx3g-5g22-fq5w
Resource: N/A
â–¼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:vulnerabilities@zephyrproject.org
Published At:28 Mar, 2026 | 00:16
Updated At:31 Mar, 2026 | 20:35

The eswifi socket offload driver copies user-provided payloads into a fixed buffer without checking available space; oversized sends overflow `eswifi->buf`, corrupting kernel memory (CWE-120). Exploit requires local code that can call the socket send API; no remote attacker can reach it directly.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.17.3HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 7.3
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Zephyr Project
zephyrproject
>>zephyr>>Versions up to 4.3.0(inclusive)
cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-120Secondaryvulnerabilities@zephyrproject.org
CWE ID: CWE-120
Type: Secondary
Source: vulnerabilities@zephyrproject.org
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-qx3g-5g22-fq5wvulnerabilities@zephyrproject.org
Exploit
Patch
Vendor Advisory
Hyperlink: https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-qx3g-5g22-fq5w
Source: vulnerabilities@zephyrproject.org
Resource:
Exploit
Patch
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

396Records found

CVE-2023-5139
Matching Score-10
Assigner-Zephyr Project
ShareView Details
Matching Score-10
Assigner-Zephyr Project
CVSS Score-4.4||MEDIUM
EPSS-0.27% / 49.83%
||
7 Day CHG~0.00%
Published-26 Oct, 2023 | 04:40
Updated-13 Feb, 2025 | 17:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential buffer overflow vulnerability in the Zephyr STM32 Crypto driver

Potential buffer overflow vulnerability at the following location in the Zephyr STM32 Crypto driver

Action-Not Available
Vendor-Zephyr Project
Product-zephyrZephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-10019
Matching Score-10
Assigner-Zephyr Project
ShareView Details
Matching Score-10
Assigner-Zephyr Project
CVSS Score-8.1||HIGH
EPSS-0.22% / 44.47%
||
7 Day CHG~0.00%
Published-11 May, 2020 | 22:26
Updated-17 Sep, 2024 | 02:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Overflow in USB DFU requested length

USB DFU has a potential buffer overflow where the requested length (wLength) is not checked against the buffer size. This could be used by a malicious USB host to exploit the buffer overflow. See NCC-ZEP-002 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-3434
Matching Score-8
Assigner-Zephyr Project
ShareView Details
Matching Score-8
Assigner-Zephyr Project
CVSS Score-4.9||MEDIUM
EPSS-0.12% / 30.64%
||
7 Day CHG~0.00%
Published-28 Jun, 2022 | 19:45
Updated-17 Sep, 2024 | 00:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
L2CAP: Stack based buffer overflow in le_ecred_conn_req()

Stack based buffer overflow in le_ecred_conn_req(). Zephyr versions >= v2.5.0 Stack-based Buffer Overflow (CWE-121). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8w87-6rfp-cfrm

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-10028
Matching Score-8
Assigner-Zephyr Project
ShareView Details
Matching Score-8
Assigner-Zephyr Project
CVSS Score-7.8||HIGH
EPSS-0.08% / 22.62%
||
7 Day CHG~0.00%
Published-11 May, 2020 | 22:26
Updated-16 Sep, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple Syscalls In GPIO Subsystem Performs No Argument Validation

Multiple syscalls with insufficient argument validation See NCC-ZEP-006 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-20
Improper Input Validation
CVE-2020-10067
Matching Score-8
Assigner-Zephyr Project
ShareView Details
Matching Score-8
Assigner-Zephyr Project
CVSS Score-7.5||HIGH
EPSS-0.06% / 18.88%
||
7 Day CHG~0.00%
Published-11 May, 2020 | 22:26
Updated-16 Sep, 2024 | 16:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow In is_in_region Allows User Thread To Access Kernel Memory

A malicious userspace application can cause a integer overflow and bypass security checks performed by system call handlers. The impact would depend on the underlying system call and can range from denial of service to information leak to memory corruption resulting in code execution within the kernel. See NCC-ZEP-005 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2020-10021
Matching Score-8
Assigner-Zephyr Project
ShareView Details
Matching Score-8
Assigner-Zephyr Project
CVSS Score-8.1||HIGH
EPSS-0.08% / 22.62%
||
7 Day CHG~0.00%
Published-11 May, 2020 | 22:26
Updated-17 Sep, 2024 | 00:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds write in USB Mass Storage with unaligned sizes

Out-of-bounds Write in the USB Mass Storage memoryWrite handler with unaligned Sizes See NCC-ZEP-024, NCC-ZEP-025, NCC-ZEP-026 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-10024
Matching Score-8
Assigner-Zephyr Project
ShareView Details
Matching Score-8
Assigner-Zephyr Project
CVSS Score-7.8||HIGH
EPSS-0.09% / 25.50%
||
7 Day CHG~0.00%
Published-11 May, 2020 | 22:26
Updated-17 Sep, 2024 | 01:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ARM Platform Uses Signed Integer Comparison When Validating Syscall Numbers

The arm platform-specific code uses a signed integer comparison when validating system call numbers. An attacker who has obtained code execution within a user thread is able to elevate privileges to that of the kernel. See NCC-ZEP-001 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-697
Incorrect Comparison
CVE-2020-13603
Matching Score-8
Assigner-Zephyr Project
ShareView Details
Matching Score-8
Assigner-Zephyr Project
CVSS Score-6.9||MEDIUM
EPSS-0.06% / 17.46%
||
7 Day CHG~0.00%
Published-24 May, 2021 | 21:40
Updated-16 Sep, 2024 | 23:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow in memory allocating functions

Integer Overflow in memory allocating functions. Zephyr versions >= 1.14.2, >= 2.4.0 contain Integer Overflow or Wraparound (CWE-190). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-94vp-8gc2-rm45

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2020-13598
Matching Score-8
Assigner-Zephyr Project
ShareView Details
Matching Score-8
Assigner-Zephyr Project
CVSS Score-6.3||MEDIUM
EPSS-0.06% / 17.60%
||
7 Day CHG~0.00%
Published-24 May, 2021 | 21:40
Updated-17 Sep, 2024 | 03:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FS: Buffer Overflow when enabling Long File Names in FAT_FS and calling fs_stat

FS: Buffer Overflow when enabling Long File Names in FAT_FS and calling fs_stat. Zephyr versions >= v1.14.2, >= v2.3.0 contain Stack-based Buffer Overflow (CWE-121). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7fhv-rgxr-x56h

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-10058
Matching Score-8
Assigner-Zephyr Project
ShareView Details
Matching Score-8
Assigner-Zephyr Project
CVSS Score-7.8||HIGH
EPSS-0.08% / 23.43%
||
7 Day CHG~0.00%
Published-11 May, 2020 | 22:26
Updated-17 Sep, 2024 | 01:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple Syscalls In kscan Subsystem Performs No Argument Validation

Multiple syscalls in the Kscan subsystem perform insufficient argument validation, allowing code executing in userspace to potentially gain elevated privileges. See NCC-ZEP-006 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-20
Improper Input Validation
CVE-2020-10027
Matching Score-8
Assigner-Zephyr Project
ShareView Details
Matching Score-8
Assigner-Zephyr Project
CVSS Score-7.8||HIGH
EPSS-0.37% / 58.62%
||
7 Day CHG~0.00%
Published-11 May, 2020 | 22:26
Updated-16 Sep, 2024 | 20:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ARC Platform Uses Signed Integer Comparison When Validating Syscall Numbers

An attacker who has obtained code execution within a user thread is able to elevate privileges to that of the kernel. See NCC-ZEP-001 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-697
Incorrect Comparison
CVE-2023-6881
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-7.3||HIGH
EPSS-0.25% / 47.82%
||
7 Day CHG~0.00%
Published-20 Feb, 2024 | 18:25
Updated-23 Jan, 2025 | 17:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
fs: fuse: buffer overflow vulnerability in the Zephyr FS

Possible buffer overflow in is_mount_point

Action-Not Available
Vendor-Zephyr Project
Product-zephyrZephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-5753
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-6.3||MEDIUM
EPSS-0.23% / 45.73%
||
7 Day CHG~0.00%
Published-24 Oct, 2023 | 16:09
Updated-13 Feb, 2025 | 18:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential buffer overflow vulnerabilities in the Zephyr Bluetooth subsystem

Potential buffer overflows in the Bluetooth subsystem due to asserts being disabled in /subsys/bluetooth/host/hci_core.c

Action-Not Available
Vendor-Zephyr Project
Product-zephyrZephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-191
Integer Underflow (Wrap or Wraparound)
CVE-2023-5184
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-7||HIGH
EPSS-0.32% / 55.26%
||
7 Day CHG~0.00%
Published-27 Sep, 2023 | 17:26
Updated-18 Jun, 2025 | 14:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential signed to unsigned conversion errors and buffer overflow vulnerabilities in the Zephyr IPM driver

Two potential signed to unsigned conversion errors and buffer overflow vulnerabilities at the following locations in the Zephyr IPM drivers.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrZephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-195
Signed to Unsigned Conversion Error
CWE ID-CWE-681
Incorrect Conversion between Numeric Types
CVE-2023-4257
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-7.6||HIGH
EPSS-0.43% / 62.72%
||
7 Day CHG~0.00%
Published-13 Oct, 2023 | 21:09
Updated-13 Feb, 2025 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unchecked user input length in the Zephyr WiFi shell module

Unchecked user input length in /subsys/net/l2/wifi/wifi_shell.c can cause buffer overflows.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrZephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2021-3966
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-9.6||CRITICAL
EPSS-0.12% / 29.82%
||
7 Day CHG~0.00%
Published-11 Jan, 2023 | 00:00
Updated-09 Apr, 2025 | 18:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Usb bluetooth device ACL read cb buffer overflow

usb device bluetooth class includes a buffer overflow related to implementation of net_buf_add_mem.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-10022
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-9||CRITICAL
EPSS-1.70% / 82.37%
||
7 Day CHG~0.00%
Published-11 May, 2020 | 22:26
Updated-16 Sep, 2024 | 23:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
UpdateHub Module Copies a Variable-Size Hash String Into a Fixed-Size Array

A malformed JSON payload that is received from an UpdateHub server may trigger memory corruption in the Zephyr OS. This could result in a denial of service in the best case, or code execution in the worst case. See NCC-NCC-016 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions. version 2.2.0 and later versions.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-10071
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-9||CRITICAL
EPSS-13.90% / 94.34%
||
7 Day CHG~0.00%
Published-05 Jun, 2020 | 17:37
Updated-17 Sep, 2024 | 04:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insufficient publish message length validation in MQTT

The Zephyr MQTT parsing code performs insufficient checking of the length field on publish messages, allowing a buffer overflow and potentially remote code execution. NCC-ZEP-031 This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-129
Improper Validation of Array Index
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-10070
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-9||CRITICAL
EPSS-6.47% / 91.13%
||
7 Day CHG~0.00%
Published-05 Jun, 2020 | 17:37
Updated-16 Sep, 2024 | 23:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MQTT buffer overflow on receive buffer

In the Zephyr Project MQTT code, improper bounds checking can result in memory corruption and possibly remote code execution. NCC-ZEP-031 This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-4260
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-6.3||MEDIUM
EPSS-0.26% / 49.24%
||
7 Day CHG~0.00%
Published-26 Sep, 2023 | 19:23
Updated-13 Feb, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential off-by-one buffer overflow vulnerability in the Zephyr FS subsystem

Potential off-by-one buffer overflow vulnerability in the Zephyr fuse file system.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrZephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-193
Off-by-one Error
CVE-2023-4264
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-7.1||HIGH
EPSS-0.23% / 45.73%
||
7 Day CHG~0.00%
Published-26 Sep, 2023 | 18:34
Updated-18 Jun, 2025 | 14:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential buffer overflow vulnerabilities in the Zephyr Bluetooth subsystem

Potential buffer overflow vulnerabilities n the Zephyr Bluetooth subsystem.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrZephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-122
Heap-based Buffer Overflow
CVE-2023-4265
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-6.4||MEDIUM
EPSS-0.23% / 45.56%
||
7 Day CHG~0.00%
Published-12 Aug, 2023 | 22:09
Updated-13 Feb, 2025 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer overflow in Zephyr USB

Potential buffer overflow vulnerabilities in the following locations: https://github.com/zephyrproject-rtos/zephyr/blob/main/drivers/usb/device/usb_dc_native_posix.c#L359 https://github.com/zephyrproject-rtos/zephyr/blob/main/drivers/usb/device/usb_dc_native_posix.c#L359 https://github.com/zephyrproject-rtos/zephyr/blob/main/subsys/usb/device/class/netusb/function_rndis... https://github.com/zephyrproject-rtos/zephyr/blob/main/subsys/usb/device/class/netusb/function_rndis.c#L841

Action-Not Available
Vendor-Zephyr Project
Product-zephyrZephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-10023
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-6.9||MEDIUM
EPSS-0.38% / 59.45%
||
7 Day CHG~0.00%
Published-11 May, 2020 | 22:26
Updated-16 Sep, 2024 | 18:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Shell Subsystem Contains a Buffer Overflow Vulnerability In shell_spaces_trim

The shell subsystem contains a buffer overflow, whereby an adversary with physical access to the device is able to cause a memory corruption, resulting in denial of service or possibly code execution within the Zephyr kernel. See NCC-NCC-019 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-3725
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-7.6||HIGH
EPSS-0.56% / 68.40%
||
7 Day CHG~0.00%
Published-06 Oct, 2023 | 20:10
Updated-13 Feb, 2025 | 16:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential buffer overflow vulnerability in the Zephyr CANbus subsystem

Potential buffer overflow vulnerability in the Zephyr CAN bus subsystem

Action-Not Available
Vendor-Zephyr Project
Product-zephyrZephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2026-0849
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-3.8||LOW
EPSS-0.02% / 6.04%
||
7 Day CHG~0.00%
Published-14 Mar, 2026 | 21:05
Updated-02 Apr, 2026 | 14:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
crypto: ATAES132A response length allows stack buffer overflow

Malformed ATAES132A responses with an oversized length field overflow a 52-byte stack buffer in the Zephyr crypto driver, allowing a compromised device or bus attacker to corrupt kernel memory and potentially hijack execution.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrZephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-9557
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-7.6||HIGH
EPSS-0.03% / 8.05%
||
7 Day CHG~0.00%
Published-26 Nov, 2025 | 05:43
Updated-01 Dec, 2025 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Bluetooth: Mesh: Out-of-Bound Write in gen_prov_cont

‭An out-of-bound write can lead to an arbitrary code execution. Even on devices with some form of memory protection, this can still lead to‬ ‭a crash and a resultant denial of service.‬

Action-Not Available
Vendor-Zephyr Project
Product-Zephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-9558
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-7.6||HIGH
EPSS-0.02% / 5.18%
||
7 Day CHG~0.00%
Published-26 Nov, 2025 | 05:39
Updated-01 Dec, 2025 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Bluetooth: Mesh: Out-of-Bound Write in gen_prov_start

There is a potential OOB Write vulnerability in the gen_prov_start function in pb_adv.c. The full length of the received data is copied into the link.rx.buf receiver buffer without any validation on the data size.

Action-Not Available
Vendor-Zephyr Project
Product-Zephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-4424
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-8.3||HIGH
EPSS-0.14% / 32.87%
||
7 Day CHG~0.00%
Published-21 Nov, 2023 | 06:42
Updated-02 Aug, 2024 | 07:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
bt: hci: DoS and possible RCE

An malicious BLE device can cause buffer overflow by sending malformed advertising packet BLE device using Zephyr OS, leading to DoS or potential RCE on the victim BLE device.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrZephyr
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-4263
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-7.6||HIGH
EPSS-0.08% / 24.15%
||
7 Day CHG~0.00%
Published-13 Oct, 2023 | 20:42
Updated-13 Feb, 2025 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential buffer overflow vulnerability in the Zephyr IEEE 802.15.4 nRF 15.4 driver

Potential buffer overflow vulnerability in the Zephyr IEEE 802.15.4 nRF 15.4 driver

Action-Not Available
Vendor-Zephyr Project
Product-zephyrZephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2023-4259
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-7.1||HIGH
EPSS-0.17% / 38.36%
||
7 Day CHG~0.00%
Published-25 Sep, 2023 | 23:05
Updated-13 Feb, 2025 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential buffer overflow vulnerabilities in the Zephyr eS-WiFi driver

Two potential buffer overflow vulnerabilities at the following locations in the Zephyr eS-WiFi driver source code.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrZephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-193
Off-by-one Error
CVE-2020-3616
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 10.18%
||
7 Day CHG~0.00%
Published-02 Jun, 2020 | 15:05
Updated-04 Aug, 2024 | 07:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in display function due to memory copy without checking length of size using strcpy function in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8017, APQ8053, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MSM8909W, MSM8917, MSM8953, MSM8996AU, QCS605, QM215, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM845, SDX20, SM6150, SM7150, SM8150

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-msm8953sdm450sdm636_firmwaresdm632_firmwaremsm8996au_firmwareapq8098_firmwaresdm845sdm450_firmwaresdm632sdx20sdm660sdm439mdm9607_firmwaresdm630sdm429sm7150_firmwaresm6150msm8909w_firmwaremdm9607msm8996auqm215apq8017_firmwaresm7150msm8917qcs605_firmwaremdm9207c_firmwaremdm9206mdm9207csm8150_firmwareapq8096ausdm439_firmwaresda845_firmwaresdm636sdm630_firmwareapq8098sda660_firmwaremdm9206_firmwareqcs605qm215_firmwaremsm8953_firmwareapq8053apq8096au_firmwaresm6150_firmwaremsm8917_firmwaresdm429_firmwaresm8150sdx20_firmwaresda660apq8017msm8909wapq8053_firmwaresdm660_firmwaresda845sdm845_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-5210
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5||MEDIUM
EPSS-1.55% / 81.53%
||
7 Day CHG~0.00%
Published-28 Jan, 2020 | 17:50
Updated-04 Aug, 2024 | 08:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
NetHack command line -w option parsing is subject to a buffer overflow

In NetHack before 3.6.5, an invalid argument to the -w command line option can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to influence command line options. Users should upgrade to NetHack 3.6.5.

Action-Not Available
Vendor-nethackNetHack
Product-nethackNetHack
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-4204
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-8.4||HIGH
EPSS-0.07% / 21.73%
||
7 Day CHG~0.00%
Published-19 Feb, 2020 | 15:15
Updated-16 Sep, 2024 | 17:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 is vulnerable to a buffer overflow, caused by improper bounds checking which could allow a local attacker to execute arbitrary code on the system with root privileges. IBM X-Force ID: 174960.

Action-Not Available
Vendor-IBM CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-aixdb2windowslinux_kernelDB2 for Linux- UNIX and Windows
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-5209
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5||MEDIUM
EPSS-1.69% / 82.35%
||
7 Day CHG~0.00%
Published-28 Jan, 2020 | 17:50
Updated-04 Aug, 2024 | 08:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
NetHack command line parsing of options starting with -de and -i is subject to a buffer overflow

In NetHack before 3.6.5, unknown options starting with -de and -i can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to influence command line options. Users should upgrade to NetHack 3.6.5.

Action-Not Available
Vendor-nethackNetHack
Product-nethackNetHack
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-39727
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.74%
||
7 Day CHG~0.00%
Published-07 Sep, 2025 | 15:16
Updated-25 Nov, 2025 | 17:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
mm: swap: fix potential buffer overflow in setup_clusters()

In the Linux kernel, the following vulnerability has been resolved: mm: swap: fix potential buffer overflow in setup_clusters() In setup_swap_map(), we only ensure badpages are in range (0, last_page]. As maxpages might be < last_page, setup_clusters() will encounter a buffer overflow when a badpage is >= maxpages. Only call inc_cluster_info_page() for badpage which is < maxpages to fix the issue.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-4609
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-7.4||HIGH
EPSS-0.13% / 31.26%
||
7 Day CHG~0.00%
Published-25 Jun, 2021 | 17:40
Updated-17 Sep, 2024 | 02:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Security Sevret Server (IBM Security Verify Privilege Manager 10.8.2) is vulnerable to a buffer overflow, caused by improper bounds checking. A local attacker could overflow a buffer and execute arbitrary code on the system or cause the system to crash. IBM X-Force ID: 184917.

Action-Not Available
Vendor-IBM Corporation
Product-security_verify_privilege_managerSecurity Verify Privilege Manager
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-36930
Matching Score-4
Assigner-Google Devices
ShareView Details
Matching Score-4
Assigner-Google Devices
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.06%
||
7 Day CHG~0.00%
Published-11 Dec, 2025 | 19:35
Updated-26 Feb, 2026 | 16:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In GetHostAddress of gxp_buffer.h, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-37803
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.05% / 14.91%
||
7 Day CHG~0.00%
Published-08 May, 2025 | 06:26
Updated-03 Nov, 2025 | 20:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
udmabuf: fix a buf size overflow issue during udmabuf creation

In the Linux kernel, the following vulnerability has been resolved: udmabuf: fix a buf size overflow issue during udmabuf creation by casting size_limit_mb to u64 when calculate pglimit.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-36931
Matching Score-4
Assigner-Google Devices
ShareView Details
Matching Score-4
Assigner-Google Devices
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.06%
||
7 Day CHG~0.00%
Published-11 Dec, 2025 | 19:35
Updated-26 Feb, 2026 | 16:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In GetHostAddress of gxp_buffer.h, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-10559
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.12% / 30.13%
||
7 Day CHG~0.00%
Published-31 Oct, 2024 | 02:00
Updated-30 Sep, 2025 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SourceCodester Airport Booking Management System details buffer overflow

A vulnerability was found in SourceCodester Airport Booking Management System 1.0 and classified as critical. Affected by this issue is the function Details. The manipulation of the argument passport/name leads to buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.

Action-Not Available
Vendor-SourceCodesterrazormist
Product-airport_booking_management_systemAirport Booking Management Systemairport_booking_management_system
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-5025
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-8.4||HIGH
EPSS-0.29% / 52.04%
||
7 Day CHG~0.00%
Published-11 Mar, 2021 | 15:30
Updated-16 Sep, 2024 | 20:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 db2fm is vulnerable to a buffer overflow, caused by improper bounds checking which could allow a local attacker to execute arbitrary code on the system with root privileges. IBM X-Force ID: 193661.

Action-Not Available
Vendor-IBM CorporationNetApp, Inc.Linux Kernel Organization, IncMicrosoft Corporation
Product-windowsdb2linux_kerneloncommand_insightDB2 for Linux, UNIX and Windows
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-0099
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.84%
||
7 Day CHG~0.00%
Published-13 Jun, 2024 | 21:23
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE

NVIDIA vGPU software for Linux contains a vulnerability in the Virtual GPU Manager, where the guest OS could cause buffer overrun in the host. A successful exploit of this vulnerability might lead to information disclosure, data tampering, escalation of privileges, and denial of service.

Action-Not Available
Vendor-NVIDIA Corporation
Product-vGPU software and Cloud Gamingnvsteslaquadrogeforcertx
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-0762
Matching Score-4
Assigner-Phoenix Technologies, Inc.
ShareView Details
Matching Score-4
Assigner-Phoenix Technologies, Inc.
CVSS Score-7.5||HIGH
EPSS-0.39% / 59.84%
||
7 Day CHG~0.00%
Published-14 May, 2024 | 14:56
Updated-29 Sep, 2025 | 16:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential buffer overflow when handling UEFI variables

Potential buffer overflow in unsafe UEFI variable handling in Phoenix SecureCoreâ„¢ for select Intel platforms This issue affects: Phoenix SecureCoreâ„¢ for Intel Kaby Lake: from 4.0.1.1 before 4.0.1.998; Phoenix SecureCoreâ„¢ for Intel Coffee Lake: from 4.1.0.1 before 4.1.0.562; Phoenix SecureCoreâ„¢ for Intel Ice Lake: from 4.2.0.1 before 4.2.0.323; Phoenix SecureCoreâ„¢ for Intel Comet Lake: from 4.2.1.1 before 4.2.1.287; Phoenix SecureCoreâ„¢ for Intel Tiger Lake: from 4.3.0.1 before 4.3.0.236; Phoenix SecureCoreâ„¢ for Intel Jasper Lake: from 4.3.1.1 before 4.3.1.184; Phoenix SecureCoreâ„¢ for Intel Alder Lake: from 4.4.0.1 before 4.4.0.269; Phoenix SecureCoreâ„¢ for Intel Raptor Lake: from 4.5.0.1 before 4.5.0.218; Phoenix SecureCoreâ„¢ for Intel Meteor Lake: from 4.5.1.1 before 4.5.1.15.

Action-Not Available
Vendor-phoenixtechPhoenixphoenixIntel Corporation
Product-core_i5-1240pcore_i5-14400fcore_i5-14500core_i7-12650hxatom_x7213ecore_i3-10105tcore_i7-8709gcore_i3-1000g4core_i5-9500core_i5-12500hlcore_i3-1115g4ecore_i5-14500hxcore_i9-14900tcore_5-220ucore_i7-1255ulcore_i3-7100xeon_gold_6338tcore_i3-8100core_i7-12800hcore_i5-8400tcore_i7-9850hxeon_platinum_8352vcore_i5-9400txeon_e-2274gcore_i7-9750hfxeon_w-10855mceleron_g6900tcore_i7-9700tcore_i5-9500txeon_gold_6338nxeon_e3-1505lcore_i5-1145grecore_i5-1235ucore_i3-1210ucore_i3-12300hlxeon_silver_4316xeon_e-2186gcore_i3-1215ulcore_i7-9750hceleron_g5900tcore_i5-12450hxceleron_g4930txeon_platinum_8368qcore_ultra_5_135hlcore_i7-8650ucore_i5-8305gcore_i3-8300tcore_i3-9350kcore_i7-8086kcore_i5-13600hcore_i7-1355uxeon_e-2144gcore_i3-1000ng4core_i5-10500hpentium_gold_g5500core_i9-14901exeon_e-2488core_i9-13950hxcore_i5-13400core_ultra_5_135ucore_m3-7y32core_i9-9900kfcore_i7-13700hxxeon_gold_5320core_i9-14901kecore_ultra_7_165uxeon_platinum_8358pentium_gold_g4600tcore_i5-12400fsecurecore_technologyxeon_gold_5318yxeon_gold_6348core_i9-12900kcore_i9-9900kscore_i3-9320core_i7-13850hxcore_i3-13100fcore_ultra_7_165hcore_i3-10105xeon_gold_6354core_i5-1245ulcore_i7-7820hqxeon_e-2224gcore_i5-9400fcore_i5-13600kfxeon_gold_6336ycore_i3-n305xeon_e-2276mcore_i5-7300uxeon_e-2124gceleron_n4500xeon_platinum_8352score_i7-12650hcore_i5-8257ucore_i7-8557uxeon_e3-1280core_i7-1185g7epentium_gold_g5400txeon_w-10885mcore_i3-7101tecore_i3-7167ucore_i3-14100core_i5-7360ucore_i5-8400core_i7-7700tcore_i5-1030g7core_i3-12100core_i9-12900fcore_i5-9600kxeon_gold_6334core_i7-1265ulxeon_e-2288gcore_i7-7700core_i5-10210ucore_i7-7740xcore_i7-13700kfpentium_gold_g5420tcore_i5-7y57core_i5-8500tcore_i9-12900hkcore_i7-7560ucore_i3-8130uceleron_g4900tcore_i5-11500hcore_i3-1000g1core_i3-9100core_i7-12800hlxeon_e3-1245core_7-250hcore_i5-8500core_ultra_5_135hcore_i5-8600tcore_3-100ucore_i7-13700eceleron_3965upentium_gold_g5400core_i5-14501ecore_i9-12950hxcore_i3-12300pentium_gold_g5420core_i7-14650hxcore_i3-1005g1core_ultra_9_185hcore_i5-9500fcore_i7-14790fcore_i7-1165g7core_i5-14501texeon_e3-1225celeron_g4950core_i5-12450hcore_i5-7500tcore_m3-6y30xeon_e-2276gcore_i7-7660ucore_i5-7267ucore_i7-1160g7xeon_e-2104gcore_i5-1340pxeon_platinum_8362core_i3-8350kxeon_w-1270pn97xeon_silver_4310core_i3-1215ucore_ultra_5_125ulxeon_gold_6330core_i5-1334ucore_i5-13500core_i3-12100tpentium_gold_g5500tcore_i5-1145g7core_i9-13900core_i7-1255ucore_i9-13900hkxeon_platinum_8351ncore_i7-8700kcore_i7-8559uxeon_w-3365atom_x7211ecore_i7-13620hcore_i5-9300hcore_i3-7350kcore_i7-8550ucore_i7-1195g7core_i5-12400celeron_3965yxeon_platinum_8360ypentium_6405uceleron_g3950core_i5-1035g1core_i7-1068ng7core_i3-8100hcore_i7-8809gcore_i7-14700kfcore_i3-7100ucore_i5-7400tcore_i5-14401ecore_i3-13100core_i5-1345uatom_x7425ecore_3-n355core_i5-8300hcore_i9-13900hxeon_e-2456core_i3-8100fceleron_3867ucore_i5-14401tecore_i5-10505celeron_6305core_i5-1350pcore_i5-13505hcore_i3-10305tcore_7-150ucore_m3-7y30core_i3-7020ucore_i9-11900kbcore_3-n350core_i7-10870hxeon_e-2278gpentium_gold_g5620core_i7-8700core_i3-1125g4xeon_w-3345core_i5-7600kxeon_platinum_8380core_i5-13600core_i5-13500tcore_i9-14900pentium_gold_4415ucore_i7-12700kfn200core_i3-9300tcore_i5-14600kfcore_i5-9600celeron_7300core_i7-13700kpentium_8505xeon_e3-1270core_i5-1155g7core_i5-11320hcore_i7-10710uceleron_n5105core_i5-1135g7core_i5-7400celeron_g5920pentium_gold_g5600xeon_e-2226gxeon_e-2224xeon_gold_6346celeron_7305core_i5-14500tcore_i3-12100fxeon_e-2414core_i5-8250ucore_i5-9600kfcore_i5-14400tcore_ultra_5_125hlcore_i3-7130ucore_i9-13900tecore_i7-13700tecore_i7-8569ucore_i7-1185g7core_i7-12700tcore_i5-14490fpentium_gold_g6405txeon_e-2244gcore_i5-10300hcore_i7-1180g7core_i5-12400tcore_i5-7y54core_i7-10810ucore_ultra_7_155ulxeon_silver_4310tcore_i5-13500hxxeon_silver_4314core_i5-1335ucore_i7-13800hxeon_e3-1285celeron_n5095pentium_silver_n6000xeon_gold_6326core_i5-12490fcore_i5-1030g4core_i5-9600tn95core_i5-8279uxeon_e-2176mcore_i7-13700tcore_i3-7300core_i9-13900kscore_i5-12600tcore_i7-7700hqcore_i5-12600kcore_i7-8700bcore_i7-1280pcore_i5-1035g7xeon_gold_6312ucore_ultra_7_155hcore_i7-7700kcore_i5-8600kcore_i9-11980hkcore_i7-12700hcore_i7-7600ucore_i5-11300hxeon_11855mpentium_gold_g6605core_i5-7600tcore_i3-8109ucore_i3-1315ucore_i3-1110g4core_i7-14700fcore_ultra_7_165hlcore_ultra_5_125ucore_i7-7500uxeon_e-2246gcore_i9-12900hxcore_i9-11900hpentium_gold_g7400celeron_g5925pentium_gold_4415ycore_i7-13705hpentium_gold_4417uxeon_w-3375core_i3-7100txeon_e-2434xeon_e-2286mcore_i3-7300tcore_i5-14600kcore_i3-14100tpentium_silver_n6005n250core_ultra_7_165ulcore_i9-9900celeron_g3930tcore_i5-7500xeon_w-1290pcore_i5-13600tcore_i5-13400fcore_i7-1260uceleron_g4920core_i9-12900tcore_i9-12900kfcore_i5-1038ng7core_i5-13400tcore_i7-14701exeon_w-1250core_i5-1240uceleron_g5900core_ultra_3_105ulxeon_w-1250pcore_i5-8400hcore_i9-12900hcore_i7-11370hcore_i9-8950hkceleron_g6900core_i5-7300hqcore_i7-9700core_i5-1130g7xeon_silver_4309ycore_i3-n300core_i7-1250uxeon_e-2286gcore_i9-14900hxcore_i5-10310un100celeron_g5905core_5-210hcore_i9-9980hkcore_i5-1245ucore_i7-11600hceleron_g4930core_i9-14900kfceleron_n4505xeon_e-2436core_i3-9100fcore_i7-13700fxeon_e-2124core_i5-14600core_i5-1230uxeon_w-1290celeron_7305lxeon_platinum_8358pcore_i5-14400core_i7-10850hcore_i5-12600pentium_8500core_5-220hpentium_6805core_i5-13490fcore_i7-7y75core_i3-7100hcore_i3-10305core_i3-10325core_i7-14701tecore_i7-12850hxxeon_gold_6338xeon_e-2174gcore_i7-11800hu300xeon_w-1270core_i5-13500hcore_i9-13900exeon_e-2186mceleron_n5100core_i5-13420hcore_i3-8100tcore_i7-10750hcore_i7-10875hpentium_gold_7505core_i9-11950hpentium_gold_g6505tpentium_gold_g6505core_i5-12600hlcore_i7-12800hxcore_ultra_5_115ucore_i7-7920hqcore_i7-14700hxcore_i7-13790fcore_i5-8400bcore_i5-1250pcore_i9-9900kcore_i5-10200hcore_i7-1265ucore_i9-10885hcore_ultra_5_134ucore_i5-12500txeon_e-2136core_i7-11390hxeon_e3-1230core_i9-14900kscore_i3-7101ecore_i5-9400xeon_gold_5318spentium_gold_g7400txeon_e3-1505mceleron_g3930core_i5-11500bcore_i5-12500hxeon_e3-1275core_i5-12600hxeon_gold_5318ncore_i5-12600kfcore_9-270h300core_i9-12900kscore_i7-8706gcore_i3-1220pcore_i7-13650hxceleron_3865uceleron_g4900core_i7-9700fcore_i3-9100tcore_i3-9300core_i9-10980hkpentium_gold_g6405core_i7-11850hcore_i7-10610ucore_i7-1360pxeon_gold_6314ucore_i9-9880hcore_i9-14900kxeon_e3-1240core_i7-1185grecore_i5-9400hxeon_e-2126gpentium_gold_4410yxeon_e-2176gxeon_gold_5320tcore_i7-1365ucore_i5-9300hfxeon_e-2236core_i7-9700kfxeon_e-2468xeon_e3-1535mcore_i5-8260ucore_i5-1140g7core_i7-1270p300txeon_w-3335xeon_11955mcore_5-120ucore_7-240hcore_ultra_5_125hxeon_gold_5315ycore_i7-13700core_i5-14450hxcore_i5-12500core_i7-1260pcore_i9-13900fcore_i7-8705gcore_i9-12900n150xeon_e-2486pentium_gold_g5600tceleron_6305ecore_i9-13905hcore_i5-10400hcore_i3-14100fxeon_platinum_8368core_i3-1115g4core_i7-7820hkcore_i5-8600core_ultra_7_164ucore_i3-1305ucore_i5-13600kcore_i9-13900kcore_i3-10110ucore_i9-9900tcore_i3-8300core_i3-11100bcore_i7-1060ng7core_i3-8100bcore_i5-7600core_i9-13900kfcore_i7-9700kcore_i9-14900fcore_i5-8500bn50core_i7-11375hpentium_gold_g4600core_i7-8700tcore_i7-8750hxeon_gold_5317core_i5-1145g7exeon_gold_6330ncore_i9-13980hxcore_i3-13100tcore_i7-1370pcore_i5-13450hxcore_i7-11700bcore_i5-7640xpentium_gold_g4620core_i7-14700tcore_i9-14901tecore_i7-7567ucore_i5-12600hxcore_i5-7440hqcore_i7-1060g7core_i5-7287uceleron_g5905tcore_i5-8350uxeon_platinum_8352ycore_i5-8259uxeon_e-2478xeon_e-2234core_i7-12700fcore_7-250ucore_i7-10510ucore_ultra_5_135ulcore_ultra_7_155ucore_i3-7320core_i7-8500ycore_ultra_7_155hlcore_i7-12700hlxeon_e3-1220core_i5-13600hxcore_i5-1235ulcore_i5-1035g4core_i3-9350kfcore_i9-13900tcore_i3-10105fcore_i7-14700core_i5-7260ucore_i7-8850hxeon_w-3323core_i5-8269ucore_i7-14700kcore_i3-1115grecore_i7-12700kcore_i7-1065g7core_i5-7200ucore_i5-1030ng7core_i7-13700hxeon_gold_6342core_i3-12300tcore_i9-13900hxxeon_w-1290tcore_i5-14600txeon_e-2146gxeon_e-2134core_i7-12700SecureCoreâ„¢ for Intel Comet LakeSecureCoreâ„¢ for Intel Alder LakeSecureCoreâ„¢ for Intel Meteor LakeSecureCoreâ„¢ for Intel Tiger LakeSecureCoreâ„¢ for Intel Jasper LakeSecureCoreâ„¢ for Intel Kaby LakeSecureCoreâ„¢ for Intel Coffee LakeSecureCoreâ„¢ for Intel Raptor LakeSecureCoreâ„¢ for Intel Ice Lakesecurecore_technology
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-0645
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
ShareView Details
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
CVSS Score-7.3||HIGH
EPSS-0.04% / 11.70%
||
7 Day CHG~0.00%
Published-17 Jan, 2024 | 13:47
Updated-10 Sep, 2024 | 18:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Overflow Vulnerability in Explorer++

Buffer overflow vulnerability in Explorer++ affecting version 1.3.5.531. A local attacker could execute arbitrary code via a long filename argument by monitoring Structured Exception Handler (SEH) records.

Action-Not Available
Vendor-explorerplusplusexplorerplusplus
Product-explorer\+\+Explorer++.exe
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-0213
Matching Score-4
Assigner-Trellix
ShareView Details
Matching Score-4
Assigner-Trellix
CVSS Score-8.2||HIGH
EPSS-0.07% / 20.71%
||
7 Day CHG~0.00%
Published-09 Jan, 2024 | 13:01
Updated-17 Jun, 2025 | 14:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A buffer overflow vulnerability in TA for Linux and TA for MacOS prior to 5.8.1 allows a local user to gain elevated permissions, or cause a Denial of Service (DoS), through exploiting a memory corruption issue in the TA service, which runs as root. This may also result in the disabling of event reporting to ePO, caused by failure to validate input from the file correctly.

Action-Not Available
Vendor-Musarubra US LLC (Trellix)
Product-agentTrellix Agent (TA)
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-6334
Matching Score-4
Assigner-HYPR Corp
ShareView Details
Matching Score-4
Assigner-HYPR Corp
CVSS Score-5.3||MEDIUM
EPSS-0.05% / 16.31%
||
7 Day CHG~0.00%
Published-16 Jan, 2024 | 19:41
Updated-17 Jun, 2025 | 21:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in HYPR Workforce Access on Windows allows Overflow Buffers.This issue affects Workforce Access: before 8.7.

Action-Not Available
Vendor-hyprHYPRMicrosoft Corporation
Product-windowsworkforce_accessWorkforce Access
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2019-4014
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-8.4||HIGH
EPSS-0.07% / 21.29%
||
7 Day CHG~0.00%
Published-03 Apr, 2019 | 13:50
Updated-16 Sep, 2024 | 17:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.1 is vulnerable to a buffer overflow, which could allow an authenticated local attacker to execute arbitrary code on the system as root. IBM X-Force ID: 155892.

Action-Not Available
Vendor-IBM CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-windowsdb2linux_kernelDB2Db2
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2022-30984
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 14.04%
||
7 Day CHG~0.00%
Published-25 Aug, 2022 | 23:18
Updated-03 Aug, 2024 | 07:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A buffer overflow vulnerability in the Rubrik Backup Service (RBS) Agent for Linux or Unix-based systems in Rubrik CDM 7.0.1, 7.0.1-p1, 7.0.1-p2 or 7.0.1-p3 before CDM 7.0.2-p2 could allow a local attacker to obtain root privileges by sending a crafted message to the RBS agent.

Action-Not Available
Vendor-opengrouprubrikn/aLinux Kernel Organization, Inc
Product-cdmunixlinux_kerneln/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-47404
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.01% / 3.40%
||
7 Day CHG~0.00%
Published-04 May, 2026 | 16:43
Updated-06 May, 2026 | 18:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in Automotive Audio

Memory corruption when dynamically changing the size of a previously allocated buffer while its contents are being modified.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_460_mobile_firmwareqrb5165mflight_rb5_5gqca6698ausnapdragon_8_gen_2_mobilesa7775psnapdragon_auto_4g_modemwsa8845h_firmwareqcn9012_firmwaresd865_5g_firmwarewcd9378wcd9326_firmwarewsa8832_firmwarefastconnect_6700csra6640wcd9395_firmwaresnapdragon_778g\+_5g_mobilevideo_collaboration_vc5_firmwaresm8650q_firmwaresa6155_firmwaresnapdragon_x75_5g_modem-rfg3x_gen_2sa7775p_firmwareqam8255pqca6698au_firmwarelemans_au_lgitqam8295p_firmwaresnapdragon_660_mobilewsa8840_firmwarewcn7861_firmwareqca8695au_firmwaresa4155pqamsrv1hqamsrv1mfwa_gen_3_ultra_firmwareqca2066qca6595au_firmwaresnapdragon_auto_5g_modem-rfsnapdragon_x12_lte_modemsa4155p_firmwareqca6584ausnapdragon_w5\+_gen_1_wearablesnapdragon_680_4g_mobilerobotics_rb5_firmwarelemansau_firmwaresnapdragon_x53_5g_modem-rf_firmwaresxr2250pqca6174a_firmwaresa8150p_firmwareqca6574a_firmwaresnapdragon_480_5g_mobilear8031snapdragon_888_5g_mobilemilos_iot_firmwaresnapdragon_x55_5g_modem-rfwcn3980miloslemans_au_lgit_firmwaresa8155wcn6650snapdragon_690_5g_mobilewcn6650_firmwareqcs8550sm8635_firmwaresa8770p_firmwarewcn3910_firmwarewcn3950_firmwarewsa8810_firmwarewsa8832qca9377video_collaboration_vc1sd662srv1hqcm4325csra6620fwa_gen_3_ultraqcs4290wcn7881_firmwarefastconnect_6700_firmwaremdm9628snapdragon_x72_5g_modem-rf_firmwarefastconnect_68005g_fixed_wireless_access_firmwareqrb5165n_firmwarevideo_collaboration_vc3qca6564a_firmwareqfw7124snapdragon_4_gen_1_mobileqcc710snapdragon_7c\+_gen_3_compute_firmwaresnapdragon_8\+_gen_2_mobileg3x_gen_2_firmwaresnapdragon_480_5g_mobile_firmwareqca6174asm7550_firmwareqam8255p_firmwareqcn9012sa8620psnapdragon_695_5g_mobileqca6797aq_firmwarewcn7881sda660_firmwarewcn3980_firmwarefastconnect_6200_firmwareqca6574_firmwaresnapdragon_x12_lte_modem_firmwarewcd9370_firmwarewsa8830_firmwaresnapdragon_778g_5g_mobile_firmwaresrv1m_firmwaresw5100pqca6696_firmwareqca6698aqqcm5430215_mobile_firmwaresxr2330p_firmwaresnapdragon_660_mobile_firmwaresnapdragon_778g_5g_mobilekalpeni_firmwaresnapdragon_6_gen_4_mobileqca6564auqca6564asa6145pcsra6620_firmwaremdm9250_firmwarevideo_collaboration_vc3_firmwarewcd9340_firmwareqca2066_firmwareqcs8550_firmwarear8035snapdragon_460_mobileqfw7114_firmwarefastconnect_6900sa7255pqca8081_firmwareqca6391_firmwarewcn3615sa8145p_firmwareqcn9011_firmwareqca6574qamsrv1m_firmwareqca6574asa6155psa9000p_firmwareqcm2290_firmwarevideo_collaboration_vc5qcm2290sxr2230p_firmware215_mobilesnapdragon_690_5g_mobile_firmwarear8031_firmwaresm6650psm7635p_firmwarefastconnect_7800sa8295p_firmwarewcd9335sm7525sw5100_firmwaresnapdragon_xr2\+_gen_1qca6391qca6584au_firmwaresa8155p_firmwarewsa8835qca6688aq_firmwarewcd9340sm7675snapdragon_6_gen_4_mobile_firmwaresxr2330psm7525_firmwareqcn6224_firmwareqamsrv1h_firmwaresa8620p_firmwarewcd9371qcn9011qca8081mdm9250snapdragon_662_mobile_firmwaresnapdragon_x32_5g_modem-rf_firmwarewcn3615_firmwareqca6595snapdragon_x53_5g_modem-rfsa2150pfastconnect_7800_firmwarefastconnect_6200sa8770psnapdragon_xr2_5g_firmwareqcn6274snapdragon_xr2_5gsd662_firmwaresm6650p_firmwaresa4150p_firmwareqcs6690sa6145p_firmwaresnapdragon_782g_mobile_firmwarewcd9371_firmwaresnapdragon_x35_5g_modem-rf_firmwaresnapdragon_auto_5g_modem-rf_gen_2snapdragon_888\+_5g_mobilewcn6450_firmwareqca9377_firmwarefastconnect_6900_firmwaresmart_audio_400wsa8810qep8111_firmwarec-v2x_9150snapdragon_auto_4g_modem_firmwarewcd9375snapdragon_865\+_5g_mobile_firmwarefastconnect_6800_firmwaresxr2350p_firmwarewcd9370ar8035_firmwareflight_rb5_5g_firmwareqrb5165nsa8255pqca8337qfw7124_firmwaresa2150p_firmwaresnapdragon_8\+_gen_2_mobile_firmwareqcm6490sda660wcn3660bwcn3990_firmwarewcn3988snapdragon_870_5g_mobilesm8650qsw5100p_firmwaresnapdragon_w5\+_gen_1_wearable_firmwareqcs2290srv1h_firmwaresnapdragon_685_4g_mobilec-v2x_9150_firmwaresm7325p_firmwaresw5100snapdragon_778g\+_5g_mobile_firmwarerobotics_rb5wsa8815sxr2350plemansausa8295pqcm4325_firmwaresnapdragon_865_5g_mobile_firmwarewcn3680b_firmwareqcn6274_firmwaresnapdragon_x32_5g_modem-rfsa8155_firmwareqca6678aqsnapdragon_7s_gen_3_mobilesa8195p_firmwareqca6698aq_firmwaresm6225p_firmwaresmart_audio_400_firmwaresxr2250p_firmwarewcd9395qca6797aqsm7550p_firmwaresnapdragon_865\+_5g_mobilesa6150pqcm6125_firmwaresnapdragon_695_5g_mobile_firmwareqca6595_firmwaremilos_iotsm7550wcn3680bkalpenig1_gen_1snapdragon_680_4g_mobile_firmwarewsa8830sa8195pwcd9380qcm6125wsa8845_firmwaresa6150p_firmwarewcd9375_firmwarewcd9341snapdragon_8_gen_2_mobile_firmwarewcn3950sm8635p_firmwarewcd9360_firmwareqcm5430_firmwarewcd9341_firmwarewsa8845hsm8550p_firmwaresm7635pwcn7861srv1msnapdragon_870_5g_mobile_firmwaresnapdragon_4_gen_1_mobile_firmwareqca8337_firmwaresm8635snapdragon_888_5g_mobile_firmwaresnapdragon_888\+_5g_mobile_firmware5g_fixed_wireless_accesssnapdragon_x55_5g_modem-rf_firmwarecsra6640_firmwareqca6595ausd865_5gsnapdragon_x75_5g_modem-rf_firmwaresnapdragon_xr2\+_gen_1_firmwareqcc710_firmwareqca6678aq_firmwarewcn6450sa9000psnapdragon_662_mobilesa8150psa4150pwcn3660b_firmwarewcn3990qca9367_firmwarerobotics_rb2sa6155qca6688aqqca9367sa8155pmilos_firmwarewcd9385_firmwarewcd9390snapdragon_8_gen_3_mobileqcn6224sm7675p_firmwareqca6564au_firmwaresm7675_firmwarewcn6755qca6574ausm7550psnapdragon_8_gen_3_mobile_firmwaresm6225pwcd9378_firmwareqcs6690_firmwaresnapdragon_x35_5g_modem-rfsm7675pqcs2290_firmwarewcd9326snapdragon_auto_5g_modem-rf_firmwarevideo_collaboration_vc1_firmwaremdm9628_firmwarewcn3988_firmwarewcn3910qcm6490_firmwareqep8111wcd9360snapdragon_685_4g_mobile_firmwaresa8255p_firmwareqrb5165m_firmwaresnapdragon_480\+_5g_mobile_firmwaresnapdragon_865_5g_mobilewcd9390_firmwareqca6696sm8635psnapdragon_x72_5g_modem-rfsa8145psnapdragon_7s_gen_3_mobile_firmwareqca8695auwsa8815_firmwareqam8295pwcn6755_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwarewsa8835_firmwarerobotics_rb2_firmwarewcd9335_firmwaresnapdragon_480\+_5g_mobilesm7325psnapdragon_782g_mobilesnapdragon_7c\+_gen_3_computewcd9380_firmwareqca6574au_firmwaresa7255p_firmwareg1_gen_1_firmwaresm8550psxr2230pqcs4290_firmwareqfw7114wcd9385sa6155p_firmwarewsa8845wsa8840Snapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-3629
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 12.84%
||
7 Day CHG~0.00%
Published-08 Sep, 2020 | 09:31
Updated-04 Aug, 2024 | 07:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

u'Stack out of bound issue occurs when making query to DSP capabilities due to wrong assumption was made on determining the buffer size for the DSP attributes' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in Bitra, Kamorta, Rennell, SC7180, SDM845, SM6150, SM7150, SM8150, SM8250, SXR2130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-kamorta_firmwaresm8150_firmwaresxr2130_firmwarerennellsc7180bitrasdm845rennell_firmwaresm8250_firmwaresm7150_firmwaresm6150_firmwaresm8250sm6150sc7180_firmwarebitra_firmwaresm8150kamortasm7150sxr2130sdm845_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 7
  • 8
  • Next
Details not found