Action not permitted
Modal body text goes here.
Modal Title
Modal Body
WID-SEC-W-2023-2637
Vulnerability from csaf_certbund
Published
2023-10-11 22:00
Modified
2023-10-11 22:00
Summary
Google Android Pixel: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das Android Betriebssystem ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android Pixel ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Daten zu manipulieren.
Betroffene Betriebssysteme
- Android
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Das Android Betriebssystem ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android Pixel ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Daten zu manipulieren.", title: "Angriff", }, { category: "general", text: "- Android", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-2637 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2637.json", }, { category: "self", summary: "WID-SEC-2023-2637 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2637", }, { category: "external", summary: "Google Pixel Security Bulletin October 2023 vom 2023-10-11", url: "https://source.android.com/docs/security/bulletin/pixel/2023-10-01", }, ], source_lang: "en-US", title: "Google Android Pixel: Mehrere Schwachstellen", tracking: { current_release_date: "2023-10-11T22:00:00.000+00:00", generator: { date: "2024-08-15T17:59:49.846+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-2637", initial_release_date: "2023-10-11T22:00:00.000+00:00", revision_history: [ { date: "2023-10-11T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Google Android Pixel", product: { name: "Google Android Pixel", product_id: "T027142", product_identification_helper: { cpe: "cpe:/o:google:android:pixel", }, }, }, ], category: "vendor", name: "Google", }, ], }, vulnerabilities: [ { cve: "CVE-2023-40142", notes: [ { category: "description", text: "In Google Android Pixel existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Kernel, Pixel, Qualcomm und Qualcomm Closed-Source u.a. durch mehrere Puffer- und Integer-Überläufe, Puffer-Überlesungen und eine Speicherbeschädigung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T027142", ], }, release_date: "2023-10-11T22:00:00.000+00:00", title: "CVE-2023-40142", }, { cve: "CVE-2023-40141", notes: [ { category: "description", text: "In Google Android Pixel existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Kernel, Pixel, Qualcomm und Qualcomm Closed-Source u.a. durch mehrere Puffer- und Integer-Überläufe, Puffer-Überlesungen und eine Speicherbeschädigung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T027142", ], }, release_date: "2023-10-11T22:00:00.000+00:00", title: "CVE-2023-40141", }, { cve: "CVE-2023-3781", notes: [ { category: "description", text: "In Google Android Pixel existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Kernel, Pixel, Qualcomm und Qualcomm Closed-Source u.a. durch mehrere Puffer- und Integer-Überläufe, Puffer-Überlesungen und eine Speicherbeschädigung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T027142", ], }, release_date: "2023-10-11T22:00:00.000+00:00", title: "CVE-2023-3781", }, { cve: "CVE-2023-35663", notes: [ { category: "description", text: "In Google Android Pixel existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Kernel, Pixel, Qualcomm und Qualcomm Closed-Source u.a. durch mehrere Puffer- und Integer-Überläufe, Puffer-Überlesungen und eine Speicherbeschädigung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T027142", ], }, release_date: "2023-10-11T22:00:00.000+00:00", title: "CVE-2023-35663", }, { cve: "CVE-2023-35662", notes: [ { category: "description", text: "In Google Android Pixel existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Kernel, Pixel, Qualcomm und Qualcomm Closed-Source u.a. durch mehrere Puffer- und Integer-Überläufe, Puffer-Überlesungen und eine Speicherbeschädigung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T027142", ], }, release_date: "2023-10-11T22:00:00.000+00:00", title: "CVE-2023-35662", }, { cve: "CVE-2023-35661", notes: [ { category: "description", text: "In Google Android Pixel existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Kernel, Pixel, Qualcomm und Qualcomm Closed-Source u.a. durch mehrere Puffer- und Integer-Überläufe, Puffer-Überlesungen und eine Speicherbeschädigung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T027142", ], }, release_date: "2023-10-11T22:00:00.000+00:00", title: "CVE-2023-35661", }, { cve: "CVE-2023-35660", notes: [ { category: "description", text: "In Google Android Pixel existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Kernel, Pixel, Qualcomm und Qualcomm Closed-Source u.a. durch mehrere Puffer- und Integer-Überläufe, Puffer-Überlesungen und eine Speicherbeschädigung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T027142", ], }, release_date: "2023-10-11T22:00:00.000+00:00", title: "CVE-2023-35660", }, { cve: "CVE-2023-35656", notes: [ { category: "description", text: "In Google Android Pixel existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Kernel, Pixel, Qualcomm und Qualcomm Closed-Source u.a. durch mehrere Puffer- und Integer-Überläufe, Puffer-Überlesungen und eine Speicherbeschädigung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T027142", ], }, release_date: "2023-10-11T22:00:00.000+00:00", title: "CVE-2023-35656", }, { cve: "CVE-2023-35655", notes: [ { category: "description", text: "In Google Android Pixel existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Kernel, Pixel, Qualcomm und Qualcomm Closed-Source u.a. durch mehrere Puffer- und Integer-Überläufe, Puffer-Überlesungen und eine Speicherbeschädigung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T027142", ], }, release_date: "2023-10-11T22:00:00.000+00:00", title: "CVE-2023-35655", }, { cve: "CVE-2023-35654", notes: [ { category: "description", text: "In Google Android Pixel existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Kernel, Pixel, Qualcomm und Qualcomm Closed-Source u.a. durch mehrere Puffer- und Integer-Überläufe, Puffer-Überlesungen und eine Speicherbeschädigung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T027142", ], }, release_date: "2023-10-11T22:00:00.000+00:00", title: "CVE-2023-35654", }, { cve: "CVE-2023-35653", notes: [ { category: "description", text: "In Google Android Pixel existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Kernel, Pixel, Qualcomm und Qualcomm Closed-Source u.a. durch mehrere Puffer- und Integer-Überläufe, Puffer-Überlesungen und eine Speicherbeschädigung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T027142", ], }, release_date: "2023-10-11T22:00:00.000+00:00", title: "CVE-2023-35653", }, { cve: "CVE-2023-35652", notes: [ { category: "description", text: "In Google Android Pixel existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Kernel, Pixel, Qualcomm und Qualcomm Closed-Source u.a. durch mehrere Puffer- und Integer-Überläufe, Puffer-Überlesungen und eine Speicherbeschädigung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T027142", ], }, release_date: "2023-10-11T22:00:00.000+00:00", title: "CVE-2023-35652", }, { cve: "CVE-2023-35649", notes: [ { category: "description", text: "In Google Android Pixel existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Kernel, Pixel, Qualcomm und Qualcomm Closed-Source u.a. durch mehrere Puffer- und Integer-Überläufe, Puffer-Überlesungen und eine Speicherbeschädigung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T027142", ], }, release_date: "2023-10-11T22:00:00.000+00:00", title: "CVE-2023-35649", }, { cve: "CVE-2023-35648", notes: [ { category: "description", text: "In Google Android Pixel existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Kernel, Pixel, Qualcomm und Qualcomm Closed-Source u.a. durch mehrere Puffer- und Integer-Überläufe, Puffer-Überlesungen und eine Speicherbeschädigung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T027142", ], }, release_date: "2023-10-11T22:00:00.000+00:00", title: "CVE-2023-35648", }, { cve: "CVE-2023-35647", notes: [ { category: "description", text: "In Google Android Pixel existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Kernel, Pixel, Qualcomm und Qualcomm Closed-Source u.a. durch mehrere Puffer- und Integer-Überläufe, Puffer-Überlesungen und eine Speicherbeschädigung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T027142", ], }, release_date: "2023-10-11T22:00:00.000+00:00", title: "CVE-2023-35647", }, { cve: "CVE-2023-35646", notes: [ { category: "description", text: "In Google Android Pixel existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Kernel, Pixel, Qualcomm und Qualcomm Closed-Source u.a. durch mehrere Puffer- und Integer-Überläufe, Puffer-Überlesungen und eine Speicherbeschädigung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T027142", ], }, release_date: "2023-10-11T22:00:00.000+00:00", title: "CVE-2023-35646", }, { cve: "CVE-2023-35645", notes: [ { category: "description", text: "In Google Android Pixel existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Kernel, Pixel, Qualcomm und Qualcomm Closed-Source u.a. durch mehrere Puffer- und Integer-Überläufe, Puffer-Überlesungen und eine Speicherbeschädigung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T027142", ], }, release_date: "2023-10-11T22:00:00.000+00:00", title: "CVE-2023-35645", }, { cve: "CVE-2023-28571", notes: [ { category: "description", text: "In Google Android Pixel existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Kernel, Pixel, Qualcomm und Qualcomm Closed-Source u.a. durch mehrere Puffer- und Integer-Überläufe, Puffer-Überlesungen und eine Speicherbeschädigung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T027142", ], }, release_date: "2023-10-11T22:00:00.000+00:00", title: "CVE-2023-28571", }, { cve: "CVE-2023-28539", notes: [ { category: "description", text: "In Google Android Pixel existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Kernel, Pixel, Qualcomm und Qualcomm Closed-Source u.a. durch mehrere Puffer- und Integer-Überläufe, Puffer-Überlesungen und eine Speicherbeschädigung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T027142", ], }, release_date: "2023-10-11T22:00:00.000+00:00", title: "CVE-2023-28539", }, { cve: "CVE-2023-22384", notes: [ { category: "description", text: "In Google Android Pixel existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Kernel, Pixel, Qualcomm und Qualcomm Closed-Source u.a. durch mehrere Puffer- und Integer-Überläufe, Puffer-Überlesungen und eine Speicherbeschädigung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T027142", ], }, release_date: "2023-10-11T22:00:00.000+00:00", title: "CVE-2023-22384", }, { cve: "CVE-2023-21667", notes: [ { category: "description", text: "In Google Android Pixel existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Kernel, Pixel, Qualcomm und Qualcomm Closed-Source u.a. durch mehrere Puffer- und Integer-Überläufe, Puffer-Überlesungen und eine Speicherbeschädigung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T027142", ], }, release_date: "2023-10-11T22:00:00.000+00:00", title: "CVE-2023-21667", }, { cve: "CVE-2023-21663", notes: [ { category: "description", text: "In Google Android Pixel existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Kernel, Pixel, Qualcomm und Qualcomm Closed-Source u.a. durch mehrere Puffer- und Integer-Überläufe, Puffer-Überlesungen und eine Speicherbeschädigung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T027142", ], }, release_date: "2023-10-11T22:00:00.000+00:00", title: "CVE-2023-21663", }, { cve: "CVE-2023-21655", notes: [ { category: "description", text: "In Google Android Pixel existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Kernel, Pixel, Qualcomm und Qualcomm Closed-Source u.a. durch mehrere Puffer- und Integer-Überläufe, Puffer-Überlesungen und eine Speicherbeschädigung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T027142", ], }, release_date: "2023-10-11T22:00:00.000+00:00", title: "CVE-2023-21655", }, { cve: "CVE-2023-21654", notes: [ { category: "description", text: "In Google Android Pixel existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Kernel, Pixel, Qualcomm und Qualcomm Closed-Source u.a. durch mehrere Puffer- und Integer-Überläufe, Puffer-Überlesungen und eine Speicherbeschädigung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T027142", ], }, release_date: "2023-10-11T22:00:00.000+00:00", title: "CVE-2023-21654", }, { cve: "CVE-2023-21644", notes: [ { category: "description", text: "In Google Android Pixel existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Kernel, Pixel, Qualcomm und Qualcomm Closed-Source u.a. durch mehrere Puffer- und Integer-Überläufe, Puffer-Überlesungen und eine Speicherbeschädigung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T027142", ], }, release_date: "2023-10-11T22:00:00.000+00:00", title: "CVE-2023-21644", }, { cve: "CVE-2023-21636", notes: [ { category: "description", text: "In Google Android Pixel existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Kernel, Pixel, Qualcomm und Qualcomm Closed-Source u.a. durch mehrere Puffer- und Integer-Überläufe, Puffer-Überlesungen und eine Speicherbeschädigung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T027142", ], }, release_date: "2023-10-11T22:00:00.000+00:00", title: "CVE-2023-21636", }, { cve: "CVE-2022-40524", notes: [ { category: "description", text: "In Google Android Pixel existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Kernel, Pixel, Qualcomm und Qualcomm Closed-Source u.a. durch mehrere Puffer- und Integer-Überläufe, Puffer-Überlesungen und eine Speicherbeschädigung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T027142", ], }, release_date: "2023-10-11T22:00:00.000+00:00", title: "CVE-2022-40524", }, { cve: "CVE-2022-33220", notes: [ { category: "description", text: "In Google Android Pixel existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Kernel, Pixel, Qualcomm und Qualcomm Closed-Source u.a. durch mehrere Puffer- und Integer-Überläufe, Puffer-Überlesungen und eine Speicherbeschädigung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T027142", ], }, release_date: "2023-10-11T22:00:00.000+00:00", title: "CVE-2022-33220", }, ], }
cve-2023-40142
Vulnerability from cvelistv5
Published
2023-10-11 19:27
Modified
2024-09-18 14:53
Severity ?
EPSS score ?
Summary
In TBD of TBD, there is a possible way to bypass carrier restrictions due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T18:24:55.581Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-40142", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-09-18T14:52:53.120235Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-18T14:53:51.297Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Android", vendor: "Google", versions: [ { status: "affected", version: "Android kernel", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>In TBD of TBD, there is a possible way to bypass carrier restrictions due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.</p>", }, ], value: "In TBD of TBD, there is a possible way to bypass carrier restrictions due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n", }, ], problemTypes: [ { descriptions: [ { description: "Elevation of privilege", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2023-10-11T19:27:09.716Z", orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", shortName: "google_android", }, references: [ { url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], }, }, cveMetadata: { assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", assignerShortName: "google_android", cveId: "CVE-2023-40142", datePublished: "2023-10-11T19:27:08.329Z", dateReserved: "2023-08-09T02:29:36.076Z", dateUpdated: "2024-09-18T14:53:51.297Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-21644
Vulnerability from cvelistv5
Published
2023-09-05 06:23
Modified
2024-09-06 14:34
Severity ?
EPSS score ?
Summary
Memory corruption in RIL due to Integer Overflow while triggering qcril_uim_request_apdu request.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Qualcomm, Inc. | Snapdragon |
Version: AQT1000 Version: QCA6390 Version: QCA6391 Version: QCA6420 Version: QCA6426 Version: QCA6430 Version: QCA6436 Version: QCA6564 Version: QCA6564AU Version: QCA6574A Version: QCA6574AU Version: QCA6595AU Version: QCA6696 Version: QCC5100 Version: SA515M Version: SA6145P Version: SA6150P Version: SA6155P Version: SA8145P Version: SA8150P Version: SA8155P Version: SA8195P Version: SD855 Version: SD865 5G Version: SD870 Version: SDA429W Version: SDX55 Version: SDX55M Version: SDXR2 5G Version: SW5100 Version: SW5100P Version: WCD9341 Version: WCD9360 Version: WCD9380 Version: WCN3610 Version: WCN3660B Version: WCN3680B Version: WCN3980 Version: WCN3988 Version: WCN3998 Version: WCN6850 Version: WCN6851 Version: WSA8810 Version: WSA8815 Version: WSA8830 Version: WSA8835 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T09:44:01.947Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", }, ], title: "CVE Program Container", }, { affected: [ { cpes: [ "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "aqt1000_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "qca6390_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "qca6391_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "qca6420_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "qca6426_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "qca6430_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "qca6436_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "qca6564_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "qca6564au_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "qca6574a_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "qca6574au_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "qca6595au_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "qca6696_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:qcc5100_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "qcc5100_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:sa515m_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sa515m_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sa6145p_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sa6150p_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sa6155p_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sa8145p_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sa8150p_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sa8155p_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sa8195p_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sd855_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sd865_5g_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sd870_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:sda429w_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sda429w_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sdx55_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sdx55m_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sdxr2_5g_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sw5100_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sw5100p_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "wcd9341_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "wcd9360_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "wcd9380_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "wcn3610_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "wcn3660b_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "wcn3680b_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "wcn3980_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "wcn3988_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "wcn3998_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "wcn6850_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "wcn6851_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "wsa8810_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "wsa8815_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "wsa8830_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "wsa8835_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2023-21644", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-09-06T14:34:10.738056Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-06T14:34:19.416Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", platforms: [ "Snapdragon Auto", "Snapdragon Compute", "Snapdragon Industrial IOT", "Snapdragon Mobile", "Snapdragon Wearables", ], product: "Snapdragon", vendor: "Qualcomm, Inc.", versions: [ { status: "affected", version: "AQT1000", }, { status: "affected", version: "QCA6390", }, { status: "affected", version: "QCA6391", }, { status: "affected", version: "QCA6420", }, { status: "affected", version: "QCA6426", }, { status: "affected", version: "QCA6430", }, { status: "affected", version: "QCA6436", }, { status: "affected", version: "QCA6564", }, { status: "affected", version: "QCA6564AU", }, { status: "affected", version: "QCA6574A", }, { status: "affected", version: "QCA6574AU", }, { status: "affected", version: "QCA6595AU", }, { status: "affected", version: "QCA6696", }, { status: "affected", version: "QCC5100", }, { status: "affected", version: "SA515M", }, { status: "affected", version: "SA6145P", }, { status: "affected", version: "SA6150P", }, { status: "affected", version: "SA6155P", }, { status: "affected", version: "SA8145P", }, { status: "affected", version: "SA8150P", }, { status: "affected", version: "SA8155P", }, { status: "affected", version: "SA8195P", }, { status: "affected", version: "SD855", }, { status: "affected", version: "SD865 5G", }, { status: "affected", version: "SD870", }, { status: "affected", version: "SDA429W", }, { status: "affected", version: "SDX55", }, { status: "affected", version: "SDX55M", }, { status: "affected", version: "SDXR2 5G", }, { status: "affected", version: "SW5100", }, { status: "affected", version: "SW5100P", }, { status: "affected", version: "WCD9341", }, { status: "affected", version: "WCD9360", }, { status: "affected", version: "WCD9380", }, { status: "affected", version: "WCN3610", }, { status: "affected", version: "WCN3660B", }, { status: "affected", version: "WCN3680B", }, { status: "affected", version: "WCN3980", }, { status: "affected", version: "WCN3988", }, { status: "affected", version: "WCN3998", }, { status: "affected", version: "WCN6850", }, { status: "affected", version: "WCN6851", }, { status: "affected", version: "WSA8810", }, { status: "affected", version: "WSA8815", }, { status: "affected", version: "WSA8830", }, { status: "affected", version: "WSA8835", }, ], }, ], descriptions: [ { lang: "en", value: "Memory corruption in RIL due to Integer Overflow while triggering qcril_uim_request_apdu request.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-680", description: "CWE-680 Integer Overflow to Buffer Overflow", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-04-12T16:21:31.484Z", orgId: "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", shortName: "qualcomm", }, references: [ { url: "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", }, ], title: "Integer Overflow to Buffer Overflow in RIL", }, }, cveMetadata: { assignerOrgId: "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", assignerShortName: "qualcomm", cveId: "CVE-2023-21644", datePublished: "2023-09-05T06:23:54.197Z", dateReserved: "2022-12-07T02:58:25.867Z", dateUpdated: "2024-09-06T14:34:19.416Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-28571
Vulnerability from cvelistv5
Published
2023-10-03 05:00
Modified
2024-08-02 13:43
Severity ?
EPSS score ?
Summary
Information disclosure in WLAN HOST while processing the WLAN scan descriptor list during roaming scan.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Qualcomm, Inc. | Snapdragon |
Version: APQ8064AU Version: CSRB31024 Version: FastConnect 6800 Version: FastConnect 6900 Version: FastConnect 7800 Version: MDM9650 Version: MSM8996AU Version: QAM8255P Version: QAM8295P Version: QCA6175A Version: QCA6310 Version: QCA6320 Version: QCA6391 Version: QCA6421 Version: QCA6426 Version: QCA6431 Version: QCA6436 Version: QCA6554A Version: QCA6564A Version: QCA6564AU Version: QCA6574 Version: QCA6574A Version: QCA6574AU Version: QCA6584AU Version: QCA6595 Version: QCA6595AU Version: QCA6678AQ Version: QCA6696 Version: QCA6698AQ Version: QCA6797AQ Version: QCC2073 Version: QCC2076 Version: QCN9074 Version: QCS410 Version: QCS610 Version: Qualcomm Video Collaboration VC1 Platform Version: Qualcomm Video Collaboration VC3 Platform Version: SA6145P Version: SA6150P Version: SA6155P Version: SA8145P Version: SA8150P Version: SA8155P Version: SA8195P Version: SA8255P Version: SA8295P Version: SD835 Version: SD865 5G Version: SM8550P Version: Snapdragon 8 Gen 2 Mobile Platform Version: Snapdragon 8+ Gen 2 Mobile Platform Version: Snapdragon 820 Automotive Platform Version: Snapdragon 835 Mobile PC Platform Version: Snapdragon 865 5G Mobile Platform Version: Snapdragon 865+ 5G Mobile Platform (SM8250-AB) Version: Snapdragon 870 5G Mobile Platform (SM8250-AC) Version: Snapdragon Auto 5G Modem-RF Version: Snapdragon W5+ Gen 1 Wearable Platform Version: Snapdragon X55 5G Modem-RF System Version: Snapdragon XR2 5G Platform Version: Snapdragon Auto 4G Modem Version: SW5100 Version: SW5100P Version: SXR2130 Version: WCD9335 Version: WCD9340 Version: WCD9341 Version: WCD9370 Version: WCD9380 Version: WCD9385 Version: WCD9390 Version: WCD9395 Version: WCN3950 Version: WCN3980 Version: WCN3988 Version: WCN3990 Version: WSA8810 Version: WSA8815 Version: WSA8830 Version: WSA8835 Version: WSA8840 Version: WSA8845 Version: WSA8845H |
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2023-28571", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-06-28T13:59:28.325621Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-06-28T13:59:37.771Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-02T13:43:22.455Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", platforms: [ "Snapdragon Auto", "Snapdragon Compute", "Snapdragon Connectivity", "Snapdragon Consumer Electronics Connectivity", "Snapdragon Consumer IOT", "Snapdragon Industrial IOT", "Snapdragon Mobile", "Snapdragon Wearables", ], product: "Snapdragon", vendor: "Qualcomm, Inc.", versions: [ { status: "affected", version: "APQ8064AU", }, { status: "affected", version: "CSRB31024", }, { status: "affected", version: "FastConnect 6800", }, { status: "affected", version: "FastConnect 6900", }, { status: "affected", version: "FastConnect 7800", }, { status: "affected", version: "MDM9650", }, { status: "affected", version: "MSM8996AU", }, { status: "affected", version: "QAM8255P", }, { status: "affected", version: "QAM8295P", }, { status: "affected", version: "QCA6175A", }, { status: "affected", version: "QCA6310", }, { status: "affected", version: "QCA6320", }, { status: "affected", version: "QCA6391", }, { status: "affected", version: "QCA6421", }, { status: "affected", version: "QCA6426", }, { status: "affected", version: "QCA6431", }, { status: "affected", version: "QCA6436", }, { status: "affected", version: "QCA6554A", }, { status: "affected", version: "QCA6564A", }, { status: "affected", version: "QCA6564AU", }, { status: "affected", version: "QCA6574", }, { status: "affected", version: "QCA6574A", }, { status: "affected", version: "QCA6574AU", }, { status: "affected", version: "QCA6584AU", }, { status: "affected", version: "QCA6595", }, { status: "affected", version: "QCA6595AU", }, { status: "affected", version: "QCA6678AQ", }, { status: "affected", version: "QCA6696", }, { status: "affected", version: "QCA6698AQ", }, { status: "affected", version: "QCA6797AQ", }, { status: "affected", version: "QCC2073", }, { status: "affected", version: "QCC2076", }, { status: "affected", version: "QCN9074", }, { status: "affected", version: "QCS410", }, { status: "affected", version: "QCS610", }, { status: "affected", version: "Qualcomm Video Collaboration VC1 Platform", }, { status: "affected", version: "Qualcomm Video Collaboration VC3 Platform", }, { status: "affected", version: "SA6145P", }, { status: "affected", version: "SA6150P", }, { status: "affected", version: "SA6155P", }, { status: "affected", version: "SA8145P", }, { status: "affected", version: "SA8150P", }, { status: "affected", version: "SA8155P", }, { status: "affected", version: "SA8195P", }, { status: "affected", version: "SA8255P", }, { status: "affected", version: "SA8295P", }, { status: "affected", version: "SD835", }, { status: "affected", version: "SD865 5G", }, { status: "affected", version: "SM8550P", }, { status: "affected", version: "Snapdragon 8 Gen 2 Mobile Platform", }, { status: "affected", version: "Snapdragon 8+ Gen 2 Mobile Platform", }, { status: "affected", version: "Snapdragon 820 Automotive Platform", }, { status: "affected", version: "Snapdragon 835 Mobile PC Platform", }, { status: "affected", version: "Snapdragon 865 5G Mobile Platform", }, { status: "affected", version: "Snapdragon 865+ 5G Mobile Platform (SM8250-AB)", }, { status: "affected", version: "Snapdragon 870 5G Mobile Platform (SM8250-AC)", }, { status: "affected", version: "Snapdragon Auto 5G Modem-RF", }, { status: "affected", version: "Snapdragon W5+ Gen 1 Wearable Platform", }, { status: "affected", version: "Snapdragon X55 5G Modem-RF System", }, { status: "affected", version: "Snapdragon XR2 5G Platform", }, { status: "affected", version: "Snapdragon Auto 4G Modem", }, { status: "affected", version: "SW5100", }, { status: "affected", version: "SW5100P", }, { status: "affected", version: "SXR2130", }, { status: "affected", version: "WCD9335", }, { status: "affected", version: "WCD9340", }, { status: "affected", version: "WCD9341", }, { status: "affected", version: "WCD9370", }, { status: "affected", version: "WCD9380", }, { status: "affected", version: "WCD9385", }, { status: "affected", version: "WCD9390", }, { status: "affected", version: "WCD9395", }, { status: "affected", version: "WCN3950", }, { status: "affected", version: "WCN3980", }, { status: "affected", version: "WCN3988", }, { status: "affected", version: "WCN3990", }, { status: "affected", version: "WSA8810", }, { status: "affected", version: "WSA8815", }, { status: "affected", version: "WSA8830", }, { status: "affected", version: "WSA8835", }, { status: "affected", version: "WSA8840", }, { status: "affected", version: "WSA8845", }, { status: "affected", version: "WSA8845H", }, ], }, ], descriptions: [ { lang: "en", value: "Information disclosure in WLAN HOST while processing the WLAN scan descriptor list during roaming scan.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-126", description: "CWE-126 Buffer Over-read", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-04-12T16:20:44.857Z", orgId: "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", shortName: "qualcomm", }, references: [ { url: "https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin", }, ], title: "Buffer Over-read in WLAN HOST", }, }, cveMetadata: { assignerOrgId: "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", assignerShortName: "qualcomm", cveId: "CVE-2023-28571", datePublished: "2023-10-03T05:00:37.642Z", dateReserved: "2023-03-17T11:41:45.849Z", dateUpdated: "2024-08-02T13:43:22.455Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-21636
Vulnerability from cvelistv5
Published
2023-09-05 06:23
Modified
2024-08-02 09:44
Severity ?
EPSS score ?
Summary
Memory Corruption due to improper validation of array index in Linux while updating adn record.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Qualcomm, Inc. | Snapdragon |
Version: AQT1000 Version: QCA6390 Version: QCA6391 Version: QCA6420 Version: QCA6426 Version: QCA6430 Version: QCA6436 Version: QCA6574A Version: QCA6574AU Version: QCA6595AU Version: QCA6696 Version: QCC5100 Version: SA515M Version: SA6145P Version: SA6150P Version: SA6155P Version: SA8145P Version: SA8150P Version: SA8155P Version: SA8195P Version: SD480 Version: SD695 Version: SD855 Version: SD865 5G Version: SD870 Version: SDA429W Version: SDX55 Version: SDX55M Version: SDXR2 5G Version: SM4375 Version: SW5100 Version: SW5100P Version: WCD9341 Version: WCD9360 Version: WCD9370 Version: WCD9375 Version: WCD9380 Version: WCD9385 Version: WCN3610 Version: WCN3660B Version: WCN3680B Version: WCN3980 Version: WCN3988 Version: WCN3991 Version: WCN3998 Version: WCN6850 Version: WCN6851 Version: WSA8810 Version: WSA8815 Version: WSA8830 Version: WSA8835 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T09:44:02.259Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", platforms: [ "Snapdragon Auto", "Snapdragon Compute", "Snapdragon Industrial IOT", "Snapdragon Mobile", "Snapdragon Wearables", ], product: "Snapdragon", vendor: "Qualcomm, Inc.", versions: [ { status: "affected", version: "AQT1000", }, { status: "affected", version: "QCA6390", }, { status: "affected", version: "QCA6391", }, { status: "affected", version: "QCA6420", }, { status: "affected", version: "QCA6426", }, { status: "affected", version: "QCA6430", }, { status: "affected", version: "QCA6436", }, { status: "affected", version: "QCA6574A", }, { status: "affected", version: "QCA6574AU", }, { status: "affected", version: "QCA6595AU", }, { status: "affected", version: "QCA6696", }, { status: "affected", version: "QCC5100", }, { status: "affected", version: "SA515M", }, { status: "affected", version: "SA6145P", }, { status: "affected", version: "SA6150P", }, { status: "affected", version: "SA6155P", }, { status: "affected", version: "SA8145P", }, { status: "affected", version: "SA8150P", }, { status: "affected", version: "SA8155P", }, { status: "affected", version: "SA8195P", }, { status: "affected", version: "SD480", }, { status: "affected", version: "SD695", }, { status: "affected", version: "SD855", }, { status: "affected", version: "SD865 5G", }, { status: "affected", version: "SD870", }, { status: "affected", version: "SDA429W", }, { status: "affected", version: "SDX55", }, { status: "affected", version: "SDX55M", }, { status: "affected", version: "SDXR2 5G", }, { status: "affected", version: "SM4375", }, { status: "affected", version: "SW5100", }, { status: "affected", version: "SW5100P", }, { status: "affected", version: "WCD9341", }, { status: "affected", version: "WCD9360", }, { status: "affected", version: "WCD9370", }, { status: "affected", version: "WCD9375", }, { status: "affected", version: "WCD9380", }, { status: "affected", version: "WCD9385", }, { status: "affected", version: "WCN3610", }, { status: "affected", version: "WCN3660B", }, { status: "affected", version: "WCN3680B", }, { status: "affected", version: "WCN3980", }, { status: "affected", version: "WCN3988", }, { status: "affected", version: "WCN3991", }, { status: "affected", version: "WCN3998", }, { status: "affected", version: "WCN6850", }, { status: "affected", version: "WCN6851", }, { status: "affected", version: "WSA8810", }, { status: "affected", version: "WSA8815", }, { status: "affected", version: "WSA8830", }, { status: "affected", version: "WSA8835", }, ], }, ], descriptions: [ { lang: "en", value: "Memory Corruption due to improper validation of array index in Linux while updating adn record.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-129", description: "CWE-129 Improper Validation of Array Index", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-04-12T16:21:28.096Z", orgId: "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", shortName: "qualcomm", }, references: [ { url: "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", }, ], title: "Improper Validation of Array Index in Linux", }, }, cveMetadata: { assignerOrgId: "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", assignerShortName: "qualcomm", cveId: "CVE-2023-21636", datePublished: "2023-09-05T06:23:53.035Z", dateReserved: "2022-12-07T02:58:25.866Z", dateUpdated: "2024-08-02T09:44:02.259Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-35654
Vulnerability from cvelistv5
Published
2023-10-11 19:21
Modified
2024-09-18 16:18
Severity ?
EPSS score ?
Summary
In ctrl_roi of stmvl53l1_module.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:30:44.699Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-35654", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-09-18T16:18:35.737261Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-18T16:18:42.477Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Android", vendor: "Google", versions: [ { status: "affected", version: "Android kernel", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>In ctrl_roi of stmvl53l1_module.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.</p>", }, ], value: "In ctrl_roi of stmvl53l1_module.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.\n\n", }, ], problemTypes: [ { descriptions: [ { description: "Elevation of privilege", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2023-10-11T19:21:30.861Z", orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", shortName: "google_android", }, references: [ { url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], }, }, cveMetadata: { assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", assignerShortName: "google_android", cveId: "CVE-2023-35654", datePublished: "2023-10-11T19:21:30.861Z", dateReserved: "2023-06-15T02:50:07.507Z", dateUpdated: "2024-09-18T16:18:42.477Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-35663
Vulnerability from cvelistv5
Published
2023-10-18 19:10
Modified
2024-09-13 14:19
Severity ?
EPSS score ?
Summary
In Init of protocolnetadapter.cpp, there is a possible out of bounds read
due to a missing bounds check. This could lead to remote information
disclosure with no additional execution privileges needed. User interaction
is not needed for exploitation.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:30:44.599Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-35663", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-13T14:18:04.124578Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-13T14:19:45.909Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Android", vendor: "Google", versions: [ { status: "affected", version: "Android kernel", }, ], }, ], descriptions: [ { lang: "en", value: " In Init of protocolnetadapter.cpp, there is a possible out of bounds read\n due to a missing bounds check. This could lead to remote information\n disclosure with no additional execution privileges needed. User interaction\n is not needed for exploitation.", }, ], problemTypes: [ { descriptions: [ { description: "Information disclosure", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2023-10-18T19:10:32.213Z", orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", shortName: "google_android", }, references: [ { url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], }, }, cveMetadata: { assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", assignerShortName: "google_android", cveId: "CVE-2023-35663", datePublished: "2023-10-18T19:10:32.213Z", dateReserved: "2023-06-15T02:50:10.272Z", dateUpdated: "2024-09-13T14:19:45.909Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-33220
Vulnerability from cvelistv5
Published
2023-09-05 06:23
Modified
2024-08-03 08:01
Severity ?
EPSS score ?
Summary
Information disclosure in Automotive multimedia due to buffer over-read.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Qualcomm, Inc. | Snapdragon |
Version: AQT1000 Version: QAM8295P Version: QCA6390 Version: QCA6391 Version: QCA6420 Version: QCA6426 Version: QCA6430 Version: QCA6436 Version: QCA6574AU Version: QCA6595AU Version: QCA6696 Version: QCC5100 Version: SA6145P Version: SA6150P Version: SA6155P Version: SA8145P Version: SA8150P Version: SA8155P Version: SA8195P Version: SA8295P Version: SD 8 Gen1 5G Version: SD855 Version: SD865 5G Version: SD870 Version: SD888 5G Version: SDX55M Version: SDXR2 5G Version: SW5100 Version: SW5100P Version: WCD9341 Version: WCD9380 Version: WCD9385 Version: WCN3980 Version: WCN3988 Version: WCN3998 Version: WCN6850 Version: WCN6851 Version: WCN6855 Version: WCN6856 Version: WCN7850 Version: WCN7851 Version: WSA8810 Version: WSA8815 Version: WSA8830 Version: WSA8835 |
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2022-33220", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-07-11T21:04:47.299164Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-07-11T21:05:02.055Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-03T08:01:20.211Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", platforms: [ "Snapdragon Auto", "Snapdragon Compute", "Snapdragon Mobile", "Snapdragon Wearables", ], product: "Snapdragon", vendor: "Qualcomm, Inc.", versions: [ { status: "affected", version: "AQT1000", }, { status: "affected", version: "QAM8295P", }, { status: "affected", version: "QCA6390", }, { status: "affected", version: "QCA6391", }, { status: "affected", version: "QCA6420", }, { status: "affected", version: "QCA6426", }, { status: "affected", version: "QCA6430", }, { status: "affected", version: "QCA6436", }, { status: "affected", version: "QCA6574AU", }, { status: "affected", version: "QCA6595AU", }, { status: "affected", version: "QCA6696", }, { status: "affected", version: "QCC5100", }, { status: "affected", version: "SA6145P", }, { status: "affected", version: "SA6150P", }, { status: "affected", version: "SA6155P", }, { status: "affected", version: "SA8145P", }, { status: "affected", version: "SA8150P", }, { status: "affected", version: "SA8155P", }, { status: "affected", version: "SA8195P", }, { status: "affected", version: "SA8295P", }, { status: "affected", version: "SD 8 Gen1 5G", }, { status: "affected", version: "SD855", }, { status: "affected", version: "SD865 5G", }, { status: "affected", version: "SD870", }, { status: "affected", version: "SD888 5G", }, { status: "affected", version: "SDX55M", }, { status: "affected", version: "SDXR2 5G", }, { status: "affected", version: "SW5100", }, { status: "affected", version: "SW5100P", }, { status: "affected", version: "WCD9341", }, { status: "affected", version: "WCD9380", }, { status: "affected", version: "WCD9385", }, { status: "affected", version: "WCN3980", }, { status: "affected", version: "WCN3988", }, { status: "affected", version: "WCN3998", }, { status: "affected", version: "WCN6850", }, { status: "affected", version: "WCN6851", }, { status: "affected", version: "WCN6855", }, { status: "affected", version: "WCN6856", }, { status: "affected", version: "WCN7850", }, { status: "affected", version: "WCN7851", }, { status: "affected", version: "WSA8810", }, { status: "affected", version: "WSA8815", }, { status: "affected", version: "WSA8830", }, { status: "affected", version: "WSA8835", }, ], }, ], descriptions: [ { lang: "en", value: "Information disclosure in Automotive multimedia due to buffer over-read.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 5.1, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-126", description: "CWE-126 Buffer Over-read", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-04-12T16:21:13.514Z", orgId: "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", shortName: "qualcomm", }, references: [ { url: "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", }, ], title: "Buffer over-read in Automotive multimedia", }, }, cveMetadata: { assignerOrgId: "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", assignerShortName: "qualcomm", cveId: "CVE-2022-33220", datePublished: "2023-09-05T06:23:46.847Z", dateReserved: "2022-06-14T10:44:39.576Z", dateUpdated: "2024-08-03T08:01:20.211Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-22384
Vulnerability from cvelistv5
Published
2023-10-03 05:00
Modified
2024-08-02 10:07
Severity ?
EPSS score ?
Summary
Memory Corruption in VR Service while sending data using Fast Message Queue (FMQ).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Qualcomm, Inc. | Snapdragon |
Version: QCA6574AU Version: QCA6696 Version: SA6145P Version: SA6150P Version: SA6155P Version: SA8145P Version: SA8150P Version: SA8155P Version: SA8195P |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T10:07:06.535Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", platforms: [ "Snapdragon Auto", ], product: "Snapdragon", vendor: "Qualcomm, Inc.", versions: [ { status: "affected", version: "QCA6574AU", }, { status: "affected", version: "QCA6696", }, { status: "affected", version: "SA6145P", }, { status: "affected", version: "SA6150P", }, { status: "affected", version: "SA6155P", }, { status: "affected", version: "SA8145P", }, { status: "affected", version: "SA8150P", }, { status: "affected", version: "SA8155P", }, { status: "affected", version: "SA8195P", }, ], }, ], descriptions: [ { lang: "en", value: "Memory Corruption in VR Service while sending data using Fast Message Queue (FMQ).", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-120", description: "CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-04-12T16:19:59.523Z", orgId: "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", shortName: "qualcomm", }, references: [ { url: "https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin", }, ], title: "Buffer Copy Without Checking Size of Input in VR Service", }, }, cveMetadata: { assignerOrgId: "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", assignerShortName: "qualcomm", cveId: "CVE-2023-22384", datePublished: "2023-10-03T05:00:22.216Z", dateReserved: "2022-12-21T07:26:32.617Z", dateUpdated: "2024-08-02T10:07:06.535Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-21663
Vulnerability from cvelistv5
Published
2023-09-05 06:24
Modified
2024-08-02 09:44
Severity ?
EPSS score ?
Summary
Memory Corruption while accessing metadata in Display.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Qualcomm, Inc. | Snapdragon |
Version: AQT1000 Version: QCA6420 Version: QCA6430 Version: QCA6574AU Version: QCA6696 Version: QCC5100 Version: SA6145P Version: SA6150P Version: SA6155P Version: SA8145P Version: SA8150P Version: SA8155P Version: SA8195P Version: SD 8 Gen1 5G Version: SD855 Version: SD888 5G Version: SDA429W Version: SW5100 Version: SW5100P Version: WCD9341 Version: WCD9380 Version: WCD9385 Version: WCN3610 Version: WCN3660B Version: WCN3680B Version: WCN3980 Version: WCN3988 Version: WCN3998 Version: WCN6850 Version: WCN6851 Version: WCN6855 Version: WCN6856 Version: WCN7850 Version: WCN7851 Version: WSA8810 Version: WSA8815 Version: WSA8830 Version: WSA8835 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T09:44:02.190Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", platforms: [ "Snapdragon Auto", "Snapdragon Mobile", "Snapdragon Wearables", ], product: "Snapdragon", vendor: "Qualcomm, Inc.", versions: [ { status: "affected", version: "AQT1000", }, { status: "affected", version: "QCA6420", }, { status: "affected", version: "QCA6430", }, { status: "affected", version: "QCA6574AU", }, { status: "affected", version: "QCA6696", }, { status: "affected", version: "QCC5100", }, { status: "affected", version: "SA6145P", }, { status: "affected", version: "SA6150P", }, { status: "affected", version: "SA6155P", }, { status: "affected", version: "SA8145P", }, { status: "affected", version: "SA8150P", }, { status: "affected", version: "SA8155P", }, { status: "affected", version: "SA8195P", }, { status: "affected", version: "SD 8 Gen1 5G", }, { status: "affected", version: "SD855", }, { status: "affected", version: "SD888 5G", }, { status: "affected", version: "SDA429W", }, { status: "affected", version: "SW5100", }, { status: "affected", version: "SW5100P", }, { status: "affected", version: "WCD9341", }, { status: "affected", version: "WCD9380", }, { status: "affected", version: "WCD9385", }, { status: "affected", version: "WCN3610", }, { status: "affected", version: "WCN3660B", }, { status: "affected", version: "WCN3680B", }, { status: "affected", version: "WCN3980", }, { status: "affected", version: "WCN3988", }, { status: "affected", version: "WCN3998", }, { status: "affected", version: "WCN6850", }, { status: "affected", version: "WCN6851", }, { status: "affected", version: "WCN6855", }, { status: "affected", version: "WCN6856", }, { status: "affected", version: "WCN7850", }, { status: "affected", version: "WCN7851", }, { status: "affected", version: "WSA8810", }, { status: "affected", version: "WSA8815", }, { status: "affected", version: "WSA8830", }, { status: "affected", version: "WSA8835", }, ], }, ], descriptions: [ { lang: "en", value: "Memory Corruption while accessing metadata in Display.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-119", description: "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-04-12T16:21:52.668Z", orgId: "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", shortName: "qualcomm", }, references: [ { url: "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", }, ], title: "Improper Restrictions of Operations within the Bounds of a Memory Buffer in Display", }, }, cveMetadata: { assignerOrgId: "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", assignerShortName: "qualcomm", cveId: "CVE-2023-21663", datePublished: "2023-09-05T06:24:01.860Z", dateReserved: "2022-12-07T02:58:25.871Z", dateUpdated: "2024-08-02T09:44:02.190Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-35662
Vulnerability from cvelistv5
Published
2023-10-11 19:25
Modified
2024-09-18 15:00
Severity ?
EPSS score ?
Summary
there is a possible out of bounds write due to buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:30:44.282Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-35662", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-09-18T15:00:32.538403Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-18T15:00:47.479Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Android", vendor: "Google", versions: [ { status: "affected", version: "Android kernel", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>there is a possible out of bounds write due to buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.</p>", }, ], value: "there is a possible out of bounds write due to buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n", }, ], problemTypes: [ { descriptions: [ { description: "Remote code execution", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2023-10-11T19:25:27.449Z", orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", shortName: "google_android", }, references: [ { url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], }, }, cveMetadata: { assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", assignerShortName: "google_android", cveId: "CVE-2023-35662", datePublished: "2023-10-11T19:25:26.960Z", dateReserved: "2023-06-15T02:50:10.272Z", dateUpdated: "2024-09-18T15:00:47.479Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-35656
Vulnerability from cvelistv5
Published
2023-10-18 19:10
Modified
2024-09-13 14:26
Severity ?
EPSS score ?
Summary
In multiple functions of protocolembmsadapter.cpp, there is a possible out
of bounds read due to a missing bounds check. This could lead to remote
information disclosure with no additional execution privileges needed. User
interaction is not needed for exploitation.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:30:43.869Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], title: "CVE Program Container", }, { affected: [ { cpes: [ "cpe:2.3:a:google:android_kernel:android_kernel:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "android_kernel", vendor: "google", versions: [ { status: "affected", version: "android_kernel", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2023-35656", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-13T14:25:06.335139Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-13T14:26:24.662Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Android", vendor: "Google", versions: [ { status: "affected", version: "Android kernel", }, ], }, ], descriptions: [ { lang: "en", value: " In multiple functions of protocolembmsadapter.cpp, there is a possible out\n of bounds read due to a missing bounds check. This could lead to remote\n information disclosure with no additional execution privileges needed. User\n interaction is not needed for exploitation.", }, ], problemTypes: [ { descriptions: [ { description: "Information disclosure", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2023-10-18T19:10:32.026Z", orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", shortName: "google_android", }, references: [ { url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], }, }, cveMetadata: { assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", assignerShortName: "google_android", cveId: "CVE-2023-35656", datePublished: "2023-10-18T19:10:32.026Z", dateReserved: "2023-06-15T02:50:10.271Z", dateUpdated: "2024-09-13T14:26:24.662Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-3781
Vulnerability from cvelistv5
Published
2023-10-11 20:37
Modified
2024-09-18 14:39
Severity ?
EPSS score ?
Summary
there is a possible use-after-free write due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T07:08:50.129Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-3781", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-09-18T14:38:59.846121Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-18T14:39:24.180Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Android", vendor: "Google", versions: [ { status: "affected", version: "Android kernel", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>there is a possible use-after-free write due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.</p>", }, ], value: "there is a possible use-after-free write due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n", }, ], problemTypes: [ { descriptions: [ { description: "Elevation of privilege", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2023-10-11T20:37:08.490Z", orgId: "83238938-5644-45f0-9007-c0392bcf6222", shortName: "Google_Devices", }, references: [ { url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], }, }, cveMetadata: { assignerOrgId: "83238938-5644-45f0-9007-c0392bcf6222", assignerShortName: "Google_Devices", cveId: "CVE-2023-3781", datePublished: "2023-10-11T20:37:08.490Z", dateReserved: "2023-07-19T20:07:36.153Z", dateUpdated: "2024-09-18T14:39:24.180Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-35655
Vulnerability from cvelistv5
Published
2023-10-11 19:23
Modified
2024-09-18 16:18
Severity ?
EPSS score ?
Summary
In CanConvertPadV2Op of darwinn_mlir_converter_aidl.cc, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:30:44.220Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-35655", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-09-18T16:18:04.840094Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-18T16:18:11.734Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Android", vendor: "Google", versions: [ { status: "affected", version: "Android kernel", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>In CanConvertPadV2Op of darwinn_mlir_converter_aidl.cc, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.</p>", }, ], value: "In CanConvertPadV2Op of darwinn_mlir_converter_aidl.cc, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.\n\n", }, ], problemTypes: [ { descriptions: [ { description: "Elevation of privilege", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2023-10-11T19:23:16.364Z", orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", shortName: "google_android", }, references: [ { url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], }, }, cveMetadata: { assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", assignerShortName: "google_android", cveId: "CVE-2023-35655", datePublished: "2023-10-11T19:23:16.364Z", dateReserved: "2023-06-15T02:50:10.271Z", dateUpdated: "2024-09-18T16:18:11.734Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-35652
Vulnerability from cvelistv5
Published
2023-10-11 19:21
Modified
2024-09-18 16:00
Severity ?
EPSS score ?
Summary
In ProtocolEmergencyCallListIndAdapter::Init of protocolcalladapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:30:44.566Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-35652", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-18T15:59:49.132937Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-18T16:00:06.080Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Android", vendor: "Google", versions: [ { status: "affected", version: "Android kernel", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>In ProtocolEmergencyCallListIndAdapter::Init of protocolcalladapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.</p>", }, ], value: "In ProtocolEmergencyCallListIndAdapter::Init of protocolcalladapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.\n\n", }, ], problemTypes: [ { descriptions: [ { description: "Information disclosure", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2023-10-11T19:21:00.472Z", orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", shortName: "google_android", }, references: [ { url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], }, }, cveMetadata: { assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", assignerShortName: "google_android", cveId: "CVE-2023-35652", datePublished: "2023-10-11T19:21:00.472Z", dateReserved: "2023-06-15T02:50:07.506Z", dateUpdated: "2024-09-18T16:00:06.080Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-21654
Vulnerability from cvelistv5
Published
2023-09-05 06:23
Modified
2024-08-02 09:44
Severity ?
EPSS score ?
Summary
Memory corruption in Audio during playback session with audio effects enabled.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Qualcomm, Inc. | Snapdragon |
Version: APQ8096AU Version: AQT1000 Version: MDM9150 Version: MDM9628 Version: MSM8996AU Version: QAM8295P Version: QCA6390 Version: QCA6391 Version: QCA6420 Version: QCA6426 Version: QCA6430 Version: QCA6436 Version: QCA6564A Version: QCA6564AU Version: QCA6574A Version: QCA6574AU Version: QCA6696 Version: QCC5100 Version: QCN9074 Version: QCS410 Version: QCS610 Version: QSM8250 Version: SA415M Version: SA6145P Version: SA6150P Version: SA6155P Version: SA8145P Version: SA8150P Version: SA8155P Version: SA8195P Version: SA8295P Version: SD855 Version: SD865 5G Version: SD870 Version: SDA429W Version: SDX55 Version: SDX55M Version: SDXR2 5G Version: SW5100 Version: SW5100P Version: WCD9341 Version: WCD9370 Version: WCD9380 Version: WCN3610 Version: WCN3660B Version: WCN3680B Version: WCN3950 Version: WCN3980 Version: WCN3988 Version: WCN3998 Version: WCN6850 Version: WCN6851 Version: WSA8810 Version: WSA8815 Version: WSA8830 Version: WSA8835 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T09:44:02.461Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", platforms: [ "Snapdragon Auto", "Snapdragon Compute", "Snapdragon Consumer IOT", "Snapdragon Industrial IOT", "Snapdragon Mobile", "Snapdragon Wearables", ], product: "Snapdragon", vendor: "Qualcomm, Inc.", versions: [ { status: "affected", version: "APQ8096AU", }, { status: "affected", version: "AQT1000", }, { status: "affected", version: "MDM9150", }, { status: "affected", version: "MDM9628", }, { status: "affected", version: "MSM8996AU", }, { status: "affected", version: "QAM8295P", }, { status: "affected", version: "QCA6390", }, { status: "affected", version: "QCA6391", }, { status: "affected", version: "QCA6420", }, { status: "affected", version: "QCA6426", }, { status: "affected", version: "QCA6430", }, { status: "affected", version: "QCA6436", }, { status: "affected", version: "QCA6564A", }, { status: "affected", version: "QCA6564AU", }, { status: "affected", version: "QCA6574A", }, { status: "affected", version: "QCA6574AU", }, { status: "affected", version: "QCA6696", }, { status: "affected", version: "QCC5100", }, { status: "affected", version: "QCN9074", }, { status: "affected", version: "QCS410", }, { status: "affected", version: "QCS610", }, { status: "affected", version: "QSM8250", }, { status: "affected", version: "SA415M", }, { status: "affected", version: "SA6145P", }, { status: "affected", version: "SA6150P", }, { status: "affected", version: "SA6155P", }, { status: "affected", version: "SA8145P", }, { status: "affected", version: "SA8150P", }, { status: "affected", version: "SA8155P", }, { status: "affected", version: "SA8195P", }, { status: "affected", version: "SA8295P", }, { status: "affected", version: "SD855", }, { status: "affected", version: "SD865 5G", }, { status: "affected", version: "SD870", }, { status: "affected", version: "SDA429W", }, { status: "affected", version: "SDX55", }, { status: "affected", version: "SDX55M", }, { status: "affected", version: "SDXR2 5G", }, { status: "affected", version: "SW5100", }, { status: "affected", version: "SW5100P", }, { status: "affected", version: "WCD9341", }, { status: "affected", version: "WCD9370", }, { status: "affected", version: "WCD9380", }, { status: "affected", version: "WCN3610", }, { status: "affected", version: "WCN3660B", }, { status: "affected", version: "WCN3680B", }, { status: "affected", version: "WCN3950", }, { status: "affected", version: "WCN3980", }, { status: "affected", version: "WCN3988", }, { status: "affected", version: "WCN3998", }, { status: "affected", version: "WCN6850", }, { status: "affected", version: "WCN6851", }, { status: "affected", version: "WSA8810", }, { status: "affected", version: "WSA8815", }, { status: "affected", version: "WSA8830", }, { status: "affected", version: "WSA8835", }, ], }, ], descriptions: [ { lang: "en", value: "Memory corruption in Audio during playback session with audio effects enabled.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-119", description: "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-04-12T16:21:42.331Z", orgId: "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", shortName: "qualcomm", }, references: [ { url: "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", }, ], title: "Improper Restriction of Operations within the Bounds of a Memory Buffer in Audio", }, }, cveMetadata: { assignerOrgId: "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", assignerShortName: "qualcomm", cveId: "CVE-2023-21654", datePublished: "2023-09-05T06:23:58.153Z", dateReserved: "2022-12-07T02:58:25.868Z", dateUpdated: "2024-08-02T09:44:02.461Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-35646
Vulnerability from cvelistv5
Published
2023-10-11 19:19
Modified
2024-09-18 18:41
Severity ?
EPSS score ?
Summary
In TBD of TBD, there is a possible stack buffer overflow due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:30:43.856Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-35646", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-09-18T18:40:58.198184Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-18T18:41:08.177Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Android", vendor: "Google", versions: [ { status: "affected", version: "Android kernel", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>In TBD of TBD, there is a possible stack buffer overflow due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.</p>", }, ], value: "In TBD of TBD, there is a possible stack buffer overflow due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n", }, ], problemTypes: [ { descriptions: [ { description: "Remote code execution", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2023-10-11T19:19:29.145Z", orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", shortName: "google_android", }, references: [ { url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], }, }, cveMetadata: { assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", assignerShortName: "google_android", cveId: "CVE-2023-35646", datePublished: "2023-10-11T19:19:27.834Z", dateReserved: "2023-06-15T02:50:07.506Z", dateUpdated: "2024-09-18T18:41:08.177Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-35661
Vulnerability from cvelistv5
Published
2023-10-11 19:25
Modified
2024-09-18 18:40
Severity ?
EPSS score ?
Summary
In ProfSixDecomTcpSACKoption of RohcPacketCommon.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:30:43.925Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-35661", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-18T18:40:02.056835Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-18T18:40:10.552Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Android", vendor: "Google", versions: [ { status: "affected", version: "Android kernel", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>In ProfSixDecomTcpSACKoption of RohcPacketCommon.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.</p>", }, ], value: "In ProfSixDecomTcpSACKoption of RohcPacketCommon.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n", }, ], problemTypes: [ { descriptions: [ { description: "Information disclosure", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2023-10-11T19:25:12.469Z", orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", shortName: "google_android", }, references: [ { url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], }, }, cveMetadata: { assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", assignerShortName: "google_android", cveId: "CVE-2023-35661", datePublished: "2023-10-11T19:25:12.469Z", dateReserved: "2023-06-15T02:50:10.272Z", dateUpdated: "2024-09-18T18:40:10.552Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-35647
Vulnerability from cvelistv5
Published
2023-10-11 19:19
Modified
2024-09-18 16:01
Severity ?
EPSS score ?
Summary
In ProtocolEmbmsGlobalCellIdAdapter::Init() of protocolembmsadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:30:43.948Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-35647", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-09-18T16:01:38.649949Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-18T16:01:46.576Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Android", vendor: "Google", versions: [ { status: "affected", version: "Android kernel", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>In ProtocolEmbmsGlobalCellIdAdapter::Init() of protocolembmsadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.</p>", }, ], value: "In ProtocolEmbmsGlobalCellIdAdapter::Init() of protocolembmsadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.\n\n", }, ], problemTypes: [ { descriptions: [ { description: "Information disclosure", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2023-10-11T19:19:54.934Z", orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", shortName: "google_android", }, references: [ { url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], }, }, cveMetadata: { assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", assignerShortName: "google_android", cveId: "CVE-2023-35647", datePublished: "2023-10-11T19:19:54.934Z", dateReserved: "2023-06-15T02:50:07.506Z", dateUpdated: "2024-09-18T16:01:46.576Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-28539
Vulnerability from cvelistv5
Published
2023-10-03 05:00
Modified
2024-08-02 13:43
Severity ?
EPSS score ?
Summary
Memory corruption in WLAN Host when the firmware invokes multiple WMI Service Available command.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Qualcomm, Inc. | Snapdragon |
Version: AR8035 Version: AR9380 Version: CSR8811 Version: CSRB31024 Version: FastConnect 6800 Version: FastConnect 6900 Version: FastConnect 7800 Version: Flight RB5 5G Platform Version: Immersive Home 214 Platform Version: Immersive Home 216 Platform Version: Immersive Home 316 Platform Version: Immersive Home 318 Platform Version: Immersive Home 3210 Platform Version: Immersive Home 326 Platform Version: IPQ4019 Version: IPQ4028 Version: IPQ4029 Version: IPQ5010 Version: IPQ5028 Version: IPQ6000 Version: IPQ6010 Version: IPQ6018 Version: IPQ6028 Version: IPQ8064 Version: IPQ8065 Version: IPQ8068 Version: IPQ8070A Version: IPQ8071A Version: IPQ8072A Version: IPQ8074A Version: IPQ8076 Version: IPQ8076A Version: IPQ8078 Version: IPQ8078A Version: IPQ8173 Version: IPQ8174 Version: IPQ9008 Version: IPQ9574 Version: QAM8255P Version: QAM8295P Version: QCA4024 Version: QCA6175A Version: QCA6310 Version: QCA6320 Version: QCA6391 Version: QCA6421 Version: QCA6426 Version: QCA6431 Version: QCA6436 Version: QCA6554A Version: QCA6564AU Version: QCA6574 Version: QCA6574A Version: QCA6574AU Version: QCA6584AU Version: QCA6595 Version: QCA6595AU Version: QCA6678AQ Version: QCA6696 Version: QCA6698AQ Version: QCA6797AQ Version: QCA7500 Version: QCA8075 Version: QCA8081 Version: QCA8082 Version: QCA8084 Version: QCA8085 Version: QCA8337 Version: QCA8386 Version: QCA9880 Version: QCA9886 Version: QCA9888 Version: QCA9889 Version: QCA9898 Version: QCA9980 Version: QCA9984 Version: QCA9985 Version: QCA9990 Version: QCA9992 Version: QCA9994 Version: QCC2073 Version: QCC2076 Version: QCC710 Version: QCN5022 Version: QCN5024 Version: QCN5052 Version: QCN5122 Version: QCN5124 Version: QCN5152 Version: QCN5154 Version: QCN5164 Version: QCN6023 Version: QCN6024 Version: QCN6112 Version: QCN6122 Version: QCN6132 Version: QCN6224 Version: QCN6274 Version: QCN9000 Version: QCN9011 Version: QCN9012 Version: QCN9022 Version: QCN9024 Version: QCN9070 Version: QCN9072 Version: QCN9074 Version: QCN9100 Version: QCN9274 Version: QCS410 Version: QCS610 Version: QFW7114 Version: QFW7124 Version: QRB5165M Version: QRB5165N Version: Qualcomm Video Collaboration VC1 Platform Version: Qualcomm Video Collaboration VC3 Platform Version: Robotics RB5 Platform Version: SA6145P Version: SA6150P Version: SA6155P Version: SA8145P Version: SA8150P Version: SA8155P Version: SA8195P Version: SA8255P Version: SA8295P Version: SD835 Version: SD865 5G Version: SDX55 Version: SDX65M Version: Snapdragon 835 Mobile PC Platform Version: Snapdragon 865 5G Mobile Platform Version: Snapdragon 865+ 5G Mobile Platform (SM8250-AB) Version: Snapdragon 870 5G Mobile Platform (SM8250-AC) Version: Snapdragon Auto 5G Modem-RF Version: Snapdragon W5+ Gen 1 Wearable Platform Version: Snapdragon X55 5G Modem-RF System Version: Snapdragon X65 5G Modem-RF System Version: Snapdragon X75 5G Modem-RF System Version: Snapdragon XR2 5G Platform Version: Snapdragon Auto 4G Modem Version: SW5100 Version: SW5100P Version: SXR2130 Version: WCD9335 Version: WCD9340 Version: WCD9341 Version: WCD9380 Version: WCD9385 Version: WCN3950 Version: WCN3980 Version: WCN3988 Version: WCN3990 Version: WSA8810 Version: WSA8815 Version: WSA8830 Version: WSA8835 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T13:43:22.602Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", platforms: [ "Snapdragon Auto", "Snapdragon Compute", "Snapdragon Connectivity", "Snapdragon Consumer Electronics Connectivity", "Snapdragon Consumer IOT", "Snapdragon Industrial IOT", "Snapdragon Mobile", "Snapdragon Wearables", "Snapdragon Wired Infrastructure and Networking", ], product: "Snapdragon", vendor: "Qualcomm, Inc.", versions: [ { status: "affected", version: "AR8035", }, { status: "affected", version: "AR9380", }, { status: "affected", version: "CSR8811", }, { status: "affected", version: "CSRB31024", }, { status: "affected", version: "FastConnect 6800", }, { status: "affected", version: "FastConnect 6900", }, { status: "affected", version: "FastConnect 7800", }, { status: "affected", version: "Flight RB5 5G Platform", }, { status: "affected", version: "Immersive Home 214 Platform", }, { status: "affected", version: "Immersive Home 216 Platform", }, { status: "affected", version: "Immersive Home 316 Platform", }, { status: "affected", version: "Immersive Home 318 Platform", }, { status: "affected", version: "Immersive Home 3210 Platform", }, { status: "affected", version: "Immersive Home 326 Platform", }, { status: "affected", version: "IPQ4019", }, { status: "affected", version: "IPQ4028", }, { status: "affected", version: "IPQ4029", }, { status: "affected", version: "IPQ5010", }, { status: "affected", version: "IPQ5028", }, { status: "affected", version: "IPQ6000", }, { status: "affected", version: "IPQ6010", }, { status: "affected", version: "IPQ6018", }, { status: "affected", version: "IPQ6028", }, { status: "affected", version: "IPQ8064", }, { status: "affected", version: "IPQ8065", }, { status: "affected", version: "IPQ8068", }, { status: "affected", version: "IPQ8070A", }, { status: "affected", version: "IPQ8071A", }, { status: "affected", version: "IPQ8072A", }, { status: "affected", version: "IPQ8074A", }, { status: "affected", version: "IPQ8076", }, { status: "affected", version: "IPQ8076A", }, { status: "affected", version: "IPQ8078", }, { status: "affected", version: "IPQ8078A", }, { status: "affected", version: "IPQ8173", }, { status: "affected", version: "IPQ8174", }, { status: "affected", version: "IPQ9008", }, { status: "affected", version: "IPQ9574", }, { status: "affected", version: "QAM8255P", }, { status: "affected", version: "QAM8295P", }, { status: "affected", version: "QCA4024", }, { status: "affected", version: "QCA6175A", }, { status: "affected", version: "QCA6310", }, { status: "affected", version: "QCA6320", }, { status: "affected", version: "QCA6391", }, { status: "affected", version: "QCA6421", }, { status: "affected", version: "QCA6426", }, { status: "affected", version: "QCA6431", }, { status: "affected", version: "QCA6436", }, { status: "affected", version: "QCA6554A", }, { status: "affected", version: "QCA6564AU", }, { status: "affected", version: "QCA6574", }, { status: "affected", version: "QCA6574A", }, { status: "affected", version: "QCA6574AU", }, { status: "affected", version: "QCA6584AU", }, { status: "affected", version: "QCA6595", }, { status: "affected", version: "QCA6595AU", }, { status: "affected", version: "QCA6678AQ", }, { status: "affected", version: "QCA6696", }, { status: "affected", version: "QCA6698AQ", }, { status: "affected", version: "QCA6797AQ", }, { status: "affected", version: "QCA7500", }, { status: "affected", version: "QCA8075", }, { status: "affected", version: "QCA8081", }, { status: "affected", version: "QCA8082", }, { status: "affected", version: "QCA8084", }, { status: "affected", version: "QCA8085", }, { status: "affected", version: "QCA8337", }, { status: "affected", version: "QCA8386", }, { status: "affected", version: "QCA9880", }, { status: "affected", version: "QCA9886", }, { status: "affected", version: "QCA9888", }, { status: "affected", version: "QCA9889", }, { status: "affected", version: "QCA9898", }, { status: "affected", version: "QCA9980", }, { status: "affected", version: "QCA9984", }, { status: "affected", version: "QCA9985", }, { status: "affected", version: "QCA9990", }, { status: "affected", version: "QCA9992", }, { status: "affected", version: "QCA9994", }, { status: "affected", version: "QCC2073", }, { status: "affected", version: "QCC2076", }, { status: "affected", version: "QCC710", }, { status: "affected", version: "QCN5022", }, { status: "affected", version: "QCN5024", }, { status: "affected", version: "QCN5052", }, { status: "affected", version: "QCN5122", }, { status: "affected", version: "QCN5124", }, { status: "affected", version: "QCN5152", }, { status: "affected", version: "QCN5154", }, { status: "affected", version: "QCN5164", }, { status: "affected", version: "QCN6023", }, { status: "affected", version: "QCN6024", }, { status: "affected", version: "QCN6112", }, { status: "affected", version: "QCN6122", }, { status: "affected", version: "QCN6132", }, { status: "affected", version: "QCN6224", }, { status: "affected", version: "QCN6274", }, { status: "affected", version: "QCN9000", }, { status: "affected", version: "QCN9011", }, { status: "affected", version: "QCN9012", }, { status: "affected", version: "QCN9022", }, { status: "affected", version: "QCN9024", }, { status: "affected", version: "QCN9070", }, { status: "affected", version: "QCN9072", }, { status: "affected", version: "QCN9074", }, { status: "affected", version: "QCN9100", }, { status: "affected", version: "QCN9274", }, { status: "affected", version: "QCS410", }, { status: "affected", version: "QCS610", }, { status: "affected", version: "QFW7114", }, { status: "affected", version: "QFW7124", }, { status: "affected", version: "QRB5165M", }, { status: "affected", version: "QRB5165N", }, { status: "affected", version: "Qualcomm Video Collaboration VC1 Platform", }, { status: "affected", version: "Qualcomm Video Collaboration VC3 Platform", }, { status: "affected", version: "Robotics RB5 Platform", }, { status: "affected", version: "SA6145P", }, { status: "affected", version: "SA6150P", }, { status: "affected", version: "SA6155P", }, { status: "affected", version: "SA8145P", }, { status: "affected", version: "SA8150P", }, { status: "affected", version: "SA8155P", }, { status: "affected", version: "SA8195P", }, { status: "affected", version: "SA8255P", }, { status: "affected", version: "SA8295P", }, { status: "affected", version: "SD835", }, { status: "affected", version: "SD865 5G", }, { status: "affected", version: "SDX55", }, { status: "affected", version: "SDX65M", }, { status: "affected", version: "Snapdragon 835 Mobile PC Platform", }, { status: "affected", version: "Snapdragon 865 5G Mobile Platform", }, { status: "affected", version: "Snapdragon 865+ 5G Mobile Platform (SM8250-AB)", }, { status: "affected", version: "Snapdragon 870 5G Mobile Platform (SM8250-AC)", }, { status: "affected", version: "Snapdragon Auto 5G Modem-RF", }, { status: "affected", version: "Snapdragon W5+ Gen 1 Wearable Platform", }, { status: "affected", version: "Snapdragon X55 5G Modem-RF System", }, { status: "affected", version: "Snapdragon X65 5G Modem-RF System", }, { status: "affected", version: "Snapdragon X75 5G Modem-RF System", }, { status: "affected", version: "Snapdragon XR2 5G Platform", }, { status: "affected", version: "Snapdragon Auto 4G Modem", }, { status: "affected", version: "SW5100", }, { status: "affected", version: "SW5100P", }, { status: "affected", version: "SXR2130", }, { status: "affected", version: "WCD9335", }, { status: "affected", version: "WCD9340", }, { status: "affected", version: "WCD9341", }, { status: "affected", version: "WCD9380", }, { status: "affected", version: "WCD9385", }, { status: "affected", version: "WCN3950", }, { status: "affected", version: "WCN3980", }, { status: "affected", version: "WCN3988", }, { status: "affected", version: "WCN3990", }, { status: "affected", version: "WSA8810", }, { status: "affected", version: "WSA8815", }, { status: "affected", version: "WSA8830", }, { status: "affected", version: "WSA8835", }, ], }, ], descriptions: [ { lang: "en", value: "Memory corruption in WLAN Host when the firmware invokes multiple WMI Service Available command.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 6.6, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-120", description: "CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-04-12T16:20:38.104Z", orgId: "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", shortName: "qualcomm", }, references: [ { url: "https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin", }, ], title: "Buffer Copy Without Checking Size of Input in WLAN Host", }, }, cveMetadata: { assignerOrgId: "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", assignerShortName: "qualcomm", cveId: "CVE-2023-28539", datePublished: "2023-10-03T05:00:35.349Z", dateReserved: "2023-03-17T11:41:45.845Z", dateUpdated: "2024-08-02T13:43:22.602Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-35660
Vulnerability from cvelistv5
Published
2023-10-11 19:24
Modified
2024-09-18 15:53
Severity ?
EPSS score ?
Summary
In lwis_transaction_client_cleanup of lwis_transaction.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:30:43.936Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-35660", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-09-18T15:53:49.225024Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-18T15:53:55.762Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Android", vendor: "Google", versions: [ { status: "affected", version: "Android kernel", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>In lwis_transaction_client_cleanup of lwis_transaction.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.</p>", }, ], value: "In lwis_transaction_client_cleanup of lwis_transaction.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.\n\n", }, ], problemTypes: [ { descriptions: [ { description: "Elevation of privilege", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2023-10-11T19:24:44.146Z", orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", shortName: "google_android", }, references: [ { url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], }, }, cveMetadata: { assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", assignerShortName: "google_android", cveId: "CVE-2023-35660", datePublished: "2023-10-11T19:24:44.146Z", dateReserved: "2023-06-15T02:50:10.272Z", dateUpdated: "2024-09-18T15:53:55.762Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-40524
Vulnerability from cvelistv5
Published
2023-09-05 06:23
Modified
2024-08-03 12:21
Severity ?
EPSS score ?
Summary
Memory corruption due to buffer over-read in Modem while processing SetNativeHandle RTP service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Qualcomm, Inc. | Snapdragon |
Version: AQT1000 Version: QCA6390 Version: QCA6391 Version: QCA6420 Version: QCA6426 Version: QCA6430 Version: QCA6436 Version: QCA6574AU Version: QCA6595AU Version: QCA6696 Version: QCC5100 Version: SA6145P Version: SA6150P Version: SA6155P Version: SA8145P Version: SA8150P Version: SA8155P Version: SA8195P Version: SD855 Version: SD865 5G Version: SD870 Version: SDX55M Version: SDXR2 5G Version: SW5100 Version: SW5100P Version: WCD9341 Version: WCD9380 Version: WCN3660B Version: WCN3680B Version: WCN3980 Version: WCN3988 Version: WCN3998 Version: WCN6850 Version: WCN6851 Version: WSA8810 Version: WSA8815 Version: WSA8830 Version: WSA8835 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T12:21:45.486Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", platforms: [ "Snapdragon Auto", "Snapdragon Compute", "Snapdragon Mobile", "Snapdragon Wearables", ], product: "Snapdragon", vendor: "Qualcomm, Inc.", versions: [ { status: "affected", version: "AQT1000", }, { status: "affected", version: "QCA6390", }, { status: "affected", version: "QCA6391", }, { status: "affected", version: "QCA6420", }, { status: "affected", version: "QCA6426", }, { status: "affected", version: "QCA6430", }, { status: "affected", version: "QCA6436", }, { status: "affected", version: "QCA6574AU", }, { status: "affected", version: "QCA6595AU", }, { status: "affected", version: "QCA6696", }, { status: "affected", version: "QCC5100", }, { status: "affected", version: "SA6145P", }, { status: "affected", version: "SA6150P", }, { status: "affected", version: "SA6155P", }, { status: "affected", version: "SA8145P", }, { status: "affected", version: "SA8150P", }, { status: "affected", version: "SA8155P", }, { status: "affected", version: "SA8195P", }, { status: "affected", version: "SD855", }, { status: "affected", version: "SD865 5G", }, { status: "affected", version: "SD870", }, { status: "affected", version: "SDX55M", }, { status: "affected", version: "SDXR2 5G", }, { status: "affected", version: "SW5100", }, { status: "affected", version: "SW5100P", }, { status: "affected", version: "WCD9341", }, { status: "affected", version: "WCD9380", }, { status: "affected", version: "WCN3660B", }, { status: "affected", version: "WCN3680B", }, { status: "affected", version: "WCN3980", }, { status: "affected", version: "WCN3988", }, { status: "affected", version: "WCN3998", }, { status: "affected", version: "WCN6850", }, { status: "affected", version: "WCN6851", }, { status: "affected", version: "WSA8810", }, { status: "affected", version: "WSA8815", }, { status: "affected", version: "WSA8830", }, { status: "affected", version: "WSA8835", }, ], }, ], descriptions: [ { lang: "en", value: "Memory corruption due to buffer over-read in Modem while processing SetNativeHandle RTP service.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-126", description: "CWE-126 Buffer Over-read", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-04-12T16:21:21.109Z", orgId: "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", shortName: "qualcomm", }, references: [ { url: "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", }, ], title: "Buffer over-read in Modem", }, }, cveMetadata: { assignerOrgId: "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", assignerShortName: "qualcomm", cveId: "CVE-2022-40524", datePublished: "2023-09-05T06:23:50.068Z", dateReserved: "2022-09-12T09:37:28.417Z", dateUpdated: "2024-08-03T12:21:45.486Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-21655
Vulnerability from cvelistv5
Published
2023-09-05 06:23
Modified
2024-08-02 09:44
Severity ?
EPSS score ?
Summary
Memory corruption in Audio while validating and mapping metadata.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Qualcomm, Inc. | Snapdragon |
Version: QCA6391 Version: QCA6574AU Version: QCA6696 Version: QCC5100 Version: SA6145P Version: SA6150P Version: SA6155P Version: SA8145P Version: SA8150P Version: SA8155P Version: SA8195P Version: SD 8 Gen1 5G Version: SD888 5G Version: SDA429W Version: SW5100 Version: SW5100P Version: WCD9380 Version: WCD9385 Version: WCN3610 Version: WCN3660B Version: WCN3680B Version: WCN3980 Version: WCN3988 Version: WCN6850 Version: WCN6851 Version: WCN6855 Version: WCN6856 Version: WCN7850 Version: WCN7851 Version: WSA8830 Version: WSA8835 |
|
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "qca6391_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "qca6574au_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "qca6696_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:qcc5100_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "qcc5100_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sa6145p_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sa6150p_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sa6155p_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sa8145p_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sa8150p_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sa8155p_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sa8195p_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sd_8_gen1_5g_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sd888_5g_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:sda429w_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sda429w_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sw5100_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sw5100p_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "wcd9380_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "wcd9385_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "wcn3610_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "wcn3660b_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "wcn3680b_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "wcn3980_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "wcn3988_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "wcn6850_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "wcn6851_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "wcn6855_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "wcn6856_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:wcn7850_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "wcn7850_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:wcn7851_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "wcn7851_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "wsa8830_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "wsa8835_firmware", vendor: "qualcomm", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2023-21655", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-07-11T20:03:59.647425Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-07-11T20:04:25.074Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-02T09:44:02.168Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", platforms: [ "Snapdragon Auto", "Snapdragon Industrial IOT", "Snapdragon Mobile", "Snapdragon Wearables", ], product: "Snapdragon", vendor: "Qualcomm, Inc.", versions: [ { status: "affected", version: "QCA6391", }, { status: "affected", version: "QCA6574AU", }, { status: "affected", version: "QCA6696", }, { status: "affected", version: "QCC5100", }, { status: "affected", version: "SA6145P", }, { status: "affected", version: "SA6150P", }, { status: "affected", version: "SA6155P", }, { status: "affected", version: "SA8145P", }, { status: "affected", version: "SA8150P", }, { status: "affected", version: "SA8155P", }, { status: "affected", version: "SA8195P", }, { status: "affected", version: "SD 8 Gen1 5G", }, { status: "affected", version: "SD888 5G", }, { status: "affected", version: "SDA429W", }, { status: "affected", version: "SW5100", }, { status: "affected", version: "SW5100P", }, { status: "affected", version: "WCD9380", }, { status: "affected", version: "WCD9385", }, { status: "affected", version: "WCN3610", }, { status: "affected", version: "WCN3660B", }, { status: "affected", version: "WCN3680B", }, { status: "affected", version: "WCN3980", }, { status: "affected", version: "WCN3988", }, { status: "affected", version: "WCN6850", }, { status: "affected", version: "WCN6851", }, { status: "affected", version: "WCN6855", }, { status: "affected", version: "WCN6856", }, { status: "affected", version: "WCN7850", }, { status: "affected", version: "WCN7851", }, { status: "affected", version: "WSA8830", }, { status: "affected", version: "WSA8835", }, ], }, ], descriptions: [ { lang: "en", value: "Memory corruption in Audio while validating and mapping metadata.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-190", description: "CWE-190 Integer Overflow or Wraparound", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-04-12T16:21:45.825Z", orgId: "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", shortName: "qualcomm", }, references: [ { url: "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", }, ], title: "Integer Overflow or Wraparound in Display", }, }, cveMetadata: { assignerOrgId: "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", assignerShortName: "qualcomm", cveId: "CVE-2023-21655", datePublished: "2023-09-05T06:23:59.310Z", dateReserved: "2022-12-07T02:58:25.868Z", dateUpdated: "2024-08-02T09:44:02.168Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-21667
Vulnerability from cvelistv5
Published
2023-09-05 06:24
Modified
2024-08-02 09:44
Severity ?
EPSS score ?
Summary
Transient DOS in Bluetooth HOST while passing descriptor to validate the blacklisted BT keyboard.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Qualcomm, Inc. | Snapdragon |
Version: QCA6390 Version: QCA6391 Version: QCA6426 Version: QCA6436 Version: QCA6574AU Version: QCA6595AU Version: QCA6696 Version: QCC5100 Version: QCN9074 Version: QCS410 Version: QCS610 Version: SA6145P Version: SA6150P Version: SA6155P Version: SA8145P Version: SA8150P Version: SA8155P Version: SA8195P Version: SD 8 Gen1 5G Version: SD865 5G Version: SD870 Version: SDX55M Version: SDXR2 5G Version: SW5100 Version: SW5100P Version: WCD9341 Version: WCD9370 Version: WCD9380 Version: WCN3660B Version: WCN3680B Version: WCN3950 Version: WCN3980 Version: WCN3988 Version: WCN6850 Version: WCN6851 Version: WCN6855 Version: WCN6856 Version: WCN7850 Version: WCN7851 Version: WSA8810 Version: WSA8815 Version: WSA8830 Version: WSA8835 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T09:44:02.056Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", platforms: [ "Snapdragon Auto", "Snapdragon Compute", "Snapdragon Consumer IOT", "Snapdragon Industrial IOT", "Snapdragon Mobile", "Snapdragon Wearables", ], product: "Snapdragon", vendor: "Qualcomm, Inc.", versions: [ { status: "affected", version: "QCA6390", }, { status: "affected", version: "QCA6391", }, { status: "affected", version: "QCA6426", }, { status: "affected", version: "QCA6436", }, { status: "affected", version: "QCA6574AU", }, { status: "affected", version: "QCA6595AU", }, { status: "affected", version: "QCA6696", }, { status: "affected", version: "QCC5100", }, { status: "affected", version: "QCN9074", }, { status: "affected", version: "QCS410", }, { status: "affected", version: "QCS610", }, { status: "affected", version: "SA6145P", }, { status: "affected", version: "SA6150P", }, { status: "affected", version: "SA6155P", }, { status: "affected", version: "SA8145P", }, { status: "affected", version: "SA8150P", }, { status: "affected", version: "SA8155P", }, { status: "affected", version: "SA8195P", }, { status: "affected", version: "SD 8 Gen1 5G", }, { status: "affected", version: "SD865 5G", }, { status: "affected", version: "SD870", }, { status: "affected", version: "SDX55M", }, { status: "affected", version: "SDXR2 5G", }, { status: "affected", version: "SW5100", }, { status: "affected", version: "SW5100P", }, { status: "affected", version: "WCD9341", }, { status: "affected", version: "WCD9370", }, { status: "affected", version: "WCD9380", }, { status: "affected", version: "WCN3660B", }, { status: "affected", version: "WCN3680B", }, { status: "affected", version: "WCN3950", }, { status: "affected", version: "WCN3980", }, { status: "affected", version: "WCN3988", }, { status: "affected", version: "WCN6850", }, { status: "affected", version: "WCN6851", }, { status: "affected", version: "WCN6855", }, { status: "affected", version: "WCN6856", }, { status: "affected", version: "WCN7850", }, { status: "affected", version: "WCN7851", }, { status: "affected", version: "WSA8810", }, { status: "affected", version: "WSA8815", }, { status: "affected", version: "WSA8830", }, { status: "affected", version: "WSA8835", }, ], }, ], descriptions: [ { lang: "en", value: "Transient DOS in Bluetooth HOST while passing descriptor to validate the blacklisted BT keyboard.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-126", description: "CWE-126 Buffer Over-read", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-04-12T16:21:59.703Z", orgId: "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", shortName: "qualcomm", }, references: [ { url: "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", }, ], title: "Buffer Over-read in Bluetooth HOST", }, }, cveMetadata: { assignerOrgId: "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", assignerShortName: "qualcomm", cveId: "CVE-2023-21667", datePublished: "2023-09-05T06:24:04.364Z", dateReserved: "2022-12-07T02:58:25.874Z", dateUpdated: "2024-08-02T09:44:02.056Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-35653
Vulnerability from cvelistv5
Published
2023-10-11 19:21
Modified
2024-09-18 15:58
Severity ?
EPSS score ?
Summary
In TBD of TBD, there is a possible way to access location information due to a permissions bypass. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:30:44.457Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-35653", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-18T15:58:33.429168Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-18T15:58:41.384Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Android", vendor: "Google", versions: [ { status: "affected", version: "Android kernel", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>In TBD of TBD, there is a possible way to access location information due to a permissions bypass. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.</p>", }, ], value: "In TBD of TBD, there is a possible way to access location information due to a permissions bypass. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.\n\n", }, ], problemTypes: [ { descriptions: [ { description: "Information disclosure", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2023-10-11T19:21:13.242Z", orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", shortName: "google_android", }, references: [ { url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], }, }, cveMetadata: { assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", assignerShortName: "google_android", cveId: "CVE-2023-35653", datePublished: "2023-10-11T19:21:13.242Z", dateReserved: "2023-06-15T02:50:07.507Z", dateUpdated: "2024-09-18T15:58:41.384Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-35645
Vulnerability from cvelistv5
Published
2023-10-11 18:40
Modified
2024-09-18 16:02
Severity ?
EPSS score ?
Summary
In tbd of tbd, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:30:43.899Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-35645", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-09-18T16:02:09.555433Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-18T16:02:17.400Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Android", vendor: "Google", versions: [ { status: "affected", version: "Android kernel", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>In tbd of tbd, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.</p>", }, ], value: "In tbd of tbd, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.\n\n", }, ], problemTypes: [ { descriptions: [ { description: "Elevation of privilege", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2023-10-11T19:18:21.704Z", orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", shortName: "google_android", }, references: [ { url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], }, }, cveMetadata: { assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", assignerShortName: "google_android", cveId: "CVE-2023-35645", datePublished: "2023-10-11T18:40:24.221Z", dateReserved: "2023-06-15T02:50:07.505Z", dateUpdated: "2024-09-18T16:02:17.400Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-35648
Vulnerability from cvelistv5
Published
2023-10-11 19:20
Modified
2024-09-18 16:01
Severity ?
EPSS score ?
Summary
In ProtocolMiscLceIndAdapter::GetConfLevel() of protocolmiscadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:30:44.205Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-35648", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-09-18T16:01:07.989250Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-18T16:01:17.596Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Android", vendor: "Google", versions: [ { status: "affected", version: "Android kernel", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>In ProtocolMiscLceIndAdapter::GetConfLevel() of protocolmiscadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.</p>", }, ], value: "In ProtocolMiscLceIndAdapter::GetConfLevel() of protocolmiscadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.\n\n", }, ], problemTypes: [ { descriptions: [ { description: "Information disclosure", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2023-10-11T19:20:09.906Z", orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", shortName: "google_android", }, references: [ { url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], }, }, cveMetadata: { assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", assignerShortName: "google_android", cveId: "CVE-2023-35648", datePublished: "2023-10-11T19:20:09.906Z", dateReserved: "2023-06-15T02:50:07.506Z", dateUpdated: "2024-09-18T16:01:17.596Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-35649
Vulnerability from cvelistv5
Published
2023-10-11 19:20
Modified
2024-09-18 16:00
Severity ?
EPSS score ?
Summary
In several functions of Exynos modem files, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:30:43.925Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-35649", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-09-18T16:00:36.379844Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-18T16:00:45.832Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Android", vendor: "Google", versions: [ { status: "affected", version: "Android kernel", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>In several functions of Exynos modem files, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation.</p>", }, ], value: "In several functions of Exynos modem files, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation.\n\n", }, ], problemTypes: [ { descriptions: [ { description: "Remote code execution", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2023-10-11T19:20:41.460Z", orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", shortName: "google_android", }, references: [ { url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], }, }, cveMetadata: { assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", assignerShortName: "google_android", cveId: "CVE-2023-35649", datePublished: "2023-10-11T19:20:41.460Z", dateReserved: "2023-06-15T02:50:07.506Z", dateUpdated: "2024-09-18T16:00:45.832Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-40141
Vulnerability from cvelistv5
Published
2023-10-11 19:26
Modified
2024-09-18 14:54
Severity ?
EPSS score ?
Summary
In temp_residency_name_store of thermal_metrics.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T18:24:55.570Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-40141", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-09-18T14:54:33.778863Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-18T14:54:57.420Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Android", vendor: "Google", versions: [ { status: "affected", version: "Android kernel", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>In temp_residency_name_store of thermal_metrics.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.</p>", }, ], value: "In temp_residency_name_store of thermal_metrics.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n", }, ], problemTypes: [ { descriptions: [ { description: "Elevation of privilege", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2023-10-11T19:26:45.729Z", orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", shortName: "google_android", }, references: [ { url: "https://source.android.com/security/bulletin/pixel/2023-10-01", }, ], }, }, cveMetadata: { assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", assignerShortName: "google_android", cveId: "CVE-2023-40141", datePublished: "2023-10-11T19:26:45.729Z", dateReserved: "2023-08-09T02:29:36.076Z", dateUpdated: "2024-09-18T14:54:57.420Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.