cve-2023-43517
Vulnerability from cvelistv5
Published
2024-02-06 05:47
Modified
2024-08-02 19:44
Severity ?
EPSS score ?
Summary
Improper Access Control in Automotive Multimedia
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Qualcomm, Inc. | Snapdragon |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:44:43.709Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.qualcomm.com/company/product-security/bulletins/february-2024-bulletin" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Snapdragon Auto" ], "product": "Snapdragon", "vendor": "Qualcomm, Inc.", "versions": [ { "status": "affected", "version": "QAM8255P" }, { "status": "affected", "version": "QAM8295P" }, { "status": "affected", "version": "QAM8650P" }, { "status": "affected", "version": "QAM8775P" }, { "status": "affected", "version": "QAMSRV1H" }, { "status": "affected", "version": "QAMSRV1M" }, { "status": "affected", "version": "QCA6574AU" }, { "status": "affected", "version": "QCA6595" }, { "status": "affected", "version": "QCA6696" }, { "status": "affected", "version": "QCA6698AQ" }, { "status": "affected", "version": "SA8255P" }, { "status": "affected", "version": "SA8295P" }, { "status": "affected", "version": "SA8540P" }, { "status": "affected", "version": "SA8650P" }, { "status": "affected", "version": "SA8770P" }, { "status": "affected", "version": "SA8775P" }, { "status": "affected", "version": "SA9000P" }, { "status": "affected", "version": "SRV1H" }, { "status": "affected", "version": "SRV1M" } ] } ], "descriptions": [ { "lang": "en", "value": "Memory corruption in Automotive Multimedia due to improper access control in HAB." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-12T16:01:13.496Z", "orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "shortName": "qualcomm" }, "references": [ { "url": "https://www.qualcomm.com/company/product-security/bulletins/february-2024-bulletin" } ], "title": "Improper Access Control in Automotive Multimedia" } }, "cveMetadata": { "assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "assignerShortName": "qualcomm", "cveId": "CVE-2023-43517", "datePublished": "2024-02-06T05:47:18.589Z", "dateReserved": "2023-09-19T14:48:15.089Z", "dateUpdated": "2024-08-02T19:44:43.709Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-43517\",\"sourceIdentifier\":\"product-security@qualcomm.com\",\"published\":\"2024-02-06T06:16:01.467\",\"lastModified\":\"2024-04-12T16:15:32.747\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Memory corruption in Automotive Multimedia due to improper access control in HAB.\"},{\"lang\":\"es\",\"value\":\"Corrupci\u00f3n de la memoria en Automotive Multimedia debido a un control de acceso inadecuado en HAB.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"product-security@qualcomm.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":8.4,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":2.5,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]},{\"source\":\"product-security@qualcomm.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-284\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3723C7B1-A7E2-401F-8D6D-189350F6BCA5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B12B89EF-7B12-481E-BCBC-F12B9D16321A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2D9E281-B382-41AC-84CB-5B1063E5AC51\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44EBEBD5-98C3-493B-A108-FD4DE6FFBE97\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"295E75BD-2A6C-4A76-A376-A9977DDB17FF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD37AA1A-B911-45BF-9BCC-C772FA83E657\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58170126-928F-4AE5-B5AF-5ED4710F9BA2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8673334-5E11-4E95-B33D-3029499F71DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qamsrv1h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC0B32F6-5EF0-4591-99D7-D0E9B09DEC5A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE03AB2A-3ED9-4489-8E5B-4FCF8BAA8559\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qamsrv1m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E646738-6A87-4470-9640-6A5A1DF3AF78\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D527E2B1-2A46-4FBA-9F7A-F5543677C8FB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8374DDB3-D484-4141-AE0C-42333D2721F6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"643EC76D-2836-48E6-81DA-78C4883C33CA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"477F6529-4CE1-44FC-B6EE-D24D44C71AE7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AE207DB-9770-40ED-961D-FDA75965826F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E23922D-C37F-476F-A623-4C1458A9156F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3F7853D-09EE-476F-B48D-BB30AEB4A67D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC6E268D-C4AF-4950-9223-39EA36D538A8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"073C1A81-D02B-4F2F-9378-CD1B2DCE0E5B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A19659B-A0C3-44B7-8D54-BA21729873A4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F978041A-CE28-4BDF-A7DB-F0360F1A5F14\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FE8B62D-83B4-4326-8A53-FED5947D5FFE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sa8540p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D6F8899-136A-4A57-9F02-BD428E1663DA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0E807AA-5646-48AD-9A5C-B0B13E222AA9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sa8650p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45FBB72B-B850-4E3F-ACBB-9392157FF131\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"781CCC31-C08F-499B-BE73-6C7DB70437AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sa8770p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75AFAA21-0589-4C6A-9418-34EE8A61BBAD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C79595B-1259-4431-96F9-C5A24E624305\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sa8775p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F2F3431-9CD7-4D4F-833D-DD4D3ACF94C7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A024AB04-B213-4018-A4C1-FA467C7BA775\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2A8AB7C-5D34-4794-8C06-2193075B323F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CD199F5-DA68-4BEB-AA99-11572DA26B4F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:srv1h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8ACA2D4D-FC77-4C1A-8278-1C27B3EA3303\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4B29E7F-8BFE-466A-B357-63F8A2160C4E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:srv1m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D55CC7D-2E65-4CA9-9892-B6FBCC087E6F\"}]}]}],\"references\":[{\"url\":\"https://www.qualcomm.com/company/product-security/bulletins/february-2024-bulletin\",\"source\":\"product-security@qualcomm.com\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.