Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:o:qualcomm:mdm9645_firmware:-:*:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-43511 |
Transient DOS while parsing IPv6 extension header when WLAN firmware receives an IPv6 packet that contains `IPPROTO_NONE` as the next header. Published: January 02, 2024; 1:15:13 AM -0500 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-33080 |
Transient DOS while parsing a vender specific IE (Information Element) of reassociation response management frame. Published: December 04, 2023; 10:15:12 PM -0500 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-28565 |
Memory corruption in WLAN HAL while handling command streams through WMI interfaces. Published: September 05, 2023; 3:15:14 AM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-21628 |
Memory corruption in WLAN HAL while processing WMI-UTF command or FTM TLV1 command. Published: June 06, 2023; 4:15:11 AM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2022-40532 |
Memory corruption due to integer overflow or wraparound in WLAN while sending WMI cmd from host to target. Published: April 13, 2023; 3:15:20 AM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2022-40512 |
Transient DOS in WLAN Firmware due to buffer over-read while processing probe response or beacon. Published: February 11, 2023; 11:15:15 PM -0500 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-33286 |
Transient DOS due to buffer over-read in WLAN while processing 802.11 management frames. Published: January 09, 2023; 3:15:12 AM -0500 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2022-33285 |
Transient DOS due to buffer over-read in WLAN while parsing WLAN CSA action frames. Published: January 09, 2023; 3:15:12 AM -0500 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2022-22063 |
Memory corruption in Core due to improper configuration in boot remapper. Published: December 15, 2022; 2:15:16 PM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2022-33238 |
Transient DOS due to loop with unreachable exit condition in WLAN while processing an incoming FTM frames. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking Published: December 13, 2022; 11:15:21 AM -0500 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-33239 |
Transient DOS due to loop with unreachable exit condition in WLAN firmware while parsing IPV6 extension header. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking Published: November 15, 2022; 5:15:15 AM -0500 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-25749 |
Transient Denial-of-Service in WLAN due to buffer over-read while parsing MDNS frames. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking Published: October 19, 2022; 7:15:10 AM -0400 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-25748 |
Memory corruption in WLAN due to integer overflow to buffer overflow while parsing GTK frames. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking Published: October 19, 2022; 7:15:10 AM -0400 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2022-25718 |
Cryptographic issue in WLAN due to improper check on return value while authentication handshake in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking Published: October 19, 2022; 7:15:10 AM -0400 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2022-22062 |
An out-of-bounds read can occur while parsing a server certificate due to improper length check in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking Published: September 02, 2022; 8:15:09 AM -0400 |
V3.1: 9.1 CRITICAL V2.0:(not available) |
CVE-2021-30344 |
Improper authorization of a replayed LTE security mode command can lead to a denial of service in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables Published: June 14, 2022; 6:15:15 AM -0400 |
V3.1: 7.5 HIGH V2.0: 7.8 HIGH |
CVE-2021-30271 |
Possible null pointer dereference in trap handler due to lack of thread ID validation before dereferencing it in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking Published: January 03, 2022; 3:15:08 AM -0500 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2021-1924 |
Information disclosure through timing and power side-channels during mod exponentiation for RSA-CRT in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking Published: November 12, 2021; 2:15:07 AM -0500 |
V3.1: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2020-11303 |
Accepting AMSDU frames with mismatched destination and source address can lead to information disclosure in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking Published: October 20, 2021; 3:15:07 AM -0400 |
V3.1: 8.6 HIGH V2.0: 5.0 MEDIUM |
CVE-2021-30261 |
Possible integer and heap overflow due to lack of input command size validation while handling beacon template update command from HLOS in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables Published: September 17, 2021; 3:15:09 AM -0400 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |