Vulnerabilities (CVE)

Filtered by vendor Qualcomm Subscribe
Filtered by product Qcn9074
Total 334 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-38422 1 Qualcomm 536 205 Mobile Platform, 205 Mobile Platform Firmware, 215 Mobile Platform and 533 more 2024-11-07 N/A 7.8 HIGH
Memory corruption while processing voice packet with arbitrary data received from ADSP.
CVE-2024-33066 1 Qualcomm 142 Csr8811, Csr8811 Firmware, Immersive Home 214 Platform and 139 more 2024-10-16 N/A 9.8 CRITICAL
Memory corruption while redirecting log file to any file location with any file name.
CVE-2022-33246 1 Qualcomm 84 Apq8096au, Apq8096au Firmware, Aqt1000 and 81 more 2024-07-03 N/A 7.8 HIGH
Memory corruption in Audio due to use of out-of-range pointer offset while Initiating a voice call session from user space with invalid session id.
CVE-2024-21458 1 Qualcomm 222 Ar8035, Ar8035 Firmware, Csr8811 and 219 more 2024-07-02 N/A 7.5 HIGH
Information disclosure while handling SA query action frame.
CVE-2024-21461 1 Qualcomm 626 215 Mobile Platform, 215 Mobile Platform Firmware, 315 5g Iot Modem and 623 more 2024-07-02 N/A 7.8 HIGH
Memory corruption while performing finish HMAC operation when context is freed by keymaster.
CVE-2024-21462 1 Qualcomm 622 315 5g Iot Modem, 315 5g Iot Modem Firmware, 9205 Lte Modem and 619 more 2024-07-02 N/A 5.5 MEDIUM
Transient DOS while loading the TA ELF file.
CVE-2024-21466 1 Qualcomm 128 Fastconnect 7800, Fastconnect 7800 Firmware, Immersive Home 3210 Platform and 125 more 2024-07-02 N/A 7.5 HIGH
Information disclosure while parsing sub-IE length during new IE generation.
CVE-2024-23368 1 Qualcomm 686 Apq8064au, Apq8064au Firmware, Aqt1000 and 683 more 2024-07-02 N/A 7.8 HIGH
Memory corruption when allocating and accessing an entry in an SMEM partition.
CVE-2024-21482 1 Qualcomm 138 Csr8811, Csr8811 Firmware, Immersive Home 214 Platform and 135 more 2024-07-02 N/A 7.8 HIGH
Memory corruption during the secure boot process, when the `bootm` command is used, it bypasses the authentication of the kernel/rootfs image.
CVE-2024-21457 1 Qualcomm 222 Ar8035, Ar8035 Firmware, Csr8811 and 219 more 2024-07-02 N/A 7.5 HIGH
INformation disclosure while handling Multi-link IE in beacon frame.
CVE-2023-33016 1 Qualcomm 132 Csr8811, Csr8811 Firmware, Fastconnect 6900 and 129 more 2024-04-12 N/A 7.5 HIGH
Transient DOS in WLAN firmware while parsing MLO (multi-link operation).
CVE-2023-28558 1 Qualcomm 398 315 5g Iot Modem, 315 5g Iot Modem Firmware, Aqt1000 and 395 more 2024-04-12 N/A 7.8 HIGH
Memory corruption in WLAN handler while processing PhyID in Tx status handler.
CVE-2023-28559 1 Qualcomm 426 Aqt1000, Aqt1000 Firmware, Ar8031 and 423 more 2024-04-12 N/A 7.8 HIGH
Memory corruption in WLAN FW while processing command parameters from untrusted WMI payload.
CVE-2023-33061 1 Qualcomm 230 Ar8035, Ar8035 Firmware, Csr8811 and 227 more 2024-04-12 N/A 7.5 HIGH
Transient DOS in WLAN Firmware while parsing WLAN beacon or probe-response frame.
CVE-2023-33056 1 Qualcomm 232 Ar8035, Ar8035 Firmware, Csr8811 and 229 more 2024-04-12 N/A 7.5 HIGH
Transient DOS in WLAN Firmware when firmware receives beacon including T2LM IE.
CVE-2023-28573 1 Qualcomm 398 315 5g Iot, 315 5g Iot Firmware, Aqt1000 and 395 more 2024-04-12 N/A 7.8 HIGH
Memory corruption in WLAN HAL while parsing WMI command parameters.
CVE-2023-28548 1 Qualcomm 366 Aqt1000, Aqt1000 Firmware, Ar8035 and 363 more 2024-04-12 N/A 7.8 HIGH
Memory corruption in WLAN HAL while processing Tx/Rx commands from QDART.
CVE-2023-28567 1 Qualcomm 582 315 5g Iot, 315 5g Iot Firmware, Aqt1000 and 579 more 2024-04-12 N/A 7.8 HIGH
Memory corruption in WLAN HAL while handling command through WMI interfaces.
CVE-2023-28564 1 Qualcomm 498 Aqt1000, Aqt1000 Firmware, Ar8031 and 495 more 2024-04-12 N/A 7.8 HIGH
Memory corruption in WLAN HAL while passing command parameters through WMI interfaces.
CVE-2023-28576 1 Qualcomm 62 Fastconnect 6800, Fastconnect 6800 Firmware, Fastconnect 6900 and 59 more 2024-04-12 N/A 7.0 HIGH
The buffer obtained from kernel APIs such as cam_mem_get_cpu_buf() may be readable/writable in userspace after kernel accesses it. In other words, user mode may race and modify the packet header (e.g. header.count), causing checks (e.g. size checks) in kernel code to be invalid. This may lead to out-of-bounds read/write issues.