CVE-2024-23386

Nov. 7, 2024, 7:54 p.m.

6.7
Medium

Description

memory corruption when WiFi display APIs are invoked with large random inputs.

Product(s) Impacted

Vendor Product Versions
Qualcomm
  • Wsa8835 Firmware
  • Wsa8835
  • Wsa8830 Firmware
  • Wsa8830
  • Wcn3660b Firmware
  • Wcn3660b
  • Wcn3620 Firmware
  • Wcn3620
  • Wcd9380 Firmware
  • Wcd9380
  • Snapdragon 8 Gen 1 Mobile Platform Firmware
  • Snapdragon 8 Gen 1 Mobile Platform
  • Snapdragon 429 Mobile Platform Firmware
  • Snapdragon 429 Mobile Platform
  • Sdm429w Firmware
  • Sdm429w
  • Fastconnect 7800 Firmware
  • Fastconnect 7800
  • Fastconnect 6900 Firmware
  • Fastconnect 6900
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-20
Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
o qualcomm wsa8835_firmware - / / / / / / /
h qualcomm wsa8835 - / / / / / / /
o qualcomm wsa8830_firmware - / / / / / / /
h qualcomm wsa8830 - / / / / / / /
o qualcomm wcn3660b_firmware - / / / / / / /
h qualcomm wcn3660b - / / / / / / /
o qualcomm wcn3620_firmware - / / / / / / /
h qualcomm wcn3620 - / / / / / / /
o qualcomm wcd9380_firmware - / / / / / / /
h qualcomm wcd9380 - / / / / / / /
o qualcomm snapdragon_8_gen_1_mobile_platform_firmware - / / / / / / /
h qualcomm snapdragon_8_gen_1_mobile_platform - / / / / / / /
o qualcomm snapdragon_429_mobile_platform_firmware - / / / / / / /
h qualcomm snapdragon_429_mobile_platform - / / / / / / /
o qualcomm sdm429w_firmware - / / / / / / /
h qualcomm sdm429w - / / / / / / /
o qualcomm fastconnect_7800_firmware - / / / / / / /
h qualcomm fastconnect_7800 - / / / / / / /
o qualcomm fastconnect_6900_firmware - / / / / / / /
h qualcomm fastconnect_6900 - / / / / / / /

CVSS Score

6.7 / 10

CVSS Data

  • Attack Vector: LOCAL
  • Attack Complexity: LOW
  • Privileges Required: HIGH
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • View Vector String

    CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Date

  • Published: Nov. 4, 2024, 10:15 a.m.
  • Last Modified: Nov. 7, 2024, 7:54 p.m.

Status : Analyzed

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

product-security@qualcomm.com

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.