Products
Qualcomm WiFi SoC
Source
product-security@qualcomm.com
Tags
CVE-2024-33019 details
Published : Aug. 5, 2024, 3:15 p.m.
Last Modified : Aug. 5, 2024, 3:15 p.m.
Last Modified : Aug. 5, 2024, 3:15 p.m.
Description
Transient DOS while parsing the received TID-to-link mapping action frame.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7.5 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-126 | Buffer Over-read | The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer. |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
Base Score
7.5
Exploitability Score
3.9
Impact Score
3.6
Base Severity
HIGH
Vector String : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
References
URL | Source |
---|---|
https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2024-bulletin.html | product-security@qualcomm.com |
This website uses the NVD API, but is not approved or certified by it.