CVE-2024-33030

Nov. 7, 2024, 8:04 p.m.

6.7
Medium

Description

Memory corruption while parsing IPC frequency table parameters for LPLH that has size greater than expected size.

Product(s) Impacted

Vendor Product Versions
Qualcomm
  • Wsa8835 Firmware
  • Wsa8835
  • Wsa8830 Firmware
  • Wsa8830
  • Wcd9380 Firmware
  • Wcd9380
  • Wcd9340 Firmware
  • Wcd9340
  • Snapdragon X75 5g Modem-rf System Firmware
  • Snapdragon X75 5g Modem-rf System
  • Snapdragon X72 5g Modem-rf System Firmware
  • Snapdragon X72 5g Modem-rf System
  • Snapdragon Auto 5g Modem-rf Gen 2 Firmware
  • Snapdragon Auto 5g Modem-rf Gen 2
  • Snapdragon 8 Gen 1 Mobile Platform Firmware
  • Snapdragon 8 Gen 1 Mobile Platform
  • Qfw7124 Firmware
  • Qfw7124
  • Qfw7114 Firmware
  • Qfw7114
  • Qcn6274 Firmware
  • Qcn6274
  • Qcn6224 Firmware
  • Qcn6224
  • Qcc710 Firmware
  • Qcc710
  • Qca9377 Firmware
  • Qca9377
  • Qca9367 Firmware
  • Qca9367
  • Qca8337 Firmware
  • Qca8337
  • Qca8081 Firmware
  • Qca8081
  • Qca6698aq Firmware
  • Qca6698aq
  • Qca6584au Firmware
  • Qca6584au
  • Fastconnect 7800 Firmware
  • Fastconnect 7800
  • Fastconnect 6900 Firmware
  • Fastconnect 6900
  • Ar8035 Firmware
  • Ar8035
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -

Weaknesses

CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.

*CPE(s)

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
o qualcomm wsa8835_firmware - / / / / / / /
h qualcomm wsa8835 - / / / / / / /
o qualcomm wsa8830_firmware - / / / / / / /
h qualcomm wsa8830 - / / / / / / /
o qualcomm wcd9380_firmware - / / / / / / /
h qualcomm wcd9380 - / / / / / / /
o qualcomm wcd9340_firmware - / / / / / / /
h qualcomm wcd9340 - / / / / / / /
o qualcomm snapdragon_x75_5g_modem-rf_system_firmware - / / / / / / /
h qualcomm snapdragon_x75_5g_modem-rf_system - / / / / / / /
o qualcomm snapdragon_x72_5g_modem-rf_system_firmware - / / / / / / /
h qualcomm snapdragon_x72_5g_modem-rf_system - / / / / / / /
o qualcomm snapdragon_auto_5g_modem-rf_gen_2_firmware - / / / / / / /
h qualcomm snapdragon_auto_5g_modem-rf_gen_2 - / / / / / / /
o qualcomm snapdragon_8_gen_1_mobile_platform_firmware - / / / / / / /
h qualcomm snapdragon_8_gen_1_mobile_platform - / / / / / / /
o qualcomm qfw7124_firmware - / / / / / / /
h qualcomm qfw7124 - / / / / / / /
o qualcomm qfw7114_firmware - / / / / / / /
h qualcomm qfw7114 - / / / / / / /
o qualcomm qcn6274_firmware - / / / / / / /
h qualcomm qcn6274 - / / / / / / /
o qualcomm qcn6224_firmware - / / / / / / /
h qualcomm qcn6224 - / / / / / / /
o qualcomm qcc710_firmware - / / / / / / /
h qualcomm qcc710 - / / / / / / /
o qualcomm qca9377_firmware - / / / / / / /
h qualcomm qca9377 - / / / / / / /
o qualcomm qca9367_firmware - / / / / / / /
h qualcomm qca9367 - / / / / / / /
o qualcomm qca8337_firmware - / / / / / / /
h qualcomm qca8337 - / / / / / / /
o qualcomm qca8081_firmware - / / / / / / /
h qualcomm qca8081 - / / / / / / /
o qualcomm qca6698aq_firmware - / / / / / / /
h qualcomm qca6698aq - / / / / / / /
o qualcomm qca6584au_firmware - / / / / / / /
h qualcomm qca6584au - / / / / / / /
o qualcomm fastconnect_7800_firmware - / / / / / / /
h qualcomm fastconnect_7800 - / / / / / / /
o qualcomm fastconnect_6900_firmware - / / / / / / /
h qualcomm fastconnect_6900 - / / / / / / /
o qualcomm ar8035_firmware - / / / / / / /
h qualcomm ar8035 - / / / / / / /

CVSS Score

6.7 / 10

CVSS Data

  • Attack Vector: LOCAL
  • Attack Complexity: LOW
  • Privileges Required: HIGH
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • View Vector String

    CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Date

  • Published: Nov. 4, 2024, 10:15 a.m.
  • Last Modified: Nov. 7, 2024, 8:04 p.m.

Status : Analyzed

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

product-security@qualcomm.com

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.