CVE-2024-33047

Sept. 4, 2024, 5:07 p.m.

7.8
High

Description

Memory corruption when the captureRead QDCM command is invoked from user-space.

Product(s) Impacted

Vendor Product Versions
Qualcomm
  • Fastconnect 6700 Firmware
  • Fastconnect 6700
  • Fastconnect 6900 Firmware
  • Fastconnect 6900
  • Fastconnect 7800 Firmware
  • Fastconnect 7800
  • Qcm5430 Firmware
  • Qcm5430
  • Qcm6490 Firmware
  • Qcm6490
  • Qcs5430 Firmware
  • Qcs5430
  • Qcs6490 Firmware
  • Qcs6490
  • Video Collaboration Vc3 Firmware
  • Video Collaboration Vc3
  • Sc8380xp Firmware
  • Sc8380xp
  • Sdm429w Firmware
  • Sdm429w
  • Snapdragon 429 Firmware
  • Snapdragon 429
  • Snapdragon 7c\+ Gen 3 Firmware
  • Snapdragon 7c\+ Gen 3
  • Snapdragon 8cx Gen 3 Firmware
  • Snapdragon 8cx Gen 3
  • Wcd9370 Firmware
  • Wcd9370
  • Wcd9375 Firmware
  • Wcd9375
  • Wcd9380 Firmware
  • Wcd9380
  • Wcd9385 Firmware
  • Wcd9385
  • Wcn3620 Firmware
  • Wcn3620
  • Wcn3660b Firmware
  • Wcn3660b
  • Wsa8830 Firmware
  • Wsa8830
  • Wsa8835 Firmware
  • Wsa8835
  • Wsa8840 Firmware
  • Wsa8840
  • Wsa8845 Firmware
  • Wsa8845
  • Wsa8845h Firmware
  • Wsa8845h
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -

Weaknesses

CWE-125
Out-of-bounds Read
The product reads data past the end, or before the beginning, of the intended buffer.
CWE-126
Buffer Over-read
The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.

*CPE(s)

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
o qualcomm fastconnect_6700_firmware - / / / / / / /
h qualcomm fastconnect_6700 - / / / / / / /
o qualcomm fastconnect_6900_firmware - / / / / / / /
h qualcomm fastconnect_6900 - / / / / / / /
o qualcomm fastconnect_7800_firmware - / / / / / / /
h qualcomm fastconnect_7800 - / / / / / / /
o qualcomm qcm5430_firmware - / / / / / / /
h qualcomm qcm5430 - / / / / / / /
o qualcomm qcm6490_firmware - / / / / / / /
h qualcomm qcm6490 - / / / / / / /
o qualcomm qcs5430_firmware - / / / / / / /
h qualcomm qcs5430 - / / / / / / /
o qualcomm qcs6490_firmware - / / / / / / /
h qualcomm qcs6490 - / / / / / / /
o qualcomm video_collaboration_vc3_firmware - / / / / / / /
h qualcomm video_collaboration_vc3 - / / / / / / /
o qualcomm sc8380xp_firmware - / / / / / / /
h qualcomm sc8380xp - / / / / / / /
o qualcomm sdm429w_firmware - / / / / / / /
h qualcomm sdm429w - / / / / / / /
o qualcomm snapdragon_429_firmware - / / / / / / /
h qualcomm snapdragon_429 - / / / / / / /
o qualcomm snapdragon_7c\+_gen_3_firmware - / / / / / / /
h qualcomm snapdragon_7c\+_gen_3 - / / / / / / /
o qualcomm snapdragon_8cx_gen_3_firmware - / / / / / / /
h qualcomm snapdragon_8cx_gen_3 - / / / / / / /
o qualcomm wcd9370_firmware - / / / / / / /
h qualcomm wcd9370 - / / / / / / /
o qualcomm wcd9375_firmware - / / / / / / /
h qualcomm wcd9375 - / / / / / / /
o qualcomm wcd9380_firmware - / / / / / / /
h qualcomm wcd9380 - / / / / / / /
o qualcomm wcd9385_firmware - / / / / / / /
h qualcomm wcd9385 - / / / / / / /
o qualcomm wcn3620_firmware - / / / / / / /
h qualcomm wcn3620 - / / / / / / /
o qualcomm wcn3660b_firmware - / / / / / / /
h qualcomm wcn3660b - / / / / / / /
o qualcomm wsa8830_firmware - / / / / / / /
h qualcomm wsa8830 - / / / / / / /
o qualcomm wsa8835_firmware - / / / / / / /
h qualcomm wsa8835 - / / / / / / /
o qualcomm wsa8840_firmware - / / / / / / /
h qualcomm wsa8840 - / / / / / / /
o qualcomm wsa8845_firmware - / / / / / / /
h qualcomm wsa8845 - / / / / / / /
o qualcomm wsa8845h_firmware - / / / / / / /
h qualcomm wsa8845h - / / / / / / /

CVSS Score

7.8 / 10

CVSS Data

  • Attack Vector: LOCAL
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • View Vector String

    CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Date

  • Published: Sept. 2, 2024, 12:15 p.m.
  • Last Modified: Sept. 4, 2024, 5:07 p.m.

Status : Analyzed

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

product-security@qualcomm.com

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.