Metrics
No CVSS v4.0
Attack Vector Local
Attack Complexity Low
Privileges Required High
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
No CVSS v3.0
No CVSS v2
This CVE is not in the KEV list.
The EPSS score is 0.00036.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Qualcomm
Subscribe
|
Aqt1000
Subscribe
Aqt1000 Firmware
Subscribe
Qam8255p
Subscribe
Qam8255p Firmware
Subscribe
Qca6420
Subscribe
Qca6420 Firmware
Subscribe
Qca6430
Subscribe
Qca6430 Firmware
Subscribe
Qca6574au
Subscribe
Qca6574au Firmware
Subscribe
Qca6595au
Subscribe
Qca6595au Firmware
Subscribe
Qca6698aq
Subscribe
Qca6698aq Firmware
Subscribe
Qca6797aq
Subscribe
Qca6797aq Firmware
Subscribe
Sa8255p
Subscribe
Sa8255p Firmware
Subscribe
Sd855
Subscribe
Sd855 Firmware
Subscribe
Sm8150
Subscribe
Sm8150-ac
Subscribe
Sm8150-ac Firmware
Subscribe
Sm8150 Firmware
Subscribe
Sm8350
Subscribe
Sm8350-ac
Subscribe
Sm8350-ac Firmware
Subscribe
Sm8350 Firmware
Subscribe
Sm8450
Subscribe
Sm8450 Firmware
Subscribe
Snapdragon Wear 4100\+ Platform
Subscribe
Snapdragon Wear 4100\+ Platform Firmware
Subscribe
Wcd9341
Subscribe
Wcd9341 Firmware
Subscribe
Wcd9380
Subscribe
Wcd9380 Firmware
Subscribe
Wcd9385
Subscribe
Wcd9385 Firmware
Subscribe
Wcn3610
Subscribe
Wcn3610 Firmware
Subscribe
Wcn3660b
Subscribe
Wcn3660b Firmware
Subscribe
Wcn3680b
Subscribe
Wcn3680b Firmware
Subscribe
Wcn3980
Subscribe
Wcn3980 Firmware
Subscribe
Wcn3991
Subscribe
Wcn3991 Firmware
Subscribe
Wcn3998
Subscribe
Wcn3998 Firmware
Subscribe
Wcn685x-1
Subscribe
Wcn685x-1 Firmware
Subscribe
Wcn685x-5
Subscribe
Wcn685x-5 Firmware
Subscribe
Wcn785x-1
Subscribe
Wcn785x-1 Firmware
Subscribe
Wcn785x-5
Subscribe
Wcn785x-5 Firmware
Subscribe
Wsa8810
Subscribe
Wsa8810 Firmware
Subscribe
Wsa8815
Subscribe
Wsa8815 Firmware
Subscribe
Wsa8830
Subscribe
Wsa8830 Firmware
Subscribe
Wsa8835
Subscribe
Wsa8835 Firmware
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
| AND |
|
Configuration 7 [-]
| AND |
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
Configuration 17 [-]
| AND |
|
Configuration 18 [-]
| AND |
|
Configuration 19 [-]
| AND |
|
Configuration 20 [-]
| AND |
|
Configuration 21 [-]
| AND |
|
Configuration 22 [-]
| AND |
|
Configuration 23 [-]
| AND |
|
Configuration 24 [-]
| AND |
|
Configuration 25 [-]
| AND |
|
Configuration 26 [-]
| AND |
|
Configuration 27 [-]
| AND |
|
Configuration 28 [-]
| AND |
|
Configuration 29 [-]
| AND |
|
Configuration 30 [-]
| AND |
|
Configuration 31 [-]
| AND |
|
Configuration 32 [-]
| AND |
|
Configuration 33 [-]
| AND |
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-36269 | Memory corruption due to buffer copy without checking the size of input in Core while processing ioctl commands from diag client applications. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: qualcomm
Published:
Updated: 2024-08-03T08:01:20.485Z
Reserved: 2022-06-14T10:44:39.578Z
Link: CVE-2022-33226
No data.
Status : Modified
Published: 2023-06-06T08:15:10.000
Modified: 2024-11-21T07:07:46.480
Link: CVE-2022-33226
No data.
OpenCVE Enrichment
No data.
EUVD