#VU82839 Use After Free in Qualcomm products - CVE-2023-33074
Published: November 7, 2023
Vulnerability identifier: #VU82839
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2023-33074
CWE-ID: CWE-416
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
FastConnect 6700
FastConnect 6900
FastConnect 7800
QAM8255P
QAM8295P
QAM8650P
QAM8775P
QCA6574
QCA6574A
QCA6595
QCA6595AU
QCA6696
QCA6698AQ
QCA6797AQ
QCM4325
SA4150P
SA4155P
SA6145P
SA6150P
SA8145P
SA8150P
SA8155P
SA8195P
SA8255P
SA8295P
SD865 5G
SG8275P
SM8550P
Snapdragon 680 4G Mobile Platform
Snapdragon 685 4G Mobile Platform (SM6225-AD)
Snapdragon 8 Gen 2 Mobile Platform
Snapdragon 8+ Gen 1 Mobile Platform
Snapdragon 8+ Gen 2 Mobile Platform
Snapdragon W5+ Gen 1 Wearable Platform
Snapdragon XR2 5G Platform
SSG2115P
SSG2125P
SW5100
SW5100P
SXR1230P
SXR2230P
WCD9380
WCD9385
WCD9390
WCD9395
WCN3950
WCN3980
WCN3988
WSA8810
WSA8815
WSA8830
WSA8835
WSA8840
WSA8845
WSA8845H
QCA6574AU
SA6155P
WSA8832
FastConnect 6700
FastConnect 6900
FastConnect 7800
QAM8255P
QAM8295P
QAM8650P
QAM8775P
QCA6574
QCA6574A
QCA6595
QCA6595AU
QCA6696
QCA6698AQ
QCA6797AQ
QCM4325
SA4150P
SA4155P
SA6145P
SA6150P
SA8145P
SA8150P
SA8155P
SA8195P
SA8255P
SA8295P
SD865 5G
SG8275P
SM8550P
Snapdragon 680 4G Mobile Platform
Snapdragon 685 4G Mobile Platform (SM6225-AD)
Snapdragon 8 Gen 2 Mobile Platform
Snapdragon 8+ Gen 1 Mobile Platform
Snapdragon 8+ Gen 2 Mobile Platform
Snapdragon W5+ Gen 1 Wearable Platform
Snapdragon XR2 5G Platform
SSG2115P
SSG2125P
SW5100
SW5100P
SXR1230P
SXR2230P
WCD9380
WCD9385
WCD9390
WCD9395
WCN3950
WCN3980
WCN3988
WSA8810
WSA8815
WSA8830
WSA8835
WSA8840
WSA8845
WSA8845H
QCA6574AU
SA6155P
WSA8832
Software vendor:
Qualcomm
Qualcomm
Description
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Audio. A local application can execute arbitrary code.
Remediation
Install security update from vendor's website.