#VU75615 Reachable Assertion in Qualcomm products - CVE-2022-34144

 

#VU75615 Reachable Assertion in Qualcomm products - CVE-2022-34144

Published: May 1, 2023


Vulnerability identifier: #VU75615
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2022-34144
CWE-ID: CWE-617
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
315 5G IoT Modem
AR8035
FastConnect 6200
FastConnect 6700
FastConnect 6800
FastConnect 6900
FastConnect 7800
QCA6391
QCA6574A
QCA6595AU
QCA6696
QCA6698AQ
QCA8081
QCA8337
QCM4490
QCM6490
QCN6024
QCN9024
QCS4490
QCS6490
SDX57M
SM4450
SM7250P
SM7315
SM7325P
Snapdragon 4 Gen 1 Mobile Platform
Snapdragon 480 5G Mobile Platform
Snapdragon 480+ 5G Mobile Platform (SM4350-AC)
Snapdragon 690 5G Mobile Platform
Snapdragon 695 5G Mobile Platform
Snapdragon 765 5G Mobile Platform (SM7250-AA)
Snapdragon 765G 5G Mobile Platform (SM7250-AB)
Snapdragon 768G 5G Mobile Platform (SM7250-AC)
Snapdragon 778G 5G Mobile Platform
Snapdragon 778G+ 5G Mobile Platform (SM7325-AE)
Snapdragon 780G 5G Mobile Platform
Snapdragon 782G Mobile Platform (SM7325-AF)
Snapdragon 7c+ Gen 3 Compute
Snapdragon 8 Gen 1 Mobile Platform
Snapdragon 8+ Gen 1 Mobile Platform
Snapdragon 865 5G Mobile Platform
Snapdragon 865+ 5G Mobile Platform (SM8250-AB)
Snapdragon 870 5G Mobile Platform (SM8250-AC)
Snapdragon 888 5G Mobile Platform
Snapdragon 888+ 5G Mobile Platform (SM8350-AC)
Snapdragon Auto 5G Modem-RF
Snapdragon X55 5G Modem-RF System
Snapdragon X65 5G Modem-RF System
Snapdragon X70 Modem-RF System
WCD9341
WCD9360
WCD9370
WCD9375
WCD9380
WCD9385
WCN3950
WCN3988
WCN6740
WSA8810
WSA8815
WSA8830
WSA8835
QCA6574AU
SD888
SDX55
WSA8832
Software vendor:
Qualcomm

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in Modem. A remote attacker can perform a denial of service (DoS) attack.


Remediation

Install security update from vendor's website.

External links