#VU75617 Buffer over-read in Qualcomm Mobile applications


Published: 2023-05-01

Vulnerability identifier: #VU75617

Vulnerability risk: High

CVSSv3.1: 7.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-40505

CWE-ID: CWE-126

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
9205 LTE Modem
Mobile applications / Mobile firmware & hardware
9206 LTE Modem
Mobile applications / Mobile firmware & hardware
9207 LTE Modem
Mobile applications / Mobile firmware & hardware
MDM8207
Mobile applications / Mobile firmware & hardware
QCA4004
Mobile applications / Mobile firmware & hardware
QCA4010
Mobile applications / Mobile firmware & hardware
QTS110
Mobile applications / Mobile firmware & hardware
Snapdragon 1100 Wearable Platform
Mobile applications / Mobile firmware & hardware
Snapdragon 1200 Wearable Platform
Mobile applications / Mobile firmware & hardware
Snapdragon Wear 1300 Platform
Mobile applications / Mobile firmware & hardware
Snapdragon X5 LTE Modem
Mobile applications / Mobile firmware & hardware
WCD9306
Mobile applications / Mobile firmware & hardware
WCD9330
Mobile applications / Mobile firmware & hardware

Vendor: Qualcomm

Description

The vulnerability allows a remote attacker to read and manipulate data.

The vulnerability exists due to improper input validation in Modem. A remote attacker can read and manipulate data.

Mitigation
Install security update from vendor's website.

Vulnerable software versions

9205 LTE Modem: All versions

9206 LTE Modem: All versions

9207 LTE Modem: All versions

MDM8207: All versions

QCA4004: All versions

QCA4010: All versions

QTS110: All versions

Snapdragon 1100 Wearable Platform: All versions

Snapdragon 1200 Wearable Platform: All versions

Snapdragon Wear 1300 Platform: All versions

Snapdragon X5 LTE Modem: All versions

WCD9306: All versions

WCD9330: All versions


External links
http://docs.qualcomm.com/product/publicresources/securitybulletin/may-2023-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability