#VU87020 Configuration in Qualcomm products - CVE-2023-33105

 

#VU87020 Configuration in Qualcomm products - CVE-2023-33105

Published: March 4, 2024 / Updated: June 14, 2024


Vulnerability identifier: #VU87020
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Green
CVE-ID: CVE-2023-33105
CWE-ID: CWE-16
Exploitation vector: Remote access
Exploit availability: Public exploit is available
Vulnerable software:
AR8035
AR9380
CSR8811
FastConnect 6700
FastConnect 6900
FastConnect 7800
Flight RB5 5G Platform
Immersive Home 214 Platform
Immersive Home 216 Platform
Immersive Home 316 Platform
Immersive Home 318 Platform
Immersive Home 3210 Platform
Immersive Home 326 Platform
IPQ4018
IPQ4028
IPQ4029
IPQ5010
IPQ5028
IPQ5302
IPQ5312
IPQ5332
IPQ6000
IPQ6005
IPQ6010
IPQ6018
IPQ6028
IPQ8065
IPQ8068
IPQ8070
IPQ8070A
IPQ8071
IPQ8071A
IPQ8072
IPQ8072A
IPQ8074A
IPQ8076
IPQ8076A
IPQ8078
IPQ8078A
IPQ8173
IPQ8174
IPQ9008
IPQ9554
IPQ9570
IPQ9574
PMP8074
QCA0000
QCA4024
QCA6391
QCA6428
QCA6438
QCA7500
QCA8072
QCA8075
QCA8081
QCA8082
QCA8084
QCA8085
QCA8337
QCA8386
QCA9880
QCA9886
QCA9888
QCA9889
QCA9898
QCA9984
QCA9985
QCA9986
QCA9990
QCA9992
QCA9994
QCC710
QCF8000
QCF8001
QCM4490
QCN5021
QCN5022
QCN5024
QCN5052
QCN5054
QCN5064
QCN5121
QCN5122
QCN5124
QCN5152
QCN5154
QCN5164
QCN5550
QCN6023
QCN6024
QCN6100
QCN6102
QCN6112
QCN6122
QCN6224
QCN6274
QCN6402
QCN6412
QCN6422
QCN6432
QCN9000
QCN9001
QCN9002
QCN9003
QCN9011
QCN9012
QCN9013
QCN9022
QCN9024
QCN9070
QCN9072
QCN9074
QCN9100
QCN9274
QCS4490
QCS8550
QFW7114
QFW7124
QRB5165M
QRB5165N
Robotics RB5 Platform
SC8380XP
SDX65M
SG8275P
Snapdragon 8 Gen 3 Mobile Platform
Snapdragon X65 5G Modem-RF System
Snapdragon X75 5G Modem-RF System
WCD9340
WCD9370
WCD9380
WCD9385
WCD9390
WCD9395
WCN3950
WCN3980
WSA8810
WSA8815
WSA8830
WSA8835
WSA8840
WSA8845
WSA8845H
IPQ4019
IPQ8064
IPQ8074
QCA9980
QCN6132
SDX55
WSA8832
Software vendor:
Qualcomm

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Host and Firmware. A remote attacker can perform a denial of service (DoS) attack.


Remediation

Install security update from vendor's website.

External links