2023-05-02 10:00:31 +02:00
|
|
|
{
|
|
|
|
"id": "CVE-2022-40505",
|
|
|
|
"sourceIdentifier": "product-security@qualcomm.com",
|
|
|
|
"published": "2023-05-02T06:15:10.173",
|
2024-12-08 03:06:42 +00:00
|
|
|
"lastModified": "2024-11-21T07:21:29.357",
|
2024-04-12 18:04:07 +00:00
|
|
|
"vulnStatus": "Modified",
|
2024-07-14 02:06:08 +00:00
|
|
|
"cveTags": [],
|
2023-05-02 10:00:31 +02:00
|
|
|
"descriptions": [
|
|
|
|
{
|
|
|
|
"lang": "en",
|
|
|
|
"value": "Information disclosure due to buffer over-read in Modem while parsing DNS hostname."
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"metrics": {
|
|
|
|
"cvssMetricV31": [
|
2023-05-09 20:00:51 +02:00
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"source": "product-security@qualcomm.com",
|
|
|
|
"type": "Secondary",
|
2023-05-09 20:00:51 +02:00
|
|
|
"cvssData": {
|
|
|
|
"version": "3.1",
|
2024-12-08 03:06:42 +00:00
|
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
|
|
|
|
"baseScore": 8.2,
|
|
|
|
"baseSeverity": "HIGH",
|
2023-05-09 20:00:51 +02:00
|
|
|
"attackVector": "NETWORK",
|
|
|
|
"attackComplexity": "LOW",
|
|
|
|
"privilegesRequired": "NONE",
|
|
|
|
"userInteraction": "NONE",
|
|
|
|
"scope": "UNCHANGED",
|
|
|
|
"confidentialityImpact": "HIGH",
|
|
|
|
"integrityImpact": "NONE",
|
2024-12-08 03:06:42 +00:00
|
|
|
"availabilityImpact": "LOW"
|
2023-05-09 20:00:51 +02:00
|
|
|
},
|
|
|
|
"exploitabilityScore": 3.9,
|
2024-12-08 03:06:42 +00:00
|
|
|
"impactScore": 4.2
|
2023-05-09 20:00:51 +02:00
|
|
|
},
|
2023-05-02 10:00:31 +02:00
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"source": "nvd@nist.gov",
|
|
|
|
"type": "Primary",
|
2023-05-02 10:00:31 +02:00
|
|
|
"cvssData": {
|
|
|
|
"version": "3.1",
|
2024-12-08 03:06:42 +00:00
|
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
|
|
|
"baseScore": 7.5,
|
|
|
|
"baseSeverity": "HIGH",
|
2023-05-02 10:00:31 +02:00
|
|
|
"attackVector": "NETWORK",
|
|
|
|
"attackComplexity": "LOW",
|
|
|
|
"privilegesRequired": "NONE",
|
|
|
|
"userInteraction": "NONE",
|
|
|
|
"scope": "UNCHANGED",
|
|
|
|
"confidentialityImpact": "HIGH",
|
|
|
|
"integrityImpact": "NONE",
|
2024-12-08 03:06:42 +00:00
|
|
|
"availabilityImpact": "NONE"
|
2023-05-02 10:00:31 +02:00
|
|
|
},
|
|
|
|
"exploitabilityScore": 3.9,
|
2024-12-08 03:06:42 +00:00
|
|
|
"impactScore": 3.6
|
2023-05-02 10:00:31 +02:00
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
2023-05-09 20:00:51 +02:00
|
|
|
"weaknesses": [
|
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"source": "product-security@qualcomm.com",
|
|
|
|
"type": "Secondary",
|
2023-05-09 20:00:51 +02:00
|
|
|
"description": [
|
|
|
|
{
|
|
|
|
"lang": "en",
|
2024-12-08 03:06:42 +00:00
|
|
|
"value": "CWE-126"
|
2023-05-09 20:00:51 +02:00
|
|
|
}
|
|
|
|
]
|
2024-04-12 18:04:07 +00:00
|
|
|
},
|
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"source": "nvd@nist.gov",
|
|
|
|
"type": "Primary",
|
2024-04-12 18:04:07 +00:00
|
|
|
"description": [
|
|
|
|
{
|
|
|
|
"lang": "en",
|
2024-12-08 03:06:42 +00:00
|
|
|
"value": "CWE-125"
|
2024-04-12 18:04:07 +00:00
|
|
|
}
|
|
|
|
]
|
2023-05-09 20:00:51 +02:00
|
|
|
}
|
|
|
|
],
|
|
|
|
"configurations": [
|
|
|
|
{
|
|
|
|
"operator": "AND",
|
|
|
|
"nodes": [
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:qualcomm:9205_lte_modem_firmware:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "920F873B-F52D-4754-9726-BECCAD0CAC45"
|
2023-05-09 20:00:51 +02:00
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"vulnerable": false,
|
|
|
|
"criteria": "cpe:2.3:h:qualcomm:9205_lte_modem:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "5EB573E2-C2B9-4B12-9EEF-9152FBFE3927"
|
2023-05-09 20:00:51 +02:00
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "AND",
|
|
|
|
"nodes": [
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:qualcomm:9206_lte_modem_firmware:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "E2C2632A-02F2-4C59-AF96-E2C77940360F"
|
2023-05-09 20:00:51 +02:00
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"vulnerable": false,
|
|
|
|
"criteria": "cpe:2.3:h:qualcomm:9206_lte_modem:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "D10A104D-951A-4FA9-938A-1324640A998D"
|
2023-05-09 20:00:51 +02:00
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "AND",
|
|
|
|
"nodes": [
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:qualcomm:9207_lte_modem_firmware:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "9CB54B6E-0AAE-428D-A264-4BF58A852645"
|
2023-05-09 20:00:51 +02:00
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"vulnerable": false,
|
|
|
|
"criteria": "cpe:2.3:h:qualcomm:9207_lte_modem:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "E12F5DF9-4D12-4321-A92C-86862A91E816"
|
2023-05-09 20:00:51 +02:00
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "AND",
|
|
|
|
"nodes": [
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:qualcomm:mdm8207_firmware:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "FE3BA789-3EC2-474D-BD5F-AD67BAE64413"
|
2023-05-09 20:00:51 +02:00
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"vulnerable": false,
|
|
|
|
"criteria": "cpe:2.3:h:qualcomm:mdm8207:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "5954E2E1-3A62-4601-8D7F-21B7B2D02370"
|
2023-05-09 20:00:51 +02:00
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "AND",
|
|
|
|
"nodes": [
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:qualcomm:qca4004_firmware:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "DFB39496-8699-4DAF-BD7B-AE69260B20CB"
|
2023-05-09 20:00:51 +02:00
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"vulnerable": false,
|
|
|
|
"criteria": "cpe:2.3:h:qualcomm:qca4004:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "E9CFBC24-5F15-40DE-806E-62C1EE808992"
|
2023-05-09 20:00:51 +02:00
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "AND",
|
|
|
|
"nodes": [
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:qualcomm:qca4010_firmware:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "04F1CE4C-CAF8-4AB9-B44D-ADC2F2E7CF4C"
|
2023-05-09 20:00:51 +02:00
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"vulnerable": false,
|
|
|
|
"criteria": "cpe:2.3:h:qualcomm:qca4010:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "30C10881-C26D-452D-A2D1-8617C2709D60"
|
2023-05-09 20:00:51 +02:00
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "AND",
|
|
|
|
"nodes": [
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:qualcomm:qts110_firmware:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "B2D4B026-2118-448D-A48D-36864DE715B8"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
|
|
|
"vulnerable": false,
|
|
|
|
"criteria": "cpe:2.3:h:qualcomm:qts110:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "5ED10480-E005-452C-A03C-D669CE94ABE4"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "AND",
|
|
|
|
"nodes": [
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:qualcomm:snapdragon_1100_wearable_platform_firmware:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "E7760D19-1CE2-4EB1-A81A-EA2DE1E142D2"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
|
|
|
"vulnerable": false,
|
|
|
|
"criteria": "cpe:2.3:h:qualcomm:snapdragon_1100_wearable_platform:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "1E19FA5E-24D1-4E7B-B8A3-BFAA09E4A40C"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "AND",
|
|
|
|
"nodes": [
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:qualcomm:snapdragon_1200_wearable_platform_firmware:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "E89870DD-3B20-4B06-9A51-755E204ECCDB"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
|
|
|
"vulnerable": false,
|
|
|
|
"criteria": "cpe:2.3:h:qualcomm:snapdragon_1200_wearable_platform:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "955F15D0-2F36-45E7-9828-96593DA7DA80"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "AND",
|
|
|
|
"nodes": [
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_1300_platform_firmware:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "5A402233-B76F-41D5-B7C2-325C8FC4D560"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
|
|
|
"vulnerable": false,
|
|
|
|
"criteria": "cpe:2.3:h:qualcomm:snapdragon_wear_1300_platform:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "C8643194-C881-408A-AAA1-78572075120A"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "AND",
|
|
|
|
"nodes": [
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:qualcomm:snapdragon_x5_lte_modem_firmware:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "312A5688-2508-4609-835F-F0957C511AE8"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
|
|
|
"vulnerable": false,
|
|
|
|
"criteria": "cpe:2.3:h:qualcomm:snapdragon_x5_lte_modem:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "ADD6DFCE-2D24-4A68-8B46-FB47ABEC6694"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "AND",
|
|
|
|
"nodes": [
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:qualcomm:wcd9306_firmware:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "FC012AD0-BCEE-4B1E-9B15-5D77D78CEA01"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
|
|
|
"vulnerable": false,
|
|
|
|
"criteria": "cpe:2.3:h:qualcomm:wcd9306:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "F51C69B9-F0AB-4BF5-A8C2-64FEB7075593"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "AND",
|
|
|
|
"nodes": [
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:qualcomm:wcd9330_firmware:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "43A90019-4E96-40B5-9E4D-CCBDD51ACA34"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
|
|
|
"vulnerable": false,
|
|
|
|
"criteria": "cpe:2.3:h:qualcomm:wcd9330:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "BC3D23FE-B3D5-4EC3-8268-98F12181966D"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
],
|
2023-05-02 10:00:31 +02:00
|
|
|
"references": [
|
|
|
|
{
|
|
|
|
"url": "https://www.qualcomm.com/company/product-security/bulletins/may-2023-bulletin",
|
2023-05-09 20:00:51 +02:00
|
|
|
"source": "product-security@qualcomm.com",
|
|
|
|
"tags": [
|
|
|
|
"Vendor Advisory"
|
|
|
|
]
|
2024-12-08 03:06:42 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
"url": "https://www.qualcomm.com/company/product-security/bulletins/may-2023-bulletin",
|
|
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
|
|
"tags": [
|
|
|
|
"Vendor Advisory"
|
|
|
|
]
|
2023-05-02 10:00:31 +02:00
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|