2023-06-09 11:28:17 +00:00
|
|
|
{
|
|
|
|
"id": "CVE-2022-40538",
|
|
|
|
"sourceIdentifier": "product-security@qualcomm.com",
|
|
|
|
"published": "2023-06-06T08:15:11.850",
|
2024-12-08 03:06:42 +00:00
|
|
|
"lastModified": "2024-11-21T07:21:40.430",
|
2024-04-12 18:04:07 +00:00
|
|
|
"vulnStatus": "Modified",
|
2024-07-14 02:06:08 +00:00
|
|
|
"cveTags": [],
|
2023-06-09 11:28:17 +00:00
|
|
|
"descriptions": [
|
|
|
|
{
|
|
|
|
"lang": "en",
|
|
|
|
"value": "Transient DOS due to reachable assertion in modem while processing sib with incorrect values from network."
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"metrics": {
|
|
|
|
"cvssMetricV31": [
|
2023-06-10 04:00:29 +00:00
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"source": "product-security@qualcomm.com",
|
|
|
|
"type": "Secondary",
|
2023-06-10 04:00:29 +00:00
|
|
|
"cvssData": {
|
|
|
|
"version": "3.1",
|
|
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
2024-12-08 03:06:42 +00:00
|
|
|
"baseScore": 7.5,
|
|
|
|
"baseSeverity": "HIGH",
|
2023-06-10 04:00:29 +00:00
|
|
|
"attackVector": "NETWORK",
|
|
|
|
"attackComplexity": "LOW",
|
|
|
|
"privilegesRequired": "NONE",
|
|
|
|
"userInteraction": "NONE",
|
|
|
|
"scope": "UNCHANGED",
|
|
|
|
"confidentialityImpact": "NONE",
|
|
|
|
"integrityImpact": "NONE",
|
2024-12-08 03:06:42 +00:00
|
|
|
"availabilityImpact": "HIGH"
|
2023-06-10 04:00:29 +00:00
|
|
|
},
|
|
|
|
"exploitabilityScore": 3.9,
|
|
|
|
"impactScore": 3.6
|
|
|
|
},
|
2023-06-09 11:28:17 +00:00
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"source": "nvd@nist.gov",
|
|
|
|
"type": "Primary",
|
2023-06-09 11:28:17 +00:00
|
|
|
"cvssData": {
|
|
|
|
"version": "3.1",
|
|
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
2024-12-08 03:06:42 +00:00
|
|
|
"baseScore": 7.5,
|
|
|
|
"baseSeverity": "HIGH",
|
2023-06-09 11:28:17 +00:00
|
|
|
"attackVector": "NETWORK",
|
|
|
|
"attackComplexity": "LOW",
|
|
|
|
"privilegesRequired": "NONE",
|
|
|
|
"userInteraction": "NONE",
|
|
|
|
"scope": "UNCHANGED",
|
|
|
|
"confidentialityImpact": "NONE",
|
|
|
|
"integrityImpact": "NONE",
|
2024-12-08 03:06:42 +00:00
|
|
|
"availabilityImpact": "HIGH"
|
2023-06-09 11:28:17 +00:00
|
|
|
},
|
|
|
|
"exploitabilityScore": 3.9,
|
|
|
|
"impactScore": 3.6
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
2023-06-10 04:00:29 +00:00
|
|
|
"weaknesses": [
|
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"source": "product-security@qualcomm.com",
|
|
|
|
"type": "Secondary",
|
2023-06-10 04:00:29 +00:00
|
|
|
"description": [
|
|
|
|
{
|
|
|
|
"lang": "en",
|
|
|
|
"value": "CWE-617"
|
|
|
|
}
|
|
|
|
]
|
2024-04-12 18:04:07 +00:00
|
|
|
},
|
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"source": "nvd@nist.gov",
|
|
|
|
"type": "Primary",
|
2024-04-12 18:04:07 +00:00
|
|
|
"description": [
|
|
|
|
{
|
|
|
|
"lang": "en",
|
|
|
|
"value": "CWE-617"
|
|
|
|
}
|
|
|
|
]
|
2023-06-10 04:00:29 +00:00
|
|
|
}
|
|
|
|
],
|
|
|
|
"configurations": [
|
|
|
|
{
|
|
|
|
"operator": "AND",
|
|
|
|
"nodes": [
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00"
|
2023-06-10 04:00:29 +00:00
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"vulnerable": false,
|
|
|
|
"criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7"
|
2023-06-10 04:00:29 +00:00
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "AND",
|
|
|
|
"nodes": [
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:qualcomm:wcn685x-5_firmware:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "2A3CF46D-E1CB-447E-8371-15C3F49B1AA9"
|
2023-06-10 04:00:29 +00:00
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"vulnerable": false,
|
|
|
|
"criteria": "cpe:2.3:h:qualcomm:wcn685x-5:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "B74FDAF1-82D0-4136-BF97-25C56FCEE77C"
|
2023-06-10 04:00:29 +00:00
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "AND",
|
|
|
|
"nodes": [
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:qualcomm:wcn685x-1_firmware:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "A07C2049-B227-4849-85D0-B53D690C7697"
|
2023-06-10 04:00:29 +00:00
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"vulnerable": false,
|
|
|
|
"criteria": "cpe:2.3:h:qualcomm:wcn685x-1:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "88D2DB07-B72B-4D44-A373-0C7EAB35F388"
|
2023-06-10 04:00:29 +00:00
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "AND",
|
|
|
|
"nodes": [
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:qualcomm:wcn785x-1_firmware:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "C41266FF-5555-4522-AD55-6A7CF8BA33D5"
|
2023-06-10 04:00:29 +00:00
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"vulnerable": false,
|
|
|
|
"criteria": "cpe:2.3:h:qualcomm:wcn785x-1:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "9E9C428C-7470-4178-9029-3234086D93F1"
|
2023-06-10 04:00:29 +00:00
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "AND",
|
|
|
|
"nodes": [
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:qualcomm:wcn785x-5_firmware:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "04EA12D4-24E2-4FE9-8CD6-06A8E36DEB2F"
|
2023-06-10 04:00:29 +00:00
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"vulnerable": false,
|
|
|
|
"criteria": "cpe:2.3:h:qualcomm:wcn785x-5:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "2AED978B-0330-4B9B-B662-AA8E9E621996"
|
2023-06-10 04:00:29 +00:00
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "AND",
|
|
|
|
"nodes": [
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026"
|
2023-06-10 04:00:29 +00:00
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"vulnerable": false,
|
|
|
|
"criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB"
|
2023-06-10 04:00:29 +00:00
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "AND",
|
|
|
|
"nodes": [
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A"
|
2023-06-10 04:00:29 +00:00
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
2024-12-08 03:06:42 +00:00
|
|
|
"vulnerable": false,
|
|
|
|
"criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED"
|
2023-06-10 04:00:29 +00:00
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "AND",
|
|
|
|
"nodes": [
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "A49DBE04-E2EA-4DA1-B774-A878A71524AC"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
|
|
|
"vulnerable": false,
|
|
|
|
"criteria": "cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "69E98386-3BB2-4E8C-AD00-E05123608439"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "AND",
|
|
|
|
"nodes": [
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
|
|
|
"vulnerable": false,
|
|
|
|
"criteria": "cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "345CCD64-C09E-407D-AAA2-311C4CCFE24F"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "AND",
|
|
|
|
"nodes": [
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
|
|
|
"vulnerable": false,
|
|
|
|
"criteria": "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "AND",
|
|
|
|
"nodes": [
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "F74BF53E-DFA1-4750-A638-FE7572B79D16"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
|
|
|
"vulnerable": false,
|
|
|
|
"criteria": "cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "226D1ABD-E4AD-487E-88EB-4C66D51DB33D"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "AND",
|
|
|
|
"nodes": [
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:qualcomm:snapdragon_x70_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "EAD88351-1DA2-4CE5-BCEB-3C64BD16468A"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
|
|
|
"vulnerable": false,
|
|
|
|
"criteria": "cpe:2.3:h:qualcomm:snapdragon_x70_modem-rf_system:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "03149AA1-8048-4675-8C6F-18FD32E54064"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "AND",
|
|
|
|
"nodes": [
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
|
|
|
"vulnerable": true,
|
|
|
|
"criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"operator": "OR",
|
|
|
|
"negate": false,
|
|
|
|
"cpeMatch": [
|
|
|
|
{
|
|
|
|
"vulnerable": false,
|
|
|
|
"criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
|
|
|
|
"matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
],
|
2023-06-09 11:28:17 +00:00
|
|
|
"references": [
|
|
|
|
{
|
|
|
|
"url": "https://www.qualcomm.com/company/product-security/bulletins/june-2023-bulletin",
|
2023-06-10 04:00:29 +00:00
|
|
|
"source": "product-security@qualcomm.com",
|
|
|
|
"tags": [
|
|
|
|
"Vendor Advisory"
|
|
|
|
]
|
2024-12-08 03:06:42 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
"url": "https://www.qualcomm.com/company/product-security/bulletins/june-2023-bulletin",
|
|
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
|
|
"tags": [
|
|
|
|
"Vendor Advisory"
|
|
|
|
]
|
2023-06-09 11:28:17 +00:00
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|