2025-02-09 03:03:48 +00:00

163 lines
4.2 KiB
JSON

{
"id": "CVE-2024-21454",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-04-01T15:15:48.667",
"lastModified": "2025-01-13T21:54:53.383",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Transient DOS while decoding the ToBeSignedMessage in Automotive Telematics."
},
{
"lang": "es",
"value": "DOS transitorio mientras se decodifica el mensaje ToBeSignedMessage en telem\u00e1tica automotriz."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-680"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:c-v2x_9150_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A725088-FC3B-4439-9189-72AA10954721"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:c-v2x_9150:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B80D6366-4C0C-4C0D-9A38-769C66D62F0F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA6AAFBC-48CC-4DB2-85AD-3DF3134FC440"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:auto_5g_modem-rf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FDF516A-A433-4547-8ED4-BE0902B2166F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:auto_4g_modem_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3286F488-B374-4E10-896A-D99D494BC5A6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:auto_4g_modem:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C21B47E0-D54A-44C0-8196-BB0547213E89"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2024-bulletin.html",
"source": "product-security@qualcomm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2024-bulletin.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}