cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-33235,https://securityvulnerability.io/vulnerability/CVE-2022-33235,Buffer Over-Read Vulnerability in Qualcomm Snapdragon Products,"A vulnerability has been identified in various Qualcomm Snapdragon products, stemming from a buffer over-read issue within the WLAN firmware. This flaw arises while parsing security context information attributes, potentially allowing unauthorized parties access to sensitive information. The affected Snapdragon series includes a wide array of applications, from consumer electronics to connectivity solutions, posing significant risks across multiple devices and environments.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",8.2,HIGH,0.0012700000079348683,false,,false,false,false,,,false,false,,2022-12-13T00:00:00.000Z,0 CVE-2022-33238,https://securityvulnerability.io/vulnerability/CVE-2022-33238,Denial of Service Vulnerability in Snapdragon Products by Qualcomm,"A transient denial of service vulnerability is present in Qualcomm's Snapdragon products due to a loop with an unreachable exit condition when processing incoming FTM frames. This issue can lead to significant disruptions, impacting device functionality across various Snapdragon platforms including automotive, consumer electronics, and IoT applications.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",7.5,HIGH,0.0008900000248104334,false,,false,false,false,,,false,false,,2022-12-13T00:00:00.000Z,0 CVE-2022-25677,https://securityvulnerability.io/vulnerability/CVE-2022-25677,Memory Corruption Vulnerability in Qualcomm Snapdragon Products,"A memory corruption issue exists within Qualcomm's Snapdragon product line due to improper handling of memory during the processing of DCI packets. This type of vulnerability arises from a use-after-free scenario, where memory that has already been released is accessed again, potentially leading to arbitrary code execution or system instability. Affected systems include a broad range of Snapdragon platforms, which are widely utilized in automotive, industrial, mobile, consumer IoT, and networking applications. Prompt attention to this vulnerability is essential for maintaining system integrity and security.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",6.7,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-12-13T00:00:00.000Z,0 CVE-2022-33239,https://securityvulnerability.io/vulnerability/CVE-2022-33239,Transient Denial of Service Vulnerability in Snapdragon Firmware,"A vulnerable condition exists within the WLAN firmware of Snapdragon products, where a loop with an unreachable exit condition occurs during the parsing of the IPv6 extension header. This vulnerability can lead to a transient denial of service, potentially impacting device functionality and network connectivity across various Snapdragon platforms.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",7.5,HIGH,0.000859999970998615,false,,false,false,false,,,false,false,,2022-11-15T00:00:00.000Z,0 CVE-2022-33237,https://securityvulnerability.io/vulnerability/CVE-2022-33237,Buffer Over-read Vulnerability in Qualcomm Snapdragon Products,"This vulnerability arises from a buffer over-read in the WLAN firmware while processing the PPE threshold, impacting various Qualcomm Snapdragon products including automotive and mobile solutions. Attackers exploiting this weakness could potentially cause transient denial-of-service situations, disrupting the normal operation of affected devices.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",7.5,HIGH,0.0008900000248104334,false,,false,false,false,,,false,false,,2022-11-15T00:00:00.000Z,0 CVE-2022-25736,https://securityvulnerability.io/vulnerability/CVE-2022-25736,Denial of Service Vulnerability in Qualcomm Snapdragon Products,"A denial of service vulnerability exists in Qualcomm Snapdragon products due to an out-of-bound read that occurs while processing VHT action frames. This vulnerability affects numerous Snapdragon platforms, potentially allowing unauthorized users to disrupt the service of connected devices. Readers are advised to review the specific product bulletins and update their systems promptly to mitigate associated risks.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",7.5,HIGH,0.0008900000248104334,false,,false,false,false,,,false,false,,2022-10-19T00:00:00.000Z,0 CVE-2022-25666,https://securityvulnerability.io/vulnerability/CVE-2022-25666,Memory Corruption in Qualcomm Snapdragon Products,"A memory corruption vulnerability exists in Qualcomm's Snapdragon products due to a use-after-free error. This issue arises when multiple threads attempt to access shared resources, leading to potential exploitation. The affected products include a range of Snapdragon variants utilized in automotive, computing, consumer IoT, industrial IoT, mobile, wearable, and networking applications, making timely security patches essential for mitigating the risks associated with this vulnerability.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",6.7,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-10-19T00:00:00.000Z,0 CVE-2022-25749,https://securityvulnerability.io/vulnerability/CVE-2022-25749,Buffer Over-Read Vulnerability in Qualcomm Snapdragon Products,"A transient denial-of-service vulnerability occurs in the Qualcomm Snapdragon product line due to a buffer over-read when processing MDNS frames. This flaw can potentially disrupt service, affecting multiple Snapdragon applications across various sectors, including automotive, mobile, and IoT devices. Proper patches and system updates are crucial for mitigating this risk.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",7.5,HIGH,0.000859999970998615,false,,false,false,false,,,false,false,,2022-10-19T00:00:00.000Z,0 CVE-2022-25748,https://securityvulnerability.io/vulnerability/CVE-2022-25748,Memory Corruption Vulnerability in Snapdragon Products by Qualcomm,"A vulnerability exists in Qualcomm's Snapdragon product line, stemming from memory corruption triggered by an integer overflow during the processing of GTK frames. This flaw affects a wide range of Snapdragon variants, including those utilized in automotive, connectivity, consumer electronics, IoT, and mobile applications. Exploiting this vulnerability may enable attackers to execute malicious code or disrupt system operations, underscoring the importance of timely updates and security measures.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",9.8,CRITICAL,0.0018899999558925629,false,,false,false,false,,,false,false,,2022-10-19T00:00:00.000Z,0 CVE-2022-22062,https://securityvulnerability.io/vulnerability/CVE-2022-22062,Out-of-Bounds Read in Snapdragon Products from Qualcomm,"An out-of-bounds read vulnerability arises when improperly checking the length of data while parsing a server certificate in various Snapdragon products. This flaw affects a wide range of devices, including automotive systems, mobile devices, and consumer electronics, potentially allowing an attacker to read sensitive information beyond the allowed memory boundaries. By exploiting this vulnerability, an attacker could gain unauthorized access to critical data, impacting both user privacy and device integrity.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",8.2,HIGH,0.001339999958872795,false,,false,false,false,,,false,false,,2022-09-02T11:31:05.000Z,0 CVE-2021-35088,https://securityvulnerability.io/vulnerability/CVE-2021-35088,Out of Bound Read Vulnerability in Snapdragon Products by Qualcomm,"The vulnerability arises from improper validation of Information Element (IE) length during the parsing of SSID IEs when the channel is in Dynamic Frequency Selection (DFS) mode. This flaw could allow unauthorized access to sensitive data, posing a significant risk across various Snapdragon platforms including automotive, consumer IoT, industrial IoT, mobile, wearables, and wired infrastructure. It is essential for users of affected Snapdragon products to apply necessary patches and monitor for any related security advisories.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",8.2,HIGH,0.002460000105202198,false,,false,false,false,,,false,false,,2022-04-01T04:40:36.000Z,0 CVE-2021-1942,https://securityvulnerability.io/vulnerability/CVE-2021-1942,Memory Corruption Vulnerability in Qualcomm Snapdragon Products,"This vulnerability arises from improper handling of permissions within a shared memory region, potentially leading to memory corruption across various Qualcomm Snapdragon products. This issue could allow an attacker to exploit the permission settings, resulting in unintended access to sensitive information or system instability. Affected devices include a wide range of Snapdragon platforms utilized in automotive systems, computing, connectivity, consumer IoT, industrial applications, mobile devices, voice and music systems, wearables, and wired infrastructure and networking.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",9.3,CRITICAL,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-04-01T04:40:25.000Z,0 CVE-2021-30325,https://securityvulnerability.io/vulnerability/CVE-2021-30325,Out of Bound Access Vulnerability in Qualcomm Snapdragon Products,"This vulnerability allows for potential out of bound access to DCI resources in various Qualcomm Snapdragon products due to insufficient validation processes and resource allocation issues. Affected products include Snapdragon Auto, Snapdragon Compute, and several IoT and mobile devices, which could lead to unauthorized access to sensitive data or resources.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",6.7,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-02-11T10:40:28.000Z,0 CVE-2021-30324,https://securityvulnerability.io/vulnerability/CVE-2021-30324,Out of Bound Write Vulnerability in Snapdragon Products by Qualcomm,"A vulnerability exists in various Qualcomm Snapdragon products due to inadequate boundary checks for maximum buffer size when sending a DCI packet to a remote process. This flaw could potentially allow unauthorized access or manipulation of data, impacting the integrity and security of affected devices. This vulnerability highlights the importance of rigorous validation checks in software development to prevent exploitation.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",6.7,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-02-11T10:40:27.000Z,0 CVE-2021-30313,https://securityvulnerability.io/vulnerability/CVE-2021-30313,Race Condition Vulnerability in Snapdragon Products by Qualcomm,"This vulnerability arises from a use-after-free condition triggered by a race condition in the creation and deletion of folders across various Snapdragon platforms. This flaw can lead to potential unauthorized access or data corruption, allowing an attacker to exploit the underlying systems mainly focused on connectivity and automotive applications. Proper patching and updates are essential to mitigate the risks associated with this security flaw.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",6.7,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-01-13T11:40:30.000Z,0 CVE-2021-30351,https://securityvulnerability.io/vulnerability/CVE-2021-30351,Out of Bound Memory Access in Qualcomm Snapdragon Products,"An out of bound memory access vulnerability exists in Qualcomm's Snapdragon products due to improper validation of the number of frames processed during music playback. This flaw can potentially allow attackers to exploit buffer overflow conditions, leading to unexpected behavior or crashes in affected devices. Security updates are recommended for all users of Snapdragon-based systems to mitigate potential risks associated with this vulnerability.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",9.8,CRITICAL,0.001879999996162951,false,,false,false,false,,,false,false,,2022-01-03T07:26:13.000Z,0 CVE-2021-30337,https://securityvulnerability.io/vulnerability/CVE-2021-30337,Use After Free Vulnerability in Qualcomm Snapdragon Products,"A possible use after free vulnerability exists when the memory associated with a process shell is freed while the process initialization is still in progress. This issue affects various Qualcomm Snapdragon products including Auto, Compute, Connectivity, Consumer IoT, Industrial IoT, Mobile, Voice & Music, Wearables, and Wired Infrastructure and Networking. Attackers exploiting this vulnerability might gain unauthorized access to sensitive data or execute arbitrary code, thus compromising the integrity and confidentiality of the system.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",8.4,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-01-03T07:26:10.000Z,0 CVE-2021-30335,https://securityvulnerability.io/vulnerability/CVE-2021-30335,Improper Validation Vulnerability in Qualcomm's Snapdragon Products,"This vulnerability arises from improper validation when multiple add or update requests are processed simultaneously within various Snapdragon platforms. This could potentially lead to assertion issues in QOS requests, impacting the overall functionality and security of devices relying on Snapdragon technology.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",8.4,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-01-03T07:26:07.000Z,0 CVE-2021-30259,https://securityvulnerability.io/vulnerability/CVE-2021-30259,Out of Bound Access in Qualcomm Snapdragon Products,"This vulnerability arises from inadequate validation of function table entries across various Snapdragon products, potentially leading to unauthorized access to memory. The affected Snapdragon platforms include Automotive, Compute, Connectivity, Consumer IoT, Industrial IoT, Mobile, Voice & Music, Wearables, and Wired Infrastructure and Networking. It is crucial for users and developers to take immediate steps to assess their systems and implement available security updates to mitigate the associated risks.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2021-11-12T06:15:55.000Z,0 CVE-2021-30312,https://securityvulnerability.io/vulnerability/CVE-2021-30312,Improper Authentication Vulnerability in Qualcomm Snapdragon Products,"This vulnerability involves improper authentication of sub-frames within a multicast AMSDU frame, potentially exposing sensitive information across multiple Qualcomm Snapdragon products. Affected devices span various categories, including automotive, computing, connectivity, consumer IoT, industrial IoT, mobile, voice and music, wearables, and network infrastructure, allowing for unintentional data leaks that can compromise user privacy and data integrity.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",7.5,HIGH,0.002139999996870756,false,,false,false,false,,,false,false,,2021-10-20T06:31:52.000Z,0 CVE-2021-1974,https://securityvulnerability.io/vulnerability/CVE-2021-1974,Buffer Over Read Vulnerability in Snapdragon Products by Qualcomm,"A buffer over read vulnerability exists due to misalignment between the mapping and unmapping lengths of the IPA SMMU and WLAN SMMU. This affects various Snapdragon platforms, potentially exposing data through improper memory access. Ensuring systems using affected Snapdragon products are updated is crucial for maintaining optimal security.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",7.5,HIGH,0.0010300000431016088,false,,false,false,false,,,false,false,,2021-09-09T07:36:07.000Z,0 CVE-2021-1972,https://securityvulnerability.io/vulnerability/CVE-2021-1972,Buffer Overflow Vulnerability in Qualcomm Snapdragon Products,"This vulnerability arises from inadequate validation of device types during the peer-to-peer search process in various Qualcomm Snapdragon platforms. As a result, it could potentially allow an attacker to cause a buffer overflow, which may lead to unauthorized access or the execution of arbitrary code on affected devices. It is crucial for users and organizations leveraging Snapdragon products to implement security updates and mitigations to protect against this risk.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",9.8,CRITICAL,0.0027699999045580626,false,,false,false,false,,,false,false,,2021-09-08T11:25:46.000Z,0 CVE-2020-11301,https://securityvulnerability.io/vulnerability/CVE-2020-11301,Improper Authentication Vulnerability in Qualcomm Snapdragon Products,"The vulnerability arises from improper authentication when handling unencrypted plaintext Wi-Fi frames within an encrypted network. This flaw impacts various Qualcomm Snapdragon products, enabling potential information disclosure. Attackers may utilize this vulnerability to intercept sensitive data, exposing users to various security risks. It is essential for users and organizations leveraging affected Snapdragon technologies to remain vigilant and apply the available mitigations.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",9.1,CRITICAL,0.0018400000408291817,false,,false,false,false,,,false,false,,2021-09-08T11:25:31.000Z,0 CVE-2020-11267,https://securityvulnerability.io/vulnerability/CVE-2020-11267,Out-of-Bounds Write Vulnerability in Qualcomm Snapdragon Products,"A vulnerability exists in Qualcomm Snapdragon products that can lead to an out-of-bounds write condition when the Initialization Vector (IV) length exceeds the permitted maximum limit. This defect may allow an attacker to exploit the buffer overflow, potentially leading to unauthorized access, data corruption, or system instability. The affected devices span across various Snapdragon categories, including auto, connectivity, consumer IoT, and more, emphasizing the widespread impact of this issue. Users are encouraged to check for updates and apply necessary patches to mitigate this risk.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",8.4,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2021-06-09T06:20:20.000Z,0 CVE-2020-11250,https://securityvulnerability.io/vulnerability/CVE-2020-11250,Use After Free Vulnerability in Snapdragon Products by Qualcomm,"This vulnerability arises from a use after free condition caused by a race condition occurring when the device driver of Snapdragon products is reopened repeatedly. This issue affects a wide range of Qualcomm's Snapdragon line, including products used in automotive, IoT, mobile, voice, music, and networking applications, which could lead to unintended consequences if exploited.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",7,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2021-06-09T05:00:45.000Z,0