Vulnerability Details : CVE-2022-40536
Transient DOS due to improper authentication in modem while receiving plain TLB OTA request message from network.
Vulnerability category: BypassGain privilegeDenial of service
Products affected by CVE-2022-40536
- cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sm6350_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sm7225_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sm8350_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sm4350_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sm7325_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sdx57m_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sm6375_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sm8450_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sm8475_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sm4375_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcn685x-1_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcn785x-1_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcn685x-5_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcn785x-5_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sm4350-ac_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sm7250-aa_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sm7250-ab_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sm7250-ac_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sm7325-ae_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sm7350-ab_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sm7325-af_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sm8150-ac_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sm8250-ab_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sm8250-ac_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sm8350-ac_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_x70_modem-rf_system_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_7c\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sm4450_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-40536
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 23 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-40536
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
Qualcomm, Inc. |
CWE ids for CVE-2022-40536
-
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.Assigned by: product-security@qualcomm.com (Secondary)
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-40536
-
https://www.qualcomm.com/company/product-security/bulletins/june-2023-bulletin
Security Bulletins | Qualcomm DocumentationVendor Advisory
Jump to