Vulnerability Details : CVE-2023-33090
Transient DOS while processing channel information for speaker protection v2 module in ADSP.
Vulnerability category: Denial of service
Products affected by CVE-2023-33090
- cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_xr2_5g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_865\+_5g_mobile_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_firmware:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-33090
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 7 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-33090
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
Qualcomm, Inc. | 2024-03-04 |
CWE ids for CVE-2023-33090
-
The product reads data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
-
The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.Assigned by: product-security@qualcomm.com (Secondary)
References for CVE-2023-33090
-
https://www.qualcomm.com/company/product-security/bulletins/march-2024-bulletin
Security Bulletins | Qualcomm DocumentationPatch;Vendor Advisory
Jump to