We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-21657

Improper Input Validation in Audio



Assignerqualcomm
Reserved2022-12-07
Published2023-06-06
Updated2024-08-02

Description

Memoru corruption in Audio when ADSP sends input during record use case.



HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-20 Improper Input Validation

Product status

Default status
unaffected

CSRA6620
affected

CSRA6640
affected

FastConnect 6200
affected

FastConnect 6700
affected

FastConnect 6800
affected

FastConnect 6900
affected

FastConnect 7800
affected

Flight RB5 5G Platform
affected

MDM9650
affected

QAM8255P
affected

QAM8295P
affected

QAM8650P
affected

QAM8775P
affected

QCA6174A
affected

QCA6310
affected

QCA6320
affected

QCA6391
affected

QCA6426
affected

QCA6436
affected

QCA6574
affected

QCA6574A
affected

QCA6574AU
affected

QCA6595
affected

QCA6595AU
affected

QCA6696
affected

QCA6698AQ
affected

QCA6797AQ
affected

QCA9377
affected

QCM2290
affected

QCM4290
affected

QCM4325
affected

QCM6490
affected

QCN9011
affected

QCN9012
affected

QCS2290
affected

QCS410
affected

QCS4290
affected

QCS610
affected

QCS6490
affected

QCS8250
affected

QCS8550
affected

QRB5165M
affected

QRB5165N
affected

Qualcomm 215 Mobile Platform
affected

Robotics RB5 Platform
affected

SA4150P
affected

SA4155P
affected

SA6145P
affected

SA6150P
affected

SA6155P
affected

SA8145P
affected

SA8150P
affected

SA8155P
affected

SA8195P
affected

SA8255P
affected

SA8295P
affected

SD660
affected

SD835
affected

SD865 5G
affected

SD888
affected

SDM429W
affected

SG4150P
affected

SM4125
affected

SM7250P
affected

SM7315
affected

SM7325P
affected

Smart Audio 400 Platform
affected

Snapdragon 4 Gen 1 Mobile Platform
affected

Snapdragon 429 Mobile Platform
affected

Snapdragon 439 Mobile Platform
affected

Snapdragon 460 Mobile Platform
affected

Snapdragon 480 5G Mobile Platform
affected

Snapdragon 480+ 5G Mobile Platform (SM4350-AC)
affected

Snapdragon 660 Mobile Platform
affected

Snapdragon 662 Mobile Platform
affected

Snapdragon 680 4G Mobile Platform
affected

Snapdragon 685 4G Mobile Platform (SM6225-AD)
affected

Snapdragon 690 5G Mobile Platform
affected

Snapdragon 695 5G Mobile Platform
affected

Snapdragon 750G 5G Mobile Platform
affected

Snapdragon 765 5G Mobile Platform (SM7250-AA)
affected

Snapdragon 765G 5G Mobile Platform (SM7250-AB)
affected

Snapdragon 768G 5G Mobile Platform (SM7250-AC)
affected

Snapdragon 778G 5G Mobile Platform
affected

Snapdragon 778G+ 5G Mobile Platform (SM7325-AE)
affected

Snapdragon 780G 5G Mobile Platform
affected

Snapdragon 782G Mobile Platform (SM7325-AF)
affected

Snapdragon 7c+ Gen 3 Compute
affected

Snapdragon 820 Automotive Platform
affected

Snapdragon 835 Mobile PC Platform
affected

Snapdragon 865 5G Mobile Platform
affected

Snapdragon 865+ 5G Mobile Platform (SM8250-AB)
affected

Snapdragon 870 5G Mobile Platform (SM8250-AC)
affected

Snapdragon 888 5G Mobile Platform
affected

Snapdragon 888+ 5G Mobile Platform (SM8350-AC)
affected

Snapdragon Auto 5G Modem-RF
affected

Snapdragon X12 LTE Modem
affected

Snapdragon X55 5G Modem-RF System
affected

Snapdragon XR2 5G Platform
affected

Snapdragon XR2+ Gen 1 Platform
affected

SXR2130
affected

WCD9326
affected

WCD9335
affected

WCD9340
affected

WCD9341
affected

WCD9370
affected

WCD9375
affected

WCD9380
affected

WCD9385
affected

WCN3615
affected

WCN3620
affected

WCN3660B
affected

WCN3680B
affected

WCN3910
affected

WCN3950
affected

WCN3980
affected

WCN3988
affected

WCN3990
affected

WCN6740
affected

WSA8810
affected

WSA8815
affected

WSA8830
affected

WSA8835
affected

References

https://www.qualcomm.com/company/product-security/bulletins/june-2023-bulletin

cve.org CVE-2023-21657

nvd.nist.gov CVE-2023-21657

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.