We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-28572

Buffer Over-read in WLAN HOST



Assignerqualcomm
Reserved2023-03-17
Published2023-11-07
Updated2024-08-02

Description

Memory corruption in WLAN HOST while processing the WLAN scan descriptor list.



MEDIUM: 6.6CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-126 Buffer Over-read

Product status

Default status
unaffected

CSRB31024
affected

FastConnect 6800
affected

FastConnect 6900
affected

FastConnect 7800
affected

MDM9628
affected

MSM8996AU
affected

QAM8295P
affected

QCA6174A
affected

QCA6175A
affected

QCA6391
affected

QCA6421
affected

QCA6426
affected

QCA6431
affected

QCA6436
affected

QCA6554A
affected

QCA6564A
affected

QCA6564AU
affected

QCA6574
affected

QCA6574A
affected

QCA6574AU
affected

QCA6584AU
affected

QCA6595
affected

QCA6595AU
affected

QCA6678AQ
affected

QCA6696
affected

QCA6698AQ
affected

QCA9377
affected

QCA9379
affected

QCC2073
affected

QCC2076
affected

SA6145P
affected

SA6150P
affected

SA6155P
affected

SA8145P
affected

SA8150P
affected

SA8155P
affected

SA8195P
affected

SA8295P
affected

Snapdragon 820 Automotive Platform
affected

Snapdragon 865 5G Mobile Platform
affected

Snapdragon 865+ 5G Mobile Platform (SM8250-AB)
affected

Snapdragon 870 5G Mobile Platform (SM8250-AC)
affected

Snapdragon Auto 5G Modem-RF
affected

Snapdragon X55 5G Modem-RF System
affected

Snapdragon Auto 4G Modem
affected

SW5100
affected

SW5100P
affected

WCD9380
affected

WCD9385
affected

WCN3980
affected

WCN3988
affected

WSA8810
affected

WSA8815
affected

WSA8830
affected

WSA8835
affected

References

https://www.qualcomm.com/company/product-security/bulletins/november-2023-bulletin

cve.org CVE-2023-28572

nvd.nist.gov CVE-2023-28572

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.