Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-49847 (GCVE-0-2024-49847)
Vulnerability from cvelistv5 – Published: 2025-05-06 08:32 – Updated: 2025-05-06 16:59- CWE-126 - Buffer Over-read
| Vendor | Product | Version | |
|---|---|---|---|
| Qualcomm, Inc. | Snapdragon |
Affected:
AR8035
Affected: FastConnect 7800 Affected: QCA6574AU Affected: QCA6584AU Affected: QCA6595AU Affected: QCA6678AQ Affected: QCA6688AQ Affected: QCA6698AQ Affected: QCA8081 Affected: QCA8337 Affected: QCC710 Affected: QCN6224 Affected: QCN6274 Affected: QFW7114 Affected: QFW7124 Affected: SDM429W Affected: SDX80M Affected: SM7675 Affected: SM7675P Affected: SM8635 Affected: SM8635P Affected: SM8650Q Affected: SM8750 Affected: SM8750P Affected: Snapdragon 429 Mobile Platform Affected: Snapdragon 8 Gen 3 Mobile Platform Affected: Snapdragon Auto 5G Modem-RF Gen 2 Affected: Snapdragon Wear 4100+ Platform Affected: Snapdragon X72 5G Modem-RF System Affected: Snapdragon X75 5G Modem-RF System Affected: WCD9340 Affected: WCD9370 Affected: WCD9375 Affected: WCD9390 Affected: WCD9395 Affected: WCN3610 Affected: WCN3620 Affected: WCN3660B Affected: WCN3680B Affected: WCN3980 Affected: WCN6755 Affected: WSA8830 Affected: WSA8832 Affected: WSA8835 Affected: WSA8840 Affected: WSA8845 Affected: WSA8845H |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-49847",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-06T16:56:15.782429Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-06T16:59:15.241Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Snapdragon Auto",
"Snapdragon MDM",
"Snapdragon Mobile",
"Snapdragon WBC",
"Snapdragon Wearables"
],
"product": "Snapdragon",
"vendor": "Qualcomm, Inc.",
"versions": [
{
"status": "affected",
"version": "AR8035"
},
{
"status": "affected",
"version": "FastConnect 7800"
},
{
"status": "affected",
"version": "QCA6574AU"
},
{
"status": "affected",
"version": "QCA6584AU"
},
{
"status": "affected",
"version": "QCA6595AU"
},
{
"status": "affected",
"version": "QCA6678AQ"
},
{
"status": "affected",
"version": "QCA6688AQ"
},
{
"status": "affected",
"version": "QCA6698AQ"
},
{
"status": "affected",
"version": "QCA8081"
},
{
"status": "affected",
"version": "QCA8337"
},
{
"status": "affected",
"version": "QCC710"
},
{
"status": "affected",
"version": "QCN6224"
},
{
"status": "affected",
"version": "QCN6274"
},
{
"status": "affected",
"version": "QFW7114"
},
{
"status": "affected",
"version": "QFW7124"
},
{
"status": "affected",
"version": "SDM429W"
},
{
"status": "affected",
"version": "SDX80M"
},
{
"status": "affected",
"version": "SM7675"
},
{
"status": "affected",
"version": "SM7675P"
},
{
"status": "affected",
"version": "SM8635"
},
{
"status": "affected",
"version": "SM8635P"
},
{
"status": "affected",
"version": "SM8650Q"
},
{
"status": "affected",
"version": "SM8750"
},
{
"status": "affected",
"version": "SM8750P"
},
{
"status": "affected",
"version": "Snapdragon 429 Mobile Platform"
},
{
"status": "affected",
"version": "Snapdragon 8 Gen 3 Mobile Platform"
},
{
"status": "affected",
"version": "Snapdragon Auto 5G Modem-RF Gen 2"
},
{
"status": "affected",
"version": "Snapdragon Wear 4100+ Platform"
},
{
"status": "affected",
"version": "Snapdragon X72 5G Modem-RF System"
},
{
"status": "affected",
"version": "Snapdragon X75 5G Modem-RF System"
},
{
"status": "affected",
"version": "WCD9340"
},
{
"status": "affected",
"version": "WCD9370"
},
{
"status": "affected",
"version": "WCD9375"
},
{
"status": "affected",
"version": "WCD9390"
},
{
"status": "affected",
"version": "WCD9395"
},
{
"status": "affected",
"version": "WCN3610"
},
{
"status": "affected",
"version": "WCN3620"
},
{
"status": "affected",
"version": "WCN3660B"
},
{
"status": "affected",
"version": "WCN3680B"
},
{
"status": "affected",
"version": "WCN3980"
},
{
"status": "affected",
"version": "WCN6755"
},
{
"status": "affected",
"version": "WSA8830"
},
{
"status": "affected",
"version": "WSA8832"
},
{
"status": "affected",
"version": "WSA8835"
},
{
"status": "affected",
"version": "WSA8840"
},
{
"status": "affected",
"version": "WSA8845"
},
{
"status": "affected",
"version": "WSA8845H"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Transient DOS while processing of a registration acceptance OTA due to incorrect ciphering key data IE."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-126",
"description": "CWE-126 Buffer Over-read",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-05-06T08:32:24.772Z",
"orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f",
"shortName": "qualcomm"
},
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2025-bulletin.html"
}
],
"title": "Buffer Over-read in Multi-Mode Call Processor"
}
},
"cveMetadata": {
"assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f",
"assignerShortName": "qualcomm",
"cveId": "CVE-2024-49847",
"datePublished": "2025-05-06T08:32:24.772Z",
"dateReserved": "2024-10-20T17:18:43.218Z",
"dateUpdated": "2025-05-06T16:59:15.241Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2024-49847",
"date": "2026-05-19",
"epss": "0.00351",
"percentile": "0.57684"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-49847\",\"sourceIdentifier\":\"product-security@qualcomm.com\",\"published\":\"2025-05-06T09:15:22.680\",\"lastModified\":\"2025-05-09T19:10:19.347\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Transient DOS while processing of a registration acceptance OTA due to incorrect ciphering key data IE.\"},{\"lang\":\"es\",\"value\":\"DOS transitorio durante el procesamiento de una aceptaci\u00f3n de registro OTA debido a datos de clave de cifrado incorrectos IE.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"product-security@qualcomm.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"product-security@qualcomm.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-126\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C88B9C86-2E8E-4DCE-A30C-02977CC00F00\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE473A5A-5CFC-4F08-A173-30717F8BD0D7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"638DBC7F-456F-487D-BED2-2214DFF8BEE2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D527E2B1-2A46-4FBA-9F7A-F5543677C8FB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8374DDB3-D484-4141-AE0C-42333D2721F6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3DDA896-576C-44B8-85B6-F71F473F776B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51A87BDA-5B24-4212-BAB3-D2BBB2F4162E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"288F637F-22F8-47CF-B67F-C798A730A1BD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0996EA3-1C92-4933-BE34-9CF625E59FE7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D001127D-8160-42F0-B8B9-2FAA2976B530\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qca6678aq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9EB615F-FD4C-450B-AB25-E936FD9816C4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFBD264F-F24A-4CDD-B316-9514A61B91E7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qca6688aq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94CC5BC4-011D-4D2B-8891-97FBF61FD783\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3F7853D-09EE-476F-B48D-BB30AEB4A67D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D1C53DC-D2F3-4C92-9725-9A85340AF026\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED0585FF-E390-46E8-8701-70964A4057BB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FA8F9DA-1386-4961-B9B2-484E4347852A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"117289C8-7484-4EAE-8F35-A25768F00EED\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A75D017-032F-4369-917C-567EE2A809F2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"107F0423-608C-404D-B58B-616A6494418F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F4362D2-30A3-4388-ABB6-293878AD7036\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB6AE9A7-386A-473B-9BD5-DA37B1E696C5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88376C1D-AC4D-4EB0-AF6A-274D020F5859\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E15BA4B4-C97F-45C0-A4AD-7E46387F19A6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7456782E-B6CE-42ED-A51E-39907120E28B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"637BF4DF-BB40-479F-B696-6AD9D4B35D64\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D72C4CE0-AB59-4652-854F-94C9998F2712\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98720774-11B8-4B4B-BC73-D4DA84E07F78\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7E52771-4FB7-45DB-A349-4DD911F53752\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72F6CE39-9299-4FC3-BC48-11F79034F2E4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sdx80m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CAE7C89-05DD-4083-9DCE-68E02F77EA69\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sdx80m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA282402-64E3-40F7-8A26-B0922777510F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sm7675_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"012C20A8-3F48-48DD-9A77-65C9CB1F6C30\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sm7675:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE992A86-36BC-40E3-8E96-6542560BE8EC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sm7675p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B46F132-4049-40D0-8351-C1C6FD2B47A0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sm7675p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1846514C-1F95-4568-98DE-C57214401841\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65865EE9-59C0-498F-A4C5-EC00D4642603\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sm8635:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE02AB51-6FB6-4727-999B-A7466CEDC534\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sm8635p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88F63D90-4BFC-4EFA-8B74-7A5027A7052D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sm8635p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20EB529B-6B9F-464F-A98B-A8ABE0F01ADB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sm8650q_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CAA8D9D-0238-4223-8F7B-134ECBB6FA05\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sm8650q:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8A722B8-E1E4-43B4-8882-591CE8C5C166\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sm8750_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84641A8E-A93C-48C1-86AC-193951BA4D78\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sm8750:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74169A4C-0247-4719-887E-BBFB36B04F07\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:sm8750p_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D8ABDBF-BABC-4219-8A18-BDFC8C826B1F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:sm8750p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"685D81D0-7E95-4DBA-A05B-7C708A5DFDF0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:snapdragon_429_mobile_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B29ED8BE-FB30-4E28-B080-7970BBCF67CF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:snapdragon_429_mobile:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1C36217-A66F-445C-8B5C-73E6096308DA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA40FA0B-F9F1-48D4-B68A-ECD7241A5F39\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:snapdragon_8_gen_3_mobile:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B00530E-070B-4832-AFF0-535D4A1A6F85\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2D789BC-43F5-40FB-A191-163C01BA5FBE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:snapdragon_wear_4100\\\\+_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA1AEB2C-F420-46A6-8804-A35870153BAA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:snapdragon_wear_4100\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20746D0A-8D06-4483-AE84-2E0232259171\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:snapdragon_x72_5g_modem-rf_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E674785-B392-4007-A4AE-DACF2745704F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:snapdragon_x72_5g_modem-rf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C48D223-A41F-4D49-B526-4695DD93349A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D82AAC94-6D8C-4EB7-ADDF-544AFCA809D6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A169176-2CBF-44B6-B4C8-C93D72E6D77D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94D2BDF1-764C-48BA-8944-3275E8768078\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1295D869-F4DD-4766-B4AA-3513752F43B4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B98784DC-3143-4D38-AD28-DBBDCCAB4272\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34143ABA-7D09-429F-A65C-3A33438BF62C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"896F1C04-9957-440F-BF01-C3772CC3B3DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A90555EB-47A7-4717-92D5-35B561825F06\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"699056F6-1517-4F25-AE07-4FFCF6923B9F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4C023D2-6FF5-4FFC-B9F2-895979166580\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAFD64E7-3F13-4DCA-8C46-6E8FE0C6F798\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"044A14FB-64F6-4200-AC85-8DC91C31BD16\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99CA230-0694-4898-A06E-9C522CCB86CE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62B00662-139A-4E36-98FA-D4F7D101D4AB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB37B5DB-2493-4082-B2BF-60385B7E027C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BCD2FE2-11F2-4B2A-9BD7-EB26718139DA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0755F669-6D7E-454A-95DA-D60FA0696FD9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE861CE7-B530-4698-A9BC-43A159647BF2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C6E9038-9B18-4958-BE1E-215901C9B4B2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B36D3274-F8D0-49C5-A6D5-95F5DC6D1950\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BC386D9-3D2B-40FA-A2D9-199BB138F46A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wcn6755:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"133FFD9F-FA09-4801-939B-AD1D507BE5FE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11B69595-E488-4590-A150-CE5BE08B5E13\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF680174-5FA6-47D9-8EAB-CC2A37A7BD42\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ACAD26E-B79E-4659-91A5-D301281F7D36\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F80BC68E-7476-4A40-9F48-53722FE9A5BF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B36F4B2-BAA3-45AD-9967-0EB482C99708\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA33DE15-C177-43B3-AD50-FF797753D12E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE1A5841-5BCB-4033-ACB9-23F3FCA65309\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B47BF35-3AA0-4667-842E-19B0FE30BF3C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A071672-9405-4418-9141-35CEADBB65AF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB7CF473-8B25-4851-91F2-1BD693CCDC85\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91E591F2-8F72-4A5A-9264-2742EB2DABDA\"}]}]}],\"references\":[{\"url\":\"https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2025-bulletin.html\",\"source\":\"product-security@qualcomm.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-49847\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-06T16:56:15.782429Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-06T16:56:33.050Z\"}}], \"cna\": {\"title\": \"Buffer Over-read in Multi-Mode Call Processor\", \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Qualcomm, Inc.\", \"product\": \"Snapdragon\", \"versions\": [{\"status\": \"affected\", \"version\": \"AR8035\"}, {\"status\": \"affected\", \"version\": \"FastConnect 7800\"}, {\"status\": \"affected\", \"version\": \"QCA6574AU\"}, {\"status\": \"affected\", \"version\": \"QCA6584AU\"}, {\"status\": \"affected\", \"version\": \"QCA6595AU\"}, {\"status\": \"affected\", \"version\": \"QCA6678AQ\"}, {\"status\": \"affected\", \"version\": \"QCA6688AQ\"}, {\"status\": \"affected\", \"version\": \"QCA6698AQ\"}, {\"status\": \"affected\", \"version\": \"QCA8081\"}, {\"status\": \"affected\", \"version\": \"QCA8337\"}, {\"status\": \"affected\", \"version\": \"QCC710\"}, {\"status\": \"affected\", \"version\": \"QCN6224\"}, {\"status\": \"affected\", \"version\": \"QCN6274\"}, {\"status\": \"affected\", \"version\": \"QFW7114\"}, {\"status\": \"affected\", \"version\": \"QFW7124\"}, {\"status\": \"affected\", \"version\": \"SDM429W\"}, {\"status\": \"affected\", \"version\": \"SDX80M\"}, {\"status\": \"affected\", \"version\": \"SM7675\"}, {\"status\": \"affected\", \"version\": \"SM7675P\"}, {\"status\": \"affected\", \"version\": \"SM8635\"}, {\"status\": \"affected\", \"version\": \"SM8635P\"}, {\"status\": \"affected\", \"version\": \"SM8650Q\"}, {\"status\": \"affected\", \"version\": \"SM8750\"}, {\"status\": \"affected\", \"version\": \"SM8750P\"}, {\"status\": \"affected\", \"version\": \"Snapdragon 429 Mobile Platform\"}, {\"status\": \"affected\", \"version\": \"Snapdragon 8 Gen 3 Mobile Platform\"}, {\"status\": \"affected\", \"version\": \"Snapdragon Auto 5G Modem-RF Gen 2\"}, {\"status\": \"affected\", \"version\": \"Snapdragon Wear 4100+ Platform\"}, {\"status\": \"affected\", \"version\": \"Snapdragon X72 5G Modem-RF System\"}, {\"status\": \"affected\", \"version\": \"Snapdragon X75 5G Modem-RF System\"}, {\"status\": \"affected\", \"version\": \"WCD9340\"}, {\"status\": \"affected\", \"version\": \"WCD9370\"}, {\"status\": \"affected\", \"version\": \"WCD9375\"}, {\"status\": \"affected\", \"version\": \"WCD9390\"}, {\"status\": \"affected\", \"version\": \"WCD9395\"}, {\"status\": \"affected\", \"version\": \"WCN3610\"}, {\"status\": \"affected\", \"version\": \"WCN3620\"}, {\"status\": \"affected\", \"version\": \"WCN3660B\"}, {\"status\": \"affected\", \"version\": \"WCN3680B\"}, {\"status\": \"affected\", \"version\": \"WCN3980\"}, {\"status\": \"affected\", \"version\": \"WCN6755\"}, {\"status\": \"affected\", \"version\": \"WSA8830\"}, {\"status\": \"affected\", \"version\": \"WSA8832\"}, {\"status\": \"affected\", \"version\": \"WSA8835\"}, {\"status\": \"affected\", \"version\": \"WSA8840\"}, {\"status\": \"affected\", \"version\": \"WSA8845\"}, {\"status\": \"affected\", \"version\": \"WSA8845H\"}], \"platforms\": [\"Snapdragon Auto\", \"Snapdragon MDM\", \"Snapdragon Mobile\", \"Snapdragon WBC\", \"Snapdragon Wearables\"], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2025-bulletin.html\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Transient DOS while processing of a registration acceptance OTA due to incorrect ciphering key data IE.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-126\", \"description\": \"CWE-126 Buffer Over-read\"}]}], \"providerMetadata\": {\"orgId\": \"2cfc7d3e-20d3-47ac-8db7-1b7285aff15f\", \"shortName\": \"qualcomm\", \"dateUpdated\": \"2025-05-06T08:32:24.772Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-49847\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-06T16:59:15.241Z\", \"dateReserved\": \"2024-10-20T17:18:43.218Z\", \"assignerOrgId\": \"2cfc7d3e-20d3-47ac-8db7-1b7285aff15f\", \"datePublished\": \"2025-05-06T08:32:24.772Z\", \"assignerShortName\": \"qualcomm\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2025-AVI-0371
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Android. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Google indique que la vulnérabilité CVE-2025-27363 est activement exploitée.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Android versions ant\u00e9rieures \u00e0 13, 14 et 15 avant le correctif du 5 mai 2025",
"product": {
"name": "Android",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-49739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49739"
},
{
"name": "CVE-2025-26428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26428"
},
{
"name": "CVE-2025-26429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26429"
},
{
"name": "CVE-2024-12577",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12577"
},
{
"name": "CVE-2025-26425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26425"
},
{
"name": "CVE-2024-49835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49835"
},
{
"name": "CVE-2025-26424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26424"
},
{
"name": "CVE-2025-21459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21459"
},
{
"name": "CVE-2024-47900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47900"
},
{
"name": "CVE-2024-47891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47891"
},
{
"name": "CVE-2025-26422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26422"
},
{
"name": "CVE-2024-34739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34739"
},
{
"name": "CVE-2025-0077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0077"
},
{
"name": "CVE-2024-49846",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49846"
},
{
"name": "CVE-2025-26442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26442"
},
{
"name": "CVE-2025-21453",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21453"
},
{
"name": "CVE-2024-49841",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49841"
},
{
"name": "CVE-2025-26421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26421"
},
{
"name": "CVE-2024-52939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52939"
},
{
"name": "CVE-2024-45580",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45580"
},
{
"name": "CVE-2025-26436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26436"
},
{
"name": "CVE-2025-26430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26430"
},
{
"name": "CVE-2024-49847",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49847"
},
{
"name": "CVE-2024-46974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46974"
},
{
"name": "CVE-2025-26435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26435"
},
{
"name": "CVE-2025-26423",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26423"
},
{
"name": "CVE-2025-21468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21468"
},
{
"name": "CVE-2025-22425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22425"
},
{
"name": "CVE-2024-49845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49845"
},
{
"name": "CVE-2025-26420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26420"
},
{
"name": "CVE-2024-47896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47896"
},
{
"name": "CVE-2024-46975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46975"
},
{
"name": "CVE-2023-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21342"
},
{
"name": "CVE-2025-21467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21467"
},
{
"name": "CVE-2025-26444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26444"
},
{
"name": "CVE-2024-49842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49842"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2025-0072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0072"
},
{
"name": "CVE-2025-0087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0087"
},
{
"name": "CVE-2023-35657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35657"
},
{
"name": "CVE-2025-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0427"
},
{
"name": "CVE-2025-26440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26440"
},
{
"name": "CVE-2025-20666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20666"
},
{
"name": "CVE-2025-26438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26438"
},
{
"name": "CVE-2025-26427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26427"
},
{
"name": "CVE-2025-26426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26426"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0371",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-05-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Android. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n\nGoogle indique que la vuln\u00e9rabilit\u00e9 CVE-2025-27363 est activement exploit\u00e9e.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Android",
"vendor_advisories": [
{
"published_at": "2025-05-05",
"title": "Bulletin de s\u00e9curit\u00e9 Google Android",
"url": "https://source.android.com/docs/security/bulletin/2025-05-01?hl=fr"
}
]
}
CERTFR-2025-AVI-0371
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Android. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Google indique que la vulnérabilité CVE-2025-27363 est activement exploitée.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Android versions ant\u00e9rieures \u00e0 13, 14 et 15 avant le correctif du 5 mai 2025",
"product": {
"name": "Android",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-49739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49739"
},
{
"name": "CVE-2025-26428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26428"
},
{
"name": "CVE-2025-26429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26429"
},
{
"name": "CVE-2024-12577",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12577"
},
{
"name": "CVE-2025-26425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26425"
},
{
"name": "CVE-2024-49835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49835"
},
{
"name": "CVE-2025-26424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26424"
},
{
"name": "CVE-2025-21459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21459"
},
{
"name": "CVE-2024-47900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47900"
},
{
"name": "CVE-2024-47891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47891"
},
{
"name": "CVE-2025-26422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26422"
},
{
"name": "CVE-2024-34739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34739"
},
{
"name": "CVE-2025-0077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0077"
},
{
"name": "CVE-2024-49846",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49846"
},
{
"name": "CVE-2025-26442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26442"
},
{
"name": "CVE-2025-21453",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21453"
},
{
"name": "CVE-2024-49841",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49841"
},
{
"name": "CVE-2025-26421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26421"
},
{
"name": "CVE-2024-52939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52939"
},
{
"name": "CVE-2024-45580",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45580"
},
{
"name": "CVE-2025-26436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26436"
},
{
"name": "CVE-2025-26430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26430"
},
{
"name": "CVE-2024-49847",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49847"
},
{
"name": "CVE-2024-46974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46974"
},
{
"name": "CVE-2025-26435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26435"
},
{
"name": "CVE-2025-26423",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26423"
},
{
"name": "CVE-2025-21468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21468"
},
{
"name": "CVE-2025-22425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22425"
},
{
"name": "CVE-2024-49845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49845"
},
{
"name": "CVE-2025-26420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26420"
},
{
"name": "CVE-2024-47896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47896"
},
{
"name": "CVE-2024-46975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46975"
},
{
"name": "CVE-2023-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21342"
},
{
"name": "CVE-2025-21467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21467"
},
{
"name": "CVE-2025-26444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26444"
},
{
"name": "CVE-2024-49842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49842"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2025-0072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0072"
},
{
"name": "CVE-2025-0087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0087"
},
{
"name": "CVE-2023-35657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35657"
},
{
"name": "CVE-2025-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0427"
},
{
"name": "CVE-2025-26440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26440"
},
{
"name": "CVE-2025-20666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20666"
},
{
"name": "CVE-2025-26438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26438"
},
{
"name": "CVE-2025-26427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26427"
},
{
"name": "CVE-2025-26426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26426"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0371",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-05-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Android. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n\nGoogle indique que la vuln\u00e9rabilit\u00e9 CVE-2025-27363 est activement exploit\u00e9e.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Android",
"vendor_advisories": [
{
"published_at": "2025-05-05",
"title": "Bulletin de s\u00e9curit\u00e9 Google Android",
"url": "https://source.android.com/docs/security/bulletin/2025-05-01?hl=fr"
}
]
}
FKIE_CVE-2024-49847
Vulnerability from fkie_nvd - Published: 2025-05-06 09:15 - Updated: 2025-05-09 19:10{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D001127D-8160-42F0-B8B9-2FAA2976B530",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:qca6678aq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9EB615F-FD4C-450B-AB25-E936FD9816C4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AFBD264F-F24A-4CDD-B316-9514A61B91E7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:qca6688aq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94CC5BC4-011D-4D2B-8891-97FBF61FD783",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
"matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*",
"matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB6AE9A7-386A-473B-9BD5-DA37B1E696C5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E15BA4B4-C97F-45C0-A4AD-7E46387F19A6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*",
"matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7E52771-4FB7-45DB-A349-4DD911F53752",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72F6CE39-9299-4FC3-BC48-11F79034F2E4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sdx80m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7CAE7C89-05DD-4083-9DCE-68E02F77EA69",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sdx80m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA282402-64E3-40F7-8A26-B0922777510F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sm7675_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "012C20A8-3F48-48DD-9A77-65C9CB1F6C30",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sm7675:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE992A86-36BC-40E3-8E96-6542560BE8EC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sm7675p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B46F132-4049-40D0-8351-C1C6FD2B47A0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sm7675p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1846514C-1F95-4568-98DE-C57214401841",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65865EE9-59C0-498F-A4C5-EC00D4642603",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sm8635:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE02AB51-6FB6-4727-999B-A7466CEDC534",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sm8635p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88F63D90-4BFC-4EFA-8B74-7A5027A7052D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sm8635p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20EB529B-6B9F-464F-A98B-A8ABE0F01ADB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sm8650q_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CAA8D9D-0238-4223-8F7B-134ECBB6FA05",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sm8650q:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D8A722B8-E1E4-43B4-8882-591CE8C5C166",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sm8750_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84641A8E-A93C-48C1-86AC-193951BA4D78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sm8750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74169A4C-0247-4719-887E-BBFB36B04F07",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sm8750p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D8ABDBF-BABC-4219-8A18-BDFC8C826B1F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sm8750p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "685D81D0-7E95-4DBA-A05B-7C708A5DFDF0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:snapdragon_429_mobile_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B29ED8BE-FB30-4E28-B080-7970BBCF67CF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:snapdragon_429_mobile:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1C36217-A66F-445C-8B5C-73E6096308DA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA40FA0B-F9F1-48D4-B68A-ECD7241A5F39",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_3_mobile:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B00530E-070B-4832-AFF0-535D4A1A6F85",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2D789BC-43F5-40FB-A191-163C01BA5FBE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_4100\\+_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA1AEB2C-F420-46A6-8804-A35870153BAA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:snapdragon_wear_4100\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20746D0A-8D06-4483-AE84-2E0232259171",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:snapdragon_x72_5g_modem-rf_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E674785-B392-4007-A4AE-DACF2745704F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:snapdragon_x72_5g_modem-rf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C48D223-A41F-4D49-B526-4695DD93349A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D82AAC94-6D8C-4EB7-ADDF-544AFCA809D6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6A169176-2CBF-44B6-B4C8-C93D72E6D77D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A90555EB-47A7-4717-92D5-35B561825F06",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4C023D2-6FF5-4FFC-B9F2-895979166580",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DAFD64E7-3F13-4DCA-8C46-6E8FE0C6F798",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*",
"matchCriteriaId": "044A14FB-64F6-4200-AC85-8DC91C31BD16",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D99CA230-0694-4898-A06E-9C522CCB86CE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62B00662-139A-4E36-98FA-D4F7D101D4AB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6BCD2FE2-11F2-4B2A-9BD7-EB26718139DA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0755F669-6D7E-454A-95DA-D60FA0696FD9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE861CE7-B530-4698-A9BC-43A159647BF2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BC386D9-3D2B-40FA-A2D9-199BB138F46A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcn6755:-:*:*:*:*:*:*:*",
"matchCriteriaId": "133FFD9F-FA09-4801-939B-AD1D507BE5FE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Transient DOS while processing of a registration acceptance OTA due to incorrect ciphering key data IE."
},
{
"lang": "es",
"value": "DOS transitorio durante el procesamiento de una aceptaci\u00f3n de registro OTA debido a datos de clave de cifrado incorrectos IE."
}
],
"id": "CVE-2024-49847",
"lastModified": "2025-05-09T19:10:19.347",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "product-security@qualcomm.com",
"type": "Secondary"
}
]
},
"published": "2025-05-06T09:15:22.680",
"references": [
{
"source": "product-security@qualcomm.com",
"tags": [
"Vendor Advisory"
],
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2025-bulletin.html"
}
],
"sourceIdentifier": "product-security@qualcomm.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-126"
}
],
"source": "product-security@qualcomm.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-C98F-FQ4V-V6R3
Vulnerability from github – Published: 2025-05-06 09:31 – Updated: 2025-05-06 09:31Transient DOS while processing of a registration acceptance OTA due to incorrect ciphering key data IE.
{
"affected": [],
"aliases": [
"CVE-2024-49847"
],
"database_specific": {
"cwe_ids": [
"CWE-125",
"CWE-126"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-05-06T09:15:22Z",
"severity": "HIGH"
},
"details": "Transient DOS while processing of a registration acceptance OTA due to incorrect ciphering key data IE.",
"id": "GHSA-c98f-fq4v-v6r3",
"modified": "2025-05-06T09:31:33Z",
"published": "2025-05-06T09:31:33Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-49847"
},
{
"type": "WEB",
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2025-bulletin.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
NCSC-2025-0143
Vulnerability from csaf_ncscnl - Published: 2025-05-07 11:19 - Updated: 2025-05-07 11:19| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:android/15
Android / System
|
vers:android/15 | ||
|
vers:android/14
Android / System
|
vers:android/14 | ||
|
vers:android/13
Android / System
|
vers:android/13 | ||
|
vers:android/12
Android / Framework
|
vers:android/12 | ||
|
vers:unknown/*
Samsung / Samsung Mobile
|
cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*
|
vers:unknown/* |
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Google heeft kwetsbaarheden verholpen in Android. ",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden bevinden zich onderandere in de Keymaster trustlet, SmartManagerCN en FreeType. De kwetsbaarheden stellen een lokale aanvaller in staat om code uit te voeren op het apparaat en code uit te voeren met de rechten van SmartManagerCN. Google meldt informatie te hebben ontvangen dat de kwetsbaarheid met kenmerk CVE-2025-27363 beperkt en gericht als zeroday is misbruikt. Deze kwetsbaarheid bevindt zich in FreeType en stelt een kwaadwillende in staat code uit te voeren middels een heap buffer overflow.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Google heeft updates uitgebracht om de kwetsbaarheden te verhelpen in Android 12,13, 14 en 15. Samsung heeft updates uitgebracht om de voor Samsung relevante kwetsbaarheden te verhelpen in Samsung Mobile devices. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "general",
"text": "Improper Handling of Insufficient Privileges",
"title": "CWE-274"
},
{
"category": "general",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "Use of Out-of-range Pointer Offset",
"title": "CWE-823"
},
{
"category": "general",
"text": "Privilege Context Switching Error",
"title": "CWE-270"
},
{
"category": "general",
"text": "Incorrect Privilege Assignment",
"title": "CWE-266"
},
{
"category": "general",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "general",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Source - android",
"url": "https://source.android.com/docs/security/bulletin/2025-05-01"
},
{
"category": "external",
"summary": "Reference - certbundde; cveprojectv5; nvd",
"url": "https://source.android.com/docs/security/bulletin/2025-05-01"
},
{
"category": "external",
"summary": "Reference - cveprojectv5; ncscclear",
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2025\u0026month=03"
}
],
"title": "Kwetsbaarheden verholpen in Google Android en Samsung Mobile",
"tracking": {
"current_release_date": "2025-05-07T11:19:50.517092Z",
"generator": {
"date": "2025-02-25T15:15:00Z",
"engine": {
"name": "V.A.",
"version": "1.0"
}
},
"id": "NCSC-2025-0143",
"initial_release_date": "2025-05-07T11:19:50.517092Z",
"revision_history": [
{
"date": "2025-05-07T11:19:50.517092Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:android/15",
"product": {
"name": "vers:android/15",
"product_id": "CSAFPID-1657641"
}
},
{
"category": "product_version_range",
"name": "vers:android/14",
"product": {
"name": "vers:android/14",
"product_id": "CSAFPID-1657640"
}
},
{
"category": "product_version_range",
"name": "vers:android/13",
"product": {
"name": "vers:android/13",
"product_id": "CSAFPID-1657639"
}
}
],
"category": "product_name",
"name": "System"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:android/12",
"product": {
"name": "vers:android/12",
"product_id": "CSAFPID-1657628"
}
}
],
"category": "product_name",
"name": "Framework"
}
],
"category": "vendor",
"name": "Android"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-899411",
"product_identification_helper": {
"cpe": "cpe:2.3:a:samsung_mobile:samsung_pay:-:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Samsung Mobile"
}
],
"category": "vendor",
"name": "Samsung"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-26430",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26430",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26430.json"
}
],
"title": "CVE-2025-26430"
},
{
"cve": "CVE-2025-26435",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26435",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26435.json"
}
],
"title": "CVE-2025-26435"
},
{
"cve": "CVE-2025-26436",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26436",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26436.json"
}
],
"title": "CVE-2025-26436"
},
{
"cve": "CVE-2025-26438",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26438",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26438.json"
}
],
"title": "CVE-2025-26438"
},
{
"cve": "CVE-2025-26440",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26440",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26440.json"
}
],
"title": "CVE-2025-26440"
},
{
"cve": "CVE-2025-26442",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26442",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26442.json"
}
],
"title": "CVE-2025-26442"
},
{
"cve": "CVE-2025-26444",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26444",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26444.json"
}
],
"title": "CVE-2025-26444"
},
{
"cve": "CVE-2025-27363",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27363",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27363.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C/CR:H/IR:H/AR:H/MAV:N/MAC:L/MPR:N/MUI:N/MS:U/MC:H/MI:H/MA:H",
"version": "3.1"
},
"products": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
}
],
"title": "CVE-2025-27363"
},
{
"cve": "CVE-2025-0072",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-0072",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-0072.json"
}
],
"title": "CVE-2025-0072"
},
{
"cve": "CVE-2025-0077",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-0077",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-0077.json"
}
],
"title": "CVE-2025-0077"
},
{
"cve": "CVE-2025-0087",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-0087",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-0087.json"
}
],
"title": "CVE-2025-0087"
},
{
"cve": "CVE-2025-0427",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-0427",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-0427.json"
}
],
"title": "CVE-2025-0427"
},
{
"cve": "CVE-2023-21342",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-21342",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-21342.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
}
],
"title": "CVE-2023-21342"
},
{
"cve": "CVE-2023-35657",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-35657",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-35657.json"
}
],
"title": "CVE-2023-35657"
},
{
"cve": "CVE-2024-12577",
"cwe": {
"id": "CWE-823",
"name": "Use of Out-of-range Pointer Offset"
},
"notes": [
{
"category": "other",
"text": "Use of Out-of-range Pointer Offset",
"title": "CWE-823"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-12577",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-12577.json"
}
],
"title": "CVE-2024-12577"
},
{
"cve": "CVE-2024-34739",
"cwe": {
"id": "CWE-116",
"name": "Improper Encoding or Escaping of Output"
},
"notes": [
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34739",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34739.json"
}
],
"title": "CVE-2024-34739"
},
{
"cve": "CVE-2024-45580",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45580",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45580.json"
}
],
"title": "CVE-2024-45580"
},
{
"cve": "CVE-2024-46974",
"cwe": {
"id": "CWE-274",
"name": "Improper Handling of Insufficient Privileges"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Insufficient Privileges",
"title": "CWE-274"
},
{
"category": "other",
"text": "Incorrect Privilege Assignment",
"title": "CWE-266"
},
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-46974",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46974.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
}
],
"title": "CVE-2024-46974"
},
{
"cve": "CVE-2024-46975",
"cwe": {
"id": "CWE-270",
"name": "Privilege Context Switching Error"
},
"notes": [
{
"category": "other",
"text": "Privilege Context Switching Error",
"title": "CWE-270"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-46975",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46975.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.9,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
}
],
"title": "CVE-2024-46975"
},
{
"cve": "CVE-2024-47891",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47891.json"
}
],
"title": "CVE-2024-47891"
},
{
"cve": "CVE-2024-47896",
"cwe": {
"id": "CWE-823",
"name": "Use of Out-of-range Pointer Offset"
},
"notes": [
{
"category": "other",
"text": "Use of Out-of-range Pointer Offset",
"title": "CWE-823"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47896",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47896.json"
}
],
"title": "CVE-2024-47896"
},
{
"cve": "CVE-2024-47900",
"cwe": {
"id": "CWE-823",
"name": "Use of Out-of-range Pointer Offset"
},
"notes": [
{
"category": "other",
"text": "Use of Out-of-range Pointer Offset",
"title": "CWE-823"
},
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47900",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47900.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
}
],
"title": "CVE-2024-47900"
},
{
"cve": "CVE-2024-49739",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49739",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49739.json"
}
],
"title": "CVE-2024-49739"
},
{
"cve": "CVE-2024-49835",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49835",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49835.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
}
],
"title": "CVE-2024-49835"
},
{
"cve": "CVE-2024-49841",
"cwe": {
"id": "CWE-390",
"name": "Detection of Error Condition Without Action"
},
"notes": [
{
"category": "other",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49841",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49841.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
}
],
"title": "CVE-2024-49841"
},
{
"cve": "CVE-2024-49842",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49842",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49842.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
}
],
"title": "CVE-2024-49842"
},
{
"cve": "CVE-2024-49845",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49845",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49845.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
}
],
"title": "CVE-2024-49845"
},
{
"cve": "CVE-2024-49846",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49846",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49846.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
}
],
"title": "CVE-2024-49846"
},
{
"cve": "CVE-2024-49847",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49847",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49847.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
}
],
"title": "CVE-2024-49847"
},
{
"cve": "CVE-2024-52939",
"cwe": {
"id": "CWE-823",
"name": "Use of Out-of-range Pointer Offset"
},
"notes": [
{
"category": "other",
"text": "Use of Out-of-range Pointer Offset",
"title": "CWE-823"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-52939",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52939.json"
}
],
"title": "CVE-2024-52939"
},
{
"cve": "CVE-2025-20666",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-20666",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-20666.json"
}
],
"title": "CVE-2025-20666"
},
{
"cve": "CVE-2025-21453",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21453",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21453.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
}
],
"title": "CVE-2025-21453"
},
{
"cve": "CVE-2025-21459",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21459",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21459.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
}
],
"title": "CVE-2025-21459"
},
{
"cve": "CVE-2025-21467",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21467",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21467.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
}
],
"title": "CVE-2025-21467"
},
{
"cve": "CVE-2025-21468",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21468",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21468.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
}
],
"title": "CVE-2025-21468"
},
{
"cve": "CVE-2025-22425",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-22425",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-22425.json"
}
],
"title": "CVE-2025-22425"
},
{
"cve": "CVE-2025-26420",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26420",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26420.json"
}
],
"title": "CVE-2025-26420"
},
{
"cve": "CVE-2025-26421",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26421",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26421.json"
}
],
"title": "CVE-2025-26421"
},
{
"cve": "CVE-2025-26422",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26422",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26422.json"
}
],
"title": "CVE-2025-26422"
},
{
"cve": "CVE-2025-26423",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26423",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26423.json"
}
],
"title": "CVE-2025-26423"
},
{
"cve": "CVE-2025-26424",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26424",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26424.json"
}
],
"title": "CVE-2025-26424"
},
{
"cve": "CVE-2025-26425",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26425",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26425.json"
}
],
"title": "CVE-2025-26425"
},
{
"cve": "CVE-2025-26426",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26426",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26426.json"
}
],
"title": "CVE-2025-26426"
},
{
"cve": "CVE-2025-26427",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26427",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26427.json"
}
],
"title": "CVE-2025-26427"
},
{
"cve": "CVE-2025-26428",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26428",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26428.json"
}
],
"title": "CVE-2025-26428"
},
{
"cve": "CVE-2025-26429",
"product_status": {
"known_affected": [
"CSAFPID-1657641",
"CSAFPID-1657640",
"CSAFPID-1657639",
"CSAFPID-1657628",
"CSAFPID-899411"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-26429",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26429.json"
}
],
"title": "CVE-2025-26429"
}
]
}
WID-SEC-W-2025-0937
Vulnerability from csaf_certbund - Published: 2025-05-05 22:00 - Updated: 2025-05-05 22:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Android 13 <2025-05-05
Google / Android
|
13 <2025-05-05 | ||
|
Google Android 14 <2025-05-05
Google / Android
|
14 <2025-05-05 | ||
|
Google Android 15 <2025-05-05
Google / Android
|
15 <2025-05-05 |
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Das Android Betriebssystem ist eine quelloffene Plattform f\u00fcr mobile Ger\u00e4te. Die Basis bildet der Linux-Kernel.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um erh\u00f6hte Privilegien zu erlangen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen preiszugeben oder andere nicht spezifizierte Angriffe auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Android",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0937 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0937.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0937 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0937"
},
{
"category": "external",
"summary": "Android Patchday Mai 2025 vom 2025-05-05",
"url": "https://source.android.com/docs/security/bulletin/2025-05-01"
}
],
"source_lang": "en-US",
"title": "Android Patchday Mai 2025: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-05-05T22:00:00.000+00:00",
"generator": {
"date": "2025-05-06T08:38:45.660+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2025-0937",
"initial_release_date": "2025-05-05T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-05-05T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "13 \u003c2025-05-05",
"product": {
"name": "Google Android 13 \u003c2025-05-05",
"product_id": "T043355"
}
},
{
"category": "product_version",
"name": "13 2025-05-05",
"product": {
"name": "Google Android 13 2025-05-05",
"product_id": "T043355-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:google:android:13__2025-05-05"
}
}
},
{
"category": "product_version_range",
"name": "14 \u003c2025-05-05",
"product": {
"name": "Google Android 14 \u003c2025-05-05",
"product_id": "T043356"
}
},
{
"category": "product_version",
"name": "14 2025-05-05",
"product": {
"name": "Google Android 14 2025-05-05",
"product_id": "T043356-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:google:android:14__2025-05-05"
}
}
},
{
"category": "product_version_range",
"name": "15 \u003c2025-05-05",
"product": {
"name": "Google Android 15 \u003c2025-05-05",
"product_id": "T043357"
}
},
{
"category": "product_version",
"name": "15 2025-05-05",
"product": {
"name": "Google Android 15 2025-05-05",
"product_id": "T043357-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:google:android:15__2025-05-05"
}
}
}
],
"category": "product_name",
"name": "Android"
}
],
"category": "vendor",
"name": "Google"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-21342",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2023-21342"
},
{
"cve": "CVE-2023-35657",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2023-35657"
},
{
"cve": "CVE-2024-12577",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-12577"
},
{
"cve": "CVE-2024-34739",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-34739"
},
{
"cve": "CVE-2024-45580",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-45580"
},
{
"cve": "CVE-2024-46974",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-46974"
},
{
"cve": "CVE-2024-46975",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-46975"
},
{
"cve": "CVE-2024-47891",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-47891"
},
{
"cve": "CVE-2024-47896",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-47896"
},
{
"cve": "CVE-2024-47900",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-47900"
},
{
"cve": "CVE-2024-49739",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-49739"
},
{
"cve": "CVE-2024-49835",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-49835"
},
{
"cve": "CVE-2024-49841",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-49841"
},
{
"cve": "CVE-2024-49842",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-49842"
},
{
"cve": "CVE-2024-49845",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-49845"
},
{
"cve": "CVE-2024-49846",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-49846"
},
{
"cve": "CVE-2024-49847",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-49847"
},
{
"cve": "CVE-2024-52939",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2024-52939"
},
{
"cve": "CVE-2025-0072",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-0072"
},
{
"cve": "CVE-2025-0077",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-0077"
},
{
"cve": "CVE-2025-0087",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-0087"
},
{
"cve": "CVE-2025-0427",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-0427"
},
{
"cve": "CVE-2025-20666",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-20666"
},
{
"cve": "CVE-2025-21453",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-21453"
},
{
"cve": "CVE-2025-21459",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-21459"
},
{
"cve": "CVE-2025-21467",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-21467"
},
{
"cve": "CVE-2025-21468",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-21468"
},
{
"cve": "CVE-2025-22425",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-22425"
},
{
"cve": "CVE-2025-26420",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26420"
},
{
"cve": "CVE-2025-26421",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26421"
},
{
"cve": "CVE-2025-26422",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26422"
},
{
"cve": "CVE-2025-26423",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26423"
},
{
"cve": "CVE-2025-26424",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26424"
},
{
"cve": "CVE-2025-26425",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26425"
},
{
"cve": "CVE-2025-26426",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26426"
},
{
"cve": "CVE-2025-26427",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26427"
},
{
"cve": "CVE-2025-26428",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26428"
},
{
"cve": "CVE-2025-26429",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26429"
},
{
"cve": "CVE-2025-26430",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26430"
},
{
"cve": "CVE-2025-26435",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26435"
},
{
"cve": "CVE-2025-26436",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26436"
},
{
"cve": "CVE-2025-26438",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26438"
},
{
"cve": "CVE-2025-26440",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26440"
},
{
"cve": "CVE-2025-26442",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26442"
},
{
"cve": "CVE-2025-26444",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-26444"
},
{
"cve": "CVE-2025-27363",
"product_status": {
"known_affected": [
"T043355",
"T043356",
"T043357"
]
},
"release_date": "2025-05-05T22:00:00.000+00:00",
"title": "CVE-2025-27363"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.