BDU:2024-00746
Vulnerability from fstec - Published: 03.07.2023
VLAI Severity ?
Title
Уязвимость микропрограммного обеспечения встраиваемых плат Qualcomm, связанная с чтением данных за границами буфера в памяти, позволяющая нарушителю выполнить произвольный код
Description
Уязвимость микропрограммного обеспечения встраиваемых плат Qualcomm связана с чтением данных за границами буфера в памяти. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, выполнить произвольный код
Severity ?
Vendor
Qualcomm Technologies Inc.
Software Name
IPQ8064, QCA9980, SD 8 Gen1 5G, WCD9380, WSA8830, WSA8835, AR8035, Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon X55 5G Modem-RF System, Snapdragon XR2 5G Platform, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon 780G 5G Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB), Snapdragon AR2 Gen 1 Platform, Snapdragon X65 5G Modem-RF System, Qualcomm® Video Collaboration VC3 Platform, Snapdragon 8 Gen 2 Mobile Platform, Snapdragon 8+ Gen 2 Mobile Platform, Snapdragon Auto 5G Modem-RF, Snapdragon X75 5G Modem-RF System, Immersive Home 214 Platform, Immersive Home 216 Platform, Immersive Home 316 Platform, Immersive Home 318 Platform, Immersive Home 3210 Platform, Immersive Home 326 Platform, IPQ5010, IPQ5028, IPQ5332, IPQ8070A, IPQ8071A, IPQ8072A, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078, IPQ8078A, IPQ8173, IPQ8174, IPQ9554, IPQ9570, QCA0000, QCA9889, QCF8001, QCN5024, QCN5124, QCN5154, QCN5164, QCN6112, QCN6122, QCN6132, QCN9013, QCN9100, SDX65M, AR9380, IPQ8065, IPQ8068, IPQ9008, IPQ9574, QCA2062, QCA2064, QCA2065, QCA2066, QCA6554A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6678AQ, QCA9886, QCA9888, QCA9985, QCA9986, QCA9990, QCA9992, QCA9994, QCC2073, QCC2076, QCN5054, QCN6100, QCN6102, QCN9001, QCN9002, QCN9003, QCN9022, FastConnect 6700, FastConnect 6900, FastConnect 7800, QCS4490, QCM4490, WCD9370, WCD9390, WCD9395, WCN3950, WCN6740, WSA8810, WSA8815, WSA8832, WSA8840, WSA8845, WSA8845H, CSR8811, IPQ6000, IPQ6010, IPQ6018, IPQ6028, QAM8255P, QAM8295P, QAM8650P, QAM8775P, QCA4024, QCA6595, QCA6595AU, QCA6696, QCA6698AQ, QCA6797AQ, QCA8075, QCA8081, QCA8082, QCA8084, QCA8085, QCA8337, QCA8386, QCC710, QCM6490, QCM8550, QCN5022, QCN5052, QCN5122, QCN5152, QCN6023, QCN6024, QCN6224, QCN6274, QCN9000, QCN9012, QCN9024, QCN9070, QCN9072, QCN9074, QCN9274, QCS6490, QCS8550, QFW7114, QFW7124, SA8255P, SA8295P, SDX55, SM8550P, SXR2230P, WCD9340, WCD9375, WCD9385, FastConnect 6800, QCA6391, QCA6426, QCA6436, QSM8350, SD865 5G, SD888, SG8275P, SSG2115P, SSG2125P, SXR1230P, SXR2130, QCA8072, QCA9984
Software Version
- (IPQ8064), - (QCA9980), - (SD 8 Gen1 5G), - (WCD9380), - (WSA8830), - (WSA8835), - (AR8035), - (Snapdragon 865 5G Mobile Platform), - (Snapdragon 865+ 5G Mobile Platform (SM8250-AB)), - (Snapdragon 870 5G Mobile Platform (SM8250-AC)), - (Snapdragon X55 5G Modem-RF System), - (Snapdragon XR2 5G Platform), - (Snapdragon 8 Gen 1 Mobile Platform), - (Snapdragon 888 5G Mobile Platform), - (Snapdragon 888+ 5G Mobile Platform (SM8350-AC)), - (Snapdragon 780G 5G Mobile Platform), - (Snapdragon 8+ Gen 1 Mobile Platform), - (Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB)), - (Snapdragon AR2 Gen 1 Platform), - (Snapdragon X65 5G Modem-RF System), - (Qualcomm® Video Collaboration VC3 Platform), - (Snapdragon 8 Gen 2 Mobile Platform), - (Snapdragon 8+ Gen 2 Mobile Platform), - (Snapdragon Auto 5G Modem-RF), - (Snapdragon X75 5G Modem-RF System), - (Immersive Home 214 Platform), - (Immersive Home 216 Platform), - (Immersive Home 316 Platform), - (Immersive Home 318 Platform), - (Immersive Home 3210 Platform), - (Immersive Home 326 Platform), - (IPQ5010), - (IPQ5028), - (IPQ5332), - (IPQ8070A), - (IPQ8071A), - (IPQ8072A), - (IPQ8074A), - (IPQ8076), - (IPQ8076A), - (IPQ8078), - (IPQ8078A), - (IPQ8173), - (IPQ8174), - (IPQ9554), - (IPQ9570), - (QCA0000), - (QCA9889), - (QCF8001), - (QCN5024), - (QCN5124), - (QCN5154), - (QCN5164), - (QCN6112), - (QCN6122), - (QCN6132), - (QCN9013), - (QCN9100), - (SDX65M), - (AR9380), - (IPQ8065), - (IPQ8068), - (IPQ9008), - (IPQ9574), - (QCA2062), - (QCA2064), - (QCA2065), - (QCA2066), - (QCA6554A), - (QCA6564AU), - (QCA6574), - (QCA6574A), - (QCA6574AU), - (QCA6584AU), - (QCA6678AQ), - (QCA9886), - (QCA9888), - (QCA9985), - (QCA9986), - (QCA9990), - (QCA9992), - (QCA9994), - (QCC2073), - (QCC2076), - (QCN5054), - (QCN6100), - (QCN6102), - (QCN9001), - (QCN9002), - (QCN9003), - (QCN9022), - (FastConnect 6700), - (FastConnect 6900), - (FastConnect 7800), - (QCS4490), - (QCM4490), - (WCD9370), - (WCD9390), - (WCD9395), - (WCN3950), - (WCN6740), - (WSA8810), - (WSA8815), - (WSA8832), - (WSA8840), - (WSA8845), - (WSA8845H), - (CSR8811), - (IPQ6000), - (IPQ6010), - (IPQ6018), - (IPQ6028), - (QAM8255P), - (QAM8295P), - (QAM8650P), - (QAM8775P), - (QCA4024), - (QCA6595), - (QCA6595AU), - (QCA6696), - (QCA6698AQ), - (QCA6797AQ), - (QCA8075), - (QCA8081), - (QCA8082), - (QCA8084), - (QCA8085), - (QCA8337), - (QCA8386), - (QCC710), - (QCM6490), - (QCM8550), - (QCN5022), - (QCN5052), - (QCN5122), - (QCN5152), - (QCN6023), - (QCN6024), - (QCN6224), - (QCN6274), - (QCN9000), - (QCN9012), - (QCN9024), - (QCN9070), - (QCN9072), - (QCN9074), - (QCN9274), - (QCS6490), - (QCS8550), - (QFW7114), - (QFW7124), - (SA8255P), - (SA8295P), - (SDX55), - (SM8550P), - (SXR2230P), - (WCD9340), - (WCD9375), - (WCD9385), - (FastConnect 6800), - (QCA6391), - (QCA6426), - (QCA6436), - (QSM8350), - (SD865 5G), - (SD888), - (SG8275P), - (SSG2115P), - (SSG2125P), - (SXR1230P), - (SXR2130), - (QCA8072), - (QCA9984)
Possible Mitigations
Использование рекомендаций:
https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2023-bulletin.html
Reference
https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2023-bulletin.html
https://vuldb.com/?id.241142
CWE
CWE-121
{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Qualcomm Technologies Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "- (IPQ8064), - (QCA9980), - (SD 8 Gen1 5G), - (WCD9380), - (WSA8830), - (WSA8835), - (AR8035), - (Snapdragon 865 5G Mobile Platform), - (Snapdragon 865+ 5G Mobile Platform (SM8250-AB)), - (Snapdragon 870 5G Mobile Platform (SM8250-AC)), - (Snapdragon X55 5G Modem-RF System), - (Snapdragon XR2 5G Platform), - (Snapdragon 8 Gen 1 Mobile Platform), - (Snapdragon 888 5G Mobile Platform), - (Snapdragon 888+ 5G Mobile Platform (SM8350-AC)), - (Snapdragon 780G 5G Mobile Platform), - (Snapdragon 8+ Gen 1 Mobile Platform), - (Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB)), - (Snapdragon AR2 Gen 1 Platform), - (Snapdragon X65 5G Modem-RF System), - (Qualcomm\u00ae Video Collaboration VC3 Platform), - (Snapdragon 8 Gen 2 Mobile Platform), - (Snapdragon 8+ Gen 2 Mobile Platform), - (Snapdragon Auto 5G Modem-RF), - (Snapdragon X75 5G Modem-RF System), - (Immersive Home 214 Platform), - (Immersive Home 216 Platform), - (Immersive Home 316 Platform), - (Immersive Home 318 Platform), - (Immersive Home 3210 Platform), - (Immersive Home 326 Platform), - (IPQ5010), - (IPQ5028), - (IPQ5332), - (IPQ8070A), - (IPQ8071A), - (IPQ8072A), - (IPQ8074A), - (IPQ8076), - (IPQ8076A), - (IPQ8078), - (IPQ8078A), - (IPQ8173), - (IPQ8174), - (IPQ9554), - (IPQ9570), - (QCA0000), - (QCA9889), - (QCF8001), - (QCN5024), - (QCN5124), - (QCN5154), - (QCN5164), - (QCN6112), - (QCN6122), - (QCN6132), - (QCN9013), - (QCN9100), - (SDX65M), - (AR9380), - (IPQ8065), - (IPQ8068), - (IPQ9008), - (IPQ9574), - (QCA2062), - (QCA2064), - (QCA2065), - (QCA2066), - (QCA6554A), - (QCA6564AU), - (QCA6574), - (QCA6574A), - (QCA6574AU), - (QCA6584AU), - (QCA6678AQ), - (QCA9886), - (QCA9888), - (QCA9985), - (QCA9986), - (QCA9990), - (QCA9992), - (QCA9994), - (QCC2073), - (QCC2076), - (QCN5054), - (QCN6100), - (QCN6102), - (QCN9001), - (QCN9002), - (QCN9003), - (QCN9022), - (FastConnect 6700), - (FastConnect 6900), - (FastConnect 7800), - (QCS4490), - (QCM4490), - (WCD9370), - (WCD9390), - (WCD9395), - (WCN3950), - (WCN6740), - (WSA8810), - (WSA8815), - (WSA8832), - (WSA8840), - (WSA8845), - (WSA8845H), - (CSR8811), - (IPQ6000), - (IPQ6010), - (IPQ6018), - (IPQ6028), - (QAM8255P), - (QAM8295P), - (QAM8650P), - (QAM8775P), - (QCA4024), - (QCA6595), - (QCA6595AU), - (QCA6696), - (QCA6698AQ), - (QCA6797AQ), - (QCA8075), - (QCA8081), - (QCA8082), - (QCA8084), - (QCA8085), - (QCA8337), - (QCA8386), - (QCC710), - (QCM6490), - (QCM8550), - (QCN5022), - (QCN5052), - (QCN5122), - (QCN5152), - (QCN6023), - (QCN6024), - (QCN6224), - (QCN6274), - (QCN9000), - (QCN9012), - (QCN9024), - (QCN9070), - (QCN9072), - (QCN9074), - (QCN9274), - (QCS6490), - (QCS8550), - (QFW7114), - (QFW7124), - (SA8255P), - (SA8295P), - (SDX55), - (SM8550P), - (SXR2230P), - (WCD9340), - (WCD9375), - (WCD9385), - (FastConnect 6800), - (QCA6391), - (QCA6426), - (QCA6436), - (QSM8350), - (SD865 5G), - (SD888), - (SG8275P), - (SSG2115P), - (SSG2125P), - (SXR1230P), - (SXR2130), - (QCA8072), - (QCA9984)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://docs.qualcomm.com/product/publicresources/securitybulletin/october-2023-bulletin.html",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "03.07.2023",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "29.01.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "29.01.2024",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2024-00746",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2023-33028",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "IPQ8064, QCA9980, SD 8 Gen1 5G, WCD9380, WSA8830, WSA8835, AR8035, Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon X55 5G Modem-RF System, Snapdragon XR2 5G Platform, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon 780G 5G Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB), Snapdragon AR2 Gen 1 Platform, Snapdragon X65 5G Modem-RF System, Qualcomm\u00ae Video Collaboration VC3 Platform, Snapdragon 8 Gen 2 Mobile Platform, Snapdragon 8+ Gen 2 Mobile Platform, Snapdragon Auto 5G Modem-RF, Snapdragon X75 5G Modem-RF System, Immersive Home 214 Platform, Immersive Home 216 Platform, Immersive Home 316 Platform, Immersive Home 318 Platform, Immersive Home 3210 Platform, Immersive Home 326 Platform, IPQ5010, IPQ5028, IPQ5332, IPQ8070A, IPQ8071A, IPQ8072A, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078, IPQ8078A, IPQ8173, IPQ8174, IPQ9554, IPQ9570, QCA0000, QCA9889, QCF8001, QCN5024, QCN5124, QCN5154, QCN5164, QCN6112, QCN6122, QCN6132, QCN9013, QCN9100, SDX65M, AR9380, IPQ8065, IPQ8068, IPQ9008, IPQ9574, QCA2062, QCA2064, QCA2065, QCA2066, QCA6554A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6678AQ, QCA9886, QCA9888, QCA9985, QCA9986, QCA9990, QCA9992, QCA9994, QCC2073, QCC2076, QCN5054, QCN6100, QCN6102, QCN9001, QCN9002, QCN9003, QCN9022, FastConnect 6700, FastConnect 6900, FastConnect 7800, QCS4490, QCM4490, WCD9370, WCD9390, WCD9395, WCN3950, WCN6740, WSA8810, WSA8815, WSA8832, WSA8840, WSA8845, WSA8845H, CSR8811, IPQ6000, IPQ6010, IPQ6018, IPQ6028, QAM8255P, QAM8295P, QAM8650P, QAM8775P, QCA4024, QCA6595, QCA6595AU, QCA6696, QCA6698AQ, QCA6797AQ, QCA8075, QCA8081, QCA8082, QCA8084, QCA8085, QCA8337, QCA8386, QCC710, QCM6490, QCM8550, QCN5022, QCN5052, QCN5122, QCN5152, QCN6023, QCN6024, QCN6224, QCN6274, QCN9000, QCN9012, QCN9024, QCN9070, QCN9072, QCN9074, QCN9274, QCS6490, QCS8550, QFW7114, QFW7124, SA8255P, SA8295P, SDX55, SM8550P, SXR2230P, WCD9340, WCD9375, WCD9385, FastConnect 6800, QCA6391, QCA6426, QCA6436, QSM8350, SD865 5G, SD888, SG8275P, SSG2115P, SSG2125P, SXR1230P, SXR2130, QCA8072, QCA9984",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0432\u0441\u0442\u0440\u0430\u0438\u0432\u0430\u0435\u043c\u044b\u0445 \u043f\u043b\u0430\u0442 Qualcomm, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u0447\u0442\u0435\u043d\u0438\u0435\u043c \u0434\u0430\u043d\u043d\u044b\u0445 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u0441\u0442\u0435\u043a\u0435 (CWE-121)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0432\u0441\u0442\u0440\u0430\u0438\u0432\u0430\u0435\u043c\u044b\u0445 \u043f\u043b\u0430\u0442 Qualcomm \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0447\u0442\u0435\u043d\u0438\u0435\u043c \u0434\u0430\u043d\u043d\u044b\u0445 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2023-bulletin.html\nhttps://vuldb.com/?id.241142",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0439 \u043a\u043e\u0434, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u041f\u041e \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-121",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 9,8)"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…