Action not permitted
Modal body text goes here.
Modal Title
Modal Body
ghsa-v4fg-34wm-hwrr
Vulnerability from github
Published
2022-10-19 12:00
Modified
2022-10-21 19:01
Severity ?
Details
Information disclosure in WLAN due to improper length check while processing authentication handshake in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
{ affected: [], aliases: [ "CVE-2022-25719", ], database_specific: { cwe_ids: [ "CWE-125", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2022-10-19T11:15:00Z", severity: "CRITICAL", }, details: "Information disclosure in WLAN due to improper length check while processing authentication handshake in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking", id: "GHSA-v4fg-34wm-hwrr", modified: "2022-10-21T19:01:19Z", published: "2022-10-19T12:00:17Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-25719", }, { type: "WEB", url: "https://www.qualcomm.com/company/product-security/bulletins/october-2022-bulletin", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", type: "CVSS_V3", }, ], }
cve-2022-25719
Vulnerability from cvelistv5
Published
2022-10-19 00:00
Modified
2024-08-03 04:49
Severity ?
EPSS score ?
Summary
Information disclosure in WLAN due to improper length check while processing authentication handshake in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Qualcomm, Inc. | Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking |
Version: APQ8009 Version: APQ8009W Version: APQ8016 Version: APQ8017 Version: APQ8037 Version: APQ8052 Version: APQ8053 Version: APQ8056 Version: APQ8076 Version: APQ8084 Version: AR8031 Version: CSR8811 Version: CSRA6620 Version: CSRA6640 Version: IPQ5010 Version: IPQ5018 Version: IPQ5028 Version: IPQ6000 Version: IPQ6010 Version: IPQ6018 Version: IPQ6028 Version: IPQ8070A Version: IPQ8071A Version: IPQ8072A Version: IPQ8074A Version: IPQ8076 Version: IPQ8076A Version: IPQ8078 Version: IPQ8078A Version: IPQ8173 Version: IPQ8174 Version: MDM9205 Version: MDM9225 Version: MDM9225M Version: MDM9230 Version: MDM9235M Version: MDM9330 Version: MDM9625 Version: MDM9625M Version: MDM9630 Version: MDM9635M Version: MSM8108 Version: MSM8208 Version: MSM8209 Version: MSM8608 Version: MSM8909W Version: MSM8917 Version: MSM8920 Version: MSM8937 Version: MSM8940 Version: MSM8952 Version: MSM8953 Version: MSM8956 Version: MSM8976 Version: MSM8976SG Version: PM8937 Version: QCA1990 Version: QCA4004 Version: QCA4010 Version: QCA4020 Version: QCA4024 Version: QCA6164 Version: QCA6174 Version: QCA6174A Version: QCA8075 Version: QCA8081 Version: QCA9377 Version: QCA9379 Version: QCA9888 Version: QCA9889 Version: QCN5022 Version: QCN5024 Version: QCN5052 Version: QCN5122 Version: QCN5124 Version: QCN5152 Version: QCN5154 Version: QCN5164 Version: QCN6023 Version: QCN6024 Version: QCN6122 Version: QCN6132 Version: QCN9000 Version: QCN9022 Version: QCN9024 Version: QCN9070 Version: QCN9072 Version: QCN9074 Version: QCN9100 Version: QCS405 Version: QET4101 Version: QSW8573 Version: Qualcomm215 Version: SD205 Version: SD210 Version: SD429 Version: SD439 Version: SD450 Version: SD632 Version: SDA429W Version: SDM429W Version: SDW2500 Version: WCD9306 Version: WCD9326 Version: WCD9335 Version: WCD9340 Version: WCN3610 Version: WCN3615 Version: WCN3620 Version: WCN3660 Version: WCN3660B Version: WCN3680 Version: WCN3680B Version: WCN3980 Version: WCN3998 Version: WCN3999 Version: WSA8810 Version: WSA8815 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T04:49:42.665Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.qualcomm.com/company/product-security/bulletins/october-2022-bulletin", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking", vendor: "Qualcomm, Inc.", versions: [ { status: "affected", version: "APQ8009", }, { status: "affected", version: "APQ8009W", }, { status: "affected", version: "APQ8016", }, { status: "affected", version: "APQ8017", }, { status: "affected", version: "APQ8037", }, { status: "affected", version: "APQ8052", }, { status: "affected", version: "APQ8053", }, { status: "affected", version: "APQ8056", }, { status: "affected", version: "APQ8076", }, { status: "affected", version: "APQ8084", }, { status: "affected", version: "AR8031", }, { status: "affected", version: "CSR8811", }, { status: "affected", version: "CSRA6620", }, { status: "affected", version: "CSRA6640", }, { status: "affected", version: "IPQ5010", }, { status: "affected", version: "IPQ5018", }, { status: "affected", version: "IPQ5028", }, { status: "affected", version: "IPQ6000", }, { status: "affected", version: "IPQ6010", }, { status: "affected", version: "IPQ6018", }, { status: "affected", version: "IPQ6028", }, { status: "affected", version: "IPQ8070A", }, { status: "affected", version: "IPQ8071A", }, { status: "affected", version: "IPQ8072A", }, { status: "affected", version: "IPQ8074A", }, { status: "affected", version: "IPQ8076", }, { status: "affected", version: "IPQ8076A", }, { status: "affected", version: "IPQ8078", }, { status: "affected", version: "IPQ8078A", }, { status: "affected", version: "IPQ8173", }, { status: "affected", version: "IPQ8174", }, { status: "affected", version: "MDM9205", }, { status: "affected", version: "MDM9225", }, { status: "affected", version: "MDM9225M", }, { status: "affected", version: "MDM9230", }, { status: "affected", version: "MDM9235M", }, { status: "affected", version: "MDM9330", }, { status: "affected", version: "MDM9625", }, { status: "affected", version: "MDM9625M", }, { status: "affected", version: "MDM9630", }, { status: "affected", version: "MDM9635M", }, { status: "affected", version: "MSM8108", }, { status: "affected", version: "MSM8208", }, { status: "affected", version: "MSM8209", }, { status: "affected", version: "MSM8608", }, { status: "affected", version: "MSM8909W", }, { status: "affected", version: "MSM8917", }, { status: "affected", version: "MSM8920", }, { status: "affected", version: "MSM8937", }, { status: "affected", version: "MSM8940", }, { status: "affected", version: "MSM8952", }, { status: "affected", version: "MSM8953", }, { status: "affected", version: "MSM8956", }, { status: "affected", version: "MSM8976", }, { status: "affected", version: "MSM8976SG", }, { status: "affected", version: "PM8937", }, { status: "affected", version: "QCA1990", }, { status: "affected", version: "QCA4004", }, { status: "affected", version: "QCA4010", }, { status: "affected", version: "QCA4020", }, { status: "affected", version: "QCA4024", }, { status: "affected", version: "QCA6164", }, { status: "affected", version: "QCA6174", }, { status: "affected", version: "QCA6174A", }, { status: "affected", version: "QCA8075", }, { status: "affected", version: "QCA8081", }, { status: "affected", version: "QCA9377", }, { status: "affected", version: "QCA9379", }, { status: "affected", version: "QCA9888", }, { status: "affected", version: "QCA9889", }, { status: "affected", version: "QCN5022", }, { status: "affected", version: "QCN5024", }, { status: "affected", version: "QCN5052", }, { status: "affected", version: "QCN5122", }, { status: "affected", version: "QCN5124", }, { status: "affected", version: "QCN5152", }, { status: "affected", version: "QCN5154", }, { status: "affected", version: "QCN5164", }, { status: "affected", version: "QCN6023", }, { status: "affected", version: "QCN6024", }, { status: "affected", version: "QCN6122", }, { status: "affected", version: "QCN6132", }, { status: "affected", version: "QCN9000", }, { status: "affected", version: "QCN9022", }, { status: "affected", version: "QCN9024", }, { status: "affected", version: "QCN9070", }, { status: "affected", version: "QCN9072", }, { status: "affected", version: "QCN9074", }, { status: "affected", version: "QCN9100", }, { status: "affected", version: "QCS405", }, { status: "affected", version: "QET4101", }, { status: "affected", version: "QSW8573", }, { status: "affected", version: "Qualcomm215", }, { status: "affected", version: "SD205", }, { status: "affected", version: "SD210", }, { status: "affected", version: "SD429", }, { status: "affected", version: "SD439", }, { status: "affected", version: "SD450", }, { status: "affected", version: "SD632", }, { status: "affected", version: "SDA429W", }, { status: "affected", version: "SDM429W", }, { status: "affected", version: "SDW2500", }, { status: "affected", version: "WCD9306", }, { status: "affected", version: "WCD9326", }, { status: "affected", version: "WCD9335", }, { status: "affected", version: "WCD9340", }, { status: "affected", version: "WCN3610", }, { status: "affected", version: "WCN3615", }, { status: "affected", version: "WCN3620", }, { status: "affected", version: "WCN3660", }, { status: "affected", version: "WCN3660B", }, { status: "affected", version: "WCN3680", }, { status: "affected", version: "WCN3680B", }, { status: "affected", version: "WCN3980", }, { status: "affected", version: "WCN3998", }, { status: "affected", version: "WCN3999", }, { status: "affected", version: "WSA8810", }, { status: "affected", version: "WSA8815", }, ], }, ], descriptions: [ { lang: "en", value: "Information disclosure in WLAN due to improper length check while processing authentication handshake in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 8.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { description: "Buffer Over-read in WLAN", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-10-19T00:00:00", orgId: "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", shortName: "qualcomm", }, references: [ { url: "https://www.qualcomm.com/company/product-security/bulletins/october-2022-bulletin", }, ], }, }, cveMetadata: { assignerOrgId: "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", assignerShortName: "qualcomm", cveId: "CVE-2022-25719", datePublished: "2022-10-19T00:00:00", dateReserved: "2022-02-22T00:00:00", dateUpdated: "2024-08-03T04:49:42.665Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.