| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 7.3 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as critical, has been found in Qualcomm AR8035, QCA6390, QCA6391, QCA6421, QCA6426, QCA6431, QCA6436, QCA6574A, QCA6574AU, QCA6595AU, QCA6696, QCA8081, QCA8337, QCM6490, QCN6024, QCN9024, QCS6490, QCX315, SA515M, SD 8 Gen1 5G, SD480, SD690 5G, SD695, SD750G, SD765, SD765G, SD768G, SD778G, SD780G, SD855, SD865 5G, SD870, SD888, SD888 5G, SDX55, SDX55M, SDX57M, SDX65, SDX70M, SDXR2 5G, SM7250P, SM7315, SM7325P, Snapdragon 4 Gen 1, WCD9341, WCD9360, WCD9370, WCD9375, WCD9380, WCD9385, WCN3988, WCN3991, WCN3998, WCN6740, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WCN7850, WCN7851, WSA8810, WSA8815, WSA8830 and WSA8835. This vulnerability affects unknown code of the component Modem. The manipulation leads to assertion. This vulnerability is uniquely identified as CVE-2022-33250. The attack is possible to be carried out remotely. No exploit exists. It is advisable to upgrade the affected component. If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Details
A vulnerability, which was classified as critical, has been found in Qualcomm AR8035, QCA6390, QCA6391, QCA6421, QCA6426, QCA6431, QCA6436, QCA6574A, QCA6574AU, QCA6595AU, QCA6696, QCA8081, QCA8337, QCM6490, QCN6024, QCN9024, QCS6490, QCX315, SA515M, SD 8 Gen1 5G, SD480, SD690 5G, SD695, SD750G, SD765, SD765G, SD768G, SD778G, SD780G, SD855, SD865 5G, SD870, SD888, SD888 5G, SDX55, SDX55M, SDX57M, SDX65, SDX70M, SDXR2 5G, SM7250P, SM7315, SM7325P, Snapdragon 4 Gen 1, WCD9341, WCD9360, WCD9370, WCD9375, WCD9380, WCD9385, WCN3988, WCN3991, WCN3998, WCN6740, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WCN7850, WCN7851, WSA8810, WSA8815, WSA8830 and WSA8835 (Chip Software). This issue affects an unknown functionality of the component Modem. The manipulation with an unknown input leads to a assertion vulnerability. Using CWE to declare the problem leads to CWE-617. The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary. Impacted is availability. The summary by CVE is:
Transient DOS due to reachable assertion in modem when network repeatedly sent invalid message container for NR to LTE handover.
The weakness was disclosed 03/11/2023. The advisory is shared at qualcomm.com. The identification of this vulnerability is CVE-2022-33250 since 06/14/2022. Neither technical details nor an exploit are publicly available.
Upgrading eliminates this vulnerability.
The vulnerability is also documented in the vulnerability database at CERT Bund (WID-SEC-2023-0841). If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Affected
- Samsung Exynos
- Samsung Android
Product
Type
Vendor
Name
- AR8035
- QCA6390
- QCA6391
- QCA6421
- QCA6426
- QCA6431
- QCA6436
- QCA6574A
- QCA6574AU
- QCA6595AU
- QCA6696
- QCA8081
- QCA8337
- QCM6490
- QCN6024
- QCN9024
- QCS6490
- QCX315
- SA515M
- SD 8 Gen1 5G
- SD480
- SD690 5G
- SD695
- SD750G
- SD765
- SD765G
- SD768G
- SD778G
- SD780G
- SD855
- SD865 5G
- SD870
- SD888
- SD888 5G
- SDX55
- SDX55M
- SDX57M
- SDX65
- SDX70M
- SDXR2 5G
- SM7250P
- SM7315
- SM7325P
- Snapdragon 4 Gen 1
- WCD9341
- WCD9360
- WCD9370
- WCD9375
- WCD9380
- WCD9385
- WCN3988
- WCN3991
- WCN3998
- WCN6740
- WCN6750
- WCN6850
- WCN6851
- WCN6855
- WCN6856
- WCN7850
- WCN7851
- WSA8810
- WSA8815
- WSA8830
- WSA8835
License
Website
- Vendor: https://www.qualcomm.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.5VulDB Meta Temp Score: 7.3
VulDB Base Score: 7.5
VulDB Temp Score: 7.2
VulDB Vector: 🔍
VulDB Reliability: 🔍
CNA Base Score: 7.5
CNA Vector (Qualcomm, Inc.): 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: AssertionCWE: CWE-617
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Timeline
06/14/2022 🔍03/11/2023 🔍
03/11/2023 🔍
09/03/2025 🔍
Sources
Vendor: qualcomm.comAdvisory: qualcomm.com
Status: Confirmed
CVE: CVE-2022-33250 (🔍)
GCVE (CVE): GCVE-0-2022-33250
GCVE (VulDB): GCVE-100-222797
CERT Bund: WID-SEC-2023-0841 - Samsung Android und Samsung Exynos: Mehrere Schwachstellen
Entry
Created: 03/11/2023 08:32 AMUpdated: 09/03/2025 03:48 PM
Changes: 03/11/2023 08:32 AM (48), 09/03/2025 03:48 PM (22)
Complete: 🔍
Cache ID: 244:4AA:40
No comments yet. Languages: en.
Please log in to comment.