CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
4.9 | $0-$5k | 0.00 |
A vulnerability was found in Qualcomm 4 Gen 1 Mobile Platform, 480 5G Mobile Platform, 480+ 5G Mobile Platform SM4350-AC, 695 5G Mobile Platform, 865 5G Mobile Platform, 865+ 5G Mobile Platform SM8250-AB, 870 5G Mobile Platform SM8250-AC, AR8035, AR9380, Auto 4G Modem, Auto 5G Modem-RF, CSR8811, CSRB31024, FastConnect 6200, FastConnect 6800, FastConnect 6900, FastConnect 7800, Immersive Home 214 Platform, Immersive Home 216 Platform, Immersive Home 316 Platform, Immersive Home 318 Platform, Immersive Home 326 Platform, Immersive Home 3210 Platform, IPQ4019, IPQ4028, IPQ4029, IPQ5010, IPQ5028, IPQ6000, IPQ6010, IPQ6018, IPQ6028, IPQ8064, IPQ8065, IPQ8068, IPQ8070A, IPQ8071A, IPQ8072A, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078, IPQ8078A, IPQ8173, IPQ8174, IPQ9008, IPQ9574, QAM8295P, QCA4024, QCA6175A, QCA6391, QCA6426, QCA6436, QCA6554A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6678AQ, QCA6696, QCA6698AQ, QCA7500, QCA8075, QCA8081, QCA8082, QCA8084, QCA8085, QCA8337, QCA8386, QCA9880, QCA9886, QCA9888, QCA9889, QCA9898, QCA9980, QCA9984, QCA9985, QCA9990, QCA9992, QCA9994, QCC710, QCC2073, QCC2076, QCF8000, QCN5022, QCN5024, QCN5052, QCN5122, QCN5124, QCN5152, QCN5154, QCN5164, QCN6023, QCN6024, QCN6112, QCN6122 and QCN6132. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component WLAN Host. The manipulation with an unknown input leads to a information disclosure vulnerability. The CWE definition for the vulnerability is CWE-200. The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. As an impact it is known to affect confidentiality.
The weakness was shared 11/07/2023. The advisory is shared at qualcomm.com. This vulnerability is known as CVE-2023-28553 since 03/17/2023. Neither technical details nor an exploit are publicly available. MITRE ATT&CK project uses the attack technique T1592 for this issue.
Upgrading eliminates this vulnerability.
Product
Vendor
Name
- 4 Gen 1 Mobile Platform
- 480 5G Mobile Platform
- 480+ 5G Mobile Platform SM4350-AC
- 695 5G Mobile Platform
- 865 5G Mobile Platform
- 865+ 5G Mobile Platform SM8250-AB
- 870 5G Mobile Platform SM8250-AC
- AR8035
- AR9380
- Auto 4G Modem
- Auto 5G Modem-RF
- CSR8811
- CSRB31024
- FastConnect 6200
- FastConnect 6800
- FastConnect 6900
- FastConnect 7800
- Immersive Home 214 Platform
- Immersive Home 216 Platform
- Immersive Home 316 Platform
- Immersive Home 318 Platform
- Immersive Home 326 Platform
- Immersive Home 3210 Platform
- IPQ4019
- IPQ4028
- IPQ4029
- IPQ5010
- IPQ5028
- IPQ6000
- IPQ6010
- IPQ6018
- IPQ6028
- IPQ8064
- IPQ8065
- IPQ8068
- IPQ8070A
- IPQ8071A
- IPQ8072A
- IPQ8074A
- IPQ8076
- IPQ8076A
- IPQ8078
- IPQ8078A
- IPQ8173
- IPQ8174
- IPQ9008
- IPQ9574
- QAM8295P
- QCA4024
- QCA6175A
- QCA6391
- QCA6426
- QCA6436
- QCA6554A
- QCA6564AU
- QCA6574
- QCA6574A
- QCA6574AU
- QCA6584AU
- QCA6595
- QCA6595AU
- QCA6678AQ
- QCA6696
- QCA6698AQ
- QCA7500
- QCA8075
- QCA8081
- QCA8082
- QCA8084
- QCA8085
- QCA8337
- QCA8386
- QCA9880
- QCA9886
- QCA9888
- QCA9889
- QCA9898
- QCA9980
- QCA9984
- QCA9985
- QCA9990
- QCA9992
- QCA9994
- QCC710
- QCC2073
- QCC2076
- QCF8000
- QCN5022
- QCN5024
- QCN5052
- QCN5122
- QCN5124
- QCN5152
- QCN5154
- QCN5164
- QCN6023
- QCN6024
- QCN6112
- QCN6122
- QCN6132
- QCN6224
- QCN6274
- QCN9000
- QCN9022
- QCN9024
- QCN9070
- QCN9072
- QCN9074
- QCN9100
- QCN9274
- QFW7114
- QFW7124
- SA4150P
- SA4155P
- SA6145P
- SA6150P
- SA6155P
- SA8145P
- SA8150P
- SA8155P
- SA8195P
- SA8295P
- SD865 5G
- SDX55
- SDX65M
- SW5100
- SW5100P
- SXR2130
- W5+ Gen 1 Wearable Platform
- WCD9340
- WCD9370
- WCD9375
- WCD9380
- WCD9385
- WCN3980
- WCN3988
- WSA8810
- WSA8815
- WSA8830
- WSA8835
- X55 5G Modem-RF System
- X65 5G Modem-RF System
- X75 5G Modem-RF System
- XR2 5G Platform
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔒VulDB CVSS-BT Score: 🔒
VulDB Vector: 🔒
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.0VulDB Meta Temp Score: 4.9
VulDB Base Score: 3.3
VulDB Temp Score: 3.2
VulDB Vector: 🔒
VulDB Reliability: 🔍
NVD Base Score: 5.5
NVD Vector: 🔒
CNA Base Score: 6.1
CNA Vector (Qualcomm, Inc.): 🔒
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Exploiting
Class: Information disclosureCWE: CWE-200 / CWE-284 / CWE-266
CAPEC: 🔒
ATT&CK: 🔒
Local: Yes
Remote: No
Availability: 🔒
Status: Not defined
EPSS Score: 🔒
EPSS Percentile: 🔒
Price Prediction: 🔍
Current Price Estimation: 🔒
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔒
Timeline
03/17/2023 CVE reserved11/07/2023 Advisory disclosed
11/07/2023 VulDB entry created
12/03/2023 VulDB entry last update
Sources
Vendor: qualcomm.comAdvisory: qualcomm.com
Status: Confirmed
CVE: CVE-2023-28553 (🔒)
Entry
Created: 11/07/2023 08:09Updated: 12/03/2023 06:32
Changes: 11/07/2023 08:09 (46), 12/03/2023 06:32 (12)
Complete: 🔍
Cache ID: 18:7B8:103
No comments yet. Languages: en.
Please log in to comment.