CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
7.3 | $0-$5k | 0.00 |
A vulnerability was found in Qualcomm 4 Gen 1 Mobile Platform, 4 Gen 2 Mobile Platform, 7c+ Gen 3 Compute, 8 Gen 1 Mobile Platform, 8 Gen 2 Mobile Platform, 8+ Gen 1 Mobile Platform, 8+ Gen 2 Mobile Platform, 8c Compute Platform SC8180X-AD Poipu Lite, 8c Compute Platform SC8180XP-AD Poipu Lite, 8cx Compute Platform SC8180X-AA, 8cx Compute Platform SC8180XP-AC, 8cx Gen 2 5G Compute Platform SC8180X-AC, 8cx Gen 2 5G Compute Platform SC8180XP-AA, 8cx Gen 3 Compute Platform SC8280XP-AB, 315 5G IoT Modem, 480 5G Mobile Platform, 480+ 5G Mobile Platform SM4350-AC, 660 Mobile Platform, 690 5G Mobile Platform, 695 5G Mobile Platform, 750G 5G Mobile Platform, 765 5G Mobile Platform SM7250-AA, 765G 5G Mobile Platform SM7250-AB, 768G 5G Mobile Platform SM7250-AC, 778G+ 5G Mobile Platform SM7325-AE, 778G 5G Mobile Platform, 780G 5G Mobile Platform, 782G Mobile Platform SM7325-AF, 865 5G Mobile Platform, 865+ 5G Mobile Platform SM8250-AB, 870 5G Mobile Platform SM8250-AC, 888 5G Mobile Platform, 888+ 5G Mobile Platform SM8350-AC, AB, AF Poipu Pro, AQT1000, AR2 Gen 1 Platform, AR8031, AR8035, AR9380, Auto 4G Modem, Auto 5G Modem-RF, Auto 5G Modem-RF Gen 2, BB, CSR8811, CSRA6620, CSRA6640, CSRB31024, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, Flight RB5 5G Platform, Immersive Home 214 Platform, Immersive Home 216 Platform, Immersive Home 316 Platform, Immersive Home 318 Platform, Immersive Home 326 Platform, Immersive Home 3210 Platform, IPQ5010, IPQ5028, IPQ5332, IPQ6000, IPQ6010, IPQ6018, IPQ6028, IPQ8064, IPQ8065, IPQ8068, IPQ8070A, IPQ8071A, IPQ8072A, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078, IPQ8078A, IPQ8173, IPQ8174, IPQ9008, IPQ9554, IPQ9570, IPQ9574, PMP8074, QAM8255P, QAM8295P, QAM8650P, QAM8775P, QCA0000, QCA1062, QCA1064, QCA2062, QCA2064, QCA2065, QCA2066, QCA4024, QCA6391, QCA6420 and QCA6421. It has been declared as critical. This vulnerability affects an unknown function of the component WPA IES. The manipulation with an unknown input leads to a denial of service vulnerability. The CWE definition for the vulnerability is CWE-404. The product does not release or incorrectly releases a resource before it is made available for re-use. As an impact it is known to affect availability.
The weakness was shared 12/05/2023. The advisory is shared for download at qualcomm.com. This vulnerability was named CVE-2023-33098 since 05/17/2023. There are neither technical details nor an exploit publicly available. The MITRE ATT&CK project declares the attack technique as T1499.
Upgrading eliminates this vulnerability.
Product
Vendor
Name
- 4 Gen 1 Mobile Platform
- 4 Gen 2 Mobile Platform
- 7c+ Gen 3 Compute
- 8 Gen 1 Mobile Platform
- 8 Gen 2 Mobile Platform
- 8+ Gen 1 Mobile Platform
- 8+ Gen 2 Mobile Platform
- 8c Compute Platform SC8180X-AD Poipu Lite
- 8c Compute Platform SC8180XP-AD Poipu Lite
- 8cx Compute Platform SC8180X-AA
- 8cx Compute Platform SC8180XP-AC
- 8cx Gen 2 5G Compute Platform SC8180X-AC
- 8cx Gen 2 5G Compute Platform SC8180XP-AA
- 8cx Gen 3 Compute Platform SC8280XP-AB
- 315 5G IoT Modem
- 480 5G Mobile Platform
- 480+ 5G Mobile Platform SM4350-AC
- 660 Mobile Platform
- 690 5G Mobile Platform
- 695 5G Mobile Platform
- 750G 5G Mobile Platform
- 765 5G Mobile Platform SM7250-AA
- 765G 5G Mobile Platform SM7250-AB
- 768G 5G Mobile Platform SM7250-AC
- 778G+ 5G Mobile Platform SM7325-AE
- 778G 5G Mobile Platform
- 780G 5G Mobile Platform
- 782G Mobile Platform SM7325-AF
- 865 5G Mobile Platform
- 865+ 5G Mobile Platform SM8250-AB
- 870 5G Mobile Platform SM8250-AC
- 888 5G Mobile Platform
- 888+ 5G Mobile Platform SM8350-AC
- AB
- AF Poipu Pro
- AQT1000
- AR2 Gen 1 Platform
- AR8031
- AR8035
- AR9380
- Auto 4G Modem
- Auto 5G Modem-RF
- Auto 5G Modem-RF Gen 2
- BB
- CSR8811
- CSRA6620
- CSRA6640
- CSRB31024
- FastConnect 6200
- FastConnect 6700
- FastConnect 6800
- FastConnect 6900
- FastConnect 7800
- Flight RB5 5G Platform
- Immersive Home 214 Platform
- Immersive Home 216 Platform
- Immersive Home 316 Platform
- Immersive Home 318 Platform
- Immersive Home 326 Platform
- Immersive Home 3210 Platform
- IPQ5010
- IPQ5028
- IPQ5332
- IPQ6000
- IPQ6010
- IPQ6018
- IPQ6028
- IPQ8064
- IPQ8065
- IPQ8068
- IPQ8070A
- IPQ8071A
- IPQ8072A
- IPQ8074A
- IPQ8076
- IPQ8076A
- IPQ8078
- IPQ8078A
- IPQ8173
- IPQ8174
- IPQ9008
- IPQ9554
- IPQ9570
- IPQ9574
- PMP8074
- QAM8255P
- QAM8295P
- QAM8650P
- QAM8775P
- QCA0000
- QCA1062
- QCA1064
- QCA2062
- QCA2064
- QCA2065
- QCA2066
- QCA4024
- QCA6391
- QCA6420
- QCA6421
- QCA6426
- QCA6430
- QCA6431
- QCA6436
- QCA6554A
- QCA6564AU
- QCA6574
- QCA6574A
- QCA6574AU
- QCA6584AU
- QCA6595
- QCA6595AU
- QCA6678AQ
- QCA6696
- QCA6698AQ
- QCA6797AQ
- QCA8072
- QCA8075
- QCA8081
- QCA8082
- QCA8084
- QCA8085
- QCA8337
- QCA8386
- QCA9377
- QCA9886
- QCA9888
- QCA9889
- QCA9980
- QCA9984
- QCA9985
- QCA9986
- QCA9990
- QCA9992
- QCA9994
- QCC710
- QCC2073
- QCC2076
- QCF8000
- QCF8001
- QCM2290
- QCM4290
- QCM4490
- QCM5430
- QCM6490
- QCM8550
- QCN5021
- QCN5022
- QCN5024
- QCN5052
- QCN5054
- QCN5122
- QCN5124
- QCN5152
- QCN5154
- QCN5164
- QCN6023
- QCN6024
- QCN6100
- QCN6102
- QCN6112
- QCN6122
- QCN6132
- QCN6224
- QCN6274
- QCN7605
- QCN7606
- QCN9000
- QCN9001
- QCN9002
- QCN9003
- QCN9011
- QCN9012
- QCN9013
- QCN9022
- QCN9024
- QCN9070
- QCN9072
- QCN9074
- QCN9100
- QCN9274
- QCS2290
- QCS4290
- QCS4490
- QCS5430
- QCS6490
- QCS7230
- QCS8250
- QCS8550
- QFW
- QFW7114
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔒VulDB CVSS-BT Score: 🔒
VulDB Vector: 🔒
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.5VulDB Meta Temp Score: 7.3
VulDB Base Score: 7.5
VulDB Temp Score: 7.2
VulDB Vector: 🔒
VulDB Reliability: 🔍
CNA Base Score: 7.5
CNA Vector (Qualcomm, Inc.): 🔒
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Exploiting
Class: Denial of serviceCWE: CWE-404
CAPEC: 🔒
ATT&CK: 🔒
Local: No
Remote: Yes
Availability: 🔒
Status: Not defined
EPSS Score: 🔒
EPSS Percentile: 🔒
Price Prediction: 🔍
Current Price Estimation: 🔒
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔒
Timeline
05/17/2023 CVE reserved12/05/2023 Advisory disclosed
12/05/2023 VulDB entry created
12/05/2023 VulDB entry last update
Sources
Vendor: qualcomm.comAdvisory: qualcomm.com
Status: Confirmed
CVE: CVE-2023-33098 (🔒)
Entry
Created: 12/05/2023 09:16Changes: 12/05/2023 09:16 (47)
Complete: 🔍
Cache ID: 3:8EA:103
No comments yet. Languages: en.
Please log in to comment.