Vulnerability identifier: #VU71028
Vulnerability risk: Medium
CVSSv3.1: 4 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-126
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
APQ8009
Hardware solutions /
Firmware
APQ8096AU
Hardware solutions /
Firmware
MDM9150
Hardware solutions /
Firmware
MDM9650
Hardware solutions /
Firmware
MSM8909W
Hardware solutions /
Firmware
MSM8996AU
Hardware solutions /
Firmware
QCA6174A
Hardware solutions /
Firmware
QCA6574AU
Hardware solutions /
Firmware
QCA9377
Hardware solutions /
Firmware
QCA9379
Hardware solutions /
Firmware
SD210
Hardware solutions /
Firmware
SD625
Hardware solutions /
Firmware
SD835
Hardware solutions /
Firmware
SDM429W
Hardware solutions /
Firmware
SDX20
Hardware solutions /
Firmware
APQ8009W
Mobile applications /
Mobile firmware & hardware
APQ8064AU
Mobile applications /
Mobile firmware & hardware
MDM9250
Mobile applications /
Mobile firmware & hardware
MDM9628
Mobile applications /
Mobile firmware & hardware
MSM8108
Mobile applications /
Mobile firmware & hardware
MSM8208
Mobile applications /
Mobile firmware & hardware
MSM8209
Mobile applications /
Mobile firmware & hardware
MSM8608
Mobile applications /
Mobile firmware & hardware
QCA4020
Mobile applications /
Mobile firmware & hardware
QCA6564A
Mobile applications /
Mobile firmware & hardware
QCA6564AU
Mobile applications /
Mobile firmware & hardware
QCA6574
Mobile applications /
Mobile firmware & hardware
QCA6574A
Mobile applications /
Mobile firmware & hardware
QCA6584AU
Mobile applications /
Mobile firmware & hardware
Qualcomm215
Mobile applications /
Mobile firmware & hardware
SD429
Mobile applications /
Mobile firmware & hardware
SD626
Mobile applications /
Mobile firmware & hardware
SDA429W
Mobile applications /
Mobile firmware & hardware
SDW2500
Mobile applications /
Mobile firmware & hardware
SDX20M
Mobile applications /
Mobile firmware & hardware
WCD9326
Mobile applications /
Mobile firmware & hardware
WCD9335
Mobile applications /
Mobile firmware & hardware
WCN3610
Mobile applications /
Mobile firmware & hardware
WCN3615
Mobile applications /
Mobile firmware & hardware
WCN3620
Mobile applications /
Mobile firmware & hardware
WCN3660B
Mobile applications /
Mobile firmware & hardware
WCN3680
Mobile applications /
Mobile firmware & hardware
WCN3680B
Mobile applications /
Mobile firmware & hardware
WCN3980
Mobile applications /
Mobile firmware & hardware
WCN3990
Mobile applications /
Mobile firmware & hardware
WSA8815
Mobile applications /
Mobile firmware & hardware
Vendor: Qualcomm
Description
The vulnerability allows a local attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in BOOT. A local attacker can perform a denial of service (DoS) attack.
Mitigation
Install security update from vendor's website.
Vulnerable software versions
APQ8009: All versions
APQ8009W: All versions
APQ8064AU: All versions
APQ8096AU: All versions
MDM9150: All versions
MDM9250: All versions
MDM9628: All versions
MDM9650: All versions
MSM8108: All versions
MSM8208: All versions
MSM8209: All versions
MSM8608: All versions
MSM8909W: All versions
MSM8996AU: All versions
QCA4020: All versions
QCA6174A: All versions
QCA6564A: All versions
QCA6564AU: All versions
QCA6574: All versions
QCA6574A: All versions
QCA6574AU: All versions
QCA6584AU: All versions
QCA9377: All versions
QCA9379: All versions
Qualcomm215: All versions
SD210: All versions
SD429: All versions
SD625: All versions
SD626: All versions
SD835: All versions
SDA429W: All versions
SDM429W: All versions
SDW2500: All versions
SDX20: All versions
SDX20M: All versions
WCD9326: All versions
WCD9335: All versions
WCN3610: All versions
WCN3615: All versions
WCN3620: All versions
WCN3660B: All versions
WCN3680: All versions
WCN3680B: All versions
WCN3980: All versions
WCN3990: All versions
WSA8815: All versions
External links
http://docs.qualcomm.com/product/publicresources/securitybulletin/january-2023-bulletin.html
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.