#VU71958 Improper Input Validation in Qualcomm products


Vulnerability identifier: #VU71958

Vulnerability risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-34146

CWE-ID: CWE-20

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
CSR8811
Mobile applications / Mobile firmware & hardware
IPQ5010
Mobile applications / Mobile firmware & hardware
IPQ5018
Mobile applications / Mobile firmware & hardware
IPQ5028
Mobile applications / Mobile firmware & hardware
IPQ6000
Mobile applications / Mobile firmware & hardware
IPQ6010
Mobile applications / Mobile firmware & hardware
IPQ6018
Mobile applications / Mobile firmware & hardware
IPQ6028
Mobile applications / Mobile firmware & hardware
IPQ8070A
Mobile applications / Mobile firmware & hardware
IPQ8071A
Mobile applications / Mobile firmware & hardware
IPQ8072A
Mobile applications / Mobile firmware & hardware
IPQ8074A
Mobile applications / Mobile firmware & hardware
IPQ8076
Mobile applications / Mobile firmware & hardware
IPQ8076A
Mobile applications / Mobile firmware & hardware
IPQ8078
Mobile applications / Mobile firmware & hardware
IPQ8078A
Mobile applications / Mobile firmware & hardware
IPQ8173
Mobile applications / Mobile firmware & hardware
IPQ8174
Mobile applications / Mobile firmware & hardware
IPQ9008
Mobile applications / Mobile firmware & hardware
IPQ9574
Mobile applications / Mobile firmware & hardware
QAM8295P
Mobile applications / Mobile firmware & hardware
QCA4024
Mobile applications / Mobile firmware & hardware
QCA6554A
Mobile applications / Mobile firmware & hardware
QCA6564AU
Mobile applications / Mobile firmware & hardware
QCA6574
Mobile applications / Mobile firmware & hardware
QCA6574A
Mobile applications / Mobile firmware & hardware
QCA6584AU
Mobile applications / Mobile firmware & hardware
QCA6595
Mobile applications / Mobile firmware & hardware
QCA6595AU
Mobile applications / Mobile firmware & hardware
QCA6696
Mobile applications / Mobile firmware & hardware
QCA6698AQ
Mobile applications / Mobile firmware & hardware
QCA8072
Mobile applications / Mobile firmware & hardware
QCA8075
Mobile applications / Mobile firmware & hardware
QCA8081
Mobile applications / Mobile firmware & hardware
QCA9888
Mobile applications / Mobile firmware & hardware
QCA9889
Mobile applications / Mobile firmware & hardware
QCM4325
Mobile applications / Mobile firmware & hardware
QCN5022
Mobile applications / Mobile firmware & hardware
QCN5024
Mobile applications / Mobile firmware & hardware
QCN5052
Mobile applications / Mobile firmware & hardware
QCN5054
Mobile applications / Mobile firmware & hardware
QCN5122
Mobile applications / Mobile firmware & hardware
QCN5124
Mobile applications / Mobile firmware & hardware
QCN5152
Mobile applications / Mobile firmware & hardware
QCN5154
Mobile applications / Mobile firmware & hardware
QCN5164
Mobile applications / Mobile firmware & hardware
QCN6023
Mobile applications / Mobile firmware & hardware
QCN6024
Mobile applications / Mobile firmware & hardware
QCN6100
Mobile applications / Mobile firmware & hardware
QCN6102
Mobile applications / Mobile firmware & hardware
QCN6112
Mobile applications / Mobile firmware & hardware
QCN6122
Mobile applications / Mobile firmware & hardware
QCN9000
Mobile applications / Mobile firmware & hardware
QCN9001
Mobile applications / Mobile firmware & hardware
QCN9002
Mobile applications / Mobile firmware & hardware
QCN9003
Mobile applications / Mobile firmware & hardware
QCN9022
Mobile applications / Mobile firmware & hardware
QCN9024
Mobile applications / Mobile firmware & hardware
QCN9070
Mobile applications / Mobile firmware & hardware
QCN9072
Mobile applications / Mobile firmware & hardware
QCN9074
Mobile applications / Mobile firmware & hardware
QCN9100
Mobile applications / Mobile firmware & hardware
QCN9274
Mobile applications / Mobile firmware & hardware
QCS410
Mobile applications / Mobile firmware & hardware
QCS610
Mobile applications / Mobile firmware & hardware
SA4150P
Mobile applications / Mobile firmware & hardware
SA8155P
Mobile applications / Mobile firmware & hardware
SA8195P
Mobile applications / Mobile firmware & hardware
SA8295P
Mobile applications / Mobile firmware & hardware
SD 8 Gen1 5G
Mobile applications / Mobile firmware & hardware
SD680
Mobile applications / Mobile firmware & hardware
SG4150P
Mobile applications / Mobile firmware & hardware
SSG2115P
Mobile applications / Mobile firmware & hardware
SSG2125P
Mobile applications / Mobile firmware & hardware
SXR1230P
Mobile applications / Mobile firmware & hardware
SXR2230P
Mobile applications / Mobile firmware & hardware
WCD9341
Mobile applications / Mobile firmware & hardware
WCD9370
Mobile applications / Mobile firmware & hardware
WCD9375
Mobile applications / Mobile firmware & hardware
WCD9380
Mobile applications / Mobile firmware & hardware
WCD9385
Mobile applications / Mobile firmware & hardware
WCN3950
Mobile applications / Mobile firmware & hardware
WCN3980
Mobile applications / Mobile firmware & hardware
WCN3988
Mobile applications / Mobile firmware & hardware
WCN6740
Mobile applications / Mobile firmware & hardware
WCN6855
Mobile applications / Mobile firmware & hardware
WCN6856
Mobile applications / Mobile firmware & hardware
WCN7850
Mobile applications / Mobile firmware & hardware
WCN7851
Mobile applications / Mobile firmware & hardware
WSA8810
Mobile applications / Mobile firmware & hardware
WSA8815
Mobile applications / Mobile firmware & hardware
WSA8830
Mobile applications / Mobile firmware & hardware
WSA8835
Mobile applications / Mobile firmware & hardware
QCA6574AU
Hardware solutions / Firmware
QCN6132
Hardware solutions / Firmware
SA6155P
Hardware solutions / Firmware
WSA8832
Hardware solutions / Firmware

Vendor: Qualcomm

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Host. A remote attacker can perform a denial of service (DoS) attack.

Mitigation
Install security update from vendor's website.

Vulnerable software versions

CSR8811: All versions

IPQ5010: All versions

IPQ5018: All versions

IPQ5028: All versions

IPQ6000: All versions

IPQ6010: All versions

IPQ6018: All versions

IPQ6028: All versions

IPQ8070A: All versions

IPQ8071A: All versions

IPQ8072A: All versions

IPQ8074A: All versions

IPQ8076: All versions

IPQ8076A: All versions

IPQ8078: All versions

IPQ8078A: All versions

IPQ8173: All versions

IPQ8174: All versions

IPQ9008: All versions

IPQ9574: All versions

QAM8295P: All versions

QCA4024: All versions

QCA6554A: All versions

QCA6564AU: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6584AU: All versions

QCA6595: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA6698AQ: All versions

QCA8072: All versions

QCA8075: All versions

QCA8081: All versions

QCA9888: All versions

QCA9889: All versions

QCM4325: All versions

QCN5022: All versions

QCN5024: All versions

QCN5052: All versions

QCN5054: All versions

QCN5122: All versions

QCN5124: All versions

QCN5152: All versions

QCN5154: All versions

QCN5164: All versions

QCN6023: All versions

QCN6024: All versions

QCN6100: All versions

QCN6102: All versions

QCN6112: All versions

QCN6122: All versions

QCN6132: All versions

QCN9000: All versions

QCN9001: All versions

QCN9002: All versions

QCN9003: All versions

QCN9022: All versions

QCN9024: All versions

QCN9070: All versions

QCN9072: All versions

QCN9074: All versions

QCN9100: All versions

QCN9274: All versions

QCS410: All versions

QCS610: All versions

SA4150P: All versions

SA6155P: All versions

SA8155P: All versions

SA8195P: All versions

SA8295P: All versions

SD 8 Gen1 5G: All versions

SD680: All versions

SG4150P: All versions

SSG2115P: All versions

SSG2125P: All versions

SXR1230P: All versions

SXR2230P: All versions

WCD9341: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN6740: All versions

WCN6855: All versions

WCN6856: All versions

WCN7850: All versions

WCN7851: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8832: All versions

WSA8835: All versions


External links
http://docs.qualcomm.com/product/publicresources/securitybulletin/february-2023-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability