Vulnerability identifier: #VU75611
Vulnerability risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-119
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
AR8035
Mobile applications /
Mobile firmware & hardware
FastConnect 6200
Mobile applications /
Mobile firmware & hardware
FastConnect 6800
Mobile applications /
Mobile firmware & hardware
FastConnect 6900
Mobile applications /
Mobile firmware & hardware
QAM8295P
Mobile applications /
Mobile firmware & hardware
QCA6391
Mobile applications /
Mobile firmware & hardware
QCA6421
Mobile applications /
Mobile firmware & hardware
QCA6426
Mobile applications /
Mobile firmware & hardware
QCA6431
Mobile applications /
Mobile firmware & hardware
QCA6436
Mobile applications /
Mobile firmware & hardware
QCA6574
Mobile applications /
Mobile firmware & hardware
QCA6574A
Mobile applications /
Mobile firmware & hardware
QCA6595AU
Mobile applications /
Mobile firmware & hardware
QCA6696
Mobile applications /
Mobile firmware & hardware
QCA6698AQ
Mobile applications /
Mobile firmware & hardware
QCA8081
Mobile applications /
Mobile firmware & hardware
QCA8337
Mobile applications /
Mobile firmware & hardware
QSM8350
Mobile applications /
Mobile firmware & hardware
SA4150P
Mobile applications /
Mobile firmware & hardware
SA4155P
Mobile applications /
Mobile firmware & hardware
SA6145P
Mobile applications /
Mobile firmware & hardware
SA6150P
Mobile applications /
Mobile firmware & hardware
SA8145P
Mobile applications /
Mobile firmware & hardware
SA8150P
Mobile applications /
Mobile firmware & hardware
SA8155P
Mobile applications /
Mobile firmware & hardware
SA8195P
Mobile applications /
Mobile firmware & hardware
SA8295P
Mobile applications /
Mobile firmware & hardware
SD 8 Gen1 5G
Mobile applications /
Mobile firmware & hardware
SD865 5G
Mobile applications /
Mobile firmware & hardware
SM7250P
Mobile applications /
Mobile firmware & hardware
Snapdragon 765 5G Mobile Platform (SM7250-AA)
Mobile applications /
Mobile firmware & hardware
Snapdragon 765G 5G Mobile Platform (SM7250-AB)
Mobile applications /
Mobile firmware & hardware
Snapdragon 768G 5G Mobile Platform (SM7250-AC)
Mobile applications /
Mobile firmware & hardware
Snapdragon 8 Gen 1 Mobile Platform
Mobile applications /
Mobile firmware & hardware
Snapdragon 865 5G Mobile Platform
Mobile applications /
Mobile firmware & hardware
Snapdragon 865+ 5G Mobile Platform (SM8250-AB)
Mobile applications /
Mobile firmware & hardware
Snapdragon 870 5G Mobile Platform (SM8250-AC)
Mobile applications /
Mobile firmware & hardware
Snapdragon 888 5G Mobile Platform
Mobile applications /
Mobile firmware & hardware
Snapdragon 888+ 5G Mobile Platform (SM8350-AC)
Mobile applications /
Mobile firmware & hardware
Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB
Mobile applications /
Mobile firmware & hardware
BB)
Mobile applications /
Mobile firmware & hardware
Snapdragon X55 5G Modem-RF System
Mobile applications /
Mobile firmware & hardware
Snapdragon X65 5G Modem-RF System
Mobile applications /
Mobile firmware & hardware
Snapdragon XR2 5G Platform
Mobile applications /
Mobile firmware & hardware
WCD9380
Mobile applications /
Mobile firmware & hardware
WCD9385
Mobile applications /
Mobile firmware & hardware
WSA8810
Mobile applications /
Mobile firmware & hardware
WSA8815
Mobile applications /
Mobile firmware & hardware
WSA8830
Mobile applications /
Mobile firmware & hardware
WSA8835
Mobile applications /
Mobile firmware & hardware
QCA6574AU
Hardware solutions /
Firmware
SA6155P
Hardware solutions /
Firmware
SA8540P
Hardware solutions /
Firmware
SA9000P
Hardware solutions /
Firmware
SXR2130
Hardware solutions /
Firmware
Vendor: Qualcomm
Description
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Automotive. A local application can execute arbitrary code.
Mitigation
Install security update from vendor's website.
Vulnerable software versions
AR8035: All versions
FastConnect 6200: All versions
FastConnect 6800: All versions
FastConnect 6900: All versions
QAM8295P: All versions
QCA6391: All versions
QCA6421: All versions
QCA6426: All versions
QCA6431: All versions
QCA6436: All versions
QCA6574: All versions
QCA6574A: All versions
QCA6574AU: All versions
QCA6595AU: All versions
QCA6696: All versions
QCA6698AQ: All versions
QCA8081: All versions
QCA8337: All versions
QSM8350: All versions
SA4150P: All versions
SA4155P: All versions
SA6145P: All versions
SA6150P: All versions
SA6155P: All versions
SA8145P: All versions
SA8150P: All versions
SA8155P: All versions
SA8195P: All versions
SA8295P: All versions
SA8540P: All versions
SA9000P: All versions
SD 8 Gen1 5G: All versions
SD865 5G: All versions
SM7250P: All versions
Snapdragon 765 5G Mobile Platform (SM7250-AA): All versions
Snapdragon 765G 5G Mobile Platform (SM7250-AB): All versions
Snapdragon 768G 5G Mobile Platform (SM7250-AC): All versions
Snapdragon 8 Gen 1 Mobile Platform: All versions
Snapdragon 865 5G Mobile Platform: All versions
Snapdragon 865+ 5G Mobile Platform (SM8250-AB): All versions
Snapdragon 870 5G Mobile Platform (SM8250-AC): All versions
Snapdragon 888 5G Mobile Platform: All versions
Snapdragon 888+ 5G Mobile Platform (SM8350-AC): All versions
Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB: All versions
BB): All versions
Snapdragon X55 5G Modem-RF System: All versions
Snapdragon X65 5G Modem-RF System: All versions
Snapdragon XR2 5G Platform: All versions
SXR2130: All versions
WCD9380: All versions
WCD9385: All versions
WSA8810: All versions
WSA8815: All versions
WSA8830: All versions
WSA8835: All versions
External links
https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2023-bulletin.html
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.