Vulnerability identifier: #VU93528
Vulnerability risk: Medium
CVSSv4.0: 4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-119
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
CSR8811
Mobile applications /
Mobile firmware & hardware
Immersive Home 214 Platform
Mobile applications /
Mobile firmware & hardware
Immersive Home 216 Platform
Mobile applications /
Mobile firmware & hardware
Immersive Home 316 Platform
Mobile applications /
Mobile firmware & hardware
Immersive Home 318 Platform
Mobile applications /
Mobile firmware & hardware
Immersive Home 3210 Platform
Mobile applications /
Mobile firmware & hardware
Immersive Home 326 Platform
Mobile applications /
Mobile firmware & hardware
IPQ5010
Mobile applications /
Mobile firmware & hardware
IPQ5028
Mobile applications /
Mobile firmware & hardware
IPQ5302
Mobile applications /
Mobile firmware & hardware
IPQ5312
Mobile applications /
Mobile firmware & hardware
IPQ5332
Mobile applications /
Mobile firmware & hardware
IPQ6000
Mobile applications /
Mobile firmware & hardware
IPQ6010
Mobile applications /
Mobile firmware & hardware
IPQ6018
Mobile applications /
Mobile firmware & hardware
IPQ6028
Mobile applications /
Mobile firmware & hardware
IPQ8070A
Mobile applications /
Mobile firmware & hardware
IPQ8071A
Mobile applications /
Mobile firmware & hardware
IPQ8072A
Mobile applications /
Mobile firmware & hardware
IPQ8074A
Mobile applications /
Mobile firmware & hardware
IPQ8076
Mobile applications /
Mobile firmware & hardware
IPQ8076A
Mobile applications /
Mobile firmware & hardware
IPQ8078
Mobile applications /
Mobile firmware & hardware
IPQ8078A
Mobile applications /
Mobile firmware & hardware
IPQ8173
Mobile applications /
Mobile firmware & hardware
IPQ8174
Mobile applications /
Mobile firmware & hardware
IPQ9008
Mobile applications /
Mobile firmware & hardware
IPQ9554
Mobile applications /
Mobile firmware & hardware
IPQ9570
Mobile applications /
Mobile firmware & hardware
IPQ9574
Mobile applications /
Mobile firmware & hardware
QCA4024
Mobile applications /
Mobile firmware & hardware
QCA8075
Mobile applications /
Mobile firmware & hardware
QCA8081
Mobile applications /
Mobile firmware & hardware
QCA8082
Mobile applications /
Mobile firmware & hardware
QCA8084
Mobile applications /
Mobile firmware & hardware
QCA8085
Mobile applications /
Mobile firmware & hardware
QCA8386
Mobile applications /
Mobile firmware & hardware
QCA9888
Mobile applications /
Mobile firmware & hardware
QCA9889
Mobile applications /
Mobile firmware & hardware
QCF8000
Mobile applications /
Mobile firmware & hardware
QCF8001
Mobile applications /
Mobile firmware & hardware
QCN5022
Mobile applications /
Mobile firmware & hardware
QCN5024
Mobile applications /
Mobile firmware & hardware
QCN5052
Mobile applications /
Mobile firmware & hardware
QCN5122
Mobile applications /
Mobile firmware & hardware
QCN5124
Mobile applications /
Mobile firmware & hardware
QCN5152
Mobile applications /
Mobile firmware & hardware
QCN5154
Mobile applications /
Mobile firmware & hardware
QCN5164
Mobile applications /
Mobile firmware & hardware
QCN6023
Mobile applications /
Mobile firmware & hardware
QCN6024
Mobile applications /
Mobile firmware & hardware
QCN6112
Mobile applications /
Mobile firmware & hardware
QCN6122
Mobile applications /
Mobile firmware & hardware
QCN6402
Mobile applications /
Mobile firmware & hardware
QCN6412
Mobile applications /
Mobile firmware & hardware
QCN6422
Mobile applications /
Mobile firmware & hardware
QCN6432
Mobile applications /
Mobile firmware & hardware
QCN9000
Mobile applications /
Mobile firmware & hardware
QCN9022
Mobile applications /
Mobile firmware & hardware
QCN9024
Mobile applications /
Mobile firmware & hardware
QCN9070
Mobile applications /
Mobile firmware & hardware
QCN9072
Mobile applications /
Mobile firmware & hardware
QCN9074
Mobile applications /
Mobile firmware & hardware
QCN9100
Mobile applications /
Mobile firmware & hardware
QCN9274
Mobile applications /
Mobile firmware & hardware
SDX65M
Mobile applications /
Mobile firmware & hardware
Snapdragon X65 5G Modem-RF System
Mobile applications /
Mobile firmware & hardware
QCN6132
Hardware solutions /
Firmware
SDX55
Hardware solutions /
Firmware
Vendor: Qualcomm
Description
The vulnerability allows a local attacker to execute arbitrary code.
The vulnerability exists due to improper input validation in Linux Boot Loader. A local attacker can execute arbitrary code.
Mitigation
Install security update from vendor's website.
Vulnerable software versions
CSR8811: All versions
Immersive Home 214 Platform: All versions
Immersive Home 216 Platform: All versions
Immersive Home 316 Platform: All versions
Immersive Home 318 Platform: All versions
Immersive Home 3210 Platform: All versions
Immersive Home 326 Platform: All versions
IPQ5010: All versions
IPQ5028: All versions
IPQ5302: All versions
IPQ5312: All versions
IPQ5332: All versions
IPQ6000: All versions
IPQ6010: All versions
IPQ6018: All versions
IPQ6028: All versions
IPQ8070A: All versions
IPQ8071A: All versions
IPQ8072A: All versions
IPQ8074A: All versions
IPQ8076: All versions
IPQ8076A: All versions
IPQ8078: All versions
IPQ8078A: All versions
IPQ8173: All versions
IPQ8174: All versions
IPQ9008: All versions
IPQ9554: All versions
IPQ9570: All versions
IPQ9574: All versions
QCA4024: All versions
QCA8075: All versions
QCA8081: All versions
QCA8082: All versions
QCA8084: All versions
QCA8085: All versions
QCA8386: All versions
QCA9888: All versions
QCA9889: All versions
QCF8000: All versions
QCF8001: All versions
QCN5022: All versions
QCN5024: All versions
QCN5052: All versions
QCN5122: All versions
QCN5124: All versions
QCN5152: All versions
QCN5154: All versions
QCN5164: All versions
QCN6023: All versions
QCN6024: All versions
QCN6112: All versions
QCN6122: All versions
QCN6132: All versions
QCN6402: All versions
QCN6412: All versions
QCN6422: All versions
QCN6432: All versions
QCN9000: All versions
QCN9022: All versions
QCN9024: All versions
QCN9070: All versions
QCN9072: All versions
QCN9074: All versions
QCN9100: All versions
QCN9274: All versions
SDX55: All versions
SDX65M: All versions
Snapdragon X65 5G Modem-RF System: All versions
External links
https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.