Vulnerabilities > Qualcomm > Qcn6432 Firmware > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-10-07 | CVE-2024-33049 | Out-of-bounds Read vulnerability in Qualcomm products Transient DOS while parsing noninheritance IE of Extension element when length of IE is 2 of beacon frame. | 7.5 |
2024-10-07 | CVE-2024-33073 | Out-of-bounds Read vulnerability in Qualcomm products Information disclosure while parsing the BSS parameter change count or MLD capabilities fields of the ML IE. | 8.2 |
2024-10-07 | CVE-2024-38397 | Out-of-bounds Read vulnerability in Qualcomm products Transient DOS while parsing probe response and assoc response frame. | 7.5 |
2024-09-02 | CVE-2024-33048 | Out-of-bounds Read vulnerability in Qualcomm products Transient DOS while parsing the received TID-to-link mapping element of beacon/probe response frame. | 7.5 |
2024-09-02 | CVE-2024-33050 | Out-of-bounds Read vulnerability in Qualcomm products Transient DOS while parsing MBSSID during new IE generation in beacon/probe frame when IE length check is either missing or improper. | 7.5 |
2024-09-02 | CVE-2024-33057 | Out-of-bounds Read vulnerability in Qualcomm products Transient DOS while parsing the multi-link element Control field when common information length check is missing before updating the location. | 7.5 |
2024-07-01 | CVE-2024-21457 | Out-of-bounds Read vulnerability in Qualcomm products INformation disclosure while handling Multi-link IE in beacon frame. | 7.5 |
2024-07-01 | CVE-2024-21458 | Out-of-bounds Read vulnerability in Qualcomm products Information disclosure while handling SA query action frame. | 7.5 |
2024-07-01 | CVE-2024-21466 | Integer Underflow (Wrap or Wraparound) vulnerability in Qualcomm products Information disclosure while parsing sub-IE length during new IE generation. | 7.5 |
2024-07-01 | CVE-2024-21482 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Qualcomm products Memory corruption during the secure boot process, when the `bootm` command is used, it bypasses the authentication of the kernel/rootfs image. | 7.8 |