← Volver a CVEs
CVE-2023-28581
CRITICAL9.8
Descripcion
Memory corruption in WLAN Firmware while parsing receieved GTK Keys in GTK KDE.
Detalles CVE
Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado9/5/2023
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
qualcomm:fastconnect_6800qualcomm:fastconnect_6800_firmwarequalcomm:fastconnect_6900qualcomm:fastconnect_6900_firmwarequalcomm:fastconnect_7800qualcomm:fastconnect_7800_firmwarequalcomm:qca6391qualcomm:qca6391_firmwarequalcomm:qca6426qualcomm:qca6426_firmwarequalcomm:qca6436qualcomm:qca6436_firmwarequalcomm:sd865_5gqualcomm:sd865_5g_firmwarequalcomm:sd_8_gen1_5gqualcomm:sd_8_gen1_5g_firmwarequalcomm:snapdragon_865\+_5gqualcomm:snapdragon_865\+_5g_firmwarequalcomm:snapdragon_865_5gqualcomm:snapdragon_865_5g_firmwarequalcomm:snapdragon_870_5gqualcomm:snapdragon_870_5g_firmwarequalcomm:snapdragon_8_gen_1qualcomm:snapdragon_8_gen_1_firmwarequalcomm:snapdragon_ar2_gen_1qualcomm:snapdragon_ar2_gen_1_firmwarequalcomm:snapdragon_xr2_5gqualcomm:snapdragon_xr2_5g_firmwarequalcomm:ssg2115pqualcomm:ssg2115p_firmwarequalcomm:ssg2125pqualcomm:ssg2125p_firmwarequalcomm:sxr1230pqualcomm:sxr1230p_firmwarequalcomm:sxr2230pqualcomm:sxr2230p_firmwarequalcomm:wcd9380qualcomm:wcd9380_firmwarequalcomm:wcd9385qualcomm:wcd9385_firmwarequalcomm:wcn6740qualcomm:wcn6740_firmwarequalcomm:wsa8810qualcomm:wsa8810_firmwarequalcomm:wsa8815qualcomm:wsa8815_firmwarequalcomm:wsa8830qualcomm:wsa8830_firmwarequalcomm:wsa8832qualcomm:wsa8832_firmwarequalcomm:wsa8835qualcomm:wsa8835_firmware
Debilidades (CWE)
CWE-119CWE-787
Referencias
https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin(product-security@qualcomm.com)
https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.