Qualcomm
Products by Qualcomm Sorted by Most Security Vulnerabilities since 2018
Known Exploited Qualcomm Vulnerabilities
The following Qualcomm vulnerabilities have been marked by CISA as Known to be Exploited by threat actors.
Title | Description | Added |
---|---|---|
Qualcomm Multiple Chipsets Integer Overflow Vulnerability | Multiple Qualcomm chipsets contain an integer overflow vulnerability due to memory corruption in Graphics Linux while assigning shared virtual memory region during IOCTL call. CVE-2023-33107 | December 5, 2023 |
Qualcomm Multiple Chipsets Use of Out-of-Range Pointer Offset Vulnerability | Multiple Qualcomm chipsets contain a use of out-of-range pointer offset vulnerability due to memory corruption in Graphics while submitting a large list of sync points in an AUX command to the IOCTL_KGSL_GPU_AUX_COMMAND. CVE-2023-33106 | December 5, 2023 |
Qualcomm Multiple Chipsets Use-After-Free Vulnerability | Multiple Qualcomm chipsets contain a use-after-free vulnerability due to memory corruption in DSP Services during a remote call from HLOS to DSP. CVE-2023-33063 | December 5, 2023 |
Qualcomm Multiple Chipsets Use-After-Free Vulnerability | Multiple Qualcomm chipsets contain a use-after-free vulnerability when process shell memory is freed using IOCTL munmap call and process initialization is in progress. CVE-2022-22071 | December 5, 2023 |
Qualcomm Multiple Chipsets Improper Input Validation Vulnerability | Memory corruption due to improper check to return error when user application requests memory allocation of a huge size in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables CVE-2020-11261 | December 1, 2021 |
Qualcomm Improper Error Handling Vulnerability | Improper handling of address deregistration on failure can lead to new GPU address allocation failure. CVE-2021-1906 | November 3, 2021 |
Qualcomm Use-After-Free Vulnerability | Possible use after free due to improper handling of memory mapping of multiple processes simultaneously CVE-2021-1905 | November 3, 2021 |
By the Year
In 2024 there have been 0 vulnerabilities in Qualcomm . Qualcomm did not have any published security vulnerabilities last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2024 | 0 | 0.00 |
2023 | 0 | 0.00 |
2022 | 0 | 0.00 |
2021 | 2 | 6.50 |
2020 | 2 | 7.10 |
2019 | 1 | 9.80 |
2018 | 0 | 0.00 |
It may take a day or so for new Qualcomm vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Qualcomm Security Vulnerabilities
Potential UE reset while decoding a crafted Sib1 or SIB1
CVE-2020-11268
7.5 - High
- May 07, 2021
Potential UE reset while decoding a crafted Sib1 or SIB1 that schedules unsupported SIBs and can lead to denial of service in Snapdragon Auto, Snapdragon Mobile
Improper Input Validation
Memory corruption during buffer allocation due to dereferencing session ctx pointer without checking if pointer is valid in Snapdragon Auto
CVE-2020-11254
5.5 - Medium
- May 07, 2021
Memory corruption during buffer allocation due to dereferencing session ctx pointer without checking if pointer is valid in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Mobile
NULL Pointer Dereference
The QCMAP_Web_CLIENT binary in the Qualcomm QCMAP software suite prior to versions released in October 2020 does not validate the return value of a strstr() or strchr() call in the Tokenizer() function
CVE-2020-25858
7.5 - High
- October 15, 2020
The QCMAP_Web_CLIENT binary in the Qualcomm QCMAP software suite prior to versions released in October 2020 does not validate the return value of a strstr() or strchr() call in the Tokenizer() function. An attacker who invokes the web interface with a crafted URL can crash the process, causing denial of service. This version of QCMAP is used in many kinds of networking devices, primarily mobile hotspots and LTE routers.
NULL Pointer Dereference
The QCMAP_CLI utility in the Qualcomm QCMAP software suite prior to versions released in October 2020 uses a system() call without validating the input
CVE-2020-25859
6.7 - Medium
- October 15, 2020
The QCMAP_CLI utility in the Qualcomm QCMAP software suite prior to versions released in October 2020 uses a system() call without validating the input, while handling a SetGatewayUrl() request. A local attacker with shell access can pass shell metacharacters and run arbitrary commands. If QCMAP_CLI can be run via sudo or setuid, this also allows elevating privileges to root. This version of QCMAP is used in many kinds of networking devices, primarily mobile hotspots and LTE routers.
Shell injection
Integer overflow to buffer overflow vulnerability in PostScript image handling code used by the PostScript- and PDF-compatible interpreters due to incorrect buffer size calculation
CVE-2019-10627
9.8 - Critical
- November 21, 2019
Integer overflow to buffer overflow vulnerability in PostScript image handling code used by the PostScript- and PDF-compatible interpreters due to incorrect buffer size calculation. in PostScript and PDF printers that use IPS versions prior to 2019.2 in PostScript and PDF printers that use IPS versions prior to 2019.2
Buffer Overflow
qpopper POP server creates lock files with predictable names, which
CVE-2000-1198
5.5 - Medium
- August 31, 2001
qpopper POP server creates lock files with predictable names, which allows local users to cause a denial of service for other users (lack of mail access) by creating lock files for other mail boxes.
Improper Locking
Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names.
CVE-1999-0427
- May 01, 2000
Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names.
Eudora 4.x allows remote attackers to bypass the user warning for executable attachments such as .exe, .com, and .bat by using a .lnk file
CVE-2000-0342
7.5 - High
- April 28, 2000
Eudora 4.x allows remote attackers to bypass the user warning for executable attachments such as .exe, .com, and .bat by using a .lnk file that refers to the attachment, aka "Stealth Attachment."
insecure temporary file
Microsoft HTML control as used in (1) Internet Explorer 5.0, (2) FrontPage Express, (3) Outlook Express 5, and (4) Eudora, and possibly others
CVE-1999-1016
- August 27, 1999
Microsoft HTML control as used in (1) Internet Explorer 5.0, (2) FrontPage Express, (3) Outlook Express 5, and (4) Eudora, and possibly others, allows remote malicious web site or HTML emails to cause a denial of service (100% CPU consumption) via large HTML form fields such as text inputs in a table cell.