Internet Explorer Transient DOS via TID-to-Link Mapping IE Elements
CVE-2024-33020 Published on August 5, 2024

Buffer Over-read in WLAN HOST
Transient DOS while processing TID-to-link mapping IE elements.

NVD

Vulnerability Analysis

CVE-2024-33020 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
NONE
Integrity Impact:
NONE
Availability Impact:
HIGH

Weakness Type

Buffer Over-read

The software reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer. This typically occurs when the pointer or its index is incremented to a position beyond the bounds of the buffer or when pointer arithmetic results in a position outside of the valid memory location to name a few. This may result in exposure of sensitive information or possibly a crash.


Products Associated with CVE-2024-33020

stack.watch emails you whenever new vulnerabilities are published in Google Android or Microsoft Internet Explorer (IE). Just hit a watch button to start following.

 
 

Affected Versions

Qualcomm, Inc. Snapdragon: qualcomm ar8035_firmware: qualcomm fastconnect_6700_firmware: qualcomm fastconnect_6800_firmware: qualcomm fastconnect_6900_firmware: qualcomm fastconnect_7800_firmware: qualcomm flight_rb5_5g_platform_firmware: qualcomm qam8255p_firmware: qualcomm qam8620p_firmware: qualcomm qam8650p_firmware: qualcomm qam8775p_firmware: qualcomm qamsrv1h_firmware: qualcomm qamsrv1m_firmware: qualcomm qca6391_firmware: qualcomm qca6426_firmware: qualcomm qca6436_firmware: qualcomm qca6554a_firmware: qualcomm qca6564au_firmware: qualcomm qca6574_firmware: qualcomm qca6574a_firmware: qualcomm qca6574au_firmware: qualcomm qca6584au_firmware: qualcomm qca6595_firmware: qualcomm qca6595au_firmware: qualcomm qca6678aq_firmware: qualcomm qca6688aq_firmware: qualcomm qca6696_firmware: qualcomm qca6698aq_firmware: qualcomm qca6797aq_firmware: qualcomm qca8081_firmware: qualcomm qca8337_firmware: qualcomm qcc2073_firmware: qualcomm qcc2076_firmware: qualcomm qcc710_firmware: qualcomm qcm5430_firmware: qualcomm qcm6490_firmware: qualcomm qcm8550_firmware: qualcomm qcn6224_firmware: qualcomm qcn6274_firmware: qualcomm qcs5430_firmware: qualcomm qcs6490_firmware: qualcomm qcs7230_firmware: qualcomm qcs8250_firmware: qualcomm qcs8550_firmware: qualcomm qfw7114_firmware: qualcomm qfw7124_firmware: qualcomm qrb5165n_firmware: qualcomm_video_collaboration_vc3_platform_firmware: qualcomm_video_collaboration_vc5_platform_firmware: qualcomm robotics_rb5_platform_firmware: qualcomm sa6155p_firmware: qualcomm sa7255p_firmware: qualcomm sa7775p_firmware: qualcomm sa8155p_firmware: qualcomm sa8195p_firmware: qualcomm sa8255p_firmware: qualcomm sa8620p_firmware: qualcomm sa8650p_firmware: qualcomm sa8770p_firmware: qualcomm sa8775p_firmware: qualcomm sa9000p_firmware: qualcomm sd865_5g_firmware: qualcomm sm8550p_firmware: qualcomm snapdragon_8_gen_2_mobile_platform_firmware: qualcomm snapdragon_8_gen_3_mobile_platform_firmware: qualcomm snapdragon_865_5g_mobile_platform_firmware: qualcomm snapdragon_ar2_gen_1_platform_firmware: qualcomm snapdragon_auto_5g_modem-rf_gen_2_firmware: qualcomm snapdragon_x55_5g_modem-rf_system_firmware: qualcomm snapdragon_x72_5g_modem-rf_system_firmware: qualcomm snapdragon_x75_5g_modem-rf_system_firmware: qualcomm snapdragon_xr2_5g_platform_firmware: qualcomm srv1h_firmware: qualcomm srv1l_firmware: qualcomm srv1m_firmware: qualcomm ssg2115p_firmware: qualcomm ssg2125p_firmware: qualcomm sxr1230p_firmware: qualcomm sxr2130_firmware: qualcomm sxr2230p_firmware: qualcomm sxr2250p_firmware: qualcomm wcd9340_firmware: qualcomm wcd9370_firmware: qualcomm wcd9375_firmware: qualcomm wcd9380_firmware: qualcomm wcd9385_firmware: qualcomm wcd9390_firmware: qualcomm wcd9395_firmware: qualcomm wsa8810_firmware: qualcomm wsa8815_firmware: qualcomm wsa8830_firmware: qualcomm wsa8832_firmware: qualcomm wsa8835_firmware: qualcomm wsa8840_firmware: qualcomm wsa8845_firmware: qualcomm wsa8845h_firmware:

Exploit Probability

EPSS
0.41%
Percentile
60.73%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.