Vulnerabilities (CVE)

Filtered by vendor Qualcomm Subscribe
Filtered by product Snapdragon X55 5g Firmware
Total 29 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-43057 1 Qualcomm 306 Ar8035, Ar8035 Firmware, C-v2x 9150 and 303 more 2025-08-11 N/A 7.8 HIGH
Memory corruption while processing command in Glink linux.
CVE-2023-24854 1 Qualcomm 326 215, 215 Firmware, Ar8035 and 323 more 2025-08-11 N/A 7.8 HIGH
Memory Corruption in WLAN HOST while parsing QMI WLAN Firmware response message.
CVE-2023-21633 1 Qualcomm 194 Apq8064au, Apq8064au Firmware, Aqt1000 and 191 more 2025-08-11 N/A 6.7 MEDIUM
Memory Corruption in Linux while processing QcRilRequestImsRegisterMultiIdentityMessage request.
CVE-2023-21629 1 Qualcomm 424 205, 205 Firmware, 215 and 421 more 2025-08-11 N/A 6.8 MEDIUM
Memory Corruption in Modem due to double free while parsing the PKCS15 sim files.
CVE-2025-21424 1 Qualcomm 478 215, 215 Firmware, 315 5g Iot Modem and 475 more 2025-08-11 N/A 7.8 HIGH
Memory corruption while calling the NPU driver APIs concurrently.
CVE-2023-22667 1 Qualcomm 410 205, 205 Firmware, 215 and 407 more 2025-08-11 N/A 8.4 HIGH
Memory Corruption in Audio while allocating the ion buffer during the music playback.
CVE-2023-22387 1 Qualcomm 542 205, 205 Firmware, 215 and 539 more 2025-08-11 N/A 7.8 HIGH
Arbitrary memory overwrite when VM gets compromised in TX write leading to Memory Corruption.
CVE-2024-53014 1 Qualcomm 502 215, 215 Firmware, 315 5g Iot Modem and 499 more 2025-08-11 N/A 7.8 HIGH
Memory corruption may occur while validating ports and channels in Audio driver.
CVE-2023-28542 1 Qualcomm 376 315 5g Iot, 315 5g Iot Firmware, Apq8064au and 373 more 2025-08-11 N/A 7.8 HIGH
Memory Corruption in WLAN HOST while fetching TX status information.
CVE-2023-21631 1 Qualcomm 320 205, 205 Firmware, 215 and 317 more 2025-08-11 N/A 7.5 HIGH
Weak Configuration due to improper input validation in Modem while processing LTE security mode command message received from network.
CVE-2023-22386 1 Qualcomm 402 215, 215 Firmware, Ar8035 and 399 more 2025-08-11 N/A 7.8 HIGH
Memory Corruption in WLAN HOST while processing WLAN FW request to allocate memory.
CVE-2023-28541 1 Qualcomm 398 Aqt1000, Aqt1000 Firmware, Ar8031 and 395 more 2025-08-11 N/A 7.8 HIGH
Memory Corruption in Data Modem while processing DMA buffer release event about CFR data.
CVE-2024-43056 1 Qualcomm 384 Aqt1000, Aqt1000 Firmware, Ar8035 and 381 more 2025-08-11 N/A 5.5 MEDIUM
Transient DOS during hypervisor virtual I/O operation in a virtual machine.
CVE-2024-53027 1 Qualcomm 424 205, 205 Firmware, Apq8017 and 421 more 2025-08-11 N/A 7.5 HIGH
Transient DOS may occur while processing the country IE.
CVE-2024-43051 1 Qualcomm 488 Aqt1000, Aqt1000 Firmware, Ar8031 and 485 more 2025-08-11 N/A 5.5 MEDIUM
Information disclosure while deriving keys for a session for any Widevine use case.
CVE-2023-24851 1 Qualcomm 382 Ar8035, Ar8035 Firmware, Csr8811 and 379 more 2025-08-11 N/A 7.8 HIGH
Memory Corruption in WLAN HOST while parsing QMI response message from firmware.
CVE-2023-33021 1 Qualcomm 336 Apq8064au, Apq8064au Firmware, Aqt1000 and 333 more 2024-11-21 N/A 8.4 HIGH
Memory corruption in Graphics while processing user packets for command submission.
CVE-2023-33015 1 Qualcomm 388 315 5g, 315 5g Firmware, Aqt1000 and 385 more 2024-11-21 N/A 7.5 HIGH
Transient DOS in WLAN Firmware while interpreting MBSSID IE of a received beacon frame.
CVE-2023-28577 1 Qualcomm 62 Fastconnect 6800, Fastconnect 6800 Firmware, Fastconnect 6900 and 59 more 2024-11-21 N/A 6.7 MEDIUM
In the function call related to CAM_REQ_MGR_RELEASE_BUF there is no check if the buffer is being used. So when a function called cam_mem_get_cpu_buf to get the kernel va to use, another thread can call CAM_REQ_MGR_RELEASE_BUF to unmap the kernel va which cause UAF of the kernel address.
CVE-2023-28576 1 Qualcomm 62 Fastconnect 6800, Fastconnect 6800 Firmware, Fastconnect 6900 and 59 more 2024-11-21 N/A 6.4 MEDIUM
The buffer obtained from kernel APIs such as cam_mem_get_cpu_buf() may be readable/writable in userspace after kernel accesses it. In other words, user mode may race and modify the packet header (e.g. header.count), causing checks (e.g. size checks) in kernel code to be invalid. This may lead to out-of-bounds read/write issues.