Lucene search

K
cve[email protected]CVE-2022-33216
HistoryFeb 12, 2023 - 4:15 a.m.

CVE-2022-33216

2023-02-1204:15:13
CWE-20
web.nvd.nist.gov
47
cve-2022-33216
transient dos
automotive
input validation
elf file
nvd

6 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H

5.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.6%

Transient Denial-of-service in Automotive due to improper input validation while parsing ELF file.

Affected configurations

NVD
Node
qualcommqam8295pMatch-
AND
qualcommqam8295p_firmwareMatch-
Node
qualcommqca6574aMatch-
AND
qualcommqca6574a_firmwareMatch-
Node
qualcommqca6574auMatch-
AND
qualcommqca6574au_firmwareMatch-
Node
qualcommqca6595Match-
AND
qualcommqca6595_firmwareMatch-
Node
qualcommqca6595auMatch-
AND
qualcommqca6595au_firmwareMatch-
Node
qualcommqca6696Match-
AND
qualcommqca6696_firmwareMatch-
Node
qualcommsa6145pMatch-
AND
qualcommsa6145p_firmwareMatch-
Node
qualcommsa6150pMatch-
AND
qualcommsa6150p_firmwareMatch-
Node
qualcommsa6155Match-
AND
qualcommsa6155_firmwareMatch-
Node
qualcommsa6155p_firmwareMatch-
AND
qualcommsa6155pMatch-
Node
qualcommsa8145p_firmwareMatch-
AND
qualcommsa8145pMatch-
Node
qualcommsa8150p_firmwareMatch-
AND
qualcommsa8150pMatch-
Node
qualcommsa8155_firmwareMatch-
AND
qualcommsa8155Match-
Node
qualcommsa8155p_firmwareMatch-
AND
qualcommsa8155pMatch-
Node
qualcommsa8195p_firmwareMatch-
AND
qualcommsa8195pMatch-
Node
qualcommsa8295p_firmwareMatch-
AND
qualcommsa8295pMatch-
Node
qualcommsa8540p_firmwareMatch-
AND
qualcommsa8540pMatch-
Node
qualcommsa9000p_firmwareMatch-
AND
qualcommsa9000pMatch-

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "platforms": [
      "Snapdragon Auto"
    ],
    "product": "Snapdragon",
    "vendor": "Qualcomm, Inc.",
    "versions": [
      {
        "status": "affected",
        "version": "QAM8295P"
      },
      {
        "status": "affected",
        "version": "QCA6574A"
      },
      {
        "status": "affected",
        "version": "QCA6574AU"
      },
      {
        "status": "affected",
        "version": "QCA6595"
      },
      {
        "status": "affected",
        "version": "QCA6595AU"
      },
      {
        "status": "affected",
        "version": "QCA6696"
      },
      {
        "status": "affected",
        "version": "SA6145P"
      },
      {
        "status": "affected",
        "version": "SA6150P"
      },
      {
        "status": "affected",
        "version": "SA6155"
      },
      {
        "status": "affected",
        "version": "SA6155P"
      },
      {
        "status": "affected",
        "version": "SA8145P"
      },
      {
        "status": "affected",
        "version": "SA8150P"
      },
      {
        "status": "affected",
        "version": "SA8155"
      },
      {
        "status": "affected",
        "version": "SA8155P"
      },
      {
        "status": "affected",
        "version": "SA8195P"
      },
      {
        "status": "affected",
        "version": "SA8295P"
      },
      {
        "status": "affected",
        "version": "SA8540P"
      },
      {
        "status": "affected",
        "version": "SA9000P"
      }
    ]
  }
]

6 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H

5.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.6%

Related for CVE-2022-33216