Lucene search

K
vulnrichmentQualcommVULNRICHMENT:CVE-2023-43543
HistoryJun 03, 2024 - 10:05 a.m.

CVE-2023-43543 Use After Free in Audio

2024-06-0310:05:17
CWE-416
qualcomm
github.com
3
cve-2023-43543
use after free
memory corruption
audio
race condition

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.1

Confidence

High

EPSS

0

Percentile

9.0%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Memory corruption in Audio during a playback or a recording due to race condition between allocation and deallocation of graph object.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*"
    ],
    "vendor": "qualcomm",
    "product": "qam8255p_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "*"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*"
    ],
    "vendor": "qualcomm",
    "product": "qam8775p_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "*"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*"
    ],
    "vendor": "qualcomm",
    "product": "qca6584au_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "*"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*"
    ],
    "vendor": "qualcomm",
    "product": "qca6698aq_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "*"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*"
    ],
    "vendor": "qualcomm",
    "product": "sa8255p_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "*"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*"
    ],
    "vendor": "qualcomm",
    "product": "sa8770p_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "*"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*"
    ],
    "vendor": "qualcomm",
    "product": "sa8775p_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "*"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*"
    ],
    "vendor": "qualcomm",
    "product": "sa9000p_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "*"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*"
    ],
    "vendor": "qualcomm",
    "product": "snapdragon_auto_5g_modem-rf_gen_2_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "*"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*"
    ],
    "vendor": "qualcomm",
    "product": "sw5100_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "*"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*"
    ],
    "vendor": "qualcomm",
    "product": "sw5100p_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "*"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*"
    ],
    "vendor": "qualcomm",
    "product": "wcn3980_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "*"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*"
    ],
    "vendor": "qualcomm",
    "product": "wcn3988_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "*"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*"
    ],
    "vendor": "qualcomm",
    "product": "wsa8830_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "*"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*"
    ],
    "vendor": "qualcomm",
    "product": "wsa8835_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "*"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*"
    ],
    "vendor": "qualcomm",
    "product": "snapdragon_w5\\+_gen_1_wearable_platform_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "*"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.1

Confidence

High

EPSS

0

Percentile

9.0%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2023-43543