Vulnerability Description
Transient DOS due to buffer over-read in WLAN firmware while parsing cipher suite info attributes. in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qualcomm | Ar8035 Firmware | - |
| Qualcomm | Ar8035 | - |
| Qualcomm | Csr8811 Firmware | - |
| Qualcomm | Csr8811 | - |
| Qualcomm | Ipq5010 Firmware | - |
| Qualcomm | Ipq5010 | - |
| Qualcomm | Ipq5018 Firmware | - |
| Qualcomm | Ipq5018 | - |
| Qualcomm | Ipq5028 Firmware | - |
| Qualcomm | Ipq5028 | - |
| Qualcomm | Ipq6000 Firmware | - |
| Qualcomm | Ipq6000 | - |
| Qualcomm | Ipq6010 Firmware | - |
| Qualcomm | Ipq6010 | - |
| Qualcomm | Ipq6018 Firmware | - |
| Qualcomm | Ipq6018 | - |
| Qualcomm | Ipq6028 Firmware | - |
| Qualcomm | Ipq6028 | - |
| Qualcomm | Ipq8070A Firmware | - |
| Qualcomm | Ipq8070A | - |
Related Weaknesses (CWE)
References
- https://www.qualcomm.com/company/product-security/bulletins/november-2022-bulletVendor Advisory
- https://www.qualcomm.com/company/product-security/bulletins/november-2022-bulletVendor Advisory
FAQ
What is CVE-2022-33236?
CVE-2022-33236 is a vulnerability with a CVSS score of 7.5 (HIGH). Transient DOS due to buffer over-read in WLAN firmware while parsing cipher suite info attributes. in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Mobile, Snapdragon Wired Infrastructure an...
How severe is CVE-2022-33236?
CVE-2022-33236 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-33236?
Check the references section above for vendor advisories and patch information. Affected products include: Qualcomm Ar8035 Firmware, Qualcomm Ar8035, Qualcomm Csr8811 Firmware, Qualcomm Csr8811, Qualcomm Ipq5010 Firmware.