Vulnerability Description
Transient DOS due to buffer over-read in WLAN firmware while processing PPE threshold. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qualcomm | Aqt1000 Firmware | - |
| Qualcomm | Aqt1000 | - |
| Qualcomm | Ar8031 Firmware | - |
| Qualcomm | Ar8031 | - |
| Qualcomm | Ar8035 Firmware | - |
| Qualcomm | Ar8035 | - |
| Qualcomm | Ar9380 Firmware | - |
| Qualcomm | Ar9380 | - |
| Qualcomm | Csr8811 Firmware | - |
| Qualcomm | Csr8811 | - |
| Qualcomm | Csra6620 Firmware | - |
| Qualcomm | Csra6620 | - |
| Qualcomm | Csra6640 Firmware | - |
| Qualcomm | Csra6640 | - |
| Qualcomm | Csrb31024 Firmware | - |
| Qualcomm | Csrb31024 | - |
| Qualcomm | Ipq4018 Firmware | - |
| Qualcomm | Ipq4018 | - |
| Qualcomm | Ipq4028 Firmware | - |
| Qualcomm | Ipq4028 | - |
Related Weaknesses (CWE)
References
- https://www.qualcomm.com/company/product-security/bulletins/november-2022-bulletVendor Advisory
- https://www.qualcomm.com/company/product-security/bulletins/november-2022-bulletVendor Advisory
FAQ
What is CVE-2022-33237?
CVE-2022-33237 is a vulnerability with a CVSS score of 7.5 (HIGH). Transient DOS due to buffer over-read in WLAN firmware while processing PPE threshold. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Sn...
How severe is CVE-2022-33237?
CVE-2022-33237 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-33237?
Check the references section above for vendor advisories and patch information. Affected products include: Qualcomm Aqt1000 Firmware, Qualcomm Aqt1000, Qualcomm Ar8031 Firmware, Qualcomm Ar8031, Qualcomm Ar8035 Firmware.