HIGH · 7.5

CVE-2022-33253

Transient DOS due to buffer over-read in WLAN while parsing corrupted NAN frames.

Vulnerability Description

Transient DOS due to buffer over-read in WLAN while parsing corrupted NAN frames.

CVSS Score

7.5

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
QualcommAqt1000 Firmware-
QualcommAqt1000-
QualcommAr8035 Firmware-
QualcommAr8035-
QualcommAr9380 Firmware-
QualcommAr9380-
QualcommCsr8811 Firmware-
QualcommCsr8811-
QualcommCsrb31024 Firmware-
QualcommCsrb31024-
QualcommIpq5010 Firmware-
QualcommIpq5010-
QualcommIpq5018 Firmware-
QualcommIpq5018-
QualcommIpq5028 Firmware-
QualcommIpq5028-
QualcommIpq6000 Firmware-
QualcommIpq6000-
QualcommIpq6010 Firmware-
QualcommIpq6010-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2022-33253?

CVE-2022-33253 is a vulnerability with a CVSS score of 7.5 (HIGH). Transient DOS due to buffer over-read in WLAN while parsing corrupted NAN frames.

How severe is CVE-2022-33253?

CVE-2022-33253 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2022-33253?

Check the references section above for vendor advisories and patch information. Affected products include: Qualcomm Aqt1000 Firmware, Qualcomm Aqt1000, Qualcomm Ar8035 Firmware, Qualcomm Ar8035, Qualcomm Ar9380 Firmware.