HIGH · 7.5

CVE-2022-40527

Transient DOS due to reachable assertion in WLAN while processing PEER ID populated by TQM.

Vulnerability Description

Transient DOS due to reachable assertion in WLAN while processing PEER ID populated by TQM.

CVSS Score

7.5

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
QualcommAr8035 Firmware-
QualcommAr8035-
QualcommCsr8811 Firmware-
QualcommCsr8811-
QualcommIpq5010 Firmware-
QualcommIpq5010-
QualcommIpq5018 Firmware-
QualcommIpq5018-
QualcommIpq5028 Firmware-
QualcommIpq5028-
QualcommIpq6000 Firmware-
QualcommIpq6000-
QualcommIpq6010 Firmware-
QualcommIpq6010-
QualcommIpq6018 Firmware-
QualcommIpq6018-
QualcommIpq6028 Firmware-
QualcommIpq6028-
QualcommIpq8070 Firmware-
QualcommIpq8070-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2022-40527?

CVE-2022-40527 is a vulnerability with a CVSS score of 7.5 (HIGH). Transient DOS due to reachable assertion in WLAN while processing PEER ID populated by TQM.

How severe is CVE-2022-40527?

CVE-2022-40527 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2022-40527?

Check the references section above for vendor advisories and patch information. Affected products include: Qualcomm Ar8035 Firmware, Qualcomm Ar8035, Qualcomm Csr8811 Firmware, Qualcomm Csr8811, Qualcomm Ipq5010 Firmware.