CVE-2022-33300

CVSS V2 None CVSS V3 None
Description
Memory corruption in Automotive Android OS due to improper input validation.
Overview
  • CVE ID
  • CVE-2022-33300
  • Assigner
  • product-security@qualcomm.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2023-01-09T08:15:12
  • Last Modified Date
  • 2023-04-19T17:10:55
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qcc5100_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qcc5100:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qcn9011:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qcn9012:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qrb5165_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qrb5165:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qrb5165m:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd_8_gen1_5g:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd660:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sdx12_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sdx12:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wcn7850_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wcn7850:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wcn7851_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wcn7851:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:* 0 OR
History
Created Old Value New Value Data Type Notes
2023-01-09 08:20:37 Added to TrackCVE
2023-01-09 13:18:13 2023-01-09T12:40:16 CVE Modified Date updated
2023-01-09 13:18:13 Received Awaiting Analysis Vulnerability Status updated
2023-01-12 11:15:35 Awaiting Analysis Undergoing Analysis Vulnerability Status updated
2023-01-12 21:14:55 2023-01-12T20:51:42 CVE Modified Date updated
2023-01-12 21:14:55 Undergoing Analysis Analyzed Vulnerability Status updated
2023-01-12 21:14:55 Weakness Enumeration new
2023-01-12 21:15:00 CPE Information updated
2023-04-19 18:02:58 2023-04-19T17:10:55 CVE Modified Date updated