• caglararli@hotmail.com
  • 05386281520

CVE-2023-33036 | Qualcomm 8 Gen 1 Mobile Platform Hypervisor denial of service

Çağlar Arlı      -    20 Views

CVE-2023-33036 | Qualcomm 8 Gen 1 Mobile Platform Hypervisor denial of service

A vulnerability was found in Qualcomm 8 Gen 1 Mobile Platform, 8c Compute Platform SC8180X-AD Poipu Lite, 8c Compute Platform SC8180XP-AD Poipu Lite, 8cx Compute Platform SC8180X-AA, 8cx Compute Platform SC8180XP-AC, 8cx Gen 2 5G Compute Platform SC8180X-AC, 8cx Gen 2 5G Compute Platform SC8180XP-AA, 8cx Gen 3 Compute Platform SC8280XP-AB, 670 Mobile Platform, 675 Mobile Platform, 678 Mobile Platform SM6150-AC, 765 5G Mobile Platform SM7250-AA, 765G 5G Mobile Platform SM7250-AB, 768G 5G Mobile Platform SM7250-AC, 845 Mobile Platform, 850 Mobile Compute Platform, 855 Mobile Platform, 855+, 860 Mobile Platform SM8150-AC, 865 5G Mobile Platform, 865+ 5G Mobile Platform SM8250-AB, 870 5G Mobile Platform SM8250-AC, 888 5G Mobile Platform, 888+ 5G Mobile Platform SM8350-AC, AB, AF Poipu Pro, AQT1000, AR2 Gen 1 Platform, AR8035, BB, FastConnect 6200, FastConnect 6800, FastConnect 6900, FastConnect 7800, QAM8255P, QAM8295P, QAM8650P, QAM8775P, QCA6174A, QCA6310, QCA6335, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6595, QCA6595AU, QCA6696, QCA6698AQ, QCA6797AQ, QCA8081, QCA8337, QCA9377, QCS8550, QSM8350, Robotics RB3 Platform, SA6145P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8255P, SA8295P, SA8540P, SA9000P, SD 8 Gen1 5G, SD 8CX, SD670, SD 675, SD675, SD855, SD865 5G, SDX55, SDX57M, SM7250P, SSG2115P, SSG2125P, SXR1230P, SXR2130, SXR2230P, Vision Intelligence 300 Platform, Vision Intelligence 400 Platform, WCD9326, WCD9340, WCD9341, WCD9370, WCD9375, WCD9380, WCD9385, WCN3950 and WCN3980. It has been declared as problematic. This vulnerability affects unknown code of the component Hypervisor. The manipulation leads to denial of service. This vulnerability was named CVE-2023-33036. Attacking locally is a requirement. There is no exploit available. It is recommended to upgrade the affected component.