A vulnerability was found in
Qualcomm 8 Gen 2 Mobile Platform, 8+ Gen 2 Mobile Platform, 8cx Gen 3 Compute Platform SC8280XP-AB, AR2 Gen 1 Platform, AR8035, BB, FastConnect 6900, FastConnect 7800, Flight RB5 5G Platform, QAM8295P, QCA6391, QCA6574AU, QCA6595, QCA6696, QCA6698AQ, QCA8081, QCA8337, QCM8550, QCN6024, QCN9011, QCN9012, QCN9024, QCS7230, QCS8250, QCS8550, QRB5165M, QRB5165N, Qualcomm Video Collaboration VC5 Platform, Robotics RB5 Platform, SA8295P, SA8540P, SA9000P, SG8275P, SM8550P, SSG2115P, SSG2125P, SXR1230P, SXR2230P, WCD9380, WCD9385, WCD9390, WCD9395, WSA8830, WSA8832, WSA8835, WSA8840, WSA8845, WSA8845H, X65 5G Modem-RF System and X70 Modem-RF System. It has been declared as
critical. Affected by this vulnerability is an unknown functionality of the component
Trusted Execution Environment. The manipulation leads to memory corruption.
This vulnerability is known as
CVE-2023-33046. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.