• caglararli@hotmail.com
  • 05386281520

CVE-2023-33076 | Qualcomm 4 Gen 2 Mobile Platform memory corruption

Çağlar Arlı      -    11 Views

CVE-2023-33076 | Qualcomm 4 Gen 2 Mobile Platform memory corruption

A vulnerability was found in Qualcomm 4 Gen 2 Mobile Platform, 8 Gen 1 Mobile Platform, 8 Gen 2 Mobile Platform, 8 Gen 3 Mobile Platform, 8+ Gen 1 Mobile Platform, 8+ Gen 2 Mobile Platform, 8c Compute Platform SC8180X-AD Poipu Lite, 8c Compute Platform SC8180XP-AD Poipu Lite, 8cx Compute Platform SC8180X-AA, 8cx Compute Platform SC8180XP-AC, 8cx Gen 2 5G Compute Platform SC8180X-AC, 8cx Gen 2 5G Compute Platform SC8180XP-AA, 8cx Gen 3 Compute Platform SC8280XP-AB, 670 Mobile Platform, 675 Mobile Platform, 678 Mobile Platform SM6150-AC, 765 5G Mobile Platform SM7250-AA, 765G 5G Mobile Platform SM7250-AB, 768G 5G Mobile Platform SM7250-AC, 845 Mobile Platform, 850 Mobile Compute Platform, 855 Mobile Platform, 855+, 860 Mobile Platform SM8150-AC, 865 5G Mobile Platform, 865+ 5G Mobile Platform SM8250-AB, 870 5G Mobile Platform SM8250-AC, 888 5G Mobile Platform, 888+ 5G Mobile Platform SM8350-AC, AB, AF Poipu Pro, AQT1000, AR2 Gen 1 Platform, AR8035, Auto 5G Modem-RF Gen 2, BB, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, QAM8255P, QAM8295P, QAM8650P, QAM8775P, QAMSRV1H, QAMSRV1M, QCA6174A, QCA6310, QCA6335, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6696, QCA6698AQ, QCA6797AQ, QCA8081, QCA8337, QCA9377, QCC710, QCM4490, QCM8550, QCN6024, QCN6224, QCN6274, QCN9024, QCS4490, QCS8550, QDU1000, QDU1010, QDU1110, QDU1210, QDX1010, QDX1011, QEP8111, QFW7114, QFW7124, QRU1032, QRU1052, QRU1062, QSM8350, Robotics RB3 Platform, SA6145P, SA6155, SA6155P, SA8150P, SA8155 and SA8155P. It has been declared as critical. This vulnerability affects unknown code. The manipulation leads to memory corruption. This vulnerability was named CVE-2023-33076. The attack needs to be approached locally. There is no exploit available. It is recommended to upgrade the affected component.