Loading HuntDB...

CVE-2022-33213

HIGH
Published 2023-03-07T04:43:22.682Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2022-33213. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
7.5
/10
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score Metrics
Exploitability: N/A Impact: N/A

EPSS Score

v2025.03.14
0.001
probability
of exploitation in the wild

There is a 0.1% chance that this vulnerability will be exploited in the wild within the next 30 days.

Updated: 2025-06-25
Exploit Probability
Percentile: 0.314
Higher than 31.4% of all CVEs

Attack Vector Metrics

Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED

Impact Metrics

Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Description

Memory corruption in modem due to buffer overflow while processing a PPP packet

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

Affected Versions:

APQ8009 APQ8009W APQ8017 APQ8037 APQ8052 APQ8056 APQ8076 APQ8096AU AQT1000 AR6003 AR8035 CSRA6620 CSRA6640 CSRB31024 FSM10055 MDM8207 MDM8215 MDM8215M MDM8615M MDM9150 MDM9205 MDM9206 MDM9207 MDM9215 MDM9230 MDM9250 MDM9310 MDM9330 MDM9607 MDM9615 MDM9615M MDM9628 MDM9630 MDM9640 MDM9650 MDM9655 MSM8108 MSM8208 MSM8209 MSM8608 MSM8909W MSM8917 MSM8920 MSM8937 MSM8940 MSM8952 MSM8956 MSM8976 MSM8976SG MSM8996AU QCA4004 QCA6174 QCA6174A QCA6310 QCA6320 QCA6335 QCA6390 QCA6391 QCA6420 QCA6421 QCA6426 QCA6430 QCA6431 QCA6436 QCA6564A QCA6564AU QCA6574 QCA6574A QCA6574AU QCA6584 QCA6584AU QCA6595AU QCA6696 QCA8081 QCA8337 QCA9367 QCA9377 QCA9379 QCC5100 QCM2290 QCM4290 QCM4325 QCM6125 QCM6490 QCN6024 QCN9024 QCS2290 QCS405 QCS410 QCS4290 QCS603 QCS605 QCS610 QCS6125 QCS6490 QCX315 QET4101 QSW8573 QTS110 Qualcomm215 SA415M SA515M SC8180X+SDX55 SD 455 SD 636 SD 675 SD 8 Gen1 5G SD 8cx Gen2 SD205 SD210 SD429 SD439 SD450 SD460 SD480 SD625 SD626 SD632 SD660 SD662 SD665 SD670 SD675 SD678 SD680 SD690 5G SD695 SD710 SD712 SD720G SD730 SD750G SD765 SD765G SD768G SD778G SD780G SD7c SD820 SD821 SD835 SD845 SD850 SD855 SD865 5G SD870 SD888 SD888 5G SDA429W SDM429W SDM630 SDW2500 SDX12 SDX20 SDX24 SDX50M SDX55 SDX55M SDX57M SDX65 SDX70M SDXR1 SDXR2 5G SG4150P SM6250 SM6250P SM7250P SM7315 SM7325P SW5100 SW5100P WCD9306 WCD9326 WCD9330 WCD9335 WCD9340 WCD9341 WCD9360 WCD9370 WCD9371 WCD9375 WCD9380 WCD9385 WCN3610 WCN3615 WCN3620 WCN3660 WCN3660B WCN3680 WCN3680B WCN3910 WCN3950 WCN3980 WCN3988 WCN3990 WCN3991 WCN3998 WCN6740 WCN6750 WCN6850 WCN6851 WCN6855 WCN6856 WCN7850 WCN7851 WSA8810 WSA8815 WSA8830 WSA8835

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed HIGH

GHSA-jc95-8hq3-w9v4

Advisory Details

Memory corruption in modem due to buffer overflow while processing a PPP packet

CVSS Scoring

CVSS Score

7.5

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: March 10, 2023, Modified: March 15, 2023

References

Published: 2023-03-07T04:43:22.682Z
Last Modified: 2024-08-03T08:01:20.349Z
Copied to clipboard!