CVE-2022-33298
MEDIUM
Published 2023-04-04T04:46:49.005Z
Actions:
CVSS Score
V3.1
6.7
/10
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Base Score Metrics
Exploitability: N/A
Impact: N/A
EPSS Score
v2023.03.01
0.000
probability
of exploitation in the wild
There is a 0.0% chance that this vulnerability will be exploited in the wild within the next 30 days.
Updated: 2025-01-25
Exploit Probability
Percentile: 0.149
Higher than 14.9% of all CVEs
Attack Vector Metrics
Impact Metrics
Description
Memory corruption due to use after free in Modem while modem initialization.
Available Exploits
No exploits available for this CVE.
Related News
No news articles found for this CVE.
Affected Products
Affected Versions:
AQT1000
FastConnect 6200
FastConnect 6800
FastConnect 6900
QCA6310
QCA6320
QCA6391
QCA6420
QCA6426
QCA6430
QCA6436
QCA6564
QCA6564AU
QCA6574A
QCA6574AU
QCA6595AU
QCA6696
SA6145P
SA6150P
SA6155P
SA8145P
SA8150P
SA8155P
SA8195P
SD730
SD835
SD855
SD865 5G
SDX55
SM6250
Snapdragon 4 Gen 1 Mobile Platform
Snapdragon 480 5G Mobile Platform
Snapdragon 480+ 5G Mobile Platform (SM4350-AC)
Snapdragon 675 Mobile Platform
Snapdragon 678 Mobile Platform (SM6150-AC)
Snapdragon 695 5G Mobile Platform
Snapdragon 710 Mobile Platform
Snapdragon 720G Mobile Platform
Snapdragon 730 Mobile Platform (SM7150-AA)
Snapdragon 730G Mobile Platform (SM7150-AB)
Snapdragon 732G Mobile Platform (SM7150-AC)
Snapdragon 835 Mobile Platform
Snapdragon 855 Mobile Platform
Snapdragon 855+/860 Mobile Platform (SM8150-AC)
Snapdragon 865 5G Mobile Platform
Snapdragon 865+ 5G Mobile Platform (SM8250-AB)
Snapdragon 870 5G Mobile Platform (SM8250-AC)
Snapdragon W5+ Gen 1 Wearable Platform
Snapdragon Wear 4100+ Platform
Snapdragon X50 5G Modem-RF System
Snapdragon X55 5G Modem-RF System
Snapdragon XR1 Platform
Snapdragon XR2 5G Platform
SW5100
SW5100P
SXR1120
SXR2130
WCD9326
WCD9335
WCD9340
WCD9341
WCD9370
WCD9375
WCD9380
WCD9385
WCN3610
WCN3660B
WCN3680B
WCN3950
WCN3980
WCN3988
WCN3990
WSA8810
WSA8815
WSA8830
WSA8835
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Published: 2023-04-04T04:46:49.005Z
Last Modified: 2024-08-03T08:01:20.586Z
Copied to clipboard!