CVE-2023-21652
HIGH
Published 2023-08-08T09:14:59.131Z
Actions:
Expert Analysis
Professional remediation guidance
Get tailored security recommendations from our analyst team for CVE-2023-21652. We'll provide specific mitigation strategies based on your environment and risk profile.
CVSS Score
V3.1
7.7
/10
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Base Score Metrics
Exploitability: N/A
Impact: N/A
EPSS Score
v2025.03.14
0.000
probability
of exploitation in the wild
There is a 0.0% chance that this vulnerability will be exploited in the wild within the next 30 days.
Updated: 2025-06-25
Exploit Probability
Percentile: 0.142
Higher than 14.2% of all CVEs
Attack Vector Metrics
Impact Metrics
Description
Cryptographic issue in HLOS as derived keys used to encrypt/decrypt information is present on stack after use.
Available Exploits
No exploits available for this CVE.
Related News
No news articles found for this CVE.
Affected Products
Affected Versions:
AQT1000
AR8035
CSRA6620
CSRA6640
QAM8295P
QCA6390
QCA6391
QCA6420
QCA6421
QCA6426
QCA6430
QCA6431
QCA6436
QCA6574
QCA6574A
QCA6574AU
QCA6595
QCA6595AU
QCA6696
QCA8081
QCA8337
QCC5100
QCM2290
QCM4290
QCM6125
QCM6490
QCN6024
QCN7606
QCN9024
QCS2290
QCS405
QCS4290
QCS6125
QCS6490
QSM8350
SA4150P
SA6145P
SA6150P
SA6155
SA6155P
SA8145P
SA8150P
SA8155
SA8155P
SA8195P
SA8295P
SA8540P
SA9000P
SD 675
SD 8 Gen1 5G
SD 8cx Gen3
SD460
SD480
SD662
SD665
SD670
SD675
SD678
SD680
SD690 5G
SD695
SD710
SD720G
SD730
SD750G
SD765
SD765G
SD768G
SD778G
SD780G
SD855
SD865 5G
SD870
SD888
SD888 5G
SDX50M
SDX55M
SDX65
SDXR1
SDXR2 5G
SG4150P
SM4125
SM4375
SM6250
SM7250P
SM7315
SM7325P
SSG2115P
SSG2125P
SW5100
SW5100P
SXR1230P
SXR2150P
WCD9326
WCD9335
WCD9341
WCD9370
WCD9375
WCD9380
WCD9385
WCN3910
WCN3950
WCN3980
WCN3988
WCN3990
WCN3991
WCN3998
WCN6740
WCN6750
WCN6850
WCN6851
WCN6855
WCN6856
WCN7850
WCN7851
WSA8810
WSA8815
WSA8830
WSA8832
WSA8835
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
GitHub Security Advisories
Community-driven vulnerability intelligence from GitHub
⚠ Unreviewed
HIGH
GHSA-83q9-jh53-rrr4
Advisory Details
Cryptographic issue in HLOS as derived keys used to encrypt/decrypt information is present on stack after use.
CVSS Scoring
CVSS Score
7.5
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
References
Advisory provided by GitHub Security Advisory Database. Published: August 8, 2023, Modified: April 4, 2024
Published: 2023-08-08T09:14:59.131Z
Last Modified: 2024-10-11T17:49:22.790Z
Copied to clipboard!