Loading HuntDB...

CVE-2023-21658

HIGH
Published 2023-06-06T07:39:13.326Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2023-21658. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
7.5
/10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score Metrics
Exploitability: N/A Impact: N/A

EPSS Score

v2025.03.14
0.001
probability
of exploitation in the wild

There is a 0.1% chance that this vulnerability will be exploited in the wild within the next 30 days.

Updated: 2025-06-25
Exploit Probability
Percentile: 0.325
Higher than 32.5% of all CVEs

Attack Vector Metrics

Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED

Impact Metrics

Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Description

Transient DOS in WLAN Firmware while processing the received beacon or probe response frame.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

Affected Versions:

AR8035 AR9380 CSR8811 FastConnect 6700 FastConnect 6800 FastConnect 6900 FastConnect 7800 Immersive Home 214 Platform Immersive Home 216 Platform Immersive Home 316 Platform Immersive Home 318 Platform IPQ5010 IPQ5028 IPQ6000 IPQ6010 IPQ6018 IPQ6028 IPQ8064 IPQ8065 IPQ8068 IPQ8070A IPQ8071A IPQ8072A IPQ8074A IPQ8076 IPQ8076A IPQ8078 IPQ8078A IPQ8173 IPQ8174 IPQ9008 IPQ9574 QAM8255P QAM8295P QAM8650P QAM8775P QCA2062 QCA2064 QCA2065 QCA2066 QCA4024 QCA6391 QCA6426 QCA6436 QCA6554A QCA6564AU QCA6574 QCA6574A QCA6574AU QCA6584AU QCA6595 QCA6595AU QCA6678AQ QCA6696 QCA6698AQ QCA6797AQ QCA8072 QCA8075 QCA8081 QCA8082 QCA8084 QCA8085 QCA8337 QCA8386 QCA9886 QCA9888 QCA9889 QCA9980 QCA9984 QCA9985 QCA9986 QCA9990 QCA9992 QCA9994 QCC2073 QCC2076 QCM4490 QCM6490 QCN5022 QCN5024 QCN5052 QCN5054 QCN5122 QCN5124 QCN5152 QCN5154 QCN5164 QCN6023 QCN6024 QCN6100 QCN6102 QCN6112 QCN6122 QCN6132 QCN9000 QCN9001 QCN9002 QCN9003 QCN9022 QCN9024 QCN9070 QCN9072 QCN9074 QCN9100 QCN9274 QCS4490 QCS6490 QCS8550 QSM8350 SA8255P SA8295P SD 8 Gen1 5G SD865 5G SD888 SDM429W Snapdragon 429 Mobile Platform Snapdragon 780G 5G Mobile Platform Snapdragon 8 Gen 1 Mobile Platform Snapdragon 8+ Gen 1 Mobile Platform Snapdragon 865 5G Mobile Platform Snapdragon 865+ 5G Mobile Platform (SM8250-AB) Snapdragon 870 5G Mobile Platform (SM8250-AC) Snapdragon 888 5G Mobile Platform Snapdragon 888+ 5G Mobile Platform (SM8350-AC) Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB) Snapdragon AR2 Gen 1 Platform Snapdragon Auto 5G Modem-RF Snapdragon X55 5G Modem-RF System Snapdragon X65 5G Modem-RF System Snapdragon XR2 5G Platform SSG2115P SSG2125P SXR1230P SXR2130 SXR2230P WCD9370 WCD9375 WCD9380 WCD9385 WCN3620 WCN3660B WCN3950 WCN6740 WSA8810 WSA8815 WSA8830 WSA8832 WSA8835

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed HIGH

GHSA-w8vw-44wp-qv75

Advisory Details

Transient DOS in WLAN Firmware while processing the received beacon or probe response frame.

CVSS Scoring

CVSS Score

7.5

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Advisory provided by GitHub Security Advisory Database. Published: June 6, 2023, Modified: April 4, 2024

References

Published: 2023-06-06T07:39:13.326Z
Last Modified: 2024-08-02T09:44:02.174Z
Copied to clipboard!