Loading HuntDB...

CVE-2023-28541

HIGH
Published 2023-07-04T04:46:44.316Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2023-28541. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
7.8
/10
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score Metrics
Exploitability: N/A Impact: N/A

EPSS Score

v2025.03.14
0.001
probability
of exploitation in the wild

There is a 0.1% chance that this vulnerability will be exploited in the wild within the next 30 days.

Updated: 2025-06-25
Exploit Probability
Percentile: 0.191
Higher than 19.1% of all CVEs

Attack Vector Metrics

Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED

Impact Metrics

Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Description

Memory Corruption in Data Modem while processing DMA buffer release event about CFR data.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

Affected Versions:

AQT1000 AR8031 AR9380 C-V2X 9150 CSR8811 CSRA6620 CSRA6640 CSRB31024 FastConnect 6200 FastConnect 6700 FastConnect 6800 FastConnect 6900 FastConnect 7800 Flight RB5 5G Platform Immersive Home 214 Platform Immersive Home 216 Platform Immersive Home 316 Platform Immersive Home 318 Platform IPQ4018 IPQ4019 IPQ4028 IPQ4029 IPQ5010 IPQ5028 IPQ6000 IPQ6010 IPQ6018 IPQ6028 IPQ8064 IPQ8065 IPQ8068 IPQ8070 IPQ8070A IPQ8071A IPQ8072A IPQ8074A IPQ8076 IPQ8076A IPQ8078 IPQ8078A IPQ8173 IPQ8174 IPQ9008 IPQ9574 MDM9250 MDM9628 MDM9640 MDM9650 MSM8909W QAM8255P QAM8295P QCA4024 QCA6174A QCA6175A QCA6310 QCA6320 QCA6335 QCA6391 QCA6420 QCA6421 QCA6426 QCA6430 QCA6431 QCA6436 QCA6554A QCA6564A QCA6564AU QCA6574 QCA6574A QCA6574AU QCA6584AU QCA6595 QCA6595AU QCA6678AQ QCA6696 QCA6698AQ QCA6797AQ QCA7500 QCA8072 QCA8075 QCA8081 QCA8082 QCA8084 QCA8085 QCA8337 QCA8386 QCA9377 QCA9880 QCA9886 QCA9888 QCA9889 QCA9898 QCA9980 QCA9984 QCA9985 QCA9990 QCA9992 QCA9994 QCM6125 QCM6490 QCN5022 QCN5024 QCN5052 QCN5054 QCN5122 QCN5124 QCN5152 QCN5154 QCN5164 QCN6023 QCN6024 QCN6122 QCN6132 QCN7605 QCN7606 QCN9000 QCN9001 QCN9002 QCN9003 QCN9011 QCN9012 QCN9022 QCN9024 QCN9070 QCN9072 QCN9074 QCN9100 QCN9274 QCS410 QCS610 QCS6125 QCS6490 QRB5165M QRB5165N Qualcomm Video Collaboration VC1 Platform Qualcomm Video Collaboration VC3 Platform Robotics RB3 Platform Robotics RB5 Platform SA6145P SA6150P SA6155P SA8145P SA8150P SA8155P SA8195P SA8255P SA8295P SD660 SD835 SD855 SD865 5G SDM429W SDX20M SDX55 SDX65M Smart Audio 400 Platform Snapdragon 429 Mobile Platform Snapdragon 660 Mobile Platform Snapdragon 665 Mobile Platform Snapdragon 8 Gen 1 Mobile Platform Snapdragon 820 Automotive Platform Snapdragon 835 Mobile PC Platform Snapdragon 845 Mobile Platform Snapdragon 855 Mobile Platform Snapdragon 855+/860 Mobile Platform (SM8150-AC) Snapdragon 865 5G Mobile Platform Snapdragon 865+ 5G Mobile Platform (SM8250-AB) Snapdragon 870 5G Mobile Platform (SM8250-AC) Snapdragon Auto 5G Modem-RF Snapdragon W5+ Gen 1 Wearable Platform Snapdragon Wear 2100 Platform Snapdragon Wear 2500 Platform Snapdragon Wear 3100 Platform Snapdragon X20 LTE Modem Snapdragon X55 5G Modem-RF System Snapdragon X65 5G Modem-RF System Snapdragon XR2 5G Platform Snapdragon Auto 4G Modem SW5100 SW5100P SXR2130 WCD9335 WCD9340 WCD9341 WCD9360 WCD9370 WCD9375 WCD9380 WCD9385 WCN3620 WCN3660B WCN3950 WCN3980 WCN3988 WCN3990 WSA8810 WSA8815 WSA8830 WSA8835

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed HIGH

GHSA-8vj8-ffqw-4wcq

Advisory Details

Memory Corruption in Data Modem while processing DMA buffer release event about CFR data.

CVSS Scoring

CVSS Score

7.5

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: July 4, 2023, Modified: April 4, 2024

References

Published: 2023-07-04T04:46:44.316Z
Last Modified: 2024-08-02T13:43:23.078Z
Copied to clipboard!