Memory corruption during the network scan request.
                
            References
                    | Link | Resource | 
|---|---|
| https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
Configuration 2 (hide)
| AND | 
 
 | 
Configuration 3 (hide)
| AND | 
 
 | 
Configuration 4 (hide)
| AND | 
 
 | 
Configuration 5 (hide)
| AND | 
 
 | 
Configuration 6 (hide)
| AND | 
 
 | 
Configuration 7 (hide)
| AND | 
 
 | 
Configuration 8 (hide)
| AND | 
 
 | 
Configuration 9 (hide)
| AND | 
 
 | 
Configuration 10 (hide)
| AND | 
 
 | 
Configuration 11 (hide)
| AND | 
 
 | 
Configuration 12 (hide)
| AND | 
 
 | 
Configuration 13 (hide)
| AND | 
 
 | 
Configuration 14 (hide)
| AND | 
 
 | 
History
                    16 Oct 2024, 20:26
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | |
| References | () https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html - Vendor Advisory | |
| CPE | cpe:2.3:h:qualcomm:sa4150p:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:sa4155p:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:snapdragon_w5\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:snapdragon_w5\+_gen_1_wearable_platform:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:* | |
| First Time | Qualcomm wcn3660b Firmware Qualcomm wcn3988 Qualcomm sa6155p Firmware Qualcomm sa4155p Firmware Qualcomm sw5100p Firmware Qualcomm snapdragon W5\+ Gen 1 Wearable Platform Qualcomm wcn3660b Qualcomm wsa8835 Firmware Qualcomm Qualcomm sa8155p Firmware Qualcomm sw5100 Qualcomm sa4155p Qualcomm wcn3980 Qualcomm sw5100 Firmware Qualcomm wcn3680b Qualcomm sa8195p Firmware Qualcomm wsa8830 Qualcomm wcn3980 Firmware Qualcomm sa4150p Firmware Qualcomm sw5100p Qualcomm sa8155p Qualcomm wsa8830 Firmware Qualcomm wsa8835 Qualcomm sa6155p Qualcomm wcn3680b Firmware Qualcomm wcn3988 Firmware Qualcomm snapdragon W5\+ Gen 1 Wearable Platform Firmware Qualcomm sa4150p Qualcomm sa8195p | 
07 Oct 2024, 13:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-10-07 13:15
Updated : 2024-10-16 20:26
NVD link : CVE-2024-23375
Mitre link : CVE-2024-23375
CVE.ORG link : CVE-2024-23375
JSON object : View
Products Affected
                qualcomm
- sa8195p_firmware
- wsa8830_firmware
- sw5100p_firmware
- wcn3980
- snapdragon_w5\+_gen_1_wearable_platform
- sw5100
- sa8195p
- sa4150p
- sa8155p
- wsa8830
- snapdragon_w5\+_gen_1_wearable_platform_firmware
- sa4155p_firmware
- sw5100p
- sa6155p_firmware
- wsa8835_firmware
- sa4155p
- sw5100_firmware
- sa4150p_firmware
- wcn3988
- wcn3660b
- wcn3680b
- wcn3980_firmware
- wcn3988_firmware
- wsa8835
- sa6155p
- wcn3660b_firmware
- sa8155p_firmware
- wcn3680b_firmware
CWE
                
                    
                        
                        CWE-120
                        
            Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
