📦 Snapdragon 4 Gen 2 Mobile Firmware
by Qualcomm
🔍 What is Snapdragon 4 Gen 2 Mobile Firmware?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This CVE describes a memory corruption vulnerability in Qualcomm's hypervisor when platform information is not properly aligned. Successful exploitation could allow attackers to execute arbitrary code...
CVE-2023-28578 is a memory corruption vulnerability in Qualcomm Core Services that occurs when removing a single event listener. This allows attackers to potentially execute arbitrary code or cause de...
A cryptographic vulnerability in Qualcomm's Trusted Zone when triggered by the High-Level Operating System (HLOS) providing incorrect input. This allows potential cryptographic bypass or manipulation ...
This CVE describes a use-after-free vulnerability in Qualcomm GPU memory management where improper pointer handling during buffer deallocation can cause memory corruption. Attackers could exploit this...
This vulnerability allows information disclosure when a User Equipment (UE) device receives RTP packets from the network. It affects mobile devices with Qualcomm chipsets that process RTP traffic. Att...
This cryptographic vulnerability in Qualcomm chipsets allows improper handling of cryptographic API calls, potentially leading to key corruption or IV reuse. This affects devices using vulnerable Qual...
This vulnerability allows memory corruption when retrieving CBOR data from a Trusted Application (TA) in Qualcomm components. Attackers could potentially execute arbitrary code or cause denial of serv...
This vulnerability allows memory corruption in Qualcomm firmware drivers when processing responses. Attackers could potentially execute arbitrary code or cause denial of service on affected devices. T...
This vulnerability allows memory corruption in Qualcomm camera components when an invalid CID (Camera ID) is used. Attackers could potentially execute arbitrary code or cause denial of service. This a...
This vulnerability involves memory corruption during camera sensor power-up or power-down sequences on Qualcomm devices. It could allow attackers to execute arbitrary code or cause denial of service. ...
This vulnerability allows attackers to read sensitive memory contents when parsing malformed OCI (Oracle Call Interface) information elements with invalid length fields. It affects systems using Qualc...
This CVE describes a use-after-free vulnerability in Qualcomm components where memory corruption can occur when process-specific maps are improperly handled in global lists. If exploited, it could all...
This vulnerability allows attackers to cause memory corruption through a specific IOCTL call for group information retrieval. Successful exploitation could lead to arbitrary code execution or system c...
This vulnerability allows memory corruption when two threads simultaneously map and unmap a single node in Qualcomm components. Successful exploitation could lead to arbitrary code execution or system...
This vulnerability allows memory corruption when processing audio files with large input buffers, potentially leading to arbitrary code execution. It affects Qualcomm audio processing components acros...
This vulnerability allows memory corruption when an IOCTL call is interrupted by a signal in Qualcomm components, potentially leading to arbitrary code execution. It affects devices using Qualcomm chi...
This vulnerability allows memory corruption during cryptographic key pair generation when verifying serialized headers. It affects systems using Qualcomm components that handle key generation, potenti...
This vulnerability allows a denial-of-service (DoS) attack on 5G NR (New Radio) devices by sending specially crafted SMS messages with non-standard container sizes. It affects mobile devices using Qua...
This vulnerability allows attackers to cause a denial-of-service (DoS) condition in Qualcomm devices by sending specially crafted DL NAS TRANSPORT messages with zero payload length. It affects mobile ...
This CVE describes a memory corruption vulnerability in the SPS Application's sorter Trusted Application (TA) when requesting public keys. Successful exploitation could allow attackers to execute arbi...
This vulnerability allows memory corruption when parsing QCP audio files with invalid chunk data sizes. Attackers could potentially execute arbitrary code or cause denial of service by tricking users ...
This vulnerability allows memory corruption when processing QMI requests for memory allocation in DHMS-supported subsystems. It affects Qualcomm chipsets used in mobile devices and IoT products. Attac...
This vulnerability in Qualcomm chipsets allows a denial-of-service attack when processing CAG (Closed Access Group) information elements from network messages. It affects mobile devices and infrastruc...
This vulnerability allows attackers to cause a denial-of-service (DoS) condition by sending malformed IE fragments during DTLS handshake negotiations. It affects Qualcomm products implementing DTLS pr...
This vulnerability in Qualcomm's NR (New Radio) DL NAS transport OTA processing allows an attacker to cause a denial-of-service (DoS) by sending specially crafted payload containers with incorrect len...
This vulnerability allows memory corruption in Qualcomm audio drivers when processing RT proxy port register operations. Attackers could potentially execute arbitrary code or cause denial of service o...