📦 Snapdragon 435 Mobile Platform Firmware
by Qualcomm
🔍 What is Snapdragon 435 Mobile Platform Firmware?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability allows memory corruption in Qualcomm's PlayReady APP implementation when processing TA commands, potentially enabling arbitrary code execution. It affects devices with Qualcomm chip...
This CVE describes a cryptographic vulnerability in RSA PKCS padding decoding that could allow attackers to decrypt sensitive data or forge digital signatures. It affects Qualcomm products implementin...
This vulnerability allows memory corruption in Qualcomm NPU (Neural Processing Unit) drivers when processing API calls with invalid input. Attackers could potentially execute arbitrary code or cause d...
This CVE describes a race condition vulnerability in Qualcomm's PCM host voice audio driver where improper session index handling during event callbacks and PCM close operations can lead to memory cor...
This vulnerability allows memory corruption in Qualcomm's SPS application when exporting public keys in the sorter TA. Attackers could potentially execute arbitrary code or cause denial of service on ...
This vulnerability allows memory corruption in the High-Level Operating System (HLOS) when importing cryptographic keys into the KeyMaster Trusted Application on Qualcomm chipsets. Attackers could pot...
CVE-2022-40521 is an improper authorization vulnerability in Qualcomm modem firmware that allows attackers to cause a transient denial of service (DoS) by sending specially crafted requests. This affe...
CVE-2022-33264 is a stack-based buffer overflow vulnerability in Qualcomm modem firmware that allows memory corruption when parsing OTASP Key Generation Request Messages. Successful exploitation could...
This vulnerability allows an attacker to cause a denial of service (DoS) by providing a specially crafted PKCS#8-encoded RSA key with a zero-byte modulus during key import operations. Systems using af...