9.3
CRITICAL
CVE-2022-33257
OpenSSL Core TrustZone Time-of-Check Time-of-Use Remote Memory Corruption Vulnerability
Description

Memory corruption in Core due to time-of-check time-of-use race condition during dump collection in trust zone.

INFO

Published Date :

March 10, 2023, 9:15 p.m.

Last Modified :

April 12, 2024, 5:16 p.m.

Remotely Exploitable :

No

Impact Score :

6.0

Exploitability Score :

2.5
Affected Products

The following products are affected by CVE-2022-33257 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Qualcomm aqt1000_firmware
2 Qualcomm qam8295p_firmware
3 Qualcomm qca6390_firmware
4 Qualcomm qca6391_firmware
5 Qualcomm qca6420_firmware
6 Qualcomm qca6426_firmware
7 Qualcomm qca6430_firmware
8 Qualcomm qca6436_firmware
9 Qualcomm qca6574au_firmware
10 Qualcomm qca6595au_firmware
11 Qualcomm qca6696_firmware
12 Qualcomm qcc5100_firmware
13 Qualcomm sa6145p_firmware
14 Qualcomm sa6155p_firmware
15 Qualcomm sa8150p_firmware
16 Qualcomm sa8155p_firmware
17 Qualcomm sa8295p_firmware
18 Qualcomm sd_8_gen1_5g_firmware
19 Qualcomm sd855_firmware
20 Qualcomm sd865_5g_firmware
21 Qualcomm sd870_firmware
22 Qualcomm sd888_5g_firmware
23 Qualcomm sdx55m_firmware
24 Qualcomm sdxr2_5g_firmware
25 Qualcomm sw5100_firmware
26 Qualcomm sw5100p_firmware
27 Qualcomm wcd9341_firmware
28 Qualcomm wcd9380_firmware
29 Qualcomm wcd9385_firmware
30 Qualcomm wcn3980_firmware
31 Qualcomm wcn3988_firmware
32 Qualcomm wcn3998_firmware
33 Qualcomm wcn6850_firmware
34 Qualcomm wcn6851_firmware
35 Qualcomm wcn6855_firmware
36 Qualcomm wcn6856_firmware
37 Qualcomm wcn7850_firmware
38 Qualcomm wcn7851_firmware
39 Qualcomm wsa8810_firmware
40 Qualcomm wsa8815_firmware
41 Qualcomm wsa8830_firmware
42 Qualcomm wsa8835_firmware
43 Qualcomm ar8035_firmware
44 Qualcomm csra6620_firmware
45 Qualcomm csra6640_firmware
46 Qualcomm wcn3991_firmware
47 Qualcomm wcn6750_firmware
48 Qualcomm qca6310_firmware
49 Qualcomm qca6335_firmware
50 Qualcomm qca6421_firmware
51 Qualcomm qca6431_firmware
52 Qualcomm qca6564au_firmware
53 Qualcomm qca6574_firmware
54 Qualcomm qca6574a_firmware
55 Qualcomm qca6595_firmware
56 Qualcomm qca6698aq_firmware
57 Qualcomm qca8081_firmware
58 Qualcomm qca8337_firmware
59 Qualcomm qca9984_firmware
60 Qualcomm qcm2290_firmware
61 Qualcomm qcm4290_firmware
62 Qualcomm qcm4325_firmware
63 Qualcomm qcm6490_firmware
64 Qualcomm qcn6024_firmware
65 Qualcomm qcn9011_firmware
66 Qualcomm qcn9012_firmware
67 Qualcomm qcn9024_firmware
68 Qualcomm qcs2290_firmware
69 Qualcomm qcs4290_firmware
70 Qualcomm qcs6490_firmware
71 Qualcomm qrb5165m_firmware
72 Qualcomm qrb5165n_firmware
73 Qualcomm qsm8250_firmware
74 Qualcomm qsm8350_firmware
75 Qualcomm qrb5165_firmware
76 Qualcomm sa6155_firmware
77 Qualcomm sa8155_firmware
78 Qualcomm sd_8cx_firmware
79 Qualcomm sd460_firmware
80 Qualcomm sd662_firmware
81 Qualcomm sd888_firmware
82 Qualcomm sdx55_firmware
83 Qualcomm sg4150p_firmware
84 Qualcomm sm4125_firmware
85 Qualcomm sm7250p_firmware
86 Qualcomm sm7315_firmware
87 Qualcomm sm7325p_firmware
88 Qualcomm ssg2115p_firmware
89 Qualcomm ssg2125p_firmware
90 Qualcomm sxr1230p_firmware
91 Qualcomm wcd9326_firmware
92 Qualcomm wcd9335_firmware
93 Qualcomm wcd9340_firmware
94 Qualcomm wcd9370_firmware
95 Qualcomm wcd9375_firmware
96 Qualcomm wcn3910_firmware
97 Qualcomm wcn3950_firmware
98 Qualcomm wcn3990_firmware
99 Qualcomm wcn6740_firmware
100 Qualcomm wsa8832_firmware
101 Qualcomm sd480_firmware
102 Qualcomm sd695_firmware
103 Qualcomm sd690_5g_firmware
104 Qualcomm sd765_firmware
105 Qualcomm sd765g_firmware
106 Qualcomm sd768g_firmware
107 Qualcomm sd778g_firmware
108 Qualcomm sd780g_firmware
109 Qualcomm sdx65_firmware
110 Qualcomm sdx70m_firmware
111 Qualcomm qca6564a_firmware
112 Qualcomm qca6174a_firmware
113 Qualcomm qca9377_firmware
114 Qualcomm qcs603_firmware
115 Qualcomm qcs605_firmware
116 Qualcomm sa8540p_firmware
117 Qualcomm sa9000p_firmware
118 Qualcomm sd_675_firmware
119 Qualcomm sd_8cx_gen2_firmware
120 Qualcomm sd_8cx_gen3_firmware
121 Qualcomm sd670_firmware
122 Qualcomm sd675_firmware
123 Qualcomm sd678_firmware
124 Qualcomm sd845_firmware
125 Qualcomm sd850_firmware
126 Qualcomm sdx24_firmware
127 Qualcomm sdx50m_firmware
128 Qualcomm sdx57m_firmware
129 Qualcomm qcn7606_firmware
130 Qualcomm sd665_firmware
131 Qualcomm sd680_firmware
132 Qualcomm ar8031_firmware
133 Qualcomm sd750g_firmware
134 Qualcomm snapdragon_4_gen_1_firmware
135 Qualcomm qcs405_firmware
136 Qualcomm sxr2150p_firmware
137 Qualcomm wcn3999_firmware
138 Qualcomm mdm9205_firmware
139 Qualcomm qca4004_firmware
140 Qualcomm wcd9306_firmware
141 Qualcomm aqt1000
142 Qualcomm ar8031
143 Qualcomm ar8035
144 Qualcomm csra6620
145 Qualcomm csra6640
146 Qualcomm qca6174a
147 Qualcomm qca6310
148 Qualcomm qca6335
149 Qualcomm qca6390
150 Qualcomm qca6391
151 Qualcomm qca6420
152 Qualcomm qca6421
153 Qualcomm qca6426
154 Qualcomm qca6430
155 Qualcomm qca6431
156 Qualcomm qca6436
157 Qualcomm qca6564a
158 Qualcomm qca6564au
159 Qualcomm qca6574
160 Qualcomm qca6574a
161 Qualcomm qca6574au
162 Qualcomm qca6595
163 Qualcomm qca6595au
164 Qualcomm qca6696
165 Qualcomm qca9984
166 Qualcomm qcm2290
167 Qualcomm qcm4290
168 Qualcomm qcs2290
169 Qualcomm qcs405
170 Qualcomm qcs4290
171 Qualcomm qcs603
172 Qualcomm qcs605
173 Qualcomm qsm8250
174 Qualcomm sa6145p
175 Qualcomm sa6155
176 Qualcomm sa6155p
177 Qualcomm sa8150p
178 Qualcomm sa8155
179 Qualcomm sa8155p
180 Qualcomm sd_675
181 Qualcomm sd_8cx
182 Qualcomm sd460
183 Qualcomm sd662
184 Qualcomm sd665
185 Qualcomm sd670
186 Qualcomm sd675
187 Qualcomm sd690_5g
188 Qualcomm sd750g
189 Qualcomm sd765
190 Qualcomm sd765g
191 Qualcomm sd768g
192 Qualcomm sd845
193 Qualcomm sd850
194 Qualcomm sd855
195 Qualcomm sd865_5g
196 Qualcomm sd888_5g
197 Qualcomm sdx50m
198 Qualcomm sdx55
199 Qualcomm sdx55m
200 Qualcomm sdxr2_5g
201 Qualcomm sm4125
202 Qualcomm sm7250p
203 Qualcomm wcd9306
204 Qualcomm wcd9326
205 Qualcomm wcd9335
206 Qualcomm wcd9340
207 Qualcomm wcd9341
208 Qualcomm wcd9370
209 Qualcomm wcd9375
210 Qualcomm wcd9380
211 Qualcomm wcd9385
212 Qualcomm wcn3910
213 Qualcomm wcn3950
214 Qualcomm wcn3980
215 Qualcomm wcn3988
216 Qualcomm wcn3990
217 Qualcomm wcn3991
218 Qualcomm wcn3998
219 Qualcomm wcn3999
220 Qualcomm wcn6740
221 Qualcomm wcn6750
222 Qualcomm wcn6850
223 Qualcomm wcn6851
224 Qualcomm wcn6856
225 Qualcomm wsa8810
226 Qualcomm wsa8815
227 Qualcomm wsa8830
228 Qualcomm wsa8835
229 Qualcomm qca8337
230 Qualcomm mdm9205
231 Qualcomm qca4004
232 Qualcomm qca9377
233 Qualcomm sdx24
234 Qualcomm qca8081
235 Qualcomm qcn7606
236 Qualcomm qcn6024
237 Qualcomm qcn9012
238 Qualcomm qcn9024
239 Qualcomm wcn6855
240 Qualcomm sd480
241 Qualcomm sd888
242 Qualcomm sm8475
243 Qualcomm sw5100
244 Qualcomm sw5100p
245 Qualcomm wcn7850
246 Qualcomm wcn7851
247 Qualcomm qam8295p
248 Qualcomm qcs6490
249 Qualcomm sa8295p
250 Qualcomm qca6698aq
251 Qualcomm sa9000p
252 Qualcomm qcm4325
253 Qualcomm qcm6490
254 Qualcomm qcn9011
255 Qualcomm qrb5165m
256 Qualcomm qrb5165n
257 Qualcomm qsm8350
258 Qualcomm sa8540p
259 Qualcomm sg4150p
260 Qualcomm sm7315
261 Qualcomm sm7325p
262 Qualcomm ssg2115p
263 Qualcomm ssg2125p
264 Qualcomm sxr1230p
265 Qualcomm wsa8832
266 Qualcomm sdx57m
267 Qualcomm qrb5165
268 Qualcomm sd870
269 Qualcomm sd_8cx_gen2
270 Qualcomm sd_8cx_gen3
271 Qualcomm sd678
272 Qualcomm sd778g
273 Qualcomm sd780g
274 Qualcomm sdx65
275 Qualcomm sdx70m
276 Qualcomm sxr2150p
277 Qualcomm qcc5100
278 Qualcomm sd680
279 Qualcomm sd695
280 Qualcomm snapdragon_4_gen_1
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2022-33257.

URL Resource
https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2022-33257 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2022-33257 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Apr. 12, 2024

    Action Type Old Value New Value
    Added CWE Qualcomm, Inc. CWE-367
  • Initial Analysis by [email protected]

    Mar. 15, 2023

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin No Types Assigned https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin Vendor Advisory
    Added CWE NIST CWE-367
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:mdm9205_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:mdm9205:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca4004_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca4004:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6335_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6335:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9984_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9984:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcc5100_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcc5100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcm4325:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn7606_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn7606:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9011:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9012:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs603_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs603:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qrb5165_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qrb5165:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qrb5165m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qsm8250_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qsm8250:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qsm8350:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8540p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd_8_gen1_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd_8cx_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd_8cx:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd_8cx_gen2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd_8cx_gen2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd_8cx_gen3_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd_8cx_gen3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd480_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd480:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd665_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd665:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd670:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd678_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd678:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd680_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd680:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd690_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd690_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd695_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd695:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd750g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd750g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd765_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd765g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd768g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd778g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd778g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd780g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd780g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd845_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd845:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd850_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd850:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx50m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx50m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx57m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx57m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx65_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx65:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx70m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx70m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sg4150p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm4125:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_4_gen_1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_4_gen_1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ssg2115p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ssg2125p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sxr1230p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sxr2150p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sxr2150p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9306_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9306:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3999_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3999:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn7850_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn7850:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn7851_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn7851:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2022-33257 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2022-33257 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.04 }} 0.00%

score

0.13294

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability