9.8
CRITICAL
CVE-2022-33279
Cisco WLAN WNM Frame Length Buffer Overflow Vulnerability
Description

Memory corruption due to stack based buffer overflow in WLAN having invalid WNM frame length.

INFO

Published Date :

Feb. 12, 2023, 4:15 a.m.

Last Modified :

April 12, 2024, 5:16 p.m.

Remotely Exploitable :

Yes !

Impact Score :

5.9

Exploitability Score :

3.9
Affected Products

The following products are affected by CVE-2022-33279 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Qualcomm qca6391_firmware
2 Qualcomm wcd9385_firmware
3 Qualcomm ar9380_firmware
4 Qualcomm csr8811_firmware
5 Qualcomm ipq4028_firmware
6 Qualcomm ipq4029_firmware
7 Qualcomm ipq5010_firmware
8 Qualcomm ipq5028_firmware
9 Qualcomm ipq6000_firmware
10 Qualcomm ipq6010_firmware
11 Qualcomm ipq6018_firmware
12 Qualcomm ipq6028_firmware
13 Qualcomm ipq8064_firmware
14 Qualcomm ipq8065_firmware
15 Qualcomm ipq8068_firmware
16 Qualcomm ipq8070a_firmware
17 Qualcomm ipq8071a_firmware
18 Qualcomm ipq8072a_firmware
19 Qualcomm ipq8074a_firmware
20 Qualcomm ipq8076_firmware
21 Qualcomm ipq8076a_firmware
22 Qualcomm ipq8078_firmware
23 Qualcomm ipq8078a_firmware
24 Qualcomm ipq8173_firmware
25 Qualcomm ipq8174_firmware
26 Qualcomm ipq9008_firmware
27 Qualcomm ipq9574_firmware
28 Qualcomm qca4024_firmware
29 Qualcomm qca8072_firmware
30 Qualcomm qca8075_firmware
31 Qualcomm qca8081_firmware
32 Qualcomm qca9886_firmware
33 Qualcomm qca9888_firmware
34 Qualcomm qca9889_firmware
35 Qualcomm qca9898_firmware
36 Qualcomm qca9980_firmware
37 Qualcomm qca9984_firmware
38 Qualcomm qca9985_firmware
39 Qualcomm qca9990_firmware
40 Qualcomm qca9992_firmware
41 Qualcomm qca9994_firmware
42 Qualcomm qcn5022_firmware
43 Qualcomm qcn5024_firmware
44 Qualcomm qcn5052_firmware
45 Qualcomm qcn5054_firmware
46 Qualcomm qcn5122_firmware
47 Qualcomm qcn5124_firmware
48 Qualcomm qcn5152_firmware
49 Qualcomm qcn5154_firmware
50 Qualcomm qcn5164_firmware
51 Qualcomm qcn6023_firmware
52 Qualcomm qcn6024_firmware
53 Qualcomm qcn6100_firmware
54 Qualcomm qcn6102_firmware
55 Qualcomm qcn6112_firmware
56 Qualcomm qcn6122_firmware
57 Qualcomm qcn6132_firmware
58 Qualcomm qcn9000_firmware
59 Qualcomm qcn9011_firmware
60 Qualcomm qcn9012_firmware
61 Qualcomm qcn9022_firmware
62 Qualcomm qcn9024_firmware
63 Qualcomm qcn9070_firmware
64 Qualcomm qcn9072_firmware
65 Qualcomm qcn9074_firmware
66 Qualcomm qcn9100_firmware
67 Qualcomm qcn9274_firmware
68 Qualcomm qrb5165m_firmware
69 Qualcomm qrb5165n_firmware
70 Qualcomm qrb5165_firmware
71 Qualcomm ipq5018_firmware
72 Qualcomm ipq4019_firmware
73 Qualcomm qca7500_firmware
74 Qualcomm qca9880_firmware
75 Qualcomm qca6391
76 Qualcomm qca9984
77 Qualcomm wcd9385
78 Qualcomm ar9380
79 Qualcomm csr8811
80 Qualcomm ipq4019
81 Qualcomm ipq4028
82 Qualcomm ipq4029
83 Qualcomm ipq6000
84 Qualcomm ipq6010
85 Qualcomm ipq6018
86 Qualcomm ipq6028
87 Qualcomm ipq8064
88 Qualcomm ipq8065
89 Qualcomm ipq8068
90 Qualcomm ipq8070a
91 Qualcomm ipq8071a
92 Qualcomm ipq8072a
93 Qualcomm ipq8074a
94 Qualcomm ipq8076
95 Qualcomm ipq8076a
96 Qualcomm ipq8078
97 Qualcomm ipq8078a
98 Qualcomm ipq8173
99 Qualcomm ipq8174
100 Qualcomm qca4024
101 Qualcomm qca7500
102 Qualcomm qca8072
103 Qualcomm qca8075
104 Qualcomm qca8081
105 Qualcomm qca9880
106 Qualcomm qca9886
107 Qualcomm qca9888
108 Qualcomm qca9889
109 Qualcomm qca9898
110 Qualcomm qca9980
111 Qualcomm qca9985
112 Qualcomm qca9990
113 Qualcomm qca9992
114 Qualcomm qca9994
115 Qualcomm qcn5022
116 Qualcomm qcn5024
117 Qualcomm qcn5052
118 Qualcomm qcn5054
119 Qualcomm qcn5122
120 Qualcomm qcn5124
121 Qualcomm qcn5152
122 Qualcomm qcn5154
123 Qualcomm qcn5164
124 Qualcomm qcn9000
125 Qualcomm qcn9074
126 Qualcomm ipq5010
127 Qualcomm ipq5018
128 Qualcomm qcn6023
129 Qualcomm qcn6024
130 Qualcomm qcn9012
131 Qualcomm qcn9022
132 Qualcomm qcn9024
133 Qualcomm qcn9070
134 Qualcomm qcn9072
135 Qualcomm qcn9100
136 Qualcomm qcn9011
137 Qualcomm qrb5165m
138 Qualcomm qrb5165n
139 Qualcomm ipq9008
140 Qualcomm ipq9574
141 Qualcomm qcn9274
142 Qualcomm qrb5165
143 Qualcomm ipq5028
144 Qualcomm qcn6112
145 Qualcomm qcn6122
146 Qualcomm qcn6132
147 Qualcomm qcn6100
148 Qualcomm qcn6102
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2022-33279.

URL Resource
https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2022-33279 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2022-33279 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Apr. 12, 2024

    Action Type Old Value New Value
    Added CWE Qualcomm, Inc. CWE-121
  • Initial Analysis by [email protected]

    Feb. 21, 2023

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin No Types Assigned https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin Vendor Advisory
    Added CWE NIST CWE-787
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ar9380_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ar9380:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:csr8811:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq4019_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq4019:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq4028_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq4028:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq4029_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq4029:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq5010_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq5010:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq5018_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq5018:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq5028_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq5028:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq6000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq6000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq6010_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq6010:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq6028_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq6028:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8064_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8064:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8065_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8065:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8068_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8068:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8070a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8070a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8071a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8071a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8072a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8072a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8074a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8074a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8076_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8076:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8076a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8076a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8078_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8078:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8078a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8078a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8173_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8173:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8174_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8174:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq9008_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq9008:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq9574_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq9574:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca4024_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca4024:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca7500_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca7500:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8072_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8072:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8075_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8075:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9880_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9880:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9886_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9886:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9888_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9888:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9889_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9889:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9898_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9898:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9980_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9980:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9984_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9984:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9985_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9985:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9990_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9990:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9992_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9992:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9994_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9994:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5022_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5022:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5024_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5024:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5052_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5052:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5054_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5054:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5122_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5122:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5124_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5124:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5152_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5152:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5154_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5154:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5164_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5164:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6023_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6023:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6100_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6102_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6102:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6112_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6112:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6122_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6122:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6132_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6132:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9011:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9012:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9022_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9022:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9070_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9070:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9072_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9072:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9100_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9274_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9274:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qrb5165_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qrb5165:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qrb5165m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2022-33279 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2022-33279 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.17 }} 0.00%

score

0.54616

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability