9.8
CRITICAL
CVE-2023-21631
"D-Link Modem LTE Security Mode Command Input Validation Weakness"
Description

Weak Configuration due to improper input validation in Modem while processing LTE security mode command message received from network.

INFO

Published Date :

July 4, 2023, 5:15 a.m.

Last Modified :

April 12, 2024, 5:16 p.m.

Remotely Exploitable :

Yes !

Impact Score :

5.9

Exploitability Score :

3.9
Affected Products

The following products are affected by CVE-2023-21631 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Qualcomm aqt1000_firmware
2 Qualcomm qca6391_firmware
3 Qualcomm qca6420_firmware
4 Qualcomm qca6426_firmware
5 Qualcomm qca6430_firmware
6 Qualcomm qca6436_firmware
7 Qualcomm qca6574au_firmware
8 Qualcomm qca6595au_firmware
9 Qualcomm qca6696_firmware
10 Qualcomm sd855_firmware
11 Qualcomm sd865_5g_firmware
12 Qualcomm sw5100_firmware
13 Qualcomm sw5100p_firmware
14 Qualcomm wcd9341_firmware
15 Qualcomm wcd9380_firmware
16 Qualcomm wcd9385_firmware
17 Qualcomm wcn3980_firmware
18 Qualcomm wcn3988_firmware
19 Qualcomm wsa8810_firmware
20 Qualcomm wsa8815_firmware
21 Qualcomm wsa8830_firmware
22 Qualcomm wsa8835_firmware
23 Qualcomm ar8035_firmware
24 Qualcomm csra6620_firmware
25 Qualcomm csra6640_firmware
26 Qualcomm csrb31024_firmware
27 Qualcomm qca6421_firmware
28 Qualcomm qca6431_firmware
29 Qualcomm qca6564au_firmware
30 Qualcomm qca6574a_firmware
31 Qualcomm qca6698aq_firmware
32 Qualcomm qca8081_firmware
33 Qualcomm qca8337_firmware
34 Qualcomm qcm2290_firmware
35 Qualcomm qcm4290_firmware
36 Qualcomm qcm4325_firmware
37 Qualcomm qcm4490_firmware
38 Qualcomm qcm6490_firmware
39 Qualcomm qcn6024_firmware
40 Qualcomm qcn9024_firmware
41 Qualcomm qcs2290_firmware
42 Qualcomm qcs4290_firmware
43 Qualcomm qcs4490_firmware
44 Qualcomm qcs6490_firmware
45 Qualcomm sc8180x\+sdx55_firmware
46 Qualcomm sd660_firmware
47 Qualcomm sd888_firmware
48 Qualcomm sdx55_firmware
49 Qualcomm sg4150p_firmware
50 Qualcomm sm7250p_firmware
51 Qualcomm sm7315_firmware
52 Qualcomm sm7325p_firmware
53 Qualcomm sc8180x-ad_firmware
54 Qualcomm sc8180xp-ad_firmware
55 Qualcomm sc8180x-aa_firmware
56 Qualcomm sc8180x-ab_firmware
57 Qualcomm sc8180xp-ac_firmware
58 Qualcomm sc8180xp-af_firmware
59 Qualcomm sc8180x-ac_firmware
60 Qualcomm sc8180x-af_firmware
61 Qualcomm sc8180xp-aa_firmware
62 Qualcomm sc8180xp-ab_firmware
63 Qualcomm sxr2130_firmware
64 Qualcomm wcd9326_firmware
65 Qualcomm wcd9335_firmware
66 Qualcomm wcd9340_firmware
67 Qualcomm wcd9360_firmware
68 Qualcomm wcd9370_firmware
69 Qualcomm wcd9375_firmware
70 Qualcomm wcn3910_firmware
71 Qualcomm wcn3950_firmware
72 Qualcomm wcn3990_firmware
73 Qualcomm wcn6740_firmware
74 Qualcomm wsa8832_firmware
75 Qualcomm wcn3660b_firmware
76 Qualcomm wcn3680b_firmware
77 Qualcomm wcn3610_firmware
78 Qualcomm mdm9628_firmware
79 Qualcomm qca6564a_firmware
80 Qualcomm qca6174a_firmware
81 Qualcomm qca9377_firmware
82 Qualcomm sdx57m_firmware
83 Qualcomm fastconnect_6200_firmware
84 Qualcomm fastconnect_6800_firmware
85 Qualcomm fastconnect_6900_firmware
86 Qualcomm fastconnect_7800_firmware
87 Qualcomm msm8108_firmware
88 Qualcomm msm8209_firmware
89 Qualcomm msm8608_firmware
90 Qualcomm msm8909w_firmware
91 Qualcomm wcn3615_firmware
92 Qualcomm wcn3620_firmware
93 Qualcomm snapdragon_4_gen_1_firmware
94 Qualcomm fastconnect_6700_firmware
95 Qualcomm sd_455_firmware
96 Qualcomm apq8017_firmware
97 Qualcomm qca4004_firmware
98 Qualcomm wcd9306_firmware
99 Qualcomm snapdragon_460_firmware
100 Qualcomm snapdragon_480_5g_firmware
101 Qualcomm snapdragon_480\+_5g_firmware
102 Qualcomm snapdragon_662_firmware
103 Qualcomm snapdragon_690_5g_firmware
104 Qualcomm snapdragon_695_5g_firmware
105 Qualcomm snapdragon_750g_5g_firmware
106 Qualcomm snapdragon_765_5g_firmware
107 Qualcomm snapdragon_765g_5g_firmware
108 Qualcomm snapdragon_768g_5g_firmware
109 Qualcomm snapdragon_855_firmware
110 Qualcomm snapdragon_x50_5g_firmware
111 Qualcomm snapdragon_x55_5g_firmware
112 Qualcomm smart_audio_400_firmware
113 Qualcomm snapdragon_630_firmware
114 Qualcomm snapdragon_636_firmware
115 Qualcomm snapdragon_660_firmware
116 Qualcomm snapdragon_665_firmware
117 Qualcomm snapdragon_680_4g_firmware
118 Qualcomm snapdragon_685_4g_firmware
119 Qualcomm snapdragon_auto_5g_firmware
120 Qualcomm snapdragon_w5\+_gen_1_firmware
121 Qualcomm snapdragon_auto_4g_firmware
122 Qualcomm qts110_firmware
123 Qualcomm smart_audio_200_firmware
124 Qualcomm snapdragon_wear_1300_firmware
125 Qualcomm snapdragon_778g_5g_firmware
126 Qualcomm snapdragon_778g\+_5g_firmware
127 Qualcomm snapdragon_780g_5g_firmware
128 Qualcomm snapdragon_782g_firmware
129 Qualcomm snapdragon_7c\+_gen_3_firmware
130 Qualcomm snapdragon_8_gen_1_firmware
131 Qualcomm snapdragon_8\+_gen_1_firmware
132 Qualcomm snapdragon_865_5g_firmware
133 Qualcomm snapdragon_865\+_5g_firmware
134 Qualcomm snapdragon_870_5g_firmware
135 Qualcomm snapdragon_888_5g_firmware
136 Qualcomm snapdragon_888\+_5g_firmware
137 Qualcomm snapdragon_x65_5g_firmware
138 Qualcomm snapdragon_xr2_5g_firmware
139 Qualcomm qcs8550_firmware
140 Qualcomm apq8037_firmware
141 Qualcomm 315_5g_firmware
142 Qualcomm c-v2x_9150_firmware
143 Qualcomm 205_firmware
144 Qualcomm 215_firmware
145 Qualcomm snapdragon_208_firmware
146 Qualcomm snapdragon_210_firmware
147 Qualcomm snapdragon_212_firmware
148 Qualcomm snapdragon_425_firmware
149 Qualcomm snapdragon_429_firmware
150 Qualcomm snapdragon_439_firmware
151 Qualcomm snapdragon_wear_2100_firmware
152 Qualcomm snapdragon_wear_2500_firmware
153 Qualcomm snapdragon_wear_3100_firmware
154 Qualcomm snapdragon_855\+\/860_firmware
155 Qualcomm video_collaboration_vc3_firmware
156 Qualcomm snapdragon_4_gen_2_firmware
157 Qualcomm snapdragon_430_firmware
158 Qualcomm snapdragon_x24_firmware
159 Qualcomm snapdragon_x70_firmware
160 Qualcomm 9205_firmware
161 Qualcomm apq8017
162 Qualcomm apq8037
163 Qualcomm aqt1000
164 Qualcomm ar8035
165 Qualcomm csra6620
166 Qualcomm csra6640
167 Qualcomm csrb31024
168 Qualcomm mdm9628
169 Qualcomm msm8108
170 Qualcomm msm8209
171 Qualcomm msm8608
172 Qualcomm msm8909w
173 Qualcomm qca6174a
174 Qualcomm qca6391
175 Qualcomm qca6420
176 Qualcomm qca6421
177 Qualcomm qca6426
178 Qualcomm qca6430
179 Qualcomm qca6431
180 Qualcomm qca6436
181 Qualcomm qca6564a
182 Qualcomm qca6564au
183 Qualcomm qca6574a
184 Qualcomm qca6574au
185 Qualcomm qca6595au
186 Qualcomm qca6696
187 Qualcomm qcm2290
188 Qualcomm qcm4290
189 Qualcomm qcs2290
190 Qualcomm qcs4290
191 Qualcomm sc8180x\+sdx55
192 Qualcomm sd_455
193 Qualcomm sd660
194 Qualcomm sd855
195 Qualcomm sd865_5g
196 Qualcomm sdx55
197 Qualcomm sm7250p
198 Qualcomm wcd9306
199 Qualcomm wcd9326
200 Qualcomm wcd9335
201 Qualcomm wcd9340
202 Qualcomm wcd9341
203 Qualcomm wcd9360
204 Qualcomm wcd9370
205 Qualcomm wcd9375
206 Qualcomm wcd9380
207 Qualcomm wcd9385
208 Qualcomm wcn3610
209 Qualcomm wcn3615
210 Qualcomm wcn3620
211 Qualcomm wcn3660b
212 Qualcomm wcn3680b
213 Qualcomm wcn3910
214 Qualcomm wcn3950
215 Qualcomm wcn3980
216 Qualcomm wcn3988
217 Qualcomm wcn3990
218 Qualcomm wcn6740
219 Qualcomm wsa8810
220 Qualcomm wsa8815
221 Qualcomm wsa8830
222 Qualcomm wsa8835
223 Qualcomm qca8337
224 Qualcomm qca4004
225 Qualcomm qca9377
226 Qualcomm qca8081
227 Qualcomm qcn6024
228 Qualcomm qcn9024
229 Qualcomm sd888
230 Qualcomm sxr2130
231 Qualcomm fastconnect_6700
232 Qualcomm sw5100
233 Qualcomm sw5100p
234 Qualcomm fastconnect_6200
235 Qualcomm fastconnect_6800
236 Qualcomm fastconnect_6900
237 Qualcomm c-v2x_9150
238 Qualcomm qcs6490
239 Qualcomm fastconnect_7800
240 Qualcomm qca6698aq
241 Qualcomm qcm4325
242 Qualcomm qcm4490
243 Qualcomm qcm6490
244 Qualcomm qcs4490
245 Qualcomm qcs8550
246 Qualcomm qts110
247 Qualcomm sg4150p
248 Qualcomm sm7315
249 Qualcomm sm7325p
250 Qualcomm wsa8832
251 Qualcomm sdx57m
252 Qualcomm sc8180x-ad
253 Qualcomm sc8180xp-ad
254 Qualcomm sc8180x-aa
255 Qualcomm sc8180x-ab
256 Qualcomm sc8180xp-ac
257 Qualcomm sc8180xp-af
258 Qualcomm sc8180x-ac
259 Qualcomm sc8180x-af
260 Qualcomm sc8180xp-aa
261 Qualcomm sc8180xp-ab
262 Qualcomm snapdragon_4_gen_1
263 Qualcomm snapdragon_wear_1300
264 Qualcomm snapdragon_778g_5g
265 Qualcomm snapdragon_782g
266 Qualcomm snapdragon_7c\+_gen_3
267 Qualcomm snapdragon_w5\+_gen_1
268 Qualcomm snapdragon_x55_5g
269 Qualcomm snapdragon_xr2_5g
270 Qualcomm 315_5g
271 Qualcomm 205
272 Qualcomm 215
273 Qualcomm video_collaboration_vc3
274 Qualcomm smart_audio_200
275 Qualcomm smart_audio_400
276 Qualcomm snapdragon_208
277 Qualcomm snapdragon_210
278 Qualcomm snapdragon_212
279 Qualcomm snapdragon_4_gen_2
280 Qualcomm snapdragon_425
281 Qualcomm snapdragon_429
282 Qualcomm snapdragon_430
283 Qualcomm snapdragon_439
284 Qualcomm snapdragon_460
285 Qualcomm snapdragon_480_5g
286 Qualcomm snapdragon_480\+_5g
287 Qualcomm snapdragon_630
288 Qualcomm snapdragon_636
289 Qualcomm snapdragon_660
290 Qualcomm snapdragon_662
291 Qualcomm snapdragon_665
292 Qualcomm snapdragon_680_4g
293 Qualcomm snapdragon_685_4g
294 Qualcomm snapdragon_690_5g
295 Qualcomm snapdragon_695_5g
296 Qualcomm snapdragon_750g_5g
297 Qualcomm snapdragon_765_5g
298 Qualcomm snapdragon_765g_5g
299 Qualcomm snapdragon_768g_5g
300 Qualcomm snapdragon_778g\+_5g
301 Qualcomm snapdragon_780g_5g
302 Qualcomm snapdragon_8_gen_1
303 Qualcomm snapdragon_8\+_gen_1
304 Qualcomm snapdragon_855
305 Qualcomm snapdragon_855\+\/860
306 Qualcomm snapdragon_865_5g
307 Qualcomm snapdragon_865\+_5g
308 Qualcomm snapdragon_870_5g
309 Qualcomm snapdragon_888_5g
310 Qualcomm snapdragon_888\+_5g
311 Qualcomm snapdragon_auto_5g
312 Qualcomm snapdragon_wear_2100
313 Qualcomm snapdragon_wear_2500
314 Qualcomm snapdragon_wear_3100
315 Qualcomm snapdragon_x24
316 Qualcomm snapdragon_x50_5g
317 Qualcomm snapdragon_x65_5g
318 Qualcomm snapdragon_x70
319 Qualcomm snapdragon_auto_4g
320 Qualcomm 9205
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2023-21631.

URL Resource
https://www.qualcomm.com/company/product-security/bulletins/july-2023-bulletin Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2023-21631 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2023-21631 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Apr. 12, 2024

    Action Type Old Value New Value
    Added CWE Qualcomm, Inc. CWE-20
  • Initial Analysis by [email protected]

    Jul. 10, 2023

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://www.qualcomm.com/company/product-security/bulletins/july-2023-bulletin No Types Assigned https://www.qualcomm.com/company/product-security/bulletins/july-2023-bulletin Vendor Advisory
    Added CWE NIST NVD-CWE-noinfo
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:315_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:315_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:9205_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:9205:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:apq8037_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:apq8037:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:c-v2x_9150_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:c-v2x_9150:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:csrb31024:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:mdm9628:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8108_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8108:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8209_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8209:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8608_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8608:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca4004_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca4004:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcm4325:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcm4490:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qts110_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qts110:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:205_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:205:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:215_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:215:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:video_collaboration_vc3_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:video_collaboration_vc3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc8180x\+sdx55_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc8180x\+sdx55:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd_455_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd_455:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd660:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx57m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx57m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sg4150p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:smart_audio_200_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:smart_audio_200:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:smart_audio_400_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:smart_audio_400:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_208_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_208:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_210_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_210:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_212_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_212:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_4_gen_1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_4_gen_1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_4_gen_2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_4_gen_2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_425_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_425:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_429_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_429:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_430_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_430:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_439_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_439:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_460_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_460:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_480_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_480_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_480\+_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_480\+_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_630_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_630:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_636_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_636:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_660_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_660:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_662_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_662:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_665_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_665:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_680_4g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_680_4g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_685_4g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_685_4g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_690_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_690_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_695_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_695_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_750g_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_750g_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_765_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_765_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_765g_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_765g_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_768g_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_768g_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_778g_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_778g_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_778g\+_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_778g\+_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_780g_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_780g_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_782g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_782g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_7c\+_gen_3_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_7c\+_gen_3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_8_gen_1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_8_gen_1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_8\+_gen_1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_8\+_gen_1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_855_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_855:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_855\+\/860_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_855\+\/860:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_865_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_865_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_865\+_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_865\+_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_870_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_870_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_888_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_888_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_888\+_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_888\+_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc8180x-ad_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc8180x-ad:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc8180xp-ad_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc8180xp-ad:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc8180x-aa_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc8180x-aa:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc8180x-ab_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc8180x-ab:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc8180xp-ac_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc8180xp-ac:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc8180xp-af_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc8180xp-af:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc8180x-ac_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc8180x-ac:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc8180x-af_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc8180x-af:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc8180xp-aa_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc8180xp-aa:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc8180xp-ab_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc8180xp-ab:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_auto_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_auto_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_w5\+_gen_1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_w5\+_gen_1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_wear_1300_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_wear_1300:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_wear_2100_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_wear_2100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_wear_2500_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_wear_2500:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_wear_3100_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_wear_3100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x24_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x24:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x50_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x50_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x55_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x55_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x65_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x65_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x70_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x70:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_xr2_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_xr2_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_auto_4g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_auto_4g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9306_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9306:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9360:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2023-21631 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2023-21631 weaknesses.

CAPEC-3: Using Leading 'Ghost' Character Sequences to Bypass Input Filters Using Leading 'Ghost' Character Sequences to Bypass Input Filters CAPEC-7: Blind SQL Injection Blind SQL Injection CAPEC-8: Buffer Overflow in an API Call Buffer Overflow in an API Call CAPEC-9: Buffer Overflow in Local Command-Line Utilities Buffer Overflow in Local Command-Line Utilities CAPEC-10: Buffer Overflow via Environment Variables Buffer Overflow via Environment Variables CAPEC-13: Subverting Environment Variable Values Subverting Environment Variable Values CAPEC-14: Client-side Injection-induced Buffer Overflow Client-side Injection-induced Buffer Overflow CAPEC-22: Exploiting Trust in Client Exploiting Trust in Client CAPEC-23: File Content Injection File Content Injection CAPEC-24: Filter Failure through Buffer Overflow Filter Failure through Buffer Overflow CAPEC-28: Fuzzing Fuzzing CAPEC-31: Accessing/Intercepting/Modifying HTTP Cookies Accessing/Intercepting/Modifying HTTP Cookies CAPEC-42: MIME Conversion MIME Conversion CAPEC-43: Exploiting Multiple Input Interpretation Layers Exploiting Multiple Input Interpretation Layers CAPEC-45: Buffer Overflow via Symbolic Links Buffer Overflow via Symbolic Links CAPEC-46: Overflow Variables and Tags Overflow Variables and Tags CAPEC-47: Buffer Overflow via Parameter Expansion Buffer Overflow via Parameter Expansion CAPEC-52: Embedding NULL Bytes Embedding NULL Bytes CAPEC-53: Postfix, Null Terminate, and Backslash Postfix, Null Terminate, and Backslash CAPEC-63: Cross-Site Scripting (XSS) Cross-Site Scripting (XSS) CAPEC-64: Using Slashes and URL Encoding Combined to Bypass Validation Logic Using Slashes and URL Encoding Combined to Bypass Validation Logic CAPEC-67: String Format Overflow in syslog() String Format Overflow in syslog() CAPEC-71: Using Unicode Encoding to Bypass Validation Logic Using Unicode Encoding to Bypass Validation Logic CAPEC-72: URL Encoding URL Encoding CAPEC-73: User-Controlled Filename User-Controlled Filename CAPEC-78: Using Escaped Slashes in Alternate Encoding Using Escaped Slashes in Alternate Encoding CAPEC-79: Using Slashes in Alternate Encoding Using Slashes in Alternate Encoding CAPEC-80: Using UTF-8 Encoding to Bypass Validation Logic Using UTF-8 Encoding to Bypass Validation Logic CAPEC-81: Web Server Logs Tampering Web Server Logs Tampering CAPEC-83: XPath Injection XPath Injection CAPEC-85: AJAX Footprinting AJAX Footprinting CAPEC-88: OS Command Injection OS Command Injection CAPEC-101: Server Side Include (SSI) Injection Server Side Include (SSI) Injection CAPEC-104: Cross Zone Scripting Cross Zone Scripting CAPEC-108: Command Line Execution through SQL Injection Command Line Execution through SQL Injection CAPEC-109: Object Relational Mapping Injection Object Relational Mapping Injection CAPEC-110: SQL Injection through SOAP Parameter Tampering SQL Injection through SOAP Parameter Tampering CAPEC-120: Double Encoding Double Encoding CAPEC-135: Format String Injection Format String Injection CAPEC-136: LDAP Injection LDAP Injection CAPEC-153: Input Data Manipulation Input Data Manipulation CAPEC-182: Flash Injection Flash Injection CAPEC-209: XSS Using MIME Type Mismatch XSS Using MIME Type Mismatch CAPEC-230: Serialized Data with Nested Payloads Serialized Data with Nested Payloads CAPEC-231: Oversized Serialized Data Payloads Oversized Serialized Data Payloads CAPEC-250: XML Injection XML Injection CAPEC-261: Fuzzing for garnering other adjacent user/sensitive data Fuzzing for garnering other adjacent user/sensitive data CAPEC-267: Leverage Alternate Encoding Leverage Alternate Encoding CAPEC-473: Signature Spoof Signature Spoof CAPEC-588: DOM-Based XSS DOM-Based XSS CAPEC-664: Server Side Request Forgery Server Side Request Forgery
Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.14 }} 0.07%

score

0.50823

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability