Description

Transient DOS in WLAN Host while doing channel switch announcement (CSA), when a mobile station receives invalid channel in CSA IE.

INFO

Published Date :

Sept. 5, 2023, 7:15 a.m.

Last Modified :

Nov. 21, 2024, 8:04 a.m.

Remotely Exploitable :

Yes !

Impact Score :

3.6

Exploitability Score :

3.9
Affected Products

The following products are affected by CVE-2023-33019 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Qualcomm qca6574au_firmware
2 Qualcomm qca6595au_firmware
3 Qualcomm qca6696_firmware
4 Qualcomm wcn3980_firmware
5 Qualcomm wsa8810_firmware
6 Qualcomm wsa8815_firmware
7 Qualcomm csra6620_firmware
8 Qualcomm csra6640_firmware
9 Qualcomm qca6554a_firmware
10 Qualcomm qca6564au_firmware
11 Qualcomm qca6574_firmware
12 Qualcomm qca6574a_firmware
13 Qualcomm qca6584au_firmware
14 Qualcomm qca6595_firmware
15 Qualcomm snapdragon_auto_5g_modem-rf_firmware
16 Qualcomm wcd9326_firmware
17 Qualcomm wcd9335_firmware
18 Qualcomm msm8996au_firmware
19 Qualcomm wcn3660b_firmware
20 Qualcomm wcn3680b_firmware
21 Qualcomm wcn3610_firmware
22 Qualcomm mdm9628_firmware
23 Qualcomm qca6564a_firmware
24 Qualcomm qca6174a_firmware
25 Qualcomm qca9377_firmware
26 Qualcomm fastconnect_6200_firmware
27 Qualcomm mdm9250_firmware
28 Qualcomm mdm9650_firmware
29 Qualcomm msm8108_firmware
30 Qualcomm msm8209_firmware
31 Qualcomm msm8608_firmware
32 Qualcomm msm8909w_firmware
33 Qualcomm qca9379_firmware
34 Qualcomm sd626_firmware
35 Qualcomm sdm429w_firmware
36 Qualcomm sdx20m_firmware
37 Qualcomm wcn3615_firmware
38 Qualcomm wcn3620_firmware
39 Qualcomm wcn3680_firmware
40 Qualcomm apq8052_firmware
41 Qualcomm apq8056_firmware
42 Qualcomm apq8076_firmware
43 Qualcomm ar8031_firmware
44 Qualcomm smart_audio_200_platform_firmware
45 Qualcomm smart_audio_400_platform_firmware
46 Qualcomm apq8017_firmware
47 Qualcomm qca9367_firmware
48 Qualcomm home_hub_100_platform_firmware
49 Qualcomm wcd9330_firmware
50 Qualcomm snapdragon_652_mobile_platform_firmware
51 Qualcomm home_hub_100_firmware
52 Qualcomm qca6175a_firmware
53 Qualcomm qca6584_firmware
54 Qualcomm smart_audio_400_firmware
55 Qualcomm snapdragon_820_firmware
56 Qualcomm snapdragon_auto_5g_firmware
57 Qualcomm smart_audio_200_firmware
58 Qualcomm snapdragon_652_firmware
59 Qualcomm snapdragon_x12_lte_firmware
60 Qualcomm snapdragon_x20_lte_firmware
61 Qualcomm snapdragon_x5_lte_firmware
62 Qualcomm wcn3660_firmware
63 Qualcomm 9206_lte_firmware
64 Qualcomm c-v2x_9150_firmware
65 Qualcomm 205_firmware
66 Qualcomm 215_firmware
67 Qualcomm smart_display_200_firmware
68 Qualcomm snapdragon_1200_firmware
69 Qualcomm snapdragon_208_firmware
70 Qualcomm snapdragon_210_firmware
71 Qualcomm snapdragon_212_firmware
72 Qualcomm snapdragon_425_firmware
73 Qualcomm snapdragon_429_firmware
74 Qualcomm snapdragon_439_firmware
75 Qualcomm snapdragon_450_firmware
76 Qualcomm snapdragon_617_firmware
77 Qualcomm snapdragon_625_firmware
78 Qualcomm snapdragon_626_firmware
79 Qualcomm snapdragon_632_firmware
80 Qualcomm snapdragon_650_firmware
81 Qualcomm snapdragon_653_firmware
82 Qualcomm snapdragon_wear_2100_firmware
83 Qualcomm snapdragon_wear_2500_firmware
84 Qualcomm snapdragon_wear_3100_firmware
85 Qualcomm snapdragon_wear_4100\+_firmware
86 Qualcomm vision_intelligence_100_firmware
87 Qualcomm vision_intelligence_200_firmware
88 Qualcomm snapdragon_x12_lte_modem_firmware
89 Qualcomm snapdragon_x5_lte_modem_firmware
90 Qualcomm snapdragon_208_processor_firmware
91 Qualcomm 9206_lte_modem_firmware
92 Qualcomm snapdragon_1200_wearable_platform_firmware
93 Qualcomm snapdragon_210_processor_firmware
94 Qualcomm snapdragon_632_mobile_platform_firmware
95 Qualcomm snapdragon_820_automotive_platform_firmware
96 Qualcomm snapdragon_wear_2100_platform_firmware
97 Qualcomm snapdragon_wear_2500_platform_firmware
98 Qualcomm snapdragon_wear_3100_platform_firmware
99 Qualcomm snapdragon_x20_lte_modem_firmware
100 Qualcomm qualcomm_205_mobile_platform_firmware
101 Qualcomm qualcomm_215_mobile_platform_firmware
102 Qualcomm snapdragon_212_mobile_platform_firmware
103 Qualcomm snapdragon_425_mobile_platform_firmware
104 Qualcomm snapdragon_429_mobile_platform_firmware
105 Qualcomm snapdragon_439_mobile_platform_firmware
106 Qualcomm snapdragon_450_mobile_platform_firmware
107 Qualcomm snapdragon_625_mobile_platform_firmware
108 Qualcomm snapdragon_626_mobile_platform_firmware
109 Qualcomm apq8017
110 Qualcomm apq8052
111 Qualcomm apq8056
112 Qualcomm apq8076
113 Qualcomm ar8031
114 Qualcomm csra6620
115 Qualcomm csra6640
116 Qualcomm mdm9628
117 Qualcomm mdm9650
118 Qualcomm msm8108
119 Qualcomm msm8209
120 Qualcomm msm8608
121 Qualcomm msm8909w
122 Qualcomm msm8996au
123 Qualcomm qca6174a
124 Qualcomm qca6175a
125 Qualcomm qca6564a
126 Qualcomm qca6564au
127 Qualcomm qca6574
128 Qualcomm qca6574a
129 Qualcomm qca6574au
130 Qualcomm qca6584
131 Qualcomm qca6584au
132 Qualcomm qca6595
133 Qualcomm qca6595au
134 Qualcomm qca6696
135 Qualcomm qca9379
136 Qualcomm sdm429w
137 Qualcomm wcd9326
138 Qualcomm wcd9330
139 Qualcomm wcd9335
140 Qualcomm wcn3610
141 Qualcomm wcn3615
142 Qualcomm wcn3620
143 Qualcomm wcn3660
144 Qualcomm wcn3660b
145 Qualcomm wcn3680
146 Qualcomm wcn3680b
147 Qualcomm wcn3980
148 Qualcomm wsa8810
149 Qualcomm wsa8815
150 Qualcomm mdm9250
151 Qualcomm qca9367
152 Qualcomm qca9377
153 Qualcomm sdx20m
154 Qualcomm snapdragon_617_processor_firmware
155 Qualcomm snapdragon_650_mobile_platform_firmware
156 Qualcomm snapdragon_653_mobile_platform_firmware
157 Qualcomm fastconnect_6200
158 Qualcomm c-v2x_9150
159 Qualcomm sd626
160 Qualcomm qca6554a
161 Qualcomm snapdragon_wear_4100\+
162 Qualcomm 205
163 Qualcomm 215
164 Qualcomm smart_audio_200
165 Qualcomm smart_audio_400
166 Qualcomm smart_display_200
167 Qualcomm snapdragon_208
168 Qualcomm snapdragon_210
169 Qualcomm snapdragon_212
170 Qualcomm snapdragon_425
171 Qualcomm snapdragon_429
172 Qualcomm snapdragon_439
173 Qualcomm snapdragon_450
174 Qualcomm snapdragon_625
175 Qualcomm snapdragon_626
176 Qualcomm snapdragon_632
177 Qualcomm snapdragon_auto_5g
178 Qualcomm snapdragon_wear_2100
179 Qualcomm snapdragon_wear_2500
180 Qualcomm snapdragon_wear_3100
181 Qualcomm vision_intelligence_100
182 Qualcomm vision_intelligence_200
183 Qualcomm snapdragon_820
184 Qualcomm snapdragon_x12_lte
185 Qualcomm home_hub_100
186 Qualcomm snapdragon_652
187 Qualcomm snapdragon_x20_lte
188 Qualcomm snapdragon_x5_lte
189 Qualcomm 9206_lte
190 Qualcomm snapdragon_1200
191 Qualcomm snapdragon_617
192 Qualcomm snapdragon_650
193 Qualcomm snapdragon_653
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2023-33019.

URL Resource
https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin Patch Vendor Advisory
https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin Patch Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2023-33019 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2023-33019 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Apr. 12, 2024

    Action Type Old Value New Value
    Added CWE Qualcomm, Inc. CWE-285
  • Initial Analysis by [email protected]

    Sep. 08, 2023

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
    Changed Reference Type https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin No Types Assigned https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin Patch, Vendor Advisory
    Added CWE NIST NVD-CWE-noinfo
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:9206_lte_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:9206_lte:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:apq8052_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:apq8052:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:apq8056_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:apq8056:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:apq8076_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:apq8076:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:c-v2x_9150_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:c-v2x_9150:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:home_hub_100_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:home_hub_100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:mdm9250_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:mdm9250:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:mdm9628:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8108_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8108:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8209_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8209:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8608_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8608:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6175a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6175a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6554a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6554a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6584_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6584:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9367_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9367:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:205_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:205:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:215_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:215:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd626_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd626:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx20m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx20m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:smart_audio_200_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:smart_audio_200:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:smart_audio_400_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:smart_audio_400:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:smart_display_200_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:smart_display_200:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_1200_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_1200:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_208_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_208:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_210_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_210:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_212_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_212:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_425_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_425:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_429_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_429:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_439_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_439:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_450_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_450:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_617_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_617:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_625_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_625:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_626_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_626:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_632_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_632:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_650_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_650:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_652_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_652:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_653_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_653:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_820_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_820:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_auto_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_auto_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_wear_2100_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_wear_2100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_wear_2500_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_wear_2500:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_wear_3100_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_wear_3100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_wear_4100\+_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_wear_4100\+:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x12_lte_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x12_lte:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x20_lte_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x20_lte:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x5_lte_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x5_lte:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:vision_intelligence_100_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:vision_intelligence_100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:vision_intelligence_200_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:vision_intelligence_200:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9330_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9330:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3660_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3660:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3680_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3680:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2023-33019 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2023-33019 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.08 }} 0.02%

score

0.34323

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability