Description

Transient DOS in WLAN Host when an invalid channel (like channel out of range) is received in STA during CSA IE.

INFO

Published Date :

Sept. 5, 2023, 7:15 a.m.

Last Modified :

Nov. 21, 2024, 8:04 a.m.

Remotely Exploitable :

Yes !

Impact Score :

3.6

Exploitability Score :

3.9
Affected Products

The following products are affected by CVE-2023-33020 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Qualcomm qca6574au_firmware
2 Qualcomm qca6595au_firmware
3 Qualcomm qca6696_firmware
4 Qualcomm wcn3980_firmware
5 Qualcomm wsa8810_firmware
6 Qualcomm wsa8815_firmware
7 Qualcomm csra6620_firmware
8 Qualcomm csra6640_firmware
9 Qualcomm qca6554a_firmware
10 Qualcomm qca6564au_firmware
11 Qualcomm qca6574_firmware
12 Qualcomm qca6574a_firmware
13 Qualcomm qca6584au_firmware
14 Qualcomm qca6595_firmware
15 Qualcomm wcd9326_firmware
16 Qualcomm wcd9335_firmware
17 Qualcomm msm8996au_firmware
18 Qualcomm wcn3660b_firmware
19 Qualcomm wcn3680b_firmware
20 Qualcomm wcn3610_firmware
21 Qualcomm mdm9628_firmware
22 Qualcomm qca6564a_firmware
23 Qualcomm qca6174a_firmware
24 Qualcomm qca9377_firmware
25 Qualcomm fastconnect_6200_firmware
26 Qualcomm mdm9250_firmware
27 Qualcomm mdm9650_firmware
28 Qualcomm msm8108_firmware
29 Qualcomm msm8209_firmware
30 Qualcomm msm8608_firmware
31 Qualcomm msm8909w_firmware
32 Qualcomm qca9379_firmware
33 Qualcomm sd626_firmware
34 Qualcomm sdm429w_firmware
35 Qualcomm sdx20m_firmware
36 Qualcomm wcn3615_firmware
37 Qualcomm wcn3620_firmware
38 Qualcomm wcn3680_firmware
39 Qualcomm apq8052_firmware
40 Qualcomm apq8056_firmware
41 Qualcomm apq8076_firmware
42 Qualcomm ar8031_firmware
43 Qualcomm apq8017_firmware
44 Qualcomm qca9367_firmware
45 Qualcomm wcd9330_firmware
46 Qualcomm home_hub_100_firmware
47 Qualcomm qca6175a_firmware
48 Qualcomm qca6584_firmware
49 Qualcomm smart_audio_400_firmware
50 Qualcomm snapdragon_820_firmware
51 Qualcomm snapdragon_auto_5g_firmware
52 Qualcomm smart_audio_200_firmware
53 Qualcomm snapdragon_652_firmware
54 Qualcomm snapdragon_x12_lte_firmware
55 Qualcomm snapdragon_x20_lte_firmware
56 Qualcomm snapdragon_x5_lte_firmware
57 Qualcomm wcn3660_firmware
58 Qualcomm 9206_lte_firmware
59 Qualcomm c-v2x_9150_firmware
60 Qualcomm 205_firmware
61 Qualcomm 215_firmware
62 Qualcomm smart_display_200_firmware
63 Qualcomm snapdragon_1200_firmware
64 Qualcomm snapdragon_208_firmware
65 Qualcomm snapdragon_210_firmware
66 Qualcomm snapdragon_212_firmware
67 Qualcomm snapdragon_425_firmware
68 Qualcomm snapdragon_429_firmware
69 Qualcomm snapdragon_439_firmware
70 Qualcomm snapdragon_450_firmware
71 Qualcomm snapdragon_617_firmware
72 Qualcomm snapdragon_625_firmware
73 Qualcomm snapdragon_626_firmware
74 Qualcomm snapdragon_632_firmware
75 Qualcomm snapdragon_650_firmware
76 Qualcomm snapdragon_653_firmware
77 Qualcomm snapdragon_wear_2100_firmware
78 Qualcomm snapdragon_wear_2500_firmware
79 Qualcomm snapdragon_wear_3100_firmware
80 Qualcomm snapdragon_wear_4100\+_firmware
81 Qualcomm vision_intelligence_100_firmware
82 Qualcomm vision_intelligence_200_firmware
83 Qualcomm apq8017
84 Qualcomm apq8052
85 Qualcomm apq8056
86 Qualcomm apq8076
87 Qualcomm ar8031
88 Qualcomm csra6620
89 Qualcomm csra6640
90 Qualcomm mdm9628
91 Qualcomm mdm9650
92 Qualcomm msm8108
93 Qualcomm msm8209
94 Qualcomm msm8608
95 Qualcomm msm8909w
96 Qualcomm msm8996au
97 Qualcomm qca6174a
98 Qualcomm qca6175a
99 Qualcomm qca6564a
100 Qualcomm qca6564au
101 Qualcomm qca6574
102 Qualcomm qca6574a
103 Qualcomm qca6574au
104 Qualcomm qca6584
105 Qualcomm qca6584au
106 Qualcomm qca6595
107 Qualcomm qca6595au
108 Qualcomm qca6696
109 Qualcomm qca9379
110 Qualcomm sdm429w
111 Qualcomm wcd9326
112 Qualcomm wcd9330
113 Qualcomm wcd9335
114 Qualcomm wcn3610
115 Qualcomm wcn3615
116 Qualcomm wcn3620
117 Qualcomm wcn3660
118 Qualcomm wcn3660b
119 Qualcomm wcn3680
120 Qualcomm wcn3680b
121 Qualcomm wcn3980
122 Qualcomm wsa8810
123 Qualcomm wsa8815
124 Qualcomm mdm9250
125 Qualcomm qca9367
126 Qualcomm qca9377
127 Qualcomm sdx20m
128 Qualcomm fastconnect_6200
129 Qualcomm c-v2x_9150
130 Qualcomm sd626
131 Qualcomm qca6554a
132 Qualcomm snapdragon_wear_4100\+
133 Qualcomm 205
134 Qualcomm 215
135 Qualcomm smart_audio_200
136 Qualcomm smart_audio_400
137 Qualcomm smart_display_200
138 Qualcomm snapdragon_208
139 Qualcomm snapdragon_210
140 Qualcomm snapdragon_212
141 Qualcomm snapdragon_425
142 Qualcomm snapdragon_429
143 Qualcomm snapdragon_439
144 Qualcomm snapdragon_450
145 Qualcomm snapdragon_625
146 Qualcomm snapdragon_626
147 Qualcomm snapdragon_632
148 Qualcomm snapdragon_auto_5g
149 Qualcomm snapdragon_wear_2100
150 Qualcomm snapdragon_wear_2500
151 Qualcomm snapdragon_wear_3100
152 Qualcomm vision_intelligence_100
153 Qualcomm vision_intelligence_200
154 Qualcomm snapdragon_820
155 Qualcomm snapdragon_x12_lte
156 Qualcomm home_hub_100
157 Qualcomm snapdragon_652
158 Qualcomm snapdragon_x20_lte
159 Qualcomm snapdragon_x5_lte
160 Qualcomm 9206_lte
161 Qualcomm snapdragon_1200
162 Qualcomm snapdragon_617
163 Qualcomm snapdragon_650
164 Qualcomm snapdragon_653
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2023-33020.

URL Resource
https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin Patch Vendor Advisory
https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin Patch Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2023-33020 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2023-33020 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Apr. 12, 2024

    Action Type Old Value New Value
    Added CWE Qualcomm, Inc. CWE-285
  • Initial Analysis by [email protected]

    Sep. 08, 2023

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
    Changed Reference Type https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin No Types Assigned https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin Patch, Vendor Advisory
    Added CWE NIST NVD-CWE-noinfo
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:9206_lte_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:9206_lte:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:apq8052_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:apq8052:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:apq8056_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:apq8056:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:apq8076_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:apq8076:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:c-v2x_9150_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:c-v2x_9150:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:home_hub_100_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:home_hub_100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:mdm9250_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:mdm9250:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:mdm9628:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8108_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8108:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8209_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8209:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8608_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8608:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6175a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6175a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6554a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6554a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6584_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6584:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9367_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9367:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:205_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:205:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:215_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:215:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd626_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd626:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx20m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx20m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:smart_audio_200_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:smart_audio_200:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:smart_audio_400_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:smart_audio_400:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:smart_display_200_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:smart_display_200:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_1200_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_1200:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_208_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_208:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_210_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_210:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_212_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_212:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_425_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_425:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_429_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_429:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_439_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_439:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_450_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_450:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_617_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_617:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_625_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_625:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_626_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_626:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_632_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_632:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_650_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_650:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_652_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_652:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_653_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_653:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_820_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_820:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_auto_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_auto_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_wear_2100_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_wear_2100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_wear_2500_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_wear_2500:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_wear_3100_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_wear_3100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_wear_4100\+_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_wear_4100\+:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x12_lte_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x12_lte:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x20_lte_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x20_lte:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x5_lte_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x5_lte:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:vision_intelligence_100_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:vision_intelligence_100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:vision_intelligence_200_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:vision_intelligence_200:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9330_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9330:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3660_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3660:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3680_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3680:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2023-33020 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2023-33020 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.08 }} 0.02%

score

0.34323

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability