7.5
HIGH
CVE-2023-33097
Cisco WLAN Firmware Denial of Service
Description

Transient DOS in WLAN Firmware while processing a FTMR frame.

INFO

Published Date :

Dec. 5, 2023, 3:15 a.m.

Last Modified :

April 12, 2024, 4:15 p.m.

Remotely Exploitable :

Yes !

Impact Score :

3.6

Exploitability Score :

3.9
Affected Products

The following products are affected by CVE-2023-33097 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Qualcomm qca6574au_firmware
2 Qualcomm qca6595au_firmware
3 Qualcomm qca6696_firmware
4 Qualcomm sd_8_gen1_5g_firmware
5 Qualcomm wcd9380_firmware
6 Qualcomm wcd9385_firmware
7 Qualcomm wsa8830_firmware
8 Qualcomm wsa8835_firmware
9 Qualcomm ar8035_firmware
10 Qualcomm csr8811_firmware
11 Qualcomm immersive_home_214_platform_firmware
12 Qualcomm immersive_home_216_platform_firmware
13 Qualcomm immersive_home_316_platform_firmware
14 Qualcomm immersive_home_318_platform_firmware
15 Qualcomm ipq5010_firmware
16 Qualcomm ipq5028_firmware
17 Qualcomm ipq6000_firmware
18 Qualcomm ipq6010_firmware
19 Qualcomm ipq6018_firmware
20 Qualcomm ipq6028_firmware
21 Qualcomm ipq8070a_firmware
22 Qualcomm ipq8071a_firmware
23 Qualcomm ipq8072a_firmware
24 Qualcomm ipq8074a_firmware
25 Qualcomm ipq8076_firmware
26 Qualcomm ipq8076a_firmware
27 Qualcomm ipq8078_firmware
28 Qualcomm ipq8078a_firmware
29 Qualcomm ipq8173_firmware
30 Qualcomm ipq8174_firmware
31 Qualcomm ipq9008_firmware
32 Qualcomm ipq9574_firmware
33 Qualcomm qca4024_firmware
34 Qualcomm qca6554a_firmware
35 Qualcomm qca6564au_firmware
36 Qualcomm qca6574_firmware
37 Qualcomm qca6574a_firmware
38 Qualcomm qca6584au_firmware
39 Qualcomm qca6595_firmware
40 Qualcomm qca6698aq_firmware
41 Qualcomm qca8072_firmware
42 Qualcomm qca8075_firmware
43 Qualcomm qca8081_firmware
44 Qualcomm qca8082_firmware
45 Qualcomm qca8084_firmware
46 Qualcomm qca8085_firmware
47 Qualcomm qca8337_firmware
48 Qualcomm qca8386_firmware
49 Qualcomm qca9888_firmware
50 Qualcomm qca9889_firmware
51 Qualcomm qcn5022_firmware
52 Qualcomm qcn5024_firmware
53 Qualcomm qcn5052_firmware
54 Qualcomm qcn5054_firmware
55 Qualcomm qcn5122_firmware
56 Qualcomm qcn5124_firmware
57 Qualcomm qcn5152_firmware
58 Qualcomm qcn5154_firmware
59 Qualcomm qcn5164_firmware
60 Qualcomm qcn6023_firmware
61 Qualcomm qcn6024_firmware
62 Qualcomm qcn6112_firmware
63 Qualcomm qcn6122_firmware
64 Qualcomm qcn6132_firmware
65 Qualcomm qcn9000_firmware
66 Qualcomm qcn9001_firmware
67 Qualcomm qcn9002_firmware
68 Qualcomm qcn9003_firmware
69 Qualcomm qcn9012_firmware
70 Qualcomm qcn9022_firmware
71 Qualcomm qcn9024_firmware
72 Qualcomm qcn9070_firmware
73 Qualcomm qcn9072_firmware
74 Qualcomm qcn9074_firmware
75 Qualcomm qcn9100_firmware
76 Qualcomm qcn9274_firmware
77 Qualcomm sdx55_firmware
78 Qualcomm snapdragon_ar2_gen_1_platform_firmware
79 Qualcomm snapdragon_x65_5g_modem-rf_system_firmware
80 Qualcomm ssg2115p_firmware
81 Qualcomm ssg2125p_firmware
82 Qualcomm sxr1230p_firmware
83 Qualcomm sxr2230p_firmware
84 Qualcomm wcd9340_firmware
85 Qualcomm wsa8832_firmware
86 Qualcomm sdx65m_firmware
87 Qualcomm fastconnect_6900_firmware
88 Qualcomm fastconnect_7800_firmware
89 Qualcomm snapdragon_8_gen_1_mobile_platform_firmware
90 Qualcomm qca0000_firmware
91 Qualcomm qam8255p_firmware
92 Qualcomm qca6797aq_firmware
93 Qualcomm qcs8550_firmware
94 Qualcomm qcc710_firmware
95 Qualcomm qam8650p_firmware
96 Qualcomm qam8775p_firmware
97 Qualcomm immersive_home_3210_platform_firmware
98 Qualcomm immersive_home_326_platform_firmware
99 Qualcomm ipq9554_firmware
100 Qualcomm ipq9570_firmware
101 Qualcomm qcc2073_firmware
102 Qualcomm qcc2076_firmware
103 Qualcomm qcm8550_firmware
104 Qualcomm qcn9013_firmware
105 Qualcomm sm8550p_firmware
106 Qualcomm snapdragon_8_gen_2_mobile_platform_firmware
107 Qualcomm snapdragon_8\+_gen_2_mobile_platform_firmware
108 Qualcomm wcd9390_firmware
109 Qualcomm wcd9395_firmware
110 Qualcomm wsa8840_firmware
111 Qualcomm wsa8845_firmware
112 Qualcomm wsa8845h_firmware
113 Qualcomm sg8275p_firmware
114 Qualcomm ipq5332_firmware
115 Qualcomm qcf8001_firmware
116 Qualcomm qcn6224_firmware
117 Qualcomm qcn6274_firmware
118 Qualcomm qfw7114_firmware
119 Qualcomm qfw7124_firmware
120 Qualcomm snapdragon_x75_5g_modem-rf_system_firmware
121 Qualcomm ar8035
122 Qualcomm qca6564au
123 Qualcomm qca6574
124 Qualcomm qca6574a
125 Qualcomm qca6574au
126 Qualcomm qca6584au
127 Qualcomm qca6595
128 Qualcomm qca6595au
129 Qualcomm qca6696
130 Qualcomm sdx55
131 Qualcomm wcd9340
132 Qualcomm wcd9380
133 Qualcomm wcd9385
134 Qualcomm wsa8830
135 Qualcomm wsa8835
136 Qualcomm qca8337
137 Qualcomm csr8811
138 Qualcomm ipq6000
139 Qualcomm ipq6010
140 Qualcomm ipq6018
141 Qualcomm ipq6028
142 Qualcomm ipq8070a
143 Qualcomm ipq8071a
144 Qualcomm ipq8072a
145 Qualcomm ipq8074a
146 Qualcomm ipq8076
147 Qualcomm ipq8076a
148 Qualcomm ipq8078
149 Qualcomm ipq8078a
150 Qualcomm ipq8173
151 Qualcomm ipq8174
152 Qualcomm qca4024
153 Qualcomm qca8072
154 Qualcomm qca8075
155 Qualcomm qca8081
156 Qualcomm qca9888
157 Qualcomm qca9889
158 Qualcomm qcn5022
159 Qualcomm qcn5024
160 Qualcomm qcn5052
161 Qualcomm qcn5054
162 Qualcomm qcn5122
163 Qualcomm qcn5124
164 Qualcomm qcn5152
165 Qualcomm qcn5154
166 Qualcomm qcn5164
167 Qualcomm qcn9000
168 Qualcomm qcn9074
169 Qualcomm ipq5010
170 Qualcomm qca0000
171 Qualcomm qcn6023
172 Qualcomm qcn6024
173 Qualcomm qcn9012
174 Qualcomm qcn9022
175 Qualcomm qcn9024
176 Qualcomm qcn9070
177 Qualcomm qcn9072
178 Qualcomm qcn9100
179 Qualcomm sc8380xp_firmware
180 Qualcomm qcf8000_firmware
181 Qualcomm fastconnect_6900
182 Qualcomm fastconnect_7800
183 Qualcomm qam8255p
184 Qualcomm qam8775p
185 Qualcomm qca6698aq
186 Qualcomm qcc710
187 Qualcomm qcn6224
188 Qualcomm qcn6274
189 Qualcomm qfw7114
190 Qualcomm qfw7124
191 Qualcomm snapdragon_x75_5g_modem-rf_system
192 Qualcomm qam8650p
193 Qualcomm qca6797aq
194 Qualcomm qcm8550
195 Qualcomm qcs8550
196 Qualcomm sc8380xp
197 Qualcomm sd_8_gen1_5g
198 Qualcomm sg8275p
199 Qualcomm sm8550p
200 Qualcomm snapdragon_8_gen_1_mobile_platform
201 Qualcomm snapdragon_8_gen_2_mobile_platform
202 Qualcomm snapdragon_8\+_gen_2_mobile_platform
203 Qualcomm snapdragon_ar2_gen_1_platform
204 Qualcomm snapdragon_x65_5g_modem-rf_system
205 Qualcomm ssg2115p
206 Qualcomm ssg2125p
207 Qualcomm sxr1230p
208 Qualcomm sxr2230p
209 Qualcomm wcd9390
210 Qualcomm wcd9395
211 Qualcomm wsa8832
212 Qualcomm wsa8840
213 Qualcomm wsa8845
214 Qualcomm wsa8845h
215 Qualcomm immersive_home_214_platform
216 Qualcomm immersive_home_216_platform
217 Qualcomm immersive_home_316_platform
218 Qualcomm immersive_home_318_platform
219 Qualcomm qca6554a
220 Qualcomm immersive_home_3210_platform
221 Qualcomm immersive_home_326_platform
222 Qualcomm ipq5332
223 Qualcomm ipq9008
224 Qualcomm ipq9554
225 Qualcomm ipq9570
226 Qualcomm ipq9574
227 Qualcomm qca8082
228 Qualcomm qca8084
229 Qualcomm qca8085
230 Qualcomm qca8386
231 Qualcomm qcf8000
232 Qualcomm qcf8001
233 Qualcomm qcn9013
234 Qualcomm qcn9274
235 Qualcomm sdx65m
236 Qualcomm qcc2073
237 Qualcomm qcc2076
238 Qualcomm ipq5028
239 Qualcomm qcn6112
240 Qualcomm qcn6122
241 Qualcomm qcn6132
242 Qualcomm qcn9001
243 Qualcomm qcn9002
244 Qualcomm qcn9003
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2023-33097.

URL Resource
https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2023-33097 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2023-33097 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Apr. 12, 2024

    Action Type Old Value New Value
    Added CWE Qualcomm, Inc. CWE-126
  • Initial Analysis by [email protected]

    Dec. 11, 2023

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
    Changed Reference Type https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin No Types Assigned https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin Vendor Advisory
    Added CWE NIST CWE-125
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:csr8811:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:immersive_home_214_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:immersive_home_214_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:immersive_home_216_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:immersive_home_216_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:immersive_home_316_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:immersive_home_316_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:immersive_home_318_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:immersive_home_318_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:immersive_home_3210_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:immersive_home_3210_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:immersive_home_326_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:immersive_home_326_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq5010_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq5010:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq5028_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq5028:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq5332_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq5332:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq6000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq6000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq6010_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq6010:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq6028_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq6028:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8070a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8070a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8071a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8071a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8072a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8072a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8074a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8074a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8076_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8076:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8076a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8076a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8078_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8078:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8078a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8078a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8173_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8173:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8174_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8174:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq9008_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq9008:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq9554_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq9554:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq9570_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq9570:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq9574_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq9574:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca0000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca0000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca4024_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca4024:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6554a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6554a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6797aq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8072_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8072:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8075_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8075:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8082_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8082:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8084_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8084:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8085_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8085:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8386_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8386:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9888_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9888:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9889_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9889:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcc2073_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcc2073:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcc2076_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcc2076:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcf8000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcf8000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcf8001_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcf8001:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5022_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5022:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5024_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5024:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5052_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5052:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5054_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5054:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5122_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5122:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5124_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5124:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5152_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5152:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5154_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5154:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5164_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5164:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6023_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6023:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6112_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6112:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6122_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6122:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6132_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6132:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9001_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9001:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9002_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9002:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9003_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9003:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9012:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9013_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9013:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9022_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9022:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9070_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9070:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9072_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9072:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9100_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9274_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9274:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc8380xp:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd_8_gen1_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx65m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx65m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_8\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_8\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ssg2115p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ssg2125p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sxr1230p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*
  • CVE Received by [email protected]

    Dec. 05, 2023

    Action Type Old Value New Value
    Added Description Transient DOS in WLAN Firmware while processing a FTMR frame.
    Added Reference Qualcomm, Inc. https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin [No types assigned]
    Added CVSS V3.1 Qualcomm, Inc. AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2023-33097 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2023-33097 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.05 }} 0.00%

score

0.13975

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability