7.5
HIGH
CVE-2023-33116
"Apache WIN WLAN Temporal Denial of Service in IEEE80211_Init Parsing"
Description

Transient DOS while parsing ieee80211_parse_mscs_ie in WIN WLAN driver.

INFO

Published Date :

Jan. 2, 2024, 6:15 a.m.

Last Modified :

Nov. 21, 2024, 8:04 a.m.

Remotely Exploitable :

Yes !

Impact Score :

3.6

Exploitability Score :

3.9
Affected Products

The following products are affected by CVE-2023-33116 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Qualcomm qca6391_firmware
2 Qualcomm wcd9380_firmware
3 Qualcomm wcd9385_firmware
4 Qualcomm wcn3980_firmware
5 Qualcomm ar8035_firmware
6 Qualcomm ar9380_firmware
7 Qualcomm csr8811_firmware
8 Qualcomm flight_rb5_5g_platform_firmware
9 Qualcomm immersive_home_214_platform_firmware
10 Qualcomm immersive_home_216_platform_firmware
11 Qualcomm immersive_home_316_platform_firmware
12 Qualcomm immersive_home_318_platform_firmware
13 Qualcomm ipq4018_firmware
14 Qualcomm ipq4028_firmware
15 Qualcomm ipq4029_firmware
16 Qualcomm ipq5010_firmware
17 Qualcomm ipq5028_firmware
18 Qualcomm ipq6000_firmware
19 Qualcomm ipq6010_firmware
20 Qualcomm ipq6018_firmware
21 Qualcomm ipq6028_firmware
22 Qualcomm ipq8064_firmware
23 Qualcomm ipq8065_firmware
24 Qualcomm ipq8068_firmware
25 Qualcomm ipq8070_firmware
26 Qualcomm ipq8070a_firmware
27 Qualcomm ipq8071a_firmware
28 Qualcomm ipq8072a_firmware
29 Qualcomm ipq8074a_firmware
30 Qualcomm ipq8076_firmware
31 Qualcomm ipq8076a_firmware
32 Qualcomm ipq8078_firmware
33 Qualcomm ipq8078a_firmware
34 Qualcomm ipq8173_firmware
35 Qualcomm ipq8174_firmware
36 Qualcomm ipq9008_firmware
37 Qualcomm ipq9574_firmware
38 Qualcomm qca4024_firmware
39 Qualcomm qca8075_firmware
40 Qualcomm qca8081_firmware
41 Qualcomm qca8082_firmware
42 Qualcomm qca8084_firmware
43 Qualcomm qca8085_firmware
44 Qualcomm qca8337_firmware
45 Qualcomm qca8386_firmware
46 Qualcomm qca9886_firmware
47 Qualcomm qca9888_firmware
48 Qualcomm qca9889_firmware
49 Qualcomm qca9898_firmware
50 Qualcomm qca9980_firmware
51 Qualcomm qca9984_firmware
52 Qualcomm qca9985_firmware
53 Qualcomm qca9990_firmware
54 Qualcomm qca9992_firmware
55 Qualcomm qca9994_firmware
56 Qualcomm qcn5022_firmware
57 Qualcomm qcn5024_firmware
58 Qualcomm qcn5052_firmware
59 Qualcomm qcn5122_firmware
60 Qualcomm qcn5124_firmware
61 Qualcomm qcn5152_firmware
62 Qualcomm qcn5154_firmware
63 Qualcomm qcn5164_firmware
64 Qualcomm qcn6023_firmware
65 Qualcomm qcn6024_firmware
66 Qualcomm qcn6112_firmware
67 Qualcomm qcn6122_firmware
68 Qualcomm qcn6132_firmware
69 Qualcomm qcn9000_firmware
70 Qualcomm qcn9011_firmware
71 Qualcomm qcn9012_firmware
72 Qualcomm qcn9022_firmware
73 Qualcomm qcn9024_firmware
74 Qualcomm qcn9070_firmware
75 Qualcomm qcn9072_firmware
76 Qualcomm qcn9074_firmware
77 Qualcomm qcn9100_firmware
78 Qualcomm qcn9274_firmware
79 Qualcomm qrb5165m_firmware
80 Qualcomm qrb5165n_firmware
81 Qualcomm sdx55_firmware
82 Qualcomm snapdragon_x65_5g_modem-rf_system_firmware
83 Qualcomm wcd9340_firmware
84 Qualcomm sdx65m_firmware
85 Qualcomm fastconnect_6900_firmware
86 Qualcomm fastconnect_7800_firmware
87 Qualcomm ipq4019_firmware
88 Qualcomm qca7500_firmware
89 Qualcomm qca9880_firmware
90 Qualcomm qca0000_firmware
91 Qualcomm qcc710_firmware
92 Qualcomm robotics_rb5_platform_firmware
93 Qualcomm immersive_home_3210_platform_firmware
94 Qualcomm immersive_home_326_platform_firmware
95 Qualcomm ipq9570_firmware
96 Qualcomm qcn9013_firmware
97 Qualcomm qcf8001_firmware
98 Qualcomm qcn6224_firmware
99 Qualcomm qcn6274_firmware
100 Qualcomm qfw7114_firmware
101 Qualcomm qfw7124_firmware
102 Qualcomm snapdragon_x75_5g_modem-rf_system_firmware
103 Qualcomm ar8035
104 Qualcomm qca6391
105 Qualcomm qca9984
106 Qualcomm sdx55
107 Qualcomm wcd9340
108 Qualcomm wcd9380
109 Qualcomm wcd9385
110 Qualcomm wcn3980
111 Qualcomm qca8337
112 Qualcomm ar9380
113 Qualcomm csr8811
114 Qualcomm ipq4018
115 Qualcomm ipq4019
116 Qualcomm ipq4028
117 Qualcomm ipq4029
118 Qualcomm ipq6000
119 Qualcomm ipq6010
120 Qualcomm ipq6018
121 Qualcomm ipq6028
122 Qualcomm ipq8064
123 Qualcomm ipq8065
124 Qualcomm ipq8068
125 Qualcomm ipq8070
126 Qualcomm ipq8070a
127 Qualcomm ipq8071a
128 Qualcomm ipq8072a
129 Qualcomm ipq8074a
130 Qualcomm ipq8076
131 Qualcomm ipq8076a
132 Qualcomm ipq8078
133 Qualcomm ipq8078a
134 Qualcomm ipq8173
135 Qualcomm ipq8174
136 Qualcomm qca4024
137 Qualcomm qca7500
138 Qualcomm qca8075
139 Qualcomm qca8081
140 Qualcomm qca9880
141 Qualcomm qca9886
142 Qualcomm qca9888
143 Qualcomm qca9889
144 Qualcomm qca9898
145 Qualcomm qca9980
146 Qualcomm qca9985
147 Qualcomm qca9990
148 Qualcomm qca9992
149 Qualcomm qca9994
150 Qualcomm qcn5022
151 Qualcomm qcn5024
152 Qualcomm qcn5052
153 Qualcomm qcn5122
154 Qualcomm qcn5124
155 Qualcomm qcn5152
156 Qualcomm qcn5154
157 Qualcomm qcn5164
158 Qualcomm qcn9000
159 Qualcomm qcn9074
160 Qualcomm ipq5010
161 Qualcomm qca0000
162 Qualcomm qcn6023
163 Qualcomm qcn6024
164 Qualcomm qcn9012
165 Qualcomm qcn9022
166 Qualcomm qcn9024
167 Qualcomm qcn9070
168 Qualcomm qcn9072
169 Qualcomm qcn9100
170 Qualcomm fastconnect_6900
171 Qualcomm fastconnect_7800
172 Qualcomm qcc710
173 Qualcomm qcn6224
174 Qualcomm qcn6274
175 Qualcomm qfw7114
176 Qualcomm qfw7124
177 Qualcomm snapdragon_x75_5g_modem-rf_system
178 Qualcomm flight_rb5_5g_platform
179 Qualcomm qcn9011
180 Qualcomm qrb5165m
181 Qualcomm qrb5165n
182 Qualcomm robotics_rb5_platform
183 Qualcomm snapdragon_x65_5g_modem-rf_system
184 Qualcomm immersive_home_214_platform
185 Qualcomm immersive_home_216_platform
186 Qualcomm immersive_home_316_platform
187 Qualcomm immersive_home_318_platform
188 Qualcomm immersive_home_3210_platform
189 Qualcomm immersive_home_326_platform
190 Qualcomm ipq9008
191 Qualcomm ipq9570
192 Qualcomm ipq9574
193 Qualcomm qca8082
194 Qualcomm qca8084
195 Qualcomm qca8085
196 Qualcomm qca8386
197 Qualcomm qcf8001
198 Qualcomm qcn9013
199 Qualcomm qcn9274
200 Qualcomm sdx65m
201 Qualcomm ipq5028
202 Qualcomm qcn6112
203 Qualcomm qcn6122
204 Qualcomm qcn6132
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2023-33116.

URL Resource
https://www.qualcomm.com/company/product-security/bulletins/january-2024-bulletin Vendor Advisory
https://www.qualcomm.com/company/product-security/bulletins/january-2024-bulletin Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2023-33116 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2023-33116 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://www.qualcomm.com/company/product-security/bulletins/january-2024-bulletin
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Apr. 12, 2024

    Action Type Old Value New Value
    Added CWE Qualcomm, Inc. CWE-126
  • Initial Analysis by [email protected]

    Jan. 08, 2024

    Action Type Old Value New Value
    Changed Reference Type https://www.qualcomm.com/company/product-security/bulletins/january-2024-bulletin No Types Assigned https://www.qualcomm.com/company/product-security/bulletins/january-2024-bulletin Vendor Advisory
    Added CWE NIST CWE-125
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ar9380_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ar9380:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:csr8811:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:flight_rb5_5g_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:immersive_home_214_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:immersive_home_214_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:immersive_home_216_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:immersive_home_216_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:immersive_home_316_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:immersive_home_316_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:immersive_home_318_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:immersive_home_318_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:immersive_home_3210_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:immersive_home_3210_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:immersive_home_326_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:immersive_home_326_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq4018_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq4018:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq4019_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq4019:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq4028_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq4028:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq4029_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq4029:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq5010_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq5010:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq5028_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq5028:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq6000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq6000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq6010_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq6010:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq6028_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq6028:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8064_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8064:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8065_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8065:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8068_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8068:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8070_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8070:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8070a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8070a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8071a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8071a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8072a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8072a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8074a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8074a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8076_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8076:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8076a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8076a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8078_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8078:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8078a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8078a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8173_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8173:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8174_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8174:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq9008_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq9008:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq9570_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq9570:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq9574_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq9574:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca0000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca0000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca4024_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca4024:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca7500_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca7500:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8075_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8075:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8082_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8082:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8084_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8084:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8085_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8085:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8386_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8386:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9880_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9880:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9886_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9886:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9888_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9888:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9889_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9889:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9898_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9898:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9980_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9980:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9984_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9984:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9985_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9985:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9990_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9990:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9992_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9992:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9994_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9994:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcf8001_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcf8001:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5022_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5022:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5024_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5024:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5052_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5052:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5122_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5122:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5124_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5124:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5152_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5152:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5154_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5154:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5164_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5164:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6023_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6023:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6112_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6112:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6122_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6122:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6132_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6132:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9011:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9012:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9013_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9013:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9022_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9022:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9070_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9070:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9072_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9072:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9100_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9274_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9274:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qrb5165m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:robotics_rb5_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:robotics_rb5_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx65m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx65m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*
  • CVE Received by [email protected]

    Jan. 02, 2024

    Action Type Old Value New Value
    Added Description Transient DOS while parsing ieee80211_parse_mscs_ie in WIN WLAN driver.
    Added Reference Qualcomm, Inc. https://www.qualcomm.com/company/product-security/bulletins/january-2024-bulletin [No types assigned]
    Added CVSS V3.1 Qualcomm, Inc. AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2023-33116 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2023-33116 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.04 }} -0.01%

score

0.17583

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability