6.1
MEDIUM
CVE-2023-43528
Qualcomm Audio Stream Manager Fixed Length Payload Size Information Disclosure
Description

Information disclosure when the ADSP payload size received in HLOS in response to Audio Stream Manager matrix session is less than this expected size.

INFO

Published Date :

May 6, 2024, 3:15 p.m.

Last Modified :

Jan. 15, 2025, 4:55 p.m.

Remotely Exploitable :

No

Impact Score :

4.2

Exploitability Score :

1.8
Affected Products

The following products are affected by CVE-2023-43528 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Qualcomm qam8295p_firmware
2 Qualcomm qca6391_firmware
3 Qualcomm qca6426_firmware
4 Qualcomm qca6436_firmware
5 Qualcomm qca6574au_firmware
6 Qualcomm qca6595au_firmware
7 Qualcomm qca6696_firmware
8 Qualcomm sa6145p_firmware
9 Qualcomm sa6150p_firmware
10 Qualcomm sa6155p_firmware
11 Qualcomm sa8145p_firmware
12 Qualcomm sa8150p_firmware
13 Qualcomm sa8155p_firmware
14 Qualcomm sa8195p_firmware
15 Qualcomm sa8295p_firmware
16 Qualcomm sd865_5g_firmware
17 Qualcomm wcd9341_firmware
18 Qualcomm wcd9380_firmware
19 Qualcomm wcn3980_firmware
20 Qualcomm wsa8810_firmware
21 Qualcomm wsa8815_firmware
22 Qualcomm ar8035_firmware
23 Qualcomm csrb31024_firmware
24 Qualcomm qca6310_firmware
25 Qualcomm qca6564au_firmware
26 Qualcomm qca6574a_firmware
27 Qualcomm qca6584au_firmware
28 Qualcomm qca6698aq_firmware
29 Qualcomm qca8081_firmware
30 Qualcomm qca8337_firmware
31 Qualcomm qcn9074_firmware
32 Qualcomm sd660_firmware
33 Qualcomm snapdragon_auto_5g_modem-rf_firmware
34 Qualcomm snapdragon_auto_4g_modem_firmware
35 Qualcomm sxr2130_firmware
36 Qualcomm wcd9335_firmware
37 Qualcomm wcd9340_firmware
38 Qualcomm wcd9370_firmware
39 Qualcomm wcn3950_firmware
40 Qualcomm wcn3990_firmware
41 Qualcomm msm8996au_firmware
42 Qualcomm wcn3660b_firmware
43 Qualcomm wcn3680b_firmware
44 Qualcomm wcn3610_firmware
45 Qualcomm qca6564a_firmware
46 Qualcomm qcs410_firmware
47 Qualcomm qcs610_firmware
48 Qualcomm qca9377_firmware
49 Qualcomm sa9000p_firmware
50 Qualcomm fastconnect_6800_firmware
51 Qualcomm fastconnect_6900_firmware
52 Qualcomm fastconnect_7800_firmware
53 Qualcomm sd835_firmware
54 Qualcomm sdm429w_firmware
55 Qualcomm wcn3620_firmware
56 Qualcomm qca6320_firmware
57 Qualcomm qca9367_firmware
58 Qualcomm snapdragon_xr2_5g_firmware
59 Qualcomm qam8255p_firmware
60 Qualcomm sa8255p_firmware
61 Qualcomm c-v2x_9150_firmware
62 Qualcomm snapdragon_wear_4100\+_firmware
63 Qualcomm qcc710_firmware
64 Qualcomm video_collaboration_vc1_firmware
65 Qualcomm video_collaboration_vc3_firmware
66 Qualcomm qam8650p_firmware
67 Qualcomm qam8775p_firmware
68 Qualcomm qcn6224_firmware
69 Qualcomm qcn6274_firmware
70 Qualcomm qfw7114_firmware
71 Qualcomm qfw7124_firmware
72 Qualcomm ar8035
73 Qualcomm csrb31024
74 Qualcomm msm8996au
75 Qualcomm qca6310
76 Qualcomm qca6320
77 Qualcomm qca6391
78 Qualcomm qca6426
79 Qualcomm qca6436
80 Qualcomm qca6564a
81 Qualcomm qca6564au
82 Qualcomm qca6574a
83 Qualcomm qca6574au
84 Qualcomm qca6584au
85 Qualcomm qca6595au
86 Qualcomm qca6696
87 Qualcomm qcs410
88 Qualcomm qcs610
89 Qualcomm sa6145p
90 Qualcomm sa6150p
91 Qualcomm sa6155p
92 Qualcomm sa8150p
93 Qualcomm sa8155p
94 Qualcomm sa8195p
95 Qualcomm sd660
96 Qualcomm sd835
97 Qualcomm sd865_5g
98 Qualcomm sdm429w
99 Qualcomm wcd9335
100 Qualcomm wcd9340
101 Qualcomm wcd9341
102 Qualcomm wcd9370
103 Qualcomm wcd9380
104 Qualcomm wcn3610
105 Qualcomm wcn3620
106 Qualcomm wcn3660b
107 Qualcomm wcn3680b
108 Qualcomm wcn3950
109 Qualcomm wcn3980
110 Qualcomm wcn3990
111 Qualcomm wsa8810
112 Qualcomm wsa8815
113 Qualcomm qca8337
114 Qualcomm qca9367
115 Qualcomm qca9377
116 Qualcomm qca8081
117 Qualcomm qcn9074
118 Qualcomm sa8770p_firmware
119 Qualcomm sa8775p_firmware
120 Qualcomm snapdragon_auto_5g_modem-rf_gen_2_firmware
121 Qualcomm sxr2130
122 Qualcomm qamsrv1h_firmware
123 Qualcomm sa8650p_firmware
124 Qualcomm srv1h_firmware
125 Qualcomm qamsrv1m_firmware
126 Qualcomm srv1m_firmware
127 Qualcomm fastconnect_6800
128 Qualcomm fastconnect_6900
129 Qualcomm sa8145p
130 Qualcomm c-v2x_9150
131 Qualcomm qam8295p
132 Qualcomm sa8295p
133 Qualcomm fastconnect_7800
134 Qualcomm qam8255p
135 Qualcomm qam8775p
136 Qualcomm qca6698aq
137 Qualcomm qcc710
138 Qualcomm qcn6224
139 Qualcomm qcn6274
140 Qualcomm qfw7114
141 Qualcomm qfw7124
142 Qualcomm sa8255p
143 Qualcomm sa8770p
144 Qualcomm sa8775p
145 Qualcomm sa9000p
146 Qualcomm snapdragon_auto_5g_modem-rf_gen_2
147 Qualcomm qam8650p
148 Qualcomm snapdragon_auto_5g_modem-rf
149 Qualcomm snapdragon_auto_4g_modem
150 Qualcomm qamsrv1h
151 Qualcomm qamsrv1m
152 Qualcomm sa8650p
153 Qualcomm srv1h
154 Qualcomm srv1m
155 Qualcomm snapdragon_wear_4100\+
156 Qualcomm snapdragon_xr2_5g
157 Qualcomm video_collaboration_vc1
158 Qualcomm video_collaboration_vc3
159 Qualcomm sa7255p_firmware
160 Qualcomm sa7255p
161 Qualcomm sa8620p_firmware
162 Qualcomm sa8620p
163 Qualcomm snapdragon_820_automotive_firmware
164 Qualcomm snapdragon_820_automotive
165 Qualcomm snapdragon_835_mobile_pc_firmware
166 Qualcomm snapdragon_835_mobile_pc
167 Qualcomm snapdragon_429_mobile_firmware
168 Qualcomm snapdragon_429_mobile
169 Qualcomm snapdragon_660_mobile_firmware
170 Qualcomm snapdragon_660_mobile
171 Qualcomm snapdragon_865_5g_mobile_firmware
172 Qualcomm snapdragon_865_5g_mobile
173 Qualcomm snapdragon_865\+_5g_mobile_firmware
174 Qualcomm snapdragon_865\+_5g_mobile
175 Qualcomm snapdragon_870_5g_mobile_firmware
176 Qualcomm snapdragon_870_5g_mobile
177 Qualcomm snapdragon_x72_5g_modem-rf_firmware
178 Qualcomm snapdragon_x72_5g_modem-rf
179 Qualcomm snapdragon_x75_5g_modem-rf_firmware
180 Qualcomm snapdragon_x75_5g_modem-rf
181 Qualcomm snapdragon_x55_5g_modem-rf_firmware
182 Qualcomm snapdragon_x55_5g_modem-rf
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2023-43528.

URL Resource
https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2024-bulletin.html Patch Vendor Advisory
https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2024-bulletin.html Patch Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2023-43528 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2023-43528 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Jan. 15, 2025

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
    Added CWE NIST CWE-125
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:c-v2x_9150_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:c-v2x_9150:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:csrb31024:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qamsrv1h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qamsrv1m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6320:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9367_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9367:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa7255p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8620p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8650p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8770p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8775p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd660:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_429_mobile_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_429_mobile:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_660_mobile_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_660_mobile:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_820_automotive_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_820_automotive:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_835_mobile_pc_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_835_mobile_pc:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_865\+_5g_mobile_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_865\+_5g_mobile:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_865_5g_mobile:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_870_5g_mobile:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_auto_4g_modem_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_auto_4g_modem:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_wear_4100\+_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_wear_4100\+:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x55_5g_modem-rf:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x72_5g_modem-rf_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x72_5g_modem-rf:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_xr2_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_xr2_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:srv1h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:srv1m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:video_collaboration_vc1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:video_collaboration_vc1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:video_collaboration_vc3_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:video_collaboration_vc3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*
    Changed Reference Type https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2024-bulletin.html No Types Assigned https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2024-bulletin.html Patch, Vendor Advisory
    Changed Reference Type https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2024-bulletin.html No Types Assigned https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2024-bulletin.html Patch, Vendor Advisory
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2024-bulletin.html
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Received by [email protected]

    May. 06, 2024

    Action Type Old Value New Value
    Added Description Information disclosure when the ADSP payload size received in HLOS in response to Audio Stream Manager matrix session is less than this expected size.
    Added Reference Qualcomm, Inc. https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2024-bulletin.html [No types assigned]
    Added CWE Qualcomm, Inc. CWE-126
    Added CVSS V3.1 Qualcomm, Inc. AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2023-43528 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2023-43528 weaknesses.

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability