7.5
HIGH
CVE-2024-23385
Huawei Modem Dial-Up Service Denial of Service Vulnerability
Description

Transient DOS as modem reset occurs when an unexpected MAC RAR (with invalid PDU length) is seen at UE.

INFO

Published Date :

Nov. 4, 2024, 10:15 a.m.

Last Modified :

Nov. 7, 2024, 8:05 p.m.

Remotely Exploitable :

Yes !

Impact Score :

3.6

Exploitability Score :

3.9
Affected Products

The following products are affected by CVE-2024-23385 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Qualcomm qca6574au_firmware
2 Qualcomm qca6595au_firmware
3 Qualcomm qca6696_firmware
4 Qualcomm wcd9380_firmware
5 Qualcomm wcd9385_firmware
6 Qualcomm wcn3980_firmware
7 Qualcomm wcn3988_firmware
8 Qualcomm wsa8810_firmware
9 Qualcomm wsa8815_firmware
10 Qualcomm wsa8830_firmware
11 Qualcomm wsa8835_firmware
12 Qualcomm ar8035_firmware
13 Qualcomm qca6574a_firmware
14 Qualcomm qca6584au_firmware
15 Qualcomm qca6698aq_firmware
16 Qualcomm qca8081_firmware
17 Qualcomm qca8337_firmware
18 Qualcomm qcm4490_firmware
19 Qualcomm qcn6024_firmware
20 Qualcomm qcn9024_firmware
21 Qualcomm qcs4490_firmware
22 Qualcomm sdx55_firmware
23 Qualcomm snapdragon_x65_5g_modem-rf_system_firmware
24 Qualcomm wcd9326_firmware
25 Qualcomm wcd9340_firmware
26 Qualcomm wcd9360_firmware
27 Qualcomm wcd9370_firmware
28 Qualcomm wcd9375_firmware
29 Qualcomm wcn3950_firmware
30 Qualcomm wsa8832_firmware
31 Qualcomm wcn3660b_firmware
32 Qualcomm wcn3680b_firmware
33 Qualcomm wcn3610_firmware
34 Qualcomm fsm10056_firmware
35 Qualcomm qca6174a_firmware
36 Qualcomm sdx57m_firmware
37 Qualcomm fastconnect_6200_firmware
38 Qualcomm fastconnect_6900_firmware
39 Qualcomm fastconnect_7800_firmware
40 Qualcomm msm8108_firmware
41 Qualcomm msm8209_firmware
42 Qualcomm msm8608_firmware
43 Qualcomm sdm429w_firmware
44 Qualcomm wcn3615_firmware
45 Qualcomm wcn3620_firmware
46 Qualcomm smart_audio_200_platform_firmware
47 Qualcomm fastconnect_6700_firmware
48 Qualcomm snapdragon_4_gen_1_mobile_platform_firmware
49 Qualcomm snapdragon_480_5g_mobile_platform_firmware
50 Qualcomm snapdragon_480\+_5g_mobile_platform_firmware
51 Qualcomm snapdragon_695_5g_mobile_platform_firmware
52 Qualcomm snapdragon_8_gen_1_mobile_platform_firmware
53 Qualcomm snapdragon_8\+_gen_1_mobile_platform_firmware
54 Qualcomm apq8017_firmware
55 Qualcomm fsm10055_firmware
56 Qualcomm qcs8550_firmware
57 Qualcomm apq8037_firmware
58 Qualcomm qcc710_firmware
59 Qualcomm snapdragon_wear_4100\+_platform_firmware
60 Qualcomm snapdragon_208_processor_firmware
61 Qualcomm snapdragon_x70_modem-rf_system_firmware
62 Qualcomm snapdragon_210_processor_firmware
63 Qualcomm snapdragon_212_mobile_platform_firmware
64 Qualcomm snapdragon_425_mobile_platform_firmware
65 Qualcomm snapdragon_429_mobile_platform_firmware
66 Qualcomm snapdragon_430_mobile_platform_firmware
67 Qualcomm snapdragon_439_mobile_platform_firmware
68 Qualcomm qcm8550_firmware
69 Qualcomm sm8550p_firmware
70 Qualcomm snapdragon_8_gen_2_mobile_platform_firmware
71 Qualcomm snapdragon_8\+_gen_2_mobile_platform_firmware
72 Qualcomm wcd9390_firmware
73 Qualcomm wcd9395_firmware
74 Qualcomm wsa8840_firmware
75 Qualcomm wsa8845_firmware
76 Qualcomm wsa8845h_firmware
77 Qualcomm sg8275p_firmware
78 Qualcomm qcn6224_firmware
79 Qualcomm qcn6274_firmware
80 Qualcomm qfw7114_firmware
81 Qualcomm qfw7124_firmware
82 Qualcomm snapdragon_x75_5g_modem-rf_system_firmware
83 Qualcomm apq8017
84 Qualcomm apq8037
85 Qualcomm ar8035
86 Qualcomm msm8108
87 Qualcomm msm8209
88 Qualcomm msm8608
89 Qualcomm qca6174a
90 Qualcomm qca6574a
91 Qualcomm qca6574au
92 Qualcomm qca6584au
93 Qualcomm qca6595au
94 Qualcomm qca6696
95 Qualcomm sdm429w
96 Qualcomm sdx55
97 Qualcomm wcd9326
98 Qualcomm wcd9340
99 Qualcomm wcd9360
100 Qualcomm wcd9370
101 Qualcomm wcd9375
102 Qualcomm wcd9380
103 Qualcomm wcd9385
104 Qualcomm wcn3610
105 Qualcomm wcn3615
106 Qualcomm wcn3620
107 Qualcomm wcn3660b
108 Qualcomm wcn3680b
109 Qualcomm wcn3950
110 Qualcomm wcn3980
111 Qualcomm wcn3988
112 Qualcomm wsa8810
113 Qualcomm wsa8815
114 Qualcomm wsa8830
115 Qualcomm wsa8835
116 Qualcomm qca8337
117 Qualcomm fsm10055
118 Qualcomm fsm10056
119 Qualcomm qca8081
120 Qualcomm qcn6024
121 Qualcomm qcn9024
122 Qualcomm snapdragon_auto_5g_modem-rf_gen_2_firmware
123 Qualcomm qep8111_firmware
124 Qualcomm snapdragon_8_gen_3_mobile_platform_firmware
125 Qualcomm snapdragon_x35_5g_modem-rf_system_firmware
126 Qualcomm fastconnect_6700
127 Qualcomm fastconnect_6200
128 Qualcomm fastconnect_6900
129 Qualcomm snapdragon_wear_4100\+_platform
130 Qualcomm fastconnect_7800
131 Qualcomm qca6698aq
132 Qualcomm qcc710
133 Qualcomm qcn6224
134 Qualcomm qcn6274
135 Qualcomm qfw7114
136 Qualcomm qfw7124
137 Qualcomm snapdragon_210_processor
138 Qualcomm snapdragon_212_mobile_platform
139 Qualcomm snapdragon_auto_5g_modem-rf_gen_2
140 Qualcomm snapdragon_x75_5g_modem-rf_system
141 Qualcomm qcm4490
142 Qualcomm qcm8550
143 Qualcomm qcs4490
144 Qualcomm qcs8550
145 Qualcomm sg8275p
146 Qualcomm sm8550p
147 Qualcomm snapdragon_4_gen_1_mobile_platform
148 Qualcomm snapdragon_425_mobile_platform
149 Qualcomm snapdragon_429_mobile_platform
150 Qualcomm snapdragon_430_mobile_platform
151 Qualcomm snapdragon_439_mobile_platform
152 Qualcomm snapdragon_480_5g_mobile_platform
153 Qualcomm snapdragon_480\+_5g_mobile_platform
154 Qualcomm snapdragon_695_5g_mobile_platform
155 Qualcomm snapdragon_8_gen_1_mobile_platform
156 Qualcomm snapdragon_8_gen_2_mobile_platform
157 Qualcomm snapdragon_8\+_gen_1_mobile_platform
158 Qualcomm snapdragon_8\+_gen_2_mobile_platform
159 Qualcomm snapdragon_x65_5g_modem-rf_system
160 Qualcomm wcd9390
161 Qualcomm wcd9395
162 Qualcomm wsa8832
163 Qualcomm wsa8840
164 Qualcomm wsa8845
165 Qualcomm wsa8845h
166 Qualcomm sdx57m
167 Qualcomm smart_audio_200_platform
168 Qualcomm snapdragon_208_processor
169 Qualcomm snapdragon_x70_modem-rf_system
170 Qualcomm qep8111
171 Qualcomm snapdragon_8_gen_3_mobile_platform
172 Qualcomm snapdragon_x35_5g_modem-rf_system
173 Qualcomm snapdragon_x72_5g_modem-rf_system_firmware
174 Qualcomm snapdragon_x72_5g_modem-rf_system
175 Qualcomm sm6370_firmware
176 Qualcomm sm6370
177 Qualcomm snapdragon_x62_5g_modem-rf_system_firmware
178 Qualcomm snapdragon_x62_5g_modem-rf_system
179 Qualcomm sdx71m_firmware
180 Qualcomm sdx71m
181 Qualcomm 205_mobile_platform_firmware
182 Qualcomm 205_mobile_platform
183 Qualcomm sm8635_firmware
184 Qualcomm sm8635
185 Qualcomm wcn6755_firmware
186 Qualcomm wcn6755
187 Qualcomm sdx61_firmware
188 Qualcomm sdx61
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2024-23385.

URL Resource
https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html Patch Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2024-23385 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2024-23385 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Nov. 07, 2024

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
    Changed Reference Type https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html No Types Assigned https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html Patch, Vendor Advisory
    Added CWE NIST CWE-617
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn6755:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9360:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x72_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x72_5g_modem-rf_system:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x70_modem-rf_system_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x70_modem-rf_system:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x62_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x62_5g_modem-rf_system:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x35_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x35_5g_modem-rf_system:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_wear_4100\+_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_wear_4100\+_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_8\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_8\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_8\+_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_8\+_gen_1_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_8_gen_3_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_695_5g_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_480\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_480\+_5g_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_480_5g_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_439_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_439_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_430_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_430_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_429_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_429_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_425_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_425_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_4_gen_1_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_212_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_212_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_210_processor_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_210_processor:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_208_processor_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_208_processor:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:smart_audio_200_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:smart_audio_200_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8635:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm6370_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm6370:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx71m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx71m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx61_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx61:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx57m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx57m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:205_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:205_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qep8111_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qep8111:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcm4490:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8608_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8608:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8209_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8209:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8108_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8108:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fsm10056_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fsm10056:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fsm10055_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fsm10055:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:apq8037_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:apq8037:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*
  • CVE Received by [email protected]

    Nov. 04, 2024

    Action Type Old Value New Value
    Added Description Transient DOS as modem reset occurs when an unexpected MAC RAR (with invalid PDU length) is seen at UE.
    Added Reference Qualcomm, Inc. https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html [No types assigned]
    Added CWE Qualcomm, Inc. CWE-617
    Added CVSS V3.1 Qualcomm, Inc. AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2024-23385 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2024-23385 weaknesses.

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability