First published: Mon Jun 03 2024(Updated: )
Memory corruption while creating a LPAC client as LPAC engine was allowed to access GPU registers.
Credit: product-security@qualcomm.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Qualcomm FastConnect 6700 Firmware | ||
Qualcomm FastConnect 6700 | ||
All of | ||
Qualcomm FastConnect 6900 Firmware | ||
Qualcomm Fastconnect 6900 Firmware | ||
All of | ||
Qualcomm Fastconnect 7800 Firmware | ||
Qualcomm Fastconnect 7800 Firmware | ||
All of | ||
Qualcomm SC8380XP | ||
qualcomm sc8380xp firmware | ||
All of | ||
Qualcomm Snapdragon 7c+ Gen 3 Compute Firmware | ||
Qualcomm Snapdragon 7c+ Gen 3 Compute | ||
All of | ||
qualcomm sc8280xp-abbb | ||
qualcomm sc8280xp-abbb firmware | ||
All of | ||
Qualcomm WCD9380 | ||
Qualcomm WCD9380 Firmware | ||
All of | ||
Qualcomm WCD9385 | ||
Qualcomm WCD9385 Firmware | ||
All of | ||
Qualcomm WSA8830 | ||
Qualcomm WSA8830 | ||
All of | ||
Qualcomm WSA8835 | ||
Qualcomm WSA8835 Firmware | ||
All of | ||
Qualcomm WSA8840 Firmware | ||
Qualcomm WSA8840 Firmware | ||
All of | ||
Qualcomm WSA8845H | ||
Qualcomm WSA8845 Firmware | ||
All of | ||
Qualcomm WSA8845H | ||
Qualcomm WSA8845H Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23360 has been classified with a critical severity due to memory corruption issues that could allow for potential exploits.
To address CVE-2024-23360, update the firmware of the affected Qualcomm Fastconnect models to the latest version provided by Qualcomm.
CVE-2024-23360 affects Qualcomm Fastconnect 6700, 6900, 7800, Sc8380xp, Snapdragon 7c+ Gen 3 Compute, Sc8280xp-abbb, Wcd9380, Wcd9385, Wsa8830, Wsa8835, Wsa8840, Wsa8845, and Wsa8845h firmware versions.
CVE-2024-23360 may be exploited remotely due to memory corruption vulnerabilities that allow unauthorized access.
CVE-2024-23360 is classified as a memory corruption vulnerability, specifically occurring during the creation of an LPAC client.