{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-33236","assignerOrgId":"2cfc7d3e-20d3-47ac-8db7-1b7285aff15f","assignerShortName":"qualcomm","dateUpdated":"2025-04-22T15:49:16.930Z","dateReserved":"2022-06-14T00:00:00.000Z","datePublished":"2022-11-15T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"2cfc7d3e-20d3-47ac-8db7-1b7285aff15f","shortName":"qualcomm","dateUpdated":"2022-11-15T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"Transient DOS due to buffer over-read in WLAN firmware while parsing cipher suite info attributes. in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking"}],"affected":[{"vendor":"Qualcomm, Inc.","product":"Snapdragon Compute, Snapdragon Connectivity, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking","versions":[{"version":"AR8035","status":"affected"},{"version":"CSR8811","status":"affected"},{"version":"IPQ5010","status":"affected"},{"version":"IPQ5018","status":"affected"},{"version":"IPQ5028","status":"affected"},{"version":"IPQ6000","status":"affected"},{"version":"IPQ6010","status":"affected"},{"version":"IPQ6018","status":"affected"},{"version":"IPQ6028","status":"affected"},{"version":"IPQ8070A","status":"affected"},{"version":"IPQ8071A","status":"affected"},{"version":"IPQ8072A","status":"affected"},{"version":"IPQ8074A","status":"affected"},{"version":"IPQ8076","status":"affected"},{"version":"IPQ8076A","status":"affected"},{"version":"IPQ8078","status":"affected"},{"version":"IPQ8078A","status":"affected"},{"version":"IPQ8173","status":"affected"},{"version":"IPQ8174","status":"affected"},{"version":"IPQ9008","status":"affected"},{"version":"QCA4024","status":"affected"},{"version":"QCA6390","status":"affected"},{"version":"QCA6391","status":"affected"},{"version":"QCA6426","status":"affected"},{"version":"QCA6436","status":"affected"},{"version":"QCA8072","status":"affected"},{"version":"QCA8075","status":"affected"},{"version":"QCA8081","status":"affected"},{"version":"QCA8082","status":"affected"},{"version":"QCA8084","status":"affected"},{"version":"QCA8085","status":"affected"},{"version":"QCA8337","status":"affected"},{"version":"QCA8386","status":"affected"},{"version":"QCA9888","status":"affected"},{"version":"QCA9889","status":"affected"},{"version":"QCN5022","status":"affected"},{"version":"QCN5024","status":"affected"},{"version":"QCN5052","status":"affected"},{"version":"QCN5054","status":"affected"},{"version":"QCN5122","status":"affected"},{"version":"QCN5124","status":"affected"},{"version":"QCN5152","status":"affected"},{"version":"QCN5154","status":"affected"},{"version":"QCN5164","status":"affected"},{"version":"QCN6023","status":"affected"},{"version":"QCN6024","status":"affected"},{"version":"QCN6100","status":"affected"},{"version":"QCN6102","status":"affected"},{"version":"QCN6112","status":"affected"},{"version":"QCN6122","status":"affected"},{"version":"QCN6132","status":"affected"},{"version":"QCN9000","status":"affected"},{"version":"QCN9001","status":"affected"},{"version":"QCN9002","status":"affected"},{"version":"QCN9003","status":"affected"},{"version":"QCN9022","status":"affected"},{"version":"QCN9024","status":"affected"},{"version":"QCN9070","status":"affected"},{"version":"QCN9072","status":"affected"},{"version":"QCN9074","status":"affected"},{"version":"QCN9100","status":"affected"},{"version":"QCN9274","status":"affected"},{"version":"SD 8 Gen1 5G","status":"affected"},{"version":"SD865 5G","status":"affected"},{"version":"SD870","status":"affected"},{"version":"SDX65","status":"affected"},{"version":"WCD9380","status":"affected"},{"version":"WCN6740","status":"affected"},{"version":"WCN6850","status":"affected"},{"version":"WCN6851","status":"affected"},{"version":"WCN6855","status":"affected"},{"version":"WCN6856","status":"affected"},{"version":"WCN7850","status":"affected"},{"version":"WCN7851","status":"affected"},{"version":"WSA8810","status":"affected"},{"version":"WSA8815","status":"affected"},{"version":"WSA8830","status":"affected"},{"version":"WSA8835","status":"affected"}]}],"references":[{"url":"https://www.qualcomm.com/company/product-security/bulletins/november-2022-bulletin"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"Buffer over-read in WLAN"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T08:01:20.441Z"},"title":"CVE Program Container","references":[{"url":"https://www.qualcomm.com/company/product-security/bulletins/november-2022-bulletin","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-125","lang":"en","description":"CWE-125 Out-of-bounds Read"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-22T14:44:40.247570Z","id":"CVE-2022-33236","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-22T15:49:16.930Z"}}]}}