{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-21452","assignerOrgId":"2cfc7d3e-20d3-47ac-8db7-1b7285aff15f","state":"PUBLISHED","assignerShortName":"qualcomm","dateReserved":"2023-12-12T06:07:46.902Z","datePublished":"2024-04-01T15:06:00.457Z","dateUpdated":"2024-08-26T20:52:17.003Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["Snapdragon Auto"],"product":"Snapdragon","vendor":"Qualcomm, Inc.","versions":[{"status":"affected","version":"C-V2X 9150"},{"status":"affected","version":"QCA6584AU"},{"status":"affected","version":"QCA6698AQ"},{"status":"affected","version":"Snapdragon Auto 5G Modem-RF"},{"status":"affected","version":"Snapdragon Auto 5G Modem-RF Gen 2"},{"status":"affected","version":"Snapdragon Auto 4G Modem"}]}],"descriptions":[{"lang":"en","value":"Transient DOS while decoding an ASN.1 OER message containing a SEQUENCE of unknown extensions."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":7.3,"baseSeverity":"HIGH","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20 Improper Input Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"2cfc7d3e-20d3-47ac-8db7-1b7285aff15f","shortName":"qualcomm","dateUpdated":"2024-04-12T08:39:01.550Z"},"references":[{"url":"https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2024-bulletin.html"}],"title":"Improper Input Validation in Automotive Telematics"},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T22:20:40.547Z"},"title":"CVE Program Container","references":[{"url":"https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2024-bulletin.html","tags":["x_transferred"]}]},{"affected":[{"vendor":"qualcomm","product":"c-v2x_9150_firmware","cpes":["cpe:2.3:o:qualcomm:c-v2x_9150_firmware:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"qualcomm","product":"qca6584au_firmware","cpes":["cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"qualcomm","product":"qca6698aq_firmware","cpes":["cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"qualcomm","product":"snapdragon_auto_5g_modem-rf_firmware","cpes":["cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"qualcomm","product":"snapdragon_auto_5g_modem-rf_gen_2_firmware","cpes":["cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"qualcomm","product":"snapdragon_auto_4g_modem_firmware","cpes":["cpe:2.3:o:qualcomm:snapdragon_auto_4g_modem_firmware:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-04-01T18:47:33.657569Z","id":"CVE-2024-21452","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-26T20:52:17.003Z"}}]}}