Show filters
73 Total Results
Displaying 1-10 of 73
Sort by:
Attacker Value
Unknown

CVE-2024-45542

Disclosure Date: January 06, 2025 (last updated January 14, 2025)
Memory corruption when IOCTL call is invoked from user-space to write board data to WLAN driver.
Attacker Value
Unknown

CVE-2024-45541

Disclosure Date: January 06, 2025 (last updated January 14, 2025)
Memory corruption when IOCTL call is invoked from user-space to read board data.
Attacker Value
Unknown

CVE-2024-43053

Disclosure Date: December 02, 2024 (last updated December 21, 2024)
Memory corruption while invoking IOCTL calls from user space to read WLAN target diagnostic information.
Attacker Value
Unknown

CVE-2024-43050

Disclosure Date: December 02, 2024 (last updated December 21, 2024)
Memory corruption while invoking IOCTL calls from user space to issue factory test command inside WLAN driver.
Attacker Value
Unknown

CVE-2024-38408

Disclosure Date: November 04, 2024 (last updated November 09, 2024)
Cryptographic issue when a controller receives an LMP start encryption command under unexpected conditions.
Attacker Value
Unknown

CVE-2024-33051

Disclosure Date: September 02, 2024 (last updated September 05, 2024)
Transient DOS while processing TIM IE from beacon frame as there is no check for IE length.
Attacker Value
Unknown

CVE-2023-43536

Disclosure Date: February 06, 2024 (last updated February 09, 2024)
Transient DOS while parse fils IE with length equal to 1.
Attacker Value
Unknown

CVE-2023-43533

Disclosure Date: February 06, 2024 (last updated February 09, 2024)
Transient DOS in WLAN Firmware when the length of received beacon is less than length of ieee802.11 beacon frame.
Attacker Value
Unknown

CVE-2023-43522

Disclosure Date: February 06, 2024 (last updated February 09, 2024)
Transient DOS while key unwrapping process, when the given encrypted key is empty or NULL.
Attacker Value
Unknown

CVE-2023-43511

Disclosure Date: January 02, 2024 (last updated January 09, 2024)
Transient DOS while parsing IPv6 extension header when WLAN firmware receives an IPv6 packet that contains `IPPROTO_NONE` as the next header.