Unknown
CVE-2023-28576
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2023-28576
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
The buffer obtained from kernel APIs such as cam_mem_get_cpu_buf() may be readable/writable in userspace after kernel accesses it. In other words, user mode may race and modify the packet header (e.g. header.count), causing checks (e.g. size checks) in kernel code to be invalid. This may lead to out-of-bounds read/write issues.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- fastconnect 6800 firmware -,
- fastconnect 6900 firmware -,
- fastconnect 7800 firmware -,
- qca6391 firmware -,
- qca6426 firmware -,
- qca6436 firmware -,
- qcn9074 firmware -,
- qcs410 firmware -,
- qcs610 firmware -,
- sd865 5g firmware -,
- snapdragon 8 gen 1 firmware -,
- snapdragon 865 5g firmware -,
- snapdragon 865+ 5g firmware -,
- snapdragon 870 5g firmware -,
- snapdragon x55 5g firmware -,
- snapdragon xr2 5g firmware -,
- sw5100 firmware -,
- sw5100p firmware -,
- sxr2130 firmware -,
- wcd9341 firmware -,
- wcd9370 firmware -,
- wcd9380 firmware -,
- wcn3660b firmware -,
- wcn3680b firmware -,
- wcn3950 firmware -,
- wcn3980 firmware -,
- wcn3988 firmware -,
- wsa8810 firmware -,
- wsa8815 firmware -,
- wsa8830 firmware -,
- wsa8835 firmware -
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: