Vulnerability
CVE-2022-33288
Memory corruption due to buffer copy without checking the size of input in Core while sending SCM command to get write protection information.
Impact
Severity (Manufact.)
CRITICAL
Severity (NIST)
8.8
Severity (Android)
N/A
Chipsets
20
Devices
752
Affected Hardware
Name | Also known as | Manufacturer |
---|---|---|
SDM670 | Snapdragon 670 | Qualcomm |
SM6150 | Snapdragon 675 | Qualcomm |
SM6150-AC | Snapdragon 678 | Qualcomm |
SM6350 | Snapdragon 690 | Qualcomm |
SM7225 | Snapdragon 750G | Qualcomm |
SM7250-AA | Snapdragon 765 | Qualcomm |
SM7250-AB | Snapdragon 765G | Qualcomm |
SM7250-AC | Snapdragon 768G | Qualcomm |
SM7325 | Snapdragon 778G | Qualcomm |
SM7325-AE | Snapdragon 778G+ | Qualcomm |
20 of 20 row(s) shown.
Rows per page
Page 1 of 2
Information reliability
The information on this website is intended to provide information on the big picture of chipset security and measure trends within the industry. Our information is obtained from several vantage points, checked for consistency, and automatically cross-referenced. However, this process may not always yield reliable information. Do not use the information on a particular vulnerability, chipset or device to verify your individual exposure in cases where inaccuracies are inacceptable, for instance to assess risks if you are a Politically Exposed Person.
Timeline
Introduced (est):
Jan 1, 2018
Reported:
Unknown
Advisory Published:
Apr 3, 2023
CVE Published:
Apr 13, 2023
Android Patch Level:
Apr 2023