Vulnerability
CVE-2022-40512
Component: WIFI
Location: FIRMWARE
Transient DOS in WLAN Firmware due to buffer over-read while processing probe response or beacon.
Impact
Severity (Manufact.)
HIGH
Severity (NIST)
7.5
Severity (Android)
N/A
Chipsets
12
Devices
462
Affected Hardware
Name | Also known as | Manufacturer |
---|---|---|
SM4375 | Snapdragon 4 Gen 1 | Qualcomm |
SDM630 | Snapdragon 630 | Qualcomm |
SDM636 | Snapdragon 636 | Qualcomm |
MSM8976 | Snapdragon 652 | Qualcomm |
SM6150 | Snapdragon 675 | Qualcomm |
MSM8992 | Snapdragon 808 | Qualcomm |
MSM8994 | Snapdragon 810 | Qualcomm |
SM8350 | Snapdragon 888 | Qualcomm |
SM8475 | Snapdragon 8+ Gen 1 | Qualcomm |
SC8180X | Snapdragon 8cx | Qualcomm |
12 of 12 row(s) shown.
Rows per page
Page 1 of 2
Information reliability
The information on this website is intended to provide information on the big picture of chipset security and measure trends within the industry. Our information is obtained from several vantage points, checked for consistency, and automatically cross-referenced. However, this process may not always yield reliable information. Do not use the information on a particular vulnerability, chipset or device to verify your individual exposure in cases where inaccuracies are inacceptable, for instance to assess risks if you are a Politically Exposed Person.
Timeline
Introduced (est):
Jul 1, 2014
Reported:
Unknown
Advisory Published:
Feb 6, 2023
CVE Published:
Feb 12, 2023
Android Patch Level:
Feb 2023