7.5
CVE-2024-43064
- EPSS 0.02%
- Published 06.01.2025 11:15:09
- Last modified 13.01.2025 21:50:35
- Source product-security@qualcomm.com
- Teams watchlist Login
- Open Login
Uncontrolled resource consumption when a driver, an application or a SMMU client tries to access the global registers through SMMU.
Data is provided by the National Vulnerability Database (NVD)
Qualcomm ≫ Qam8255p Firmware Version-
Qualcomm ≫ Qam8295p Firmware Version-
Qualcomm ≫ Qam8620p Firmware Version-
Qualcomm ≫ Qam8650p Firmware Version-
Qualcomm ≫ Qam8775p Firmware Version-
Qualcomm ≫ Qamsrv1h Firmware Version-
Qualcomm ≫ Qamsrv1m Firmware Version-
Qualcomm ≫ Qca6574au Firmware Version-
Qualcomm ≫ Qca6595 Firmware Version-
Qualcomm ≫ Qca6595au Firmware Version-
Qualcomm ≫ Qca6688aq Firmware Version-
Qualcomm ≫ Qca6696 Firmware Version-
Qualcomm ≫ Qca6698aq Firmware Version-
Qualcomm ≫ Sa7255p Firmware Version-
Qualcomm ≫ Sa7775p Firmware Version-
Qualcomm ≫ Sa8255p Firmware Version-
Qualcomm ≫ Sa8295p Firmware Version-
Qualcomm ≫ Sa8540p Firmware Version-
Qualcomm ≫ Sa8620p Firmware Version-
Qualcomm ≫ Sa8650p Firmware Version-
Qualcomm ≫ Sa8770p Firmware Version-
Qualcomm ≫ Sa8775p Firmware Version-
Qualcomm ≫ Sa9000p Firmware Version-
Qualcomm ≫ Sdm429w Firmware Version-
Qualcomm ≫ Snapdragon 429 Mobile Firmware Version-
Qualcomm ≫ Srv1h Firmware Version-
Qualcomm ≫ Srv1l Firmware Version-
Qualcomm ≫ Srv1m Firmware Version-
Qualcomm ≫ Wcn3620 Firmware Version-
Qualcomm ≫ Wcn3660b Firmware Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.029 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 4.7 | 1 | 3.6 |
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
|
product-security@qualcomm.com | 7.5 | 0.8 | 6 |
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
|
CWE-770 Allocation of Resources Without Limits or Throttling
The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.