5.5
CVE-2025-27072
- EPSS 0.01%
- Published 06.08.2025 07:26:08
- Last modified 18.08.2025 18:27:12
- Source product-security@qualcomm.com
- Teams watchlist Login
- Open Login
Information disclosure while processing a packet at EAVB BE side with invalid header length.
Data is provided by the National Vulnerability Database (NVD)
Qualcomm ≫ Qam8255p Firmware Version-
Qualcomm ≫ Qam8295p Firmware Version-
Qualcomm ≫ Qam8620p Firmware Version-
Qualcomm ≫ Qam8650p Firmware Version-
Qualcomm ≫ Qam8775p Firmware Version-
Qualcomm ≫ Qamsrv1h Firmware Version-
Qualcomm ≫ Qamsrv1m Firmware Version-
Qualcomm ≫ Qca6574a Firmware Version-
Qualcomm ≫ Qca6574au Firmware Version-
Qualcomm ≫ Qca6595 Firmware Version-
Qualcomm ≫ Qca6595au Firmware Version-
Qualcomm ≫ Qca6688aq Firmware Version-
Qualcomm ≫ Qca6696 Firmware Version-
Qualcomm ≫ Qca6698aq Firmware Version-
Qualcomm ≫ Sa6145p Firmware Version-
Qualcomm ≫ Sa6150p Firmware Version-
Qualcomm ≫ Sa6155 Firmware Version-
Qualcomm ≫ Sa6155p Firmware Version-
Qualcomm ≫ Sa7255p Firmware Version-
Qualcomm ≫ Sa7775p Firmware Version-
Qualcomm ≫ Sa8145p Firmware Version-
Qualcomm ≫ Sa8150p Firmware Version-
Qualcomm ≫ Sa8155 Firmware Version-
Qualcomm ≫ Sa8155p Firmware Version-
Qualcomm ≫ Sa8195p Firmware Version-
Qualcomm ≫ Sa8255p Firmware Version-
Qualcomm ≫ Sa8295p Firmware Version-
Qualcomm ≫ Sa8540p Firmware Version-
Qualcomm ≫ Sa8620p Firmware Version-
Qualcomm ≫ Sa8650p Firmware Version-
Qualcomm ≫ Sa8770p Firmware Version-
Qualcomm ≫ Sa8775p Firmware Version-
Qualcomm ≫ Sa9000p Firmware Version-
Qualcomm ≫ Srv1h Firmware Version-
Qualcomm ≫ Srv1l Firmware Version-
Qualcomm ≫ Srv1m Firmware Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.01% | 0.012 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
product-security@qualcomm.com | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.