
CVE-2022-40504 – Reachable assertion in Modem
https://notcve.org/view.php?id=CVE-2022-40504
02 May 2023 — Transient DOS due to reachable assertion in Modem when UE received Downlink Data Indication message from the network. • https://www.qualcomm.com/company/product-security/bulletins/may-2023-bulletin • CWE-617: Reachable Assertion •

CVE-2022-40532 – Integer overflow or wraparound in WLAN
https://notcve.org/view.php?id=CVE-2022-40532
04 Apr 2023 — Memory corruption due to integer overflow or wraparound in WLAN while sending WMI cmd from host to target. • https://www.qualcomm.com/company/product-security/bulletins/april-2023-bulletin • CWE-190: Integer Overflow or Wraparound •

CVE-2022-33302 – Improper validation of array index in User Identity Module
https://notcve.org/view.php?id=CVE-2022-33302
04 Apr 2023 — Memory corruption due to improper validation of array index in User Identity Module when APN TLV length is greater than command length. • https://www.qualcomm.com/company/product-security/bulletins/april-2023-bulletin • CWE-129: Improper Validation of Array Index •

CVE-2022-33289 – Improper validation of array index in Modem
https://notcve.org/view.php?id=CVE-2022-33289
04 Apr 2023 — Memory corruption occurs in Modem due to improper validation of array index when malformed APDU is sent from card. • https://www.qualcomm.com/company/product-security/bulletins/april-2023-bulletin • CWE-129: Improper Validation of Array Index •

CVE-2022-33288 – Buffer copy without checking the size of input in Core
https://notcve.org/view.php?id=CVE-2022-33288
04 Apr 2023 — Memory corruption due to buffer copy without checking the size of input in Core while sending SCM command to get write protection information. • https://www.qualcomm.com/company/product-security/bulletins/april-2023-bulletin • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2022-33231 – Double free in Core
https://notcve.org/view.php?id=CVE-2022-33231
04 Apr 2023 — Memory corruption due to double free in core while initializing the encryption key. • https://www.qualcomm.com/company/product-security/bulletins/april-2023-bulletin • CWE-415: Double Free •

CVE-2022-40531 – Incorrect type conversion in WLAN
https://notcve.org/view.php?id=CVE-2022-40531
07 Mar 2023 — Memory corruption in WLAN due to incorrect type cast while sending WMI_SCAN_SCH_PRIO_TBL_CMDID message. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-704: Incorrect Type Conversion or Cast •

CVE-2022-40530 – Integer overflow to buffer overflow in WLAN
https://notcve.org/view.php?id=CVE-2022-40530
07 Mar 2023 — Memory corruption in WLAN due to integer overflow to buffer overflow in WLAN during initialization phase. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-190: Integer Overflow or Wraparound CWE-680: Integer Overflow to Buffer Overflow •

CVE-2022-33242 – Improper authentication in Qualcomm IPC
https://notcve.org/view.php?id=CVE-2022-33242
07 Mar 2023 — Memory corruption due to improper authentication in Qualcomm IPC while loading unsigned lib in audio PD. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-287: Improper Authentication •

CVE-2022-33213 – Memory Corruption in MODEM
https://notcve.org/view.php?id=CVE-2022-33213
07 Mar 2023 — Memory corruption in modem due to buffer overflow while processing a PPP packet • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-121: Stack-based Buffer Overflow •