CWE-1262

Improper Access Control for Register Interface

The product uses memory-mapped I/O registers that act as an interface to hardware functionality from software, but there is improper access control to those registers.

CVE-2022-23005 (GCVE-0-2022-23005)
Vulnerability from cvelistv5
Published
2023-01-23 00:00
Modified
2025-04-01 19:56
CWE
  • CWE-1224 - Improper Restriction of Write-Once Bit Fields Improper Restriction of Write-Once Bit Fields
  • CWE-1233 - Security-Sensitive Hardware Controls with Missing Lock Bit Protection
  • CWE-1262 - Improper Access Control for Register Interface
Summary
Western Digital has identified a weakness in the UFS standard that could result in a security vulnerability. This vulnerability may exist in some systems where the Host boot ROM code implements the UFS Boot feature to boot from UFS compliant storage devices. The UFS Boot feature, as specified in the UFS standard, is provided by UFS devices to support platforms that need to download the system boot loader from external non-volatile storage locations. Several scenarios have been identified in which adversaries may disable the boot capability, or revert to an old boot loader code, if the host boot ROM code is improperly implemented. UFS Host Boot ROM implementers may be impacted by this vulnerability. UFS devices are only impacted when connected to a vulnerable UFS Host and are not independently impacted by this vulnerability. When present, the vulnerability is in the UFS Host implementation and is not a vulnerability in Western Digital UFS Devices. Western Digital has provided details of the vulnerability to the JEDEC standards body, multiple vendors of host processors, and software solutions providers.
Impacted products
Vendor Product Version
NA NA Version: NA
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T03:28:42.818Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.westerndigital.com/support/product-security/wdc-23001-host-boot-rom-code-vulnerability-in-systems-implementing-ufs-boot-feature"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://documents.westerndigital.com/content/dam/doc-library/en_us/assets/public/western-digital/collateral/white-paper/white-paper-host-boot-rom-code-vulnerability-and-mitigation.pdf"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-23005",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-01T19:55:51.781558Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-01T19:56:07.984Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "NA",
          "vendor": "NA",
          "versions": [
            {
              "status": "affected",
              "version": "NA"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Rotem Sela and Avri Altman of Western Digital"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Western Digital has identified a weakness in the UFS standard that could result in a security vulnerability. This vulnerability may exist in some systems where the Host boot ROM code implements the UFS Boot feature to boot from UFS compliant storage devices. The UFS Boot feature, as specified in the UFS standard, is provided by UFS devices to support platforms that need to download the system boot loader from external non-volatile storage locations. Several scenarios have been identified in which adversaries may disable the boot capability, or revert to an old boot loader code, if the host boot ROM code is improperly implemented. UFS Host Boot ROM implementers may be impacted by this vulnerability. UFS devices are only impacted when connected to a vulnerable UFS Host and are not independently impacted by this vulnerability. When present, the vulnerability is in the UFS Host implementation and is not a vulnerability in Western Digital UFS Devices. Western Digital has provided details of the vulnerability to the JEDEC standards body, multiple vendors of host processors, and software solutions providers."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1224",
              "description": "CWE-1224 Improper Restriction of Write-Once Bit FieldsCWE-1224 Improper Restriction of Write-Once Bit Fields",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-1233",
              "description": "CWE-1233 Security-Sensitive Hardware Controls with Missing Lock Bit Protection",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-1262",
              "description": "CWE-1262 Improper Access Control for Register Interface",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-24T00:00:00.000Z",
        "orgId": "cb3b742e-5145-4748-b44b-5ffd45bf3b6a",
        "shortName": "WDC PSIRT"
      },
      "references": [
        {
          "url": "https://www.westerndigital.com/support/product-security/wdc-23001-host-boot-rom-code-vulnerability-in-systems-implementing-ufs-boot-feature"
        },
        {
          "url": "https://documents.westerndigital.com/content/dam/doc-library/en_us/assets/public/western-digital/collateral/white-paper/white-paper-host-boot-rom-code-vulnerability-and-mitigation.pdf"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "Host Boot ROM Code Vulnerability in Systems Implementing UFS Boot Feature",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cb3b742e-5145-4748-b44b-5ffd45bf3b6a",
    "assignerShortName": "WDC PSIRT",
    "cveId": "CVE-2022-23005",
    "datePublished": "2023-01-23T00:00:00.000Z",
    "dateReserved": "2022-01-10T00:00:00.000Z",
    "dateUpdated": "2025-04-01T19:56:07.984Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20599 (GCVE-0-2023-20599)
Vulnerability from cvelistv5
Published
2025-06-10 16:15
Modified
2026-02-26 17:51
CWE
  • CWE-1262 - Register Interface Allows Software Access to Sensitive Data or Security Settings
Summary
Improper register access control in ASP may allow a privileged attacker to perform unauthorized access to ASP’s Crypto Co-Processor (CCP) registers from x86 resulting in potential loss of control of cryptographic key pointer/index leading to loss of integrity or confidentiality.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20599",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-11T04:01:37.861337Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-26T17:51:02.287Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "AMD EPYC\u2122 7002 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "RomePI 100H SEV 0.24.19 [hex 00.18.13]"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Threadripper\u2122 3000 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "CastlePeakPI-SP3r3_1.0.0.F"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Threadripper\u2122 PRO 3000 WX Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "ChagallWSPI-sWRX8 1.0.0.C"
            },
            {
              "status": "unaffected",
              "version": "CastlePeakWSPI-sWRX8 1.0.0.H"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "PicassoPI-FP5_1.0.1.2c"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD EPYC\u2122 Embedded 7002 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbRomePI-SP3 1.0.0.B"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD EPYC\u2122 Embedded 7003 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbMilanPI-SP3 1.0.0.8"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Embedded R1000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbeddedPI-FP5 1211"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbeddedPI-FP5 1211"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Embedded R2000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbeddedR2KPI-FP5 1006"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Embedded V1000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbeddedPI-FP5 1211 RC1"
            }
          ]
        }
      ],
      "datePublic": "2025-11-21T20:45:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper register access control in ASP may allow a privileged attacker to perform unauthorized access to ASP\u2019s Crypto Co-Processor (CCP) registers from x86 resulting in potential loss of control of cryptographic key pointer/index leading to loss of integrity or confidentiality.\u003cbr\u003e"
            }
          ],
          "value": "Improper register access control in ASP may allow a privileged attacker to perform unauthorized access to ASP\u2019s Crypto Co-Processor (CCP) registers from x86 resulting in potential loss of control of cryptographic key pointer/index leading to loss of integrity or confidentiality."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 7.9,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1262",
              "description": "CWE-1262  Register Interface Allows Software Access to Sensitive Data or Security Settings",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-23T16:43:00.282Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "url": "https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-7039.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "AMD PSIRT Automation 1.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20599",
    "datePublished": "2025-06-10T16:15:03.641Z",
    "dateReserved": "2022-10-27T18:53:39.763Z",
    "dateUpdated": "2026-02-26T17:51:02.287Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2024-45556 (GCVE-0-2024-45556)
Vulnerability from cvelistv5
Published
2025-04-07 10:15
Modified
2025-04-07 15:51
CWE
  • CWE-1262 - Improper Access Control for Register Interface
Summary
Cryptographic issue may arise because the access control configuration permits Linux to read key registers in TCSR.
Impacted products
Vendor Product Version
Qualcomm, Inc. Snapdragon Version: FastConnect 6900
Version: FastConnect 7800
Version: Immersive Home 3210 Platform
Version: Immersive Home 326 Platform
Version: IPQ5300
Version: IPQ5302
Version: IPQ5312
Version: IPQ5332
Version: IPQ9008
Version: IPQ9048
Version: IPQ9554
Version: IPQ9570
Version: IPQ9574
Version: QCA0000
Version: QCA8075
Version: QCA8081
Version: QCA8082
Version: QCA8084
Version: QCA8085
Version: QCA8386
Version: QCF8000
Version: QCF8000SFP
Version: QCF8001
Version: QCN5124
Version: QCN6224
Version: QCN6402
Version: QCN6412
Version: QCN6422
Version: QCN6432
Version: QCN9000
Version: QCN9012
Version: QCN9013
Version: QCN9024
Version: QCN9074
Version: QCN9160
Version: QCN9274
Version: QXM8083
Version: SD 8 Gen1 5G
Version: SDM429W
Version: SDX65M
Version: Snapdragon 429 Mobile Platform
Version: Snapdragon AR1 Gen 1 Platform
Version: Snapdragon AR1 Gen 1 Platform "Luna1"
Version: Snapdragon AR2 Gen 1 Platform
Version: Snapdragon Wear 4100+ Platform
Version: Snapdragon X65 5G Modem-RF System
Version: SSG2115P
Version: SSG2125P
Version: SXR1230P
Version: SXR2230P
Version: SXR2250P
Version: WCD9380
Version: WCD9385
Version: WCN3620
Version: WCN3660B
Version: WCN3680B
Version: WCN3980
Version: WSA8830
Version: WSA8832
Version: WSA8835
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-45556",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-07T15:51:44.636784Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-07T15:51:55.660Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Snapdragon CCW",
            "Snapdragon Compute",
            "Snapdragon Wearables",
            "Snapdragon Wired Infrastructure and Networking"
          ],
          "product": "Snapdragon",
          "vendor": "Qualcomm, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "FastConnect 6900"
            },
            {
              "status": "affected",
              "version": "FastConnect 7800"
            },
            {
              "status": "affected",
              "version": "Immersive Home 3210 Platform"
            },
            {
              "status": "affected",
              "version": "Immersive Home 326 Platform"
            },
            {
              "status": "affected",
              "version": "IPQ5300"
            },
            {
              "status": "affected",
              "version": "IPQ5302"
            },
            {
              "status": "affected",
              "version": "IPQ5312"
            },
            {
              "status": "affected",
              "version": "IPQ5332"
            },
            {
              "status": "affected",
              "version": "IPQ9008"
            },
            {
              "status": "affected",
              "version": "IPQ9048"
            },
            {
              "status": "affected",
              "version": "IPQ9554"
            },
            {
              "status": "affected",
              "version": "IPQ9570"
            },
            {
              "status": "affected",
              "version": "IPQ9574"
            },
            {
              "status": "affected",
              "version": "QCA0000"
            },
            {
              "status": "affected",
              "version": "QCA8075"
            },
            {
              "status": "affected",
              "version": "QCA8081"
            },
            {
              "status": "affected",
              "version": "QCA8082"
            },
            {
              "status": "affected",
              "version": "QCA8084"
            },
            {
              "status": "affected",
              "version": "QCA8085"
            },
            {
              "status": "affected",
              "version": "QCA8386"
            },
            {
              "status": "affected",
              "version": "QCF8000"
            },
            {
              "status": "affected",
              "version": "QCF8000SFP"
            },
            {
              "status": "affected",
              "version": "QCF8001"
            },
            {
              "status": "affected",
              "version": "QCN5124"
            },
            {
              "status": "affected",
              "version": "QCN6224"
            },
            {
              "status": "affected",
              "version": "QCN6402"
            },
            {
              "status": "affected",
              "version": "QCN6412"
            },
            {
              "status": "affected",
              "version": "QCN6422"
            },
            {
              "status": "affected",
              "version": "QCN6432"
            },
            {
              "status": "affected",
              "version": "QCN9000"
            },
            {
              "status": "affected",
              "version": "QCN9012"
            },
            {
              "status": "affected",
              "version": "QCN9013"
            },
            {
              "status": "affected",
              "version": "QCN9024"
            },
            {
              "status": "affected",
              "version": "QCN9074"
            },
            {
              "status": "affected",
              "version": "QCN9160"
            },
            {
              "status": "affected",
              "version": "QCN9274"
            },
            {
              "status": "affected",
              "version": "QXM8083"
            },
            {
              "status": "affected",
              "version": "SD 8 Gen1 5G"
            },
            {
              "status": "affected",
              "version": "SDM429W"
            },
            {
              "status": "affected",
              "version": "SDX65M"
            },
            {
              "status": "affected",
              "version": "Snapdragon 429 Mobile Platform"
            },
            {
              "status": "affected",
              "version": "Snapdragon AR1 Gen 1 Platform"
            },
            {
              "status": "affected",
              "version": "Snapdragon AR1 Gen 1 Platform \"Luna1\""
            },
            {
              "status": "affected",
              "version": "Snapdragon AR2 Gen 1 Platform"
            },
            {
              "status": "affected",
              "version": "Snapdragon Wear 4100+ Platform"
            },
            {
              "status": "affected",
              "version": "Snapdragon X65 5G Modem-RF System"
            },
            {
              "status": "affected",
              "version": "SSG2115P"
            },
            {
              "status": "affected",
              "version": "SSG2125P"
            },
            {
              "status": "affected",
              "version": "SXR1230P"
            },
            {
              "status": "affected",
              "version": "SXR2230P"
            },
            {
              "status": "affected",
              "version": "SXR2250P"
            },
            {
              "status": "affected",
              "version": "WCD9380"
            },
            {
              "status": "affected",
              "version": "WCD9385"
            },
            {
              "status": "affected",
              "version": "WCN3620"
            },
            {
              "status": "affected",
              "version": "WCN3660B"
            },
            {
              "status": "affected",
              "version": "WCN3680B"
            },
            {
              "status": "affected",
              "version": "WCN3980"
            },
            {
              "status": "affected",
              "version": "WSA8830"
            },
            {
              "status": "affected",
              "version": "WSA8832"
            },
            {
              "status": "affected",
              "version": "WSA8835"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cryptographic issue may arise because the access control configuration permits Linux to read key registers in TCSR."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1262",
              "description": "CWE-1262: Improper Access Control for Register Interface",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-07T10:15:47.649Z",
        "orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f",
        "shortName": "qualcomm"
      },
      "references": [
        {
          "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2025-bulletin.html"
        }
      ],
      "title": "Improper Access Control for Register Interface in TZ Firmware"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f",
    "assignerShortName": "qualcomm",
    "cveId": "CVE-2024-45556",
    "datePublished": "2025-04-07T10:15:47.649Z",
    "dateReserved": "2024-09-02T10:26:15.223Z",
    "dateUpdated": "2025-04-07T15:51:55.660Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-1882 (GCVE-0-2025-1882)
Vulnerability from cvelistv5
Published
2025-03-03 21:00
Modified
2025-03-04 15:48
CWE
  • CWE-1262 - Improper Access Control for Register Interface
  • CWE-284 - Improper Access Controls
Summary
A vulnerability was found in i-Drive i11 and i12 up to 20250227. It has been rated as critical. Affected by this issue is some unknown functionality of the component Device Setting Handler. The manipulation leads to improper access control for register interface. The attack needs to be done within the local network. The complexity of an attack is rather high. The exploitation is known to be difficult. It was not possible to identify the current maintainer of the product. It must be assumed that the product is end-of-life.
References
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-1882",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-04T15:47:58.890610Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-04T15:48:07.904Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "modules": [
            "Device Setting Handler"
          ],
          "product": "i11",
          "vendor": "i-Drive",
          "versions": [
            {
              "status": "affected",
              "version": "20250227"
            }
          ]
        },
        {
          "modules": [
            "Device Setting Handler"
          ],
          "product": "i12",
          "vendor": "i-Drive",
          "versions": [
            {
              "status": "affected",
              "version": "20250227"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "geochen (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability was found in i-Drive i11 and i12 up to 20250227. It has been rated as critical. Affected by this issue is some unknown functionality of the component Device Setting Handler. The manipulation leads to improper access control for register interface. The attack needs to be done within the local network. The complexity of an attack is rather high. The exploitation is known to be difficult. It was not possible to identify the current maintainer of the product. It must be assumed that the product is end-of-life."
        },
        {
          "lang": "de",
          "value": "Eine kritische Schwachstelle wurde in i-Drive i11 and i12 bis 20250227 ausgemacht. Es geht hierbei um eine nicht n\u00e4her spezifizierte Funktion der Komponente Device Setting Handler. Durch Manipulieren mit unbekannten Daten kann eine improper access control for register interface-Schwachstelle ausgenutzt werden. Der Angriff kann im lokalen Netzwerk angegangen werden. Die Komplexit\u00e4t eines Angriffs ist eher hoch. Sie ist schwierig ausnutzbar."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 2.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
            "version": "4.0"
          }
        },
        {
          "cvssV3_1": {
            "baseScore": 5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 4.3,
            "vectorString": "AV:A/AC:H/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1262",
              "description": "Improper Access Control for Register Interface",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-284",
              "description": "Improper Access Controls",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-03-03T21:00:09.182Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-298196 | i-Drive i11/i12 Device Setting improper access control for register interface",
          "tags": [
            "vdb-entry"
          ],
          "url": "https://vuldb.com/?id.298196"
        },
        {
          "name": "VDB-298196 | CTI Indicators (IOB, IOC)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/?ctiid.298196"
        },
        {
          "name": "Submit #510955 | i-DRIVE Dashcam i11, i12 Improper Access Control for Register Interface",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/?submit.510955"
        },
        {
          "tags": [
            "related"
          ],
          "url": "https://github.com/geo-chen/i-Drive"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-03-03T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2025-03-03T01:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2025-03-03T13:30:45.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "i-Drive i11/i12 Device Setting improper access control for register interface"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2025-1882",
    "datePublished": "2025-03-03T21:00:09.182Z",
    "dateReserved": "2025-03-03T12:25:23.787Z",
    "dateUpdated": "2025-03-04T15:48:07.904Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20788 (GCVE-0-2025-20788)
Vulnerability from cvelistv5
Published
2025-12-02 02:34
Modified
2025-12-02 14:43
CWE
  • CWE-1262 - Improper Access Control for Register Interface
Summary
In GPU pdma, there is a possible memory corruption due to a missing permission check. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS10117735; Issue ID: MSV-4539.
Impacted products
Vendor Product Version
MediaTek, Inc. MT6991, MT8196 Version: Android 15.0,
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "LOW",
              "baseScore": 4.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "LOW",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-20788",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-02T14:42:42.510009Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-02T14:43:01.439Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT6991, MT8196",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 15.0,"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In GPU pdma, there is a possible memory corruption due to a missing permission check. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS10117735; Issue ID: MSV-4539."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1262",
              "description": "CWE-1262 Improper Access Control for Register Interface",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-02T02:34:51.415Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/December-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2025-20788",
    "datePublished": "2025-12-02T02:34:51.415Z",
    "dateReserved": "2024-11-01T01:21:50.402Z",
    "dateUpdated": "2025-12-02T14:43:01.439Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-36194 (GCVE-0-2025-36194)
Vulnerability from cvelistv5
Published
2026-02-02 22:01
Modified
2026-02-04 16:53
CWE
  • CWE-1262 - Improper Access Control for Register Interface
Summary
IBM PowerVM Hypervisor FW1110.00 through FW1110.03, FW1060.00 through FW1060.51, and FW950.00 through FW950.F0 may expose a limited amount of data to a peer partition in specific shared processor configurations during certain operations.
References
Impacted products
Vendor Product Version
IBM PowerVM Hypervisor Version: FW1110.00    FW1110.03
Version: FW1060.00    FW1060.51
Version: FW950.00    FW950.F0
    cpe:2.3:a:ibm:powervm_hypervisor:fw1110.00:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:powervm_hypervisor:fw1110.00.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:powervm_hypervisor:fw1110.03:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:powervm_hypervisor:fw1110.03.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:powervm_hypervisor:fw1060.00:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:powervm_hypervisor:fw1060.00.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:powervm_hypervisor:fw1060.51:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:powervm_hypervisor:fw1060.51.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:powervm_hypervisor:fw950.00:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:powervm_hypervisor:fw950.00.0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:powervm_hypervisor:fw950.f0:*:*:*:*:*:*:*
    cpe:2.3:a:ibm:powervm_hypervisor:fw950.f0.0:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-36194",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-04T15:46:41.472201Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-04T16:53:44.141Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:ibm:powervm_hypervisor:fw1110.00:*:*:*:*:*:*:*",
            "cpe:2.3:a:ibm:powervm_hypervisor:fw1110.00.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:ibm:powervm_hypervisor:fw1110.03:*:*:*:*:*:*:*",
            "cpe:2.3:a:ibm:powervm_hypervisor:fw1110.03.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:ibm:powervm_hypervisor:fw1060.00:*:*:*:*:*:*:*",
            "cpe:2.3:a:ibm:powervm_hypervisor:fw1060.00.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:ibm:powervm_hypervisor:fw1060.51:*:*:*:*:*:*:*",
            "cpe:2.3:a:ibm:powervm_hypervisor:fw1060.51.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:ibm:powervm_hypervisor:fw950.00:*:*:*:*:*:*:*",
            "cpe:2.3:a:ibm:powervm_hypervisor:fw950.00.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:ibm:powervm_hypervisor:fw950.f0:*:*:*:*:*:*:*",
            "cpe:2.3:a:ibm:powervm_hypervisor:fw950.f0.0:*:*:*:*:*:*:*"
          ],
          "product": "PowerVM Hypervisor",
          "vendor": "IBM",
          "versions": [
            {
              "lessThanOrEqual": "FW1110.03",
              "status": "affected",
              "version": "FW1110.00",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "FW1060.51",
              "status": "affected",
              "version": "FW1060.00",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "FW950.F0",
              "status": "affected",
              "version": "FW950.00",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eIBM PowerVM Hypervisor FW1110.00 through FW1110.03, FW1060.00 through FW1060.51, and FW950.00 through FW950.F0 may expose a limited amount of data to a peer partition in specific shared processor configurations during certain operations.\u003c/p\u003e"
            }
          ],
          "value": "IBM PowerVM Hypervisor FW1110.00 through FW1110.03, FW1060.00 through FW1060.51, and FW950.00 through FW950.F0 may expose a limited amount of data to a peer partition in specific shared processor configurations during certain operations."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 2.8,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1262",
              "description": "CWE-1262 Improper Access Control for Register Interface",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-02T22:01:36.083Z",
        "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
        "shortName": "ibm"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory",
            "patch"
          ],
          "url": "https://www.ibm.com/support/pages/node/7257555"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eCustomers with the products below should install FW1110.10(1110_100), or newer to remediate this vulnerability.\u003cbr\u003ePower 11\u003c/p\u003e\u003col\u003e\u003cli\u003eIBM Power System E1180 (9080-HEU)\u003c/li\u003e\u003c/ol\u003e\u003cp\u003eCustomers with the products below should install FW1110.10(1110_116), or newer to remediate this vulnerability.\u003cbr\u003ePower 11\u003c/p\u003e\u003col\u003e\u003cli\u003eIBM Power System S1122 (9824-22A)\u003c/li\u003e\u003cli\u003eIBM Power System S1124 (9824-42A)\u003c/li\u003e\u003cli\u003eIBM Power System S1122s (9824-22B)\u003c/li\u003e\u003cli\u003eIBM Power System S1114 (9824-41B)\u003c/li\u003e\u003cli\u003eIBM Power System L1122 (9856-22H)\u003c/li\u003e\u003cli\u003eIBM Power System L1124 (9856-42H)\u003c/li\u003e\u003cli\u003eIBM Power System E1150 (9043-MRU)\u003c/li\u003e\u003c/ol\u003e\u003cp\u003eCustomers with the products below should install FW1060.52(1060_153)/FW1060.60(1060_158), or newer to remediate this vulnerability.\u003cbr\u003ePower 10\u003c/p\u003e\u003col\u003e\u003cli\u003eIBM Power System E1080 (9080-HEX)\u003c/li\u003e\u003c/ol\u003e\u003cp\u003eCustomers with the products below should install FW1060.52(1060_149), FW1060.60(1060_157), or newer to remediate this vulnerability.\u003cbr\u003ePower 10\u003c/p\u003e\u003col\u003e\u003cli\u003eIBM Power System S1022 (9105-22A)\u003c/li\u003e\u003cli\u003eIBM Power System S1024 (9105-42A)\u003c/li\u003e\u003cli\u003eIBM Power System S1022s (9105-22B)\u003c/li\u003e\u003cli\u003eIBM Power System S1014 (9105-41B)\u003c/li\u003e\u003cli\u003eIBM Power System L1022 (9786-22H)\u003c/li\u003e\u003cli\u003eIBM Power System L1024 (9786-42H)\u003c/li\u003e\u003cli\u003eIBM Power System E1050 (9043-MRX)\u003c/li\u003e\u003cli\u003eIBM Power System S1012 (9028-21B)\u0026nbsp;\u003c/li\u003e\u003c/ol\u003e\u003cp\u003eCustomers with the products below should install 950.F1(950_194)/950.G0(950_203), or newer to remediate this vulnerability.\u003cbr\u003ePower 9\u003c/p\u003e\u003col\u003e\u003cli\u003eIBM Power System L922 (9008-22L)\u003c/li\u003e\u003cli\u003eIBM Power System S922 (9009-22A, 9009-22G)\u003c/li\u003e\u003cli\u003eIBM Power System H922 (9223-22H, 9223-22S)\u003c/li\u003e\u003cli\u003eIBM Power System S914 (9009-41A, 9009-41G)\u003c/li\u003e\u003cli\u003eIBM Power System S924 (9009-42A, 9009-42G)\u003c/li\u003e\u003cli\u003eIBM Power System H924 (9223-42H, 9223-42S)\u003c/li\u003e\u003cli\u003eIBM Power System E950 (9040-MR9)\u003c/li\u003e\u003cli\u003eIBM Power System E980 (9080-M9S)\u003c/li\u003e\u003c/ol\u003e\u003cbr\u003e"
            }
          ],
          "value": "Customers with the products below should install FW1110.10(1110_100), or newer to remediate this vulnerability.\nPower 11\n\n  *  IBM Power System E1180 (9080-HEU)\nCustomers with the products below should install FW1110.10(1110_116), or newer to remediate this vulnerability.\nPower 11\n\n  *  IBM Power System S1122 (9824-22A)\n  *  IBM Power System S1124 (9824-42A)\n  *  IBM Power System S1122s (9824-22B)\n  *  IBM Power System S1114 (9824-41B)\n  *  IBM Power System L1122 (9856-22H)\n  *  IBM Power System L1124 (9856-42H)\n  *  IBM Power System E1150 (9043-MRU)\nCustomers with the products below should install FW1060.52(1060_153)/FW1060.60(1060_158), or newer to remediate this vulnerability.\nPower 10\n\n  *  IBM Power System E1080 (9080-HEX)\nCustomers with the products below should install FW1060.52(1060_149), FW1060.60(1060_157), or newer to remediate this vulnerability.\nPower 10\n\n  *  IBM Power System S1022 (9105-22A)\n  *  IBM Power System S1024 (9105-42A)\n  *  IBM Power System S1022s (9105-22B)\n  *  IBM Power System S1014 (9105-41B)\n  *  IBM Power System L1022 (9786-22H)\n  *  IBM Power System L1024 (9786-42H)\n  *  IBM Power System E1050 (9043-MRX)\n  *  IBM Power System S1012 (9028-21B)\u00a0\nCustomers with the products below should install 950.F1(950_194)/950.G0(950_203), or newer to remediate this vulnerability.\nPower 9\n\n  *  IBM Power System L922 (9008-22L)\n  *  IBM Power System S922 (9009-22A, 9009-22G)\n  *  IBM Power System H922 (9223-22H, 9223-22S)\n  *  IBM Power System S914 (9009-41A, 9009-41G)\n  *  IBM Power System S924 (9009-42A, 9009-42G)\n  *  IBM Power System H924 (9223-42H, 9223-42S)\n  *  IBM Power System E950 (9040-MR9)\n  *  IBM Power System E980 (9080-M9S)"
        }
      ],
      "title": "This Power System update is being released to address",
      "x_generator": {
        "engine": "ibm-cvegen"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
    "assignerShortName": "ibm",
    "cveId": "CVE-2025-36194",
    "datePublished": "2026-02-02T22:01:36.083Z",
    "dateReserved": "2025-04-15T21:16:24.268Z",
    "dateUpdated": "2026-02-04T16:53:44.141Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-47385 (GCVE-0-2025-47385)
Vulnerability from cvelistv5
Published
2026-03-02 16:53
Modified
2026-03-03 04:56
CWE
  • CWE-1262 - Improper Access Control for Register Interface
Summary
Memory Corruption when accessing trusted execution environment without proper privilege check.
Impacted products
Vendor Product Version
Qualcomm, Inc. Snapdragon Version: FastConnect 6200
Version: FastConnect 6700
Version: FastConnect 6900
Version: FastConnect 7800
Version: G2 Gen 1
Version: LeMans_AU_LGIT
Version: LeMansAU
Version: Milos
Version: Netrani
Version: Orne
Version: Palawan25
Version: Pandeiro
Version: QAM8255P
Version: QAM8295P
Version: QAMSRV1H
Version: QAMSRV1M
Version: QCA6574
Version: QCA6574A
Version: QCA6574AU
Version: QCA6595
Version: QCA6595AU
Version: QCA6688AQ
Version: QCA6696
Version: QCA6698AQ
Version: QCA6797AQ
Version: QCA8695AU
Version: QCA9367
Version: QCA9377
Version: QLN1083BD
Version: QLN1086BD
Version: QMP1000
Version: QPA1083BD
Version: QPA1086BD
Version: QXM1083
Version: QXM1086
Version: QXM1093
Version: QXM1094
Version: QXM1095
Version: QXM1096
Version: SA6155P
Version: SA7255P
Version: SA7775P
Version: SA8155P
Version: SA8195P
Version: SA8255P
Version: SA8295P
Version: SA8620P
Version: SA8770P
Version: SA9000P
Version: SAR1165P
Version: SAR1250P
Version: SAR2230P
Version: SM7435
Version: SM8750P
Version: Snapdragon 4 Gen 1 Mobile Platform
Version: Snapdragon 4 Gen 2 Mobile Platform
Version: Snapdragon 480 5G Mobile Platform
Version: Snapdragon 480+ 5G Mobile Platform
Version: Snapdragon 6 Gen 1 Mobile Platform
Version: Snapdragon 6 Gen 3 Mobile Platform
Version: Snapdragon 6 Gen 4 Mobile Platform
Version: Snapdragon 695 5G Mobile Platform
Version: Snapdragon 7s Gen 3 Mobile Platform
Version: Snapdragon 8 Elite
Version: Snapdragon AR1+ Gen 1 Platform
Version: Snapdragon W5+ Gen 1 Wearable Platform
Version: SRV1H
Version: SRV1M
Version: SW5100
Version: SW5100P
Version: SXR2330P
Version: SXR2350P
Version: WCD9370
Version: WCD9375
Version: WCD9378
Version: WCD9380
Version: WCD9385
Version: WCD9395
Version: WCN3950
Version: WCN3988
Version: WCN6450
Version: WCN6755
Version: WCN7860
Version: WCN7861
Version: WCN7880
Version: WCN7881
Version: WSA8810
Version: WSA8815
Version: WSA8830
Version: WSA8832
Version: WSA8835
Version: WSA8840
Version: WSA8845
Version: WSA8845H
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-47385",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-03-02T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-03T04:56:10.607Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Snapdragon Auto",
            "Snapdragon Compute",
            "Snapdragon Industrial IOT",
            "Snapdragon Mobile",
            "Snapdragon Wearables"
          ],
          "product": "Snapdragon",
          "vendor": "Qualcomm, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "FastConnect 6200"
            },
            {
              "status": "affected",
              "version": "FastConnect 6700"
            },
            {
              "status": "affected",
              "version": "FastConnect 6900"
            },
            {
              "status": "affected",
              "version": "FastConnect 7800"
            },
            {
              "status": "affected",
              "version": "G2 Gen 1"
            },
            {
              "status": "affected",
              "version": "LeMans_AU_LGIT"
            },
            {
              "status": "affected",
              "version": "LeMansAU"
            },
            {
              "status": "affected",
              "version": "Milos"
            },
            {
              "status": "affected",
              "version": "Netrani"
            },
            {
              "status": "affected",
              "version": "Orne"
            },
            {
              "status": "affected",
              "version": "Palawan25"
            },
            {
              "status": "affected",
              "version": "Pandeiro"
            },
            {
              "status": "affected",
              "version": "QAM8255P"
            },
            {
              "status": "affected",
              "version": "QAM8295P"
            },
            {
              "status": "affected",
              "version": "QAMSRV1H"
            },
            {
              "status": "affected",
              "version": "QAMSRV1M"
            },
            {
              "status": "affected",
              "version": "QCA6574"
            },
            {
              "status": "affected",
              "version": "QCA6574A"
            },
            {
              "status": "affected",
              "version": "QCA6574AU"
            },
            {
              "status": "affected",
              "version": "QCA6595"
            },
            {
              "status": "affected",
              "version": "QCA6595AU"
            },
            {
              "status": "affected",
              "version": "QCA6688AQ"
            },
            {
              "status": "affected",
              "version": "QCA6696"
            },
            {
              "status": "affected",
              "version": "QCA6698AQ"
            },
            {
              "status": "affected",
              "version": "QCA6797AQ"
            },
            {
              "status": "affected",
              "version": "QCA8695AU"
            },
            {
              "status": "affected",
              "version": "QCA9367"
            },
            {
              "status": "affected",
              "version": "QCA9377"
            },
            {
              "status": "affected",
              "version": "QLN1083BD"
            },
            {
              "status": "affected",
              "version": "QLN1086BD"
            },
            {
              "status": "affected",
              "version": "QMP1000"
            },
            {
              "status": "affected",
              "version": "QPA1083BD"
            },
            {
              "status": "affected",
              "version": "QPA1086BD"
            },
            {
              "status": "affected",
              "version": "QXM1083"
            },
            {
              "status": "affected",
              "version": "QXM1086"
            },
            {
              "status": "affected",
              "version": "QXM1093"
            },
            {
              "status": "affected",
              "version": "QXM1094"
            },
            {
              "status": "affected",
              "version": "QXM1095"
            },
            {
              "status": "affected",
              "version": "QXM1096"
            },
            {
              "status": "affected",
              "version": "SA6155P"
            },
            {
              "status": "affected",
              "version": "SA7255P"
            },
            {
              "status": "affected",
              "version": "SA7775P"
            },
            {
              "status": "affected",
              "version": "SA8155P"
            },
            {
              "status": "affected",
              "version": "SA8195P"
            },
            {
              "status": "affected",
              "version": "SA8255P"
            },
            {
              "status": "affected",
              "version": "SA8295P"
            },
            {
              "status": "affected",
              "version": "SA8620P"
            },
            {
              "status": "affected",
              "version": "SA8770P"
            },
            {
              "status": "affected",
              "version": "SA9000P"
            },
            {
              "status": "affected",
              "version": "SAR1165P"
            },
            {
              "status": "affected",
              "version": "SAR1250P"
            },
            {
              "status": "affected",
              "version": "SAR2230P"
            },
            {
              "status": "affected",
              "version": "SM7435"
            },
            {
              "status": "affected",
              "version": "SM8750P"
            },
            {
              "status": "affected",
              "version": "Snapdragon 4 Gen 1 Mobile Platform"
            },
            {
              "status": "affected",
              "version": "Snapdragon 4 Gen 2 Mobile Platform"
            },
            {
              "status": "affected",
              "version": "Snapdragon 480 5G Mobile Platform"
            },
            {
              "status": "affected",
              "version": "Snapdragon 480+ 5G Mobile Platform"
            },
            {
              "status": "affected",
              "version": "Snapdragon 6 Gen 1 Mobile Platform"
            },
            {
              "status": "affected",
              "version": "Snapdragon 6 Gen 3 Mobile Platform"
            },
            {
              "status": "affected",
              "version": "Snapdragon 6 Gen 4 Mobile Platform"
            },
            {
              "status": "affected",
              "version": "Snapdragon 695 5G Mobile Platform"
            },
            {
              "status": "affected",
              "version": "Snapdragon 7s Gen 3 Mobile Platform"
            },
            {
              "status": "affected",
              "version": "Snapdragon 8 Elite"
            },
            {
              "status": "affected",
              "version": "Snapdragon AR1+ Gen 1 Platform"
            },
            {
              "status": "affected",
              "version": "Snapdragon W5+ Gen 1 Wearable Platform"
            },
            {
              "status": "affected",
              "version": "SRV1H"
            },
            {
              "status": "affected",
              "version": "SRV1M"
            },
            {
              "status": "affected",
              "version": "SW5100"
            },
            {
              "status": "affected",
              "version": "SW5100P"
            },
            {
              "status": "affected",
              "version": "SXR2330P"
            },
            {
              "status": "affected",
              "version": "SXR2350P"
            },
            {
              "status": "affected",
              "version": "WCD9370"
            },
            {
              "status": "affected",
              "version": "WCD9375"
            },
            {
              "status": "affected",
              "version": "WCD9378"
            },
            {
              "status": "affected",
              "version": "WCD9380"
            },
            {
              "status": "affected",
              "version": "WCD9385"
            },
            {
              "status": "affected",
              "version": "WCD9395"
            },
            {
              "status": "affected",
              "version": "WCN3950"
            },
            {
              "status": "affected",
              "version": "WCN3988"
            },
            {
              "status": "affected",
              "version": "WCN6450"
            },
            {
              "status": "affected",
              "version": "WCN6755"
            },
            {
              "status": "affected",
              "version": "WCN7860"
            },
            {
              "status": "affected",
              "version": "WCN7861"
            },
            {
              "status": "affected",
              "version": "WCN7880"
            },
            {
              "status": "affected",
              "version": "WCN7881"
            },
            {
              "status": "affected",
              "version": "WSA8810"
            },
            {
              "status": "affected",
              "version": "WSA8815"
            },
            {
              "status": "affected",
              "version": "WSA8830"
            },
            {
              "status": "affected",
              "version": "WSA8832"
            },
            {
              "status": "affected",
              "version": "WSA8835"
            },
            {
              "status": "affected",
              "version": "WSA8840"
            },
            {
              "status": "affected",
              "version": "WSA8845"
            },
            {
              "status": "affected",
              "version": "WSA8845H"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Memory Corruption when accessing trusted execution environment without proper privilege check."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1262",
              "description": "CWE-1262: Improper Access Control for Register Interface",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-03-02T16:53:54.702Z",
        "orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f",
        "shortName": "qualcomm"
      },
      "references": [
        {
          "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2026-bulletin.html"
        }
      ],
      "title": "Improper Access Control for Register Interface in SCE-Mink"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f",
    "assignerShortName": "qualcomm",
    "cveId": "CVE-2025-47385",
    "datePublished": "2026-03-02T16:53:54.702Z",
    "dateReserved": "2025-05-06T08:33:16.266Z",
    "dateUpdated": "2026-03-03T04:56:10.607Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

Mitigation

Phase: Architecture and Design

Description:

  • Design proper policies for hardware register access from software.
Mitigation

Phase: Implementation

Description:

  • Ensure that access control policies for register access are implemented in accordance with the specified design.
CAPEC-680: Exploitation of Improperly Controlled Registers

An adversary exploits missing or incorrectly configured access control within registers to read/write data that is not meant to be obtained or modified by a user.

Back to CWE stats page