Impact
The vulnerability is a buffer over‑read in the WLAN Hardware Abstraction Layer that occurs when the system processes target power rate tables during channel configuration. The over‑read can trigger a transient loss of service, temporarily disrupting network connectivity. The description does not mention any escalation or data exfiltration ability, so the impact is limited to service interruption.
Affected Systems
Qualcomm Snapdragon devices that incorporate the WLAN HAL mentioned in Qualcomm’s security bulletin are affected. Specific product models and firmware versions are not listed in the advisory; any Snapdragon platform using the referenced HAL code should be considered potentially impacted.
Risk and Exploitability
The CVSS score of 6.5 indicates a moderate severity vulnerability. The EPSS score is not available, and the flaw is not listed in CISA KEV. The likely attack vector involves triggering the channel configuration process, possibly through crafted WLAN frames or conditions that provoke the device to process a target power rate table. An attacker would need the ability to influence the device’s channel configuration to exploit the flaw, which could cause a brief denial of service. The advisory does not provide additional exploitation prerequisites.
OpenCVE Enrichment