A vulnerability was found in
Qualcomm 4 Gen 1 Mobile Platform, 8 Gen 2 Mobile Platform, 8+ Gen 2 Mobile Platform, 480 5G Mobile Platform, 480+ 5G Mobile Platform SM4350-AC, 680 4G Mobile Platform, 685 4G Mobile Platform SM6225-AD, 695 5G Mobile Platform, AR8035, FastConnect 6200, FastConnect 6700, FastConnect 6900, FastConnect 7800, Flight RB5 5G Platform, QAM8255P, QAM8295P, QAM8650P, QAM8775P, QCA6391, QCA6574, QCA6574A, QCA6574AU, QCA6595, QCA6595AU, QCA6696, QCA6698AQ, QCA6797AQ, QCA8081, QCA8337, QCC710, QCM4325, QCM6490, QCM8550, QCN6224, QCN6274, QCS6490, QCS7230, QCS8250, QCS8550, QDU1000, QDU1010, QDU1110, QDU1210, QDX1010, QDX1011, QFW7114, QFW7124, QRB5165N, QRU1032, QRU1052, QRU1062, Qualcomm Video Collaboration VC3 Platform, Qualcomm Video Collaboration VC5 Platform, Robotics RB5 Platform, SA6155P, SA8155P, SA8195P, SA8255P, SA8295P, SG4150P, SG8275P, SM8550P, SW5100, SW5100P, W5+ Gen 1 Wearable Platform, WCD9340, WCD9370, WCD9375, WCD9380, WCD9385, WCD9390, WCD9395, WCN3950, WCN3980, WCN3988, WSA8810, WSA8815, WSA8830, WSA8835, WSA8840, WSA8845, WSA8845H and X75 5G Modem-RF System. It has been classified as
critical. This affects an unknown part of the component
IOCTL Call Handler. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as
CVE-2023-43514. The attack needs to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.