CVE-2025-27060 (CNNVD-202510-1215)
HIGH
中文标题:
Qualcomm Chipsets 安全漏洞
英文标题:
Untrusted Pointer Dereference in TZ Firmware
CVSS分数:
8.8
发布时间:
2025-10-09 03:18:06
漏洞类型:
其他
状态:
PUBLISHED
数据质量分数:
0.30
数据版本:
v3
漏洞描述
中文描述:
Qualcomm Chipsets是美国高通(Qualcomm)公司的一系列芯片组。 Qualcomm Chipsets存在安全漏洞,该漏洞源于处理畸形输入时存在内存损坏。
英文描述:
Memory corruption while performing SCM call with malformed inputs.
CWE类型:
CWE-822
标签:
(暂无数据)
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Qualcomm, Inc. | Snapdragon | Immersive Home 214 Platform | - | - |
cpe:2.3:a:qualcomm,_inc.:snapdragon:immersive_home_214_platform:*:*:*:*:*:*:*
|
| Qualcomm, Inc. | Snapdragon | Immersive Home 216 Platform | - | - |
cpe:2.3:a:qualcomm,_inc.:snapdragon:immersive_home_216_platform:*:*:*:*:*:*:*
|
| Qualcomm, Inc. | Snapdragon | Immersive Home 316 Platform | - | - |
cpe:2.3:a:qualcomm,_inc.:snapdragon:immersive_home_316_platform:*:*:*:*:*:*:*
|
| Qualcomm, Inc. | Snapdragon | Immersive Home 318 Platform | - | - |
cpe:2.3:a:qualcomm,_inc.:snapdragon:immersive_home_318_platform:*:*:*:*:*:*:*
|
| Qualcomm, Inc. | Snapdragon | IPQ5010 | - | - |
cpe:2.3:a:qualcomm,_inc.:snapdragon:ipq5010:*:*:*:*:*:*:*
|
| Qualcomm, Inc. | Snapdragon | IPQ5028 | - | - |
cpe:2.3:a:qualcomm,_inc.:snapdragon:ipq5028:*:*:*:*:*:*:*
|
| Qualcomm, Inc. | Snapdragon | QCN6023 | - | - |
cpe:2.3:a:qualcomm,_inc.:snapdragon:qcn6023:*:*:*:*:*:*:*
|
| Qualcomm, Inc. | Snapdragon | QCN6024 | - | - |
cpe:2.3:a:qualcomm,_inc.:snapdragon:qcn6024:*:*:*:*:*:*:*
|
| Qualcomm, Inc. | Snapdragon | QCN6100 | - | - |
cpe:2.3:a:qualcomm,_inc.:snapdragon:qcn6100:*:*:*:*:*:*:*
|
| Qualcomm, Inc. | Snapdragon | QCN6102 | - | - |
cpe:2.3:a:qualcomm,_inc.:snapdragon:qcn6102:*:*:*:*:*:*:*
|
| Qualcomm, Inc. | Snapdragon | QCN6112 | - | - |
cpe:2.3:a:qualcomm,_inc.:snapdragon:qcn6112:*:*:*:*:*:*:*
|
| Qualcomm, Inc. | Snapdragon | QCN6122 | - | - |
cpe:2.3:a:qualcomm,_inc.:snapdragon:qcn6122:*:*:*:*:*:*:*
|
| Qualcomm, Inc. | Snapdragon | QCN6132 | - | - |
cpe:2.3:a:qualcomm,_inc.:snapdragon:qcn6132:*:*:*:*:*:*:*
|
| Qualcomm, Inc. | Snapdragon | QCN9000 | - | - |
cpe:2.3:a:qualcomm,_inc.:snapdragon:qcn9000:*:*:*:*:*:*:*
|
| Qualcomm, Inc. | Snapdragon | QCN9001 | - | - |
cpe:2.3:a:qualcomm,_inc.:snapdragon:qcn9001:*:*:*:*:*:*:*
|
| Qualcomm, Inc. | Snapdragon | QCN9002 | - | - |
cpe:2.3:a:qualcomm,_inc.:snapdragon:qcn9002:*:*:*:*:*:*:*
|
| Qualcomm, Inc. | Snapdragon | QCN9003 | - | - |
cpe:2.3:a:qualcomm,_inc.:snapdragon:qcn9003:*:*:*:*:*:*:*
|
| Qualcomm, Inc. | Snapdragon | QCN9012 | - | - |
cpe:2.3:a:qualcomm,_inc.:snapdragon:qcn9012:*:*:*:*:*:*:*
|
| Qualcomm, Inc. | Snapdragon | QCN9022 | - | - |
cpe:2.3:a:qualcomm,_inc.:snapdragon:qcn9022:*:*:*:*:*:*:*
|
| Qualcomm, Inc. | Snapdragon | QCN9024 | - | - |
cpe:2.3:a:qualcomm,_inc.:snapdragon:qcn9024:*:*:*:*:*:*:*
|
| Qualcomm, Inc. | Snapdragon | QCN9070 | - | - |
cpe:2.3:a:qualcomm,_inc.:snapdragon:qcn9070:*:*:*:*:*:*:*
|
| Qualcomm, Inc. | Snapdragon | QCN9072 | - | - |
cpe:2.3:a:qualcomm,_inc.:snapdragon:qcn9072:*:*:*:*:*:*:*
|
| Qualcomm, Inc. | Snapdragon | QCN9074 | - | - |
cpe:2.3:a:qualcomm,_inc.:snapdragon:qcn9074:*:*:*:*:*:*:*
|
| Qualcomm, Inc. | Snapdragon | QCN9100 | - | - |
cpe:2.3:a:qualcomm,_inc.:snapdragon:qcn9100:*:*:*:*:*:*:*
|
| Qualcomm, Inc. | Snapdragon | QCN9274 | - | - |
cpe:2.3:a:qualcomm,_inc.:snapdragon:qcn9274:*:*:*:*:*:*:*
|
| qualcomm | immersive_home_214_platform_firmware | - | - | - |
cpe:2.3:o:qualcomm:immersive_home_214_platform_firmware:-:*:*:*:*:*:*:*
|
| qualcomm | immersive_home_216_platform_firmware | - | - | - |
cpe:2.3:o:qualcomm:immersive_home_216_platform_firmware:-:*:*:*:*:*:*:*
|
| qualcomm | immersive_home_316_platform_firmware | - | - | - |
cpe:2.3:o:qualcomm:immersive_home_316_platform_firmware:-:*:*:*:*:*:*:*
|
| qualcomm | immersive_home_318_platform_firmware | - | - | - |
cpe:2.3:o:qualcomm:immersive_home_318_platform_firmware:-:*:*:*:*:*:*:*
|
| qualcomm | ipq5010_firmware | - | - | - |
cpe:2.3:o:qualcomm:ipq5010_firmware:-:*:*:*:*:*:*:*
|
| qualcomm | ipq5028_firmware | - | - | - |
cpe:2.3:o:qualcomm:ipq5028_firmware:-:*:*:*:*:*:*:*
|
| qualcomm | qcn6023_firmware | - | - | - |
cpe:2.3:o:qualcomm:qcn6023_firmware:-:*:*:*:*:*:*:*
|
| qualcomm | qcn6024_firmware | - | - | - |
cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*
|
| qualcomm | qcn6100_firmware | - | - | - |
cpe:2.3:o:qualcomm:qcn6100_firmware:-:*:*:*:*:*:*:*
|
| qualcomm | qcn6102_firmware | - | - | - |
cpe:2.3:o:qualcomm:qcn6102_firmware:-:*:*:*:*:*:*:*
|
| qualcomm | qcn6112_firmware | - | - | - |
cpe:2.3:o:qualcomm:qcn6112_firmware:-:*:*:*:*:*:*:*
|
| qualcomm | qcn6122_firmware | - | - | - |
cpe:2.3:o:qualcomm:qcn6122_firmware:-:*:*:*:*:*:*:*
|
| qualcomm | qcn6132_firmware | - | - | - |
cpe:2.3:o:qualcomm:qcn6132_firmware:-:*:*:*:*:*:*:*
|
| qualcomm | qcn9000_firmware | - | - | - |
cpe:2.3:o:qualcomm:qcn9000_firmware:-:*:*:*:*:*:*:*
|
| qualcomm | qcn9001_firmware | - | - | - |
cpe:2.3:o:qualcomm:qcn9001_firmware:-:*:*:*:*:*:*:*
|
| qualcomm | qcn9002_firmware | - | - | - |
cpe:2.3:o:qualcomm:qcn9002_firmware:-:*:*:*:*:*:*:*
|
| qualcomm | qcn9003_firmware | - | - | - |
cpe:2.3:o:qualcomm:qcn9003_firmware:-:*:*:*:*:*:*:*
|
| qualcomm | qcn9012_firmware | - | - | - |
cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*
|
| qualcomm | qcn9022_firmware | - | - | - |
cpe:2.3:o:qualcomm:qcn9022_firmware:-:*:*:*:*:*:*:*
|
| qualcomm | qcn9024_firmware | - | - | - |
cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*
|
| qualcomm | qcn9070_firmware | - | - | - |
cpe:2.3:o:qualcomm:qcn9070_firmware:-:*:*:*:*:*:*:*
|
| qualcomm | qcn9072_firmware | - | - | - |
cpe:2.3:o:qualcomm:qcn9072_firmware:-:*:*:*:*:*:*:*
|
| qualcomm | qcn9074_firmware | - | - | - |
cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*
|
| qualcomm | qcn9100_firmware | - | - | - |
cpe:2.3:o:qualcomm:qcn9100_firmware:-:*:*:*:*:*:*:*
|
| qualcomm | qcn9274_firmware | - | - | - |
cpe:2.3:o:qualcomm:qcn9274_firmware:-:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题
OTHER
cve.org
访问
cve.org
CVSS评分详情
3.1 (cna)
HIGH
8.8
CVSS向量:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2025-10-09 03:18:06
修改时间:
2025-10-10 03:55:14
创建时间:
2025-11-11 15:40:18
更新时间:
2025-11-11 16:00:16
利用信息
暂无可利用代码信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-27060 |
2025-11-11 15:23:11 | 2025-11-11 07:40:18 |
| NVD | nvd_CVE-2025-27060 |
2025-11-11 15:01:05 | 2025-11-11 07:48:08 |
| CNNVD | cnnvd_CNNVD-202510-1215 |
2025-11-11 15:12:28 | 2025-11-11 08:00:16 |
版本与语言
当前版本:
v3
主要语言:
EN
支持语言:
EN
ZH
安全公告
暂无安全公告信息
变更历史
v3
CNNVD
2025-11-11 16:00:16
vulnerability_type: 未提取 → 其他; cnnvd_id: 未提取 → CNNVD-202510-1215; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 其他
- cnnvd_id: 未提取 -> CNNVD-202510-1215
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:48:08
affected_products_count: 25 → 50; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- affected_products_count: 25 -> 50
- data_sources: ['cve'] -> ['cve', 'nvd']