6 known vulnerabilities · sorted by CVSS score
Memory corruption while using alignments for memory allocation.
Memory Corruption when accessing trusted execution environment without proper privilege check.
Memory Corruption when accessing buffers with invalid length during TA invocation.
Memory Corruption when adding user-supplied data without checking available buffer space.
Weak configuration may lead to cryptographic issue when a VoWiFi call is triggered from UE.
Transient DOS when an LTE RLC packet with invalid TB is received by UE.