18 known vulnerabilities · sorted by CVSS score
Cryptographic issue occurs due to use of insecure connection method while downloading.
Memory corruption while processing data packets in diag received from Unix clients.
Memory corruption while reading secure file.
Memory corruption while triggering commands in the PlayReady Trusted application.
Memory corruption while processing a data structure, when an iterator is accessed after it has been removed, potential failures occur.
Memory corruption during the FRS UDS generation process.
Memory corruption while processing manipulated payload in video firmware.
Memory corruption during memory mapping into protected VM address space due to incorrect API restrictions.
Memory corruption while processing video packets received from video firmware.
Memory corruption while retrieving the CBOR data from TA.
Memory corruption during memory assignment to headless peripheral VM due to incorrect error code handling.
Transient DOS may occur while processing malformed length field in SSID IEs.
Transient DOS while processing received beacon frame.
Transient DOS may occur when processing vendor-specific information elements while parsing a WLAN frame for BTM requests.
Cryptographic issue when a Trusted Zone with outdated code is triggered by a HLOS providing incorrect input.
Cryptographic issue while processing crypto API calls, missing checks may lead to corrupted key usage or IV reuses.
Transient DOS when importing a PKCS#8-encoded RSA private key with a zero-sized modulus.
Memory corruption while operating the mailbox in Automotive.