A vulnerability classified as critical has been found in Qualcomm 8 Gen 1 Mobile Platform, 8+ Gen 1 Mobile Platform, 855 Mobile Platform, 855+, 860 Mobile Platform SM8150-AC, 865 5G Mobile Platform, 865+ 5G Mobile Platform SM8250-AB, 870 5G Mobile Platform SM8250-AC, AQT1000, Auto 5G Modem-RF, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, QAM8295P, QCA6391, QCA6420, QCA6426, QCA6430, QCA6436, QCA6574AU, QCA6595AU, QCA6696, QCA6698AQ, QCS410, QCS610, SA4150P, SA4155P, SA6145P, SA6150P, SA6155P, SA8145P, SA8150P, SA8155P, SA8195P, SA8295P, SD 8 Gen1 5G, SD855, SD865 5G, SM4450, SW5100, SW5100P, SXR2130, W5+ Gen 1 Wearable Platform, WCD9341, WCD9370, WCD9380, WCN3610, WCN3660B, WCN3680B, WCN3950, WCN3980, WCN3988, WCN6740, Wear 4100+ Platform, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835, X55 5G Modem-RF System and XR2 5G Platform. Affected is an unknown function of the component Bus Socket Transport Server. The manipulation leads to memory corruption.

This vulnerability is traded as CVE-2023-33038. The attack needs to be approached locally. There is no exploit available.

It is recommended to upgrade the affected component.