Description
Memory corruption occurs when a secure application is launched on a device with insufficient memory.
CVSS Metrics
- Vector
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Attack Vector
- local
- Complexity
- low
- Privileges
- low
- User Action
- none
- Scope
- unchanged
- Confidentiality
- high
- Integrity
- high
- Availability
- high
- Weaknesses
- CWE-415
Metadata
- Primary Vendor
- QUALCOMM
- Published
- 1/7/2026
- Last Modified
- 1/27/2026
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
qualcomm : fastconnect_6200_firmwarequalcomm : fastconnect_6700_firmwarequalcomm : fastconnect_6900_firmwarequalcomm : fastconnect_7800_firmwarequalcomm : qcs610_firmwarequalcomm : qmp1000_firmwarequalcomm : video_collaboration_vc1_platform_firmwarequalcomm : video_collaboration_vc3_platform_firmwarequalcomm : sm6475_firmwarequalcomm : sm7435_firmwarequalcomm : sm8735_firmwarequalcomm : sm8750_firmwarequalcomm : sm8750p_firmwarequalcomm : snapdragon_4_gen_2_mobile_platform_firmwarequalcomm : snapdragon_6_gen_1_mobile_platform_firmwarequalcomm : snapdragon_ar1_gen_1_platform_firmwarequalcomm : snapdragon_ar1_gen_1_platform_\"luna1\"_firmwarequalcomm : snapdragon_w5\+_gen_1_wearable_platform_firmwarequalcomm : sw5100_firmwarequalcomm : sw5100p_firmwarequalcomm : sxr2330p_firmwarequalcomm : sxr2350p_firmwarequalcomm : wcd9370_firmwarequalcomm : wcd9375_firmwarequalcomm : wcd9378_firmwarequalcomm : wcd9380_firmwarequalcomm : wcd9385_firmwarequalcomm : wcd9395_firmwarequalcomm : wcn3950_firmwarequalcomm : wcn3980_firmwarequalcomm : wcn3988_firmwarequalcomm : wcn6755_firmwarequalcomm : wcn7750_firmwarequalcomm : wcn7860_firmwarequalcomm : wcn7861_firmwarequalcomm : wcn7880_firmwarequalcomm : wcn7881_firmwarequalcomm : wsa8810_firmwarequalcomm : wsa8815_firmwarequalcomm : wsa8830_firmwarequalcomm : wsa8832_firmwarequalcomm : wsa8835_firmwarequalcomm : wsa8840_firmwarequalcomm : wsa8845_firmwarequalcomm : wsa8845h_firmware
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.