OSINT - The Qualcomm DSP Driver - How Serbian authorities have deployed surveillance technology and digital repression tactics
OSINT - The Qualcomm DSP Driver - How Serbian authorities have deployed surveillance technology and digital repression tactics
AI Analysis
Technical Summary
The security threat identified as CVE-2024-38402 pertains to the use of surveillance technology and digital repression tactics by Serbian authorities, specifically involving the Qualcomm Digital Signal Processor (DSP) driver. This vulnerability is categorized under OSINT (Open Source Intelligence) and relates to network activity and external analysis rather than a traditional software flaw with patchable code. The Qualcomm DSP driver is a critical component in many mobile devices, responsible for handling audio, sensor data, and other real-time processing tasks. While no specific affected versions or patch information are provided, the threat highlights how state actors may leverage proprietary hardware drivers and embedded system components to conduct surveillance and digital repression. The technical details indicate a low severity rating and no known exploits in the wild, suggesting limited immediate risk from a technical exploitation standpoint. However, the nature of the threat is more strategic and operational, focusing on the deployment of surveillance infrastructure and tactics rather than a direct vulnerability that can be exploited by external attackers. The involvement of Serbian authorities and the tagging of the threat with country-specific metadata imply a geopolitical dimension, where surveillance technology is used for monitoring and potentially repressing digital communications within Serbia. This OSINT report underscores the importance of understanding how hardware-level components like the Qualcomm DSP driver can be manipulated or utilized in state-sponsored surveillance campaigns, which may not be mitigated by traditional software patches or updates.
Potential Impact
For European organizations, particularly those operating in or with ties to Serbia and the Western Balkans, this threat signals potential risks related to privacy, data confidentiality, and freedom of communication. While the direct technical exploitation risk is low, the strategic use of surveillance technology by state actors can lead to unauthorized monitoring of communications, data interception, and digital repression of activists, journalists, or political opponents. Organizations handling sensitive information or engaging in activities that may attract state scrutiny could face increased risks of surveillance and data leakage. This could undermine trust, lead to reputational damage, and potentially expose confidential business or personal information. Additionally, the use of embedded system components like the Qualcomm DSP driver in mobile devices means that mobile communications could be a vector for surveillance, impacting mobile workforce security and cross-border communications. The broader impact includes chilling effects on digital rights and privacy within affected regions, which can indirectly affect European organizations through regulatory, legal, and operational challenges.
Mitigation Recommendations
Given the nature of this threat as an OSINT-identified state surveillance tactic rather than a conventional software vulnerability, mitigation requires a multi-layered approach beyond typical patching. European organizations should: 1) Conduct thorough risk assessments for operations in Serbia and neighboring countries, focusing on potential surveillance risks. 2) Employ end-to-end encryption for all sensitive communications, including voice, messaging, and data transfers, to reduce interception risks even if hardware-level surveillance is present. 3) Use mobile devices with hardware and software security features that limit unauthorized DSP access or allow for secure boot and trusted execution environments. 4) Implement strict operational security (OpSec) protocols for employees traveling to or working within high-risk regions, including the use of secure communication apps and minimizing sensitive data on devices. 5) Monitor OSINT and threat intelligence feeds for updates on surveillance tactics and emerging vulnerabilities related to embedded system components. 6) Engage with privacy-focused technology providers and consider hardware that supports open-source firmware or has transparent security audits to reduce reliance on potentially compromised proprietary drivers. 7) Collaborate with legal and compliance teams to understand local laws and advocate for digital rights protections. These measures go beyond generic advice by focusing on the unique challenges posed by hardware-level surveillance and state-sponsored digital repression.
Affected Countries
Serbia, Bosnia and Herzegovina, Montenegro, North Macedonia, Croatia, Slovenia, Hungary
Indicators of Compromise
- domain: 176.223.111.131
- domain: 195.178.51.251
- domain: 94.140.125.174
- domain: 178.220.122.57
- domain: 185.86.148.174
- domain: 188.93.127.34
- domain: 79.101.110.108
- vulnerability: CVE-2024-38402
- vulnerability: CVE-2024-49848
- vulnerability: CVE-2024-21455
- vulnerability: CVE-2024-43047
- vulnerability: CVE-2024-33060
- text: stix 2.1
- stix2-pattern: [app:id='com.gu.activity']
- text: stix 2.1
- stix2-pattern: [app:id='com.serv.services']
- text: stix 2.1
- stix2-pattern: [app:id='com.li.activity']
- text: stix 2.1
- stix2-pattern: [app:id='com.accesibilityservice']
- text: stix 2.1
- stix2-pattern: [app:cert.sha256='3ac97735164824657b683e805133b1274b2dedabf9fdd6aa9aca31089d501e64']
- text: stix 2.1
- stix2-pattern: [app:cert.sha256='35926e966186c8f2deec66864389d73989c75c85cb6668da2f455db6fe67e91f']
- text: stix 2.1
- stix2-pattern: [app:cert.sha256='38693e1ea0fbf39d28f66b1714fdeed4e23b3973276481097d2d66e87f3647eb']
- text: stix 2.1
- stix2-pattern: [file:hashes.sha256='d55e492d5fce87898e065572a5553d1ac1389cd12bf3d28cabc1218cb29780af']
- text: stix 2.1
- stix2-pattern: [file:hashes.sha256='54ee2c4f3e2396b6f92def135d68abd35d63ca7f9c304633a36f705ba4728cb7']
- text: stix 2.1
- stix2-pattern: [file:hashes.sha256='99673ce7f10e938ed73ed4a99930fbd6499983caa7a2c1b9e3f0e0bb0a5df602']
- text: stix 2.1
- stix2-pattern: [file:hashes.sha256='087fc1217c897033425fe7f1f12b913cd48918c875e99c25bdb9e1ffcf80f57e']
- text: IOCs for Serbian NoviSpy Android spyware
- boolean: 0
- text: NoviSpy
- file: novispy.stix2
- text: 2.1
- text: com.serv.services
- text: com.gu.activity
- text: com.li.activity
- text: com.accesibilityservice
- hash: 3ac97735164824657b683e805133b1274b2dedabf9fdd6aa9aca31089d501e64
- hash: 35926e966186c8f2deec66864389d73989c75c85cb6668da2f455db6fe67e91f
- hash: 38693e1ea0fbf39d28f66b1714fdeed4e23b3973276481097d2d66e87f3647eb
- vulnerability: CVE-2024-33060
- datetime: 2024-09-02T10:22:46.127000+00:00
- datetime: 2024-09-05T03:56:12.175000+00:00
- text: PUBLISHED
- link: https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html
- cpe: cpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:c-v2x_9150_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:mdm9250_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm2150_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qdu1000_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qdu1010_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qdu1110_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qdu1210_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qdx1010_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qdx1011_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qep8111_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qru1032_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qru1052_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qru1062_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qualcomm_215_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:robotics_rb5_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sd626_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sdx20m_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sdx61_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sm6370_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:smart_audio_400_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_429_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_460_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_660_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_662_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_670_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_675_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_690_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_710_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_720g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_750g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_820_automotive_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_835_mobile_pc_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_855_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x12_lte_modem_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x20_lte_modem_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x35_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x50_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x62_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x72_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_xr1_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_auto_4g_modem_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:srv1l_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sxr1120_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:talynplus_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:vision_intelligence_400_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3680_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*
- vulnerability: CVE-2024-43047
- datetime: 2024-10-07T12:59:01.656000+00:00
- datetime: 2024-10-09T12:57:09.326000+00:00
- text: PUBLISHED
- link: https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html
- cpe: cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_660_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_865\+_5g_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_888\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sm6225-ad_firmware:-:*:*:*:*:*:*:*
- vulnerability: CVE-2024-21455
- datetime: 2024-10-07T12:58:42.341000+00:00
- datetime: 2024-10-07T13:19:44.091000+00:00
- text: PUBLISHED
- link: https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html
- cpe: cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*
- vulnerability: CVE-2024-21455
- datetime: 2024-10-07T12:58:42.341000+00:00
- datetime: 2024-10-07T13:19:44.091000+00:00
- text: PUBLISHED
- link: https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html
- cpe: cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*
- vulnerability: CVE-2024-38402
- datetime: 2024-09-02T10:22:48.204000+00:00
- datetime: 2024-09-06T16:19:57.498000+00:00
- text: PUBLISHED
- link: https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html
- cpe: cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qdu1000_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qdu1010_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qdu1110_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qdu1210_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qdx1010_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qdx1011_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qep8111_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qru1032_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qru1052_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qru1062_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:robotics_rb5_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sdx61_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sm6370_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:smart_audio_400_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_460_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_662_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x12_lte_modem_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x35_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x62_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x72_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:srv1l_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:talynplus_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*
- ip: 195.178.51.251
- ip: 79.101.110.108
- ip: 188.93.127.34
- ip: 178.220.122.57
- ip: 94.140.125.174
- ip: 185.86.148.174
- ip: 176.223.111.131
- text: Serbia
- text: RS
- float: 44
- float: 21
- text: db_source: GeoOpen-Country. build_db: 2023-11-20 12:50:37. Latitude and longitude are country average.
- text: Serbia
- text: RS
- float: 44
- float: 21
- text: db_source: GeoOpen-Country-ASN. build_db: 2023-11-20 15:49:14. Latitude and longitude are country average.
- text: 8400
- text: ASNOrganization: TELEKOM-AS. db_source: GeoOpen-Country-ASN. build_db: 2023-11-20 15:49:14.
- text: all
- yara: rule APT_serbia_novispy_android_accesibilityservice { meta: description = "Rule for Serbian NoviSpy Android spyware APK, com.accesibilityservice version" author = "Donncha O Cearbhaill, Amnesty International" sample = "99673ce7f10e938ed73ed4a99930fbd6499983caa7a2c1b9e3f0e0bb0a5df602" strings: $dex = { 64 65 78 0A 30 33 ?? 00 } // C2 communication $c2_1 = "195.178.51.251" $c2_2 = "79.101.110.108" $c2_3 = "188.93.127.34" // Unique Strings $u_1 = "kataklinger vibercajzna" ascii nocase $u_2 = "select action_command.* from action_command where action_id = ? and trigger_type = ?" ascii nocase $u_3 = "6FDF20EAFA2D58AF609C72AE7092BB45" ascii nocase $u_4 = "{\"cellChangeMonitoring\":true,\"signalStrengthMonitoring\":true,\"temperatureDelta\":1," ascii nocase $u_5 = "{\"fileUpload\":false,\"audioRecording\":false,\"cellChangeMonitoring\":true,"ascii nocase $u_6 = "\"serverIp\":\"188.93.127.34\"" ascii nocase $u_7 = "ucitavanjepodataka" ascii nocase // Other strings $s_1 = "test.dat" ascii $s_2 = "/active.config" ascii $s_3 = "message_map.ser" ascii $s_4 = "event type =" ascii $s_5 = "change type subtree" ascii $s_6 = "change type content description" ascii $s_7 = "change type pane title" ascii $s_8 = "content change type pane_appeared" ascii $s_9 = "window state changed" ascii $s_10 = "notification state changed" ascii $s_11 = "window content changed" ascii $s_12 = "view scrolled" ascii $s_13 = "type selection changed" ascii $s_14 = "type announcement" ascii $s_15 = "scroll position =" ascii $s_16 = "imei=%s;imsi=%s;phone=%s;sim_serial=%s;os=%s" $s_17 = "imei=%s;imsi=%s;phone=%s;sim_serial=%s;roaming=%s;os=%s" $s_18 = "last message = %s, level = %d, hash = %s, node count = %d" $s_19 = "MyAccessibilityService" condition: $dex at 0 and ( any of ($u*) or any of ($c2*) or 7 of ($s*) ) }
- text: APT_serbia_novispy_android_accesibilityservice
- text: all
- yara: rule APT_serbia_novispy_android_serv_services { meta: description = "Rule for Serbian NoviSpy Android spyware APK, com.serv.services version" author = "Donncha O Cearbhaill, Amnesty International" sample = "087fc1217c897033425fe7f1f12b913cd48918c875e99c25bdb9e1ffcf80f57e" strings: $dex = { 64 65 78 0A 30 33 ?? 00 } // C2 communication $c2_comm_1 = "178.220.122.57" // Unique Strings // C2 commands received via SMS $sms_c2_cmd_1 = "C_ARF" ascii $sms_c2_cmd_2 = "C_ARN" ascii $sms_c2_cmd_3 = "C_AWF" ascii $sms_c2_cmd_4 = "C_AWI" ascii $sms_c2_cmd_5 = "C_AWN" ascii $sms_c2_cmd_6 = "C_CRF" ascii $sms_c2_cmd_7 = "C_CRN" ascii $sms_c2_cmd_8 = "C_LCW" ascii $sms_c2_cmd_9 = "C_MNS" ascii $sms_c2_cmd_10 = "C_MXS" ascii $sms_c2_cmd_11 = "C_R_F" ascii $sms_c2_cmd_12 = "C_R_N" ascii $sms_c2_cmd_13 = "C_SMF" ascii $sms_c2_cmd_14 = "C_SMN" ascii $sms_c2_cmd_15 = "C_SWF" ascii $sms_c2_cmd_16 = "C_SWN" ascii $sms_c2_cmd_17 = "C_UIR" ascii $sms_c2_cmd_18 = "C_UMF" ascii $sms_c2_cmd_19 = "C_UMN" ascii $sms_c2_cmd_20 = "C_UWF" ascii $sms_c2_cmd_21 = "C_UWN" ascii $sms_c2_cmd_22 = "C_WLF" ascii $sms_c2_cmd_23 = "C_WLN" ascii // C2 commands received via FTP. // This is not a comprehensive list of commands, generic command names are excluded to prevent false positives. $ftp_c2_cmd_1 = "CALL_REC_OFF" ascii $ftp_c2_cmd_2 = "CALL_REC_ON" ascii $ftp_c2_cmd_3 = "CHARGING_REC_OFF" ascii $ftp_c2_cmd_4 = "CHARGING_REC_ON" ascii $ftp_c2_cmd_5 = "SECURE_REC_OFF" ascii $ftp_c2_cmd_6 = "SECURE_REC_ON" ascii $ftp_c2_cmd_7 = "SSD_MOBILE_OFF" ascii $ftp_c2_cmd_8 = "SSD_MOBILE_ON" ascii $ftp_c2_cmd_9 = "SSD_WIFI_OFF" ascii $ftp_c2_cmd_10 = "SSD_WIFI_ON" ascii $ftp_c2_cmd_11 = "UPLOAD_INTERVAL" ascii $ftp_c2_cmd_12 = "UPLOAD_MOBILE_OFF" ascii $ftp_c2_cmd_13 = "UPLOAD_MOBILE_ON" ascii $ftp_c2_cmd_14 = "UPLOAD_WIFI_OFF" ascii $ftp_c2_cmd_15 = "UPLOAD_WIFI_ON" ascii $ftp_c2_cmd_16 = "AUTO_WIFI_INTERVAL" ascii $ftp_c2_cmd_17 = "WIFI_LOCK_ON" ascii $ftp_c2_cmd_18 = "WIFI_LOCK_OFF" ascii $ftp_c2_cmd_19 = "AUTO_WIFI_ON" ascii $ftp_c2_cmd_20 = "AUTO_WIFI_OFF" ascii $ftp_c2_cmd_21 = "START_AUDIO" ascii // App local settings configured based on C2 commands. $setting_1 = "UIR" ascii $setting_2 = "ULW" ascii $setting_3 = "ULM" ascii $setting_4 = "SSW" ascii $setting_5 = "SSM" ascii $setting_6 = "CRN" ascii $setting_7 = "SRN" ascii $setting_8 = "CRC" ascii $setting_9 = "MXS" ascii $setting_10 = "MNS" ascii $setting_11 = "AWF" ascii $setting_12 = "AWI" ascii $setting_13 = "CHR" ascii $setting_14 = "WLS" ascii $setting_15 = "A_R_N" ascii $setting_16 = "A_R_F" ascii $setting_17 = "U_I" ascii $setting_18 = "U_W_N" ascii $setting_19 = "S_W_N" ascii $setting_20 = "U_M_F" ascii $setting_21 = "S_M_F" ascii $setting_22 = "A_W_F" ascii $setting_23 = "A_W_I" ascii $setting_24 = "W_L_N" ascii $setting_25 = "C_R_F" ascii $setting_26 = "CH_R_F" ascii $setting_27 = "S_R_N" ascii condition: $dex at 0 and ( any of ($c2_comm*) or 20 of ($sms_c2_cmd*) or 20 of ($ftp_c2_cmd*) or 20 of ($setting*) ) }
- text: APT_serbia_novispy_android_serv_services
OSINT - The Qualcomm DSP Driver - How Serbian authorities have deployed surveillance technology and digital repression tactics
Description
OSINT - The Qualcomm DSP Driver - How Serbian authorities have deployed surveillance technology and digital repression tactics
AI-Powered Analysis
Technical Analysis
The security threat identified as CVE-2024-38402 pertains to the use of surveillance technology and digital repression tactics by Serbian authorities, specifically involving the Qualcomm Digital Signal Processor (DSP) driver. This vulnerability is categorized under OSINT (Open Source Intelligence) and relates to network activity and external analysis rather than a traditional software flaw with patchable code. The Qualcomm DSP driver is a critical component in many mobile devices, responsible for handling audio, sensor data, and other real-time processing tasks. While no specific affected versions or patch information are provided, the threat highlights how state actors may leverage proprietary hardware drivers and embedded system components to conduct surveillance and digital repression. The technical details indicate a low severity rating and no known exploits in the wild, suggesting limited immediate risk from a technical exploitation standpoint. However, the nature of the threat is more strategic and operational, focusing on the deployment of surveillance infrastructure and tactics rather than a direct vulnerability that can be exploited by external attackers. The involvement of Serbian authorities and the tagging of the threat with country-specific metadata imply a geopolitical dimension, where surveillance technology is used for monitoring and potentially repressing digital communications within Serbia. This OSINT report underscores the importance of understanding how hardware-level components like the Qualcomm DSP driver can be manipulated or utilized in state-sponsored surveillance campaigns, which may not be mitigated by traditional software patches or updates.
Potential Impact
For European organizations, particularly those operating in or with ties to Serbia and the Western Balkans, this threat signals potential risks related to privacy, data confidentiality, and freedom of communication. While the direct technical exploitation risk is low, the strategic use of surveillance technology by state actors can lead to unauthorized monitoring of communications, data interception, and digital repression of activists, journalists, or political opponents. Organizations handling sensitive information or engaging in activities that may attract state scrutiny could face increased risks of surveillance and data leakage. This could undermine trust, lead to reputational damage, and potentially expose confidential business or personal information. Additionally, the use of embedded system components like the Qualcomm DSP driver in mobile devices means that mobile communications could be a vector for surveillance, impacting mobile workforce security and cross-border communications. The broader impact includes chilling effects on digital rights and privacy within affected regions, which can indirectly affect European organizations through regulatory, legal, and operational challenges.
Mitigation Recommendations
Given the nature of this threat as an OSINT-identified state surveillance tactic rather than a conventional software vulnerability, mitigation requires a multi-layered approach beyond typical patching. European organizations should: 1) Conduct thorough risk assessments for operations in Serbia and neighboring countries, focusing on potential surveillance risks. 2) Employ end-to-end encryption for all sensitive communications, including voice, messaging, and data transfers, to reduce interception risks even if hardware-level surveillance is present. 3) Use mobile devices with hardware and software security features that limit unauthorized DSP access or allow for secure boot and trusted execution environments. 4) Implement strict operational security (OpSec) protocols for employees traveling to or working within high-risk regions, including the use of secure communication apps and minimizing sensitive data on devices. 5) Monitor OSINT and threat intelligence feeds for updates on surveillance tactics and emerging vulnerabilities related to embedded system components. 6) Engage with privacy-focused technology providers and consider hardware that supports open-source firmware or has transparent security audits to reduce reliance on potentially compromised proprietary drivers. 7) Collaborate with legal and compliance teams to understand local laws and advocate for digital rights protections. These measures go beyond generic advice by focusing on the unique challenges posed by hardware-level surveillance and state-sponsored digital repression.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Threat Level
- 3
- Analysis
- 0
- Uuid
- 87c159e3-5105-491e-87ba-94a7f0a52e09
- Original Timestamp
- 1734533886
Indicators of Compromise
Domain
| Value | Description | Copy |
|---|---|---|
domain176.223.111.131 | Merged from event 270542 | |
domain195.178.51.251 | Merged from event 270542 | |
domain94.140.125.174 | Merged from event 270542 | |
domain178.220.122.57 | Merged from event 270542 | |
domain185.86.148.174 | Merged from event 270542 | |
domain188.93.127.34 | Merged from event 270542 | |
domain79.101.110.108 | Merged from event 270542 |
Vulnerability
| Value | Description | Copy |
|---|---|---|
vulnerabilityCVE-2024-38402 | — | |
vulnerabilityCVE-2024-49848 | — | |
vulnerabilityCVE-2024-21455 | — | |
vulnerabilityCVE-2024-43047 | — | |
vulnerabilityCVE-2024-33060 | — | |
vulnerabilityCVE-2024-33060 | — | |
vulnerabilityCVE-2024-43047 | — | |
vulnerabilityCVE-2024-21455 | — | |
vulnerabilityCVE-2024-21455 | — | |
vulnerabilityCVE-2024-38402 | — |
Text
| Value | Description | Copy |
|---|---|---|
textstix 2.1 | — | |
textstix 2.1 | — | |
textstix 2.1 | — | |
textstix 2.1 | — | |
textstix 2.1 | — | |
textstix 2.1 | — | |
textstix 2.1 | — | |
textstix 2.1 | — | |
textstix 2.1 | — | |
textstix 2.1 | — | |
textstix 2.1 | — | |
textIOCs for Serbian NoviSpy Android spyware | — | |
textNoviSpy | — | |
text2.1 | — | |
textcom.serv.services | — | |
textcom.gu.activity | — | |
textcom.li.activity | — | |
textcom.accesibilityservice | — | |
textPUBLISHED | — | |
textPUBLISHED | — | |
textPUBLISHED | — | |
textPUBLISHED | — | |
textPUBLISHED | — | |
textSerbia | — | |
textRS | — | |
textdb_source: GeoOpen-Country. build_db: 2023-11-20 12:50:37. Latitude and longitude are country average. | — | |
textSerbia | — | |
textRS | — | |
textdb_source: GeoOpen-Country-ASN. build_db: 2023-11-20 15:49:14. Latitude and longitude are country average. | — | |
text8400 | — | |
textASNOrganization: TELEKOM-AS. db_source: GeoOpen-Country-ASN. build_db: 2023-11-20 15:49:14. | — | |
textall | — | |
textAPT_serbia_novispy_android_accesibilityservice | — | |
textall | — | |
textAPT_serbia_novispy_android_serv_services | — |
Stix2 pattern
| Value | Description | Copy |
|---|---|---|
stix2-pattern[app:id='com.gu.activity'] | — | |
stix2-pattern[app:id='com.serv.services'] | — | |
stix2-pattern[app:id='com.li.activity'] | — | |
stix2-pattern[app:id='com.accesibilityservice'] | — | |
stix2-pattern[app:cert.sha256='3ac97735164824657b683e805133b1274b2dedabf9fdd6aa9aca31089d501e64'] | — | |
stix2-pattern[app:cert.sha256='35926e966186c8f2deec66864389d73989c75c85cb6668da2f455db6fe67e91f'] | — | |
stix2-pattern[app:cert.sha256='38693e1ea0fbf39d28f66b1714fdeed4e23b3973276481097d2d66e87f3647eb'] | — | |
stix2-pattern[file:hashes.sha256='d55e492d5fce87898e065572a5553d1ac1389cd12bf3d28cabc1218cb29780af'] | — | |
stix2-pattern[file:hashes.sha256='54ee2c4f3e2396b6f92def135d68abd35d63ca7f9c304633a36f705ba4728cb7'] | — | |
stix2-pattern[file:hashes.sha256='99673ce7f10e938ed73ed4a99930fbd6499983caa7a2c1b9e3f0e0bb0a5df602'] | — | |
stix2-pattern[file:hashes.sha256='087fc1217c897033425fe7f1f12b913cd48918c875e99c25bdb9e1ffcf80f57e'] | — |
Boolean
| Value | Description | Copy |
|---|---|---|
boolean0 | — |
File
| Value | Description | Copy |
|---|---|---|
filenovispy.stix2 | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash3ac97735164824657b683e805133b1274b2dedabf9fdd6aa9aca31089d501e64 | — | |
hash35926e966186c8f2deec66864389d73989c75c85cb6668da2f455db6fe67e91f | — | |
hash38693e1ea0fbf39d28f66b1714fdeed4e23b3973276481097d2d66e87f3647eb | — |
Datetime
| Value | Description | Copy |
|---|---|---|
datetime2024-09-02T10:22:46.127000+00:00 | — | |
datetime2024-09-05T03:56:12.175000+00:00 | — | |
datetime2024-10-07T12:59:01.656000+00:00 | — | |
datetime2024-10-09T12:57:09.326000+00:00 | — | |
datetime2024-10-07T12:58:42.341000+00:00 | — | |
datetime2024-10-07T13:19:44.091000+00:00 | — | |
datetime2024-10-07T12:58:42.341000+00:00 | — | |
datetime2024-10-07T13:19:44.091000+00:00 | — | |
datetime2024-09-02T10:22:48.204000+00:00 | — | |
datetime2024-09-06T16:19:57.498000+00:00 | — |
Link
| Value | Description | Copy |
|---|---|---|
linkhttps://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html | — | |
linkhttps://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html | — | |
linkhttps://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html | — | |
linkhttps://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html | — | |
linkhttps://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html | — |
Cpe
| Value | Description | Copy |
|---|---|---|
cpecpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:c-v2x_9150_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:mdm9250_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm2150_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qdu1000_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qdu1010_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qdu1110_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qdu1210_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qdx1010_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qdx1011_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qep8111_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qru1032_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qru1052_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qru1062_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qualcomm_215_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:robotics_rb5_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sd626_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sdx20m_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sdx61_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sm6370_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:smart_audio_400_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_429_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_460_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_660_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_662_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_670_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_675_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_690_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_710_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_720g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_750g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_820_automotive_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_835_mobile_pc_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_855_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x12_lte_modem_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x20_lte_modem_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x35_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x50_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x62_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x72_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_xr1_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_auto_4g_modem_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:srv1l_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sxr1120_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:talynplus_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:vision_intelligence_400_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3680_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_660_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_865\+_5g_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_888\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sm6225-ad_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qdu1000_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qdu1010_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qdu1110_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qdu1210_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qdx1010_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qdx1011_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qep8111_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qru1032_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qru1052_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qru1062_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:robotics_rb5_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sdx61_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sm6370_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:smart_audio_400_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_460_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_662_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x12_lte_modem_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x35_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x62_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x72_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:srv1l_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:talynplus_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:* | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip195.178.51.251 | — | |
ip79.101.110.108 | — | |
ip188.93.127.34 | — | |
ip178.220.122.57 | — | |
ip94.140.125.174 | — | |
ip185.86.148.174 | — | |
ip176.223.111.131 | — |
Float
| Value | Description | Copy |
|---|---|---|
float44 | — | |
float21 | — | |
float44 | — | |
float21 | — |
Yara
| Value | Description | Copy |
|---|---|---|
yararule APT_serbia_novispy_android_accesibilityservice {
meta:
description = "Rule for Serbian NoviSpy Android spyware APK, com.accesibilityservice version"
author = "Donncha O Cearbhaill, Amnesty International"
sample = "99673ce7f10e938ed73ed4a99930fbd6499983caa7a2c1b9e3f0e0bb0a5df602"
strings:
$dex = { 64 65 78 0A 30 33 ?? 00 }
// C2 communication
$c2_1 = "195.178.51.251"
$c2_2 = "79.101.110.108"
$c2_3 = "188.93.127.34"
// Unique Strings
$u_1 = "kataklinger vibercajzna" ascii nocase
$u_2 = "select action_command.* from action_command where action_id = ? and trigger_type = ?" ascii nocase
$u_3 = "6FDF20EAFA2D58AF609C72AE7092BB45" ascii nocase
$u_4 = "{\"cellChangeMonitoring\":true,\"signalStrengthMonitoring\":true,\"temperatureDelta\":1," ascii nocase
$u_5 = "{\"fileUpload\":false,\"audioRecording\":false,\"cellChangeMonitoring\":true,"ascii nocase
$u_6 = "\"serverIp\":\"188.93.127.34\"" ascii nocase
$u_7 = "ucitavanjepodataka" ascii nocase
// Other strings
$s_1 = "test.dat" ascii
$s_2 = "/active.config" ascii
$s_3 = "message_map.ser" ascii
$s_4 = "event type =" ascii
$s_5 = "change type subtree" ascii
$s_6 = "change type content description" ascii
$s_7 = "change type pane title" ascii
$s_8 = "content change type pane_appeared" ascii
$s_9 = "window state changed" ascii
$s_10 = "notification state changed" ascii
$s_11 = "window content changed" ascii
$s_12 = "view scrolled" ascii
$s_13 = "type selection changed" ascii
$s_14 = "type announcement" ascii
$s_15 = "scroll position =" ascii
$s_16 = "imei=%s;imsi=%s;phone=%s;sim_serial=%s;os=%s"
$s_17 = "imei=%s;imsi=%s;phone=%s;sim_serial=%s;roaming=%s;os=%s"
$s_18 = "last message = %s, level = %d, hash = %s, node count = %d"
$s_19 = "MyAccessibilityService"
condition:
$dex at 0 and (
any of ($u*) or
any of ($c2*) or
7 of ($s*)
)
} | — | |
yararule APT_serbia_novispy_android_serv_services {
meta:
description = "Rule for Serbian NoviSpy Android spyware APK, com.serv.services version"
author = "Donncha O Cearbhaill, Amnesty International"
sample = "087fc1217c897033425fe7f1f12b913cd48918c875e99c25bdb9e1ffcf80f57e"
strings:
$dex = { 64 65 78 0A 30 33 ?? 00 }
// C2 communication
$c2_comm_1 = "178.220.122.57"
// Unique Strings
// C2 commands received via SMS
$sms_c2_cmd_1 = "C_ARF" ascii
$sms_c2_cmd_2 = "C_ARN" ascii
$sms_c2_cmd_3 = "C_AWF" ascii
$sms_c2_cmd_4 = "C_AWI" ascii
$sms_c2_cmd_5 = "C_AWN" ascii
$sms_c2_cmd_6 = "C_CRF" ascii
$sms_c2_cmd_7 = "C_CRN" ascii
$sms_c2_cmd_8 = "C_LCW" ascii
$sms_c2_cmd_9 = "C_MNS" ascii
$sms_c2_cmd_10 = "C_MXS" ascii
$sms_c2_cmd_11 = "C_R_F" ascii
$sms_c2_cmd_12 = "C_R_N" ascii
$sms_c2_cmd_13 = "C_SMF" ascii
$sms_c2_cmd_14 = "C_SMN" ascii
$sms_c2_cmd_15 = "C_SWF" ascii
$sms_c2_cmd_16 = "C_SWN" ascii
$sms_c2_cmd_17 = "C_UIR" ascii
$sms_c2_cmd_18 = "C_UMF" ascii
$sms_c2_cmd_19 = "C_UMN" ascii
$sms_c2_cmd_20 = "C_UWF" ascii
$sms_c2_cmd_21 = "C_UWN" ascii
$sms_c2_cmd_22 = "C_WLF" ascii
$sms_c2_cmd_23 = "C_WLN" ascii
// C2 commands received via FTP.
// This is not a comprehensive list of commands, generic command names are excluded to prevent false positives.
$ftp_c2_cmd_1 = "CALL_REC_OFF" ascii
$ftp_c2_cmd_2 = "CALL_REC_ON" ascii
$ftp_c2_cmd_3 = "CHARGING_REC_OFF" ascii
$ftp_c2_cmd_4 = "CHARGING_REC_ON" ascii
$ftp_c2_cmd_5 = "SECURE_REC_OFF" ascii
$ftp_c2_cmd_6 = "SECURE_REC_ON" ascii
$ftp_c2_cmd_7 = "SSD_MOBILE_OFF" ascii
$ftp_c2_cmd_8 = "SSD_MOBILE_ON" ascii
$ftp_c2_cmd_9 = "SSD_WIFI_OFF" ascii
$ftp_c2_cmd_10 = "SSD_WIFI_ON" ascii
$ftp_c2_cmd_11 = "UPLOAD_INTERVAL" ascii
$ftp_c2_cmd_12 = "UPLOAD_MOBILE_OFF" ascii
$ftp_c2_cmd_13 = "UPLOAD_MOBILE_ON" ascii
$ftp_c2_cmd_14 = "UPLOAD_WIFI_OFF" ascii
$ftp_c2_cmd_15 = "UPLOAD_WIFI_ON" ascii
$ftp_c2_cmd_16 = "AUTO_WIFI_INTERVAL" ascii
$ftp_c2_cmd_17 = "WIFI_LOCK_ON" ascii
$ftp_c2_cmd_18 = "WIFI_LOCK_OFF" ascii
$ftp_c2_cmd_19 = "AUTO_WIFI_ON" ascii
$ftp_c2_cmd_20 = "AUTO_WIFI_OFF" ascii
$ftp_c2_cmd_21 = "START_AUDIO" ascii
// App local settings configured based on C2 commands.
$setting_1 = "UIR" ascii
$setting_2 = "ULW" ascii
$setting_3 = "ULM" ascii
$setting_4 = "SSW" ascii
$setting_5 = "SSM" ascii
$setting_6 = "CRN" ascii
$setting_7 = "SRN" ascii
$setting_8 = "CRC" ascii
$setting_9 = "MXS" ascii
$setting_10 = "MNS" ascii
$setting_11 = "AWF" ascii
$setting_12 = "AWI" ascii
$setting_13 = "CHR" ascii
$setting_14 = "WLS" ascii
$setting_15 = "A_R_N" ascii
$setting_16 = "A_R_F" ascii
$setting_17 = "U_I" ascii
$setting_18 = "U_W_N" ascii
$setting_19 = "S_W_N" ascii
$setting_20 = "U_M_F" ascii
$setting_21 = "S_M_F" ascii
$setting_22 = "A_W_F" ascii
$setting_23 = "A_W_I" ascii
$setting_24 = "W_L_N" ascii
$setting_25 = "C_R_F" ascii
$setting_26 = "CH_R_F" ascii
$setting_27 = "S_R_N" ascii
condition:
$dex at 0 and (
any of ($c2_comm*) or
20 of ($sms_c2_cmd*) or
20 of ($ftp_c2_cmd*) or
20 of ($setting*)
)
} | — |
Threat ID: 682c7ad6e3e6de8ceb775699
Added to database: 5/20/2025, 12:51:34 PM
Last enriched: 6/19/2025, 2:32:35 PM
Last updated: 12/4/2025, 5:09:42 AM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2025-12-03
MediumCVE-2025-64763: CWE-693: Protection Mechanism Failure in envoyproxy envoy
LowCVE-2025-20388: The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. in Splunk Splunk Enterprise
LowCVE-2025-20385: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. in Splunk Splunk Enterprise
LowCVE-2025-20382: A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks. in Splunk Splunk Enterprise
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.