OSINT - The Qualcomm DSP Driver - How Serbian authorities have deployed surveillance technology and digital repression tactics
OSINT - The Qualcomm DSP Driver - How Serbian authorities have deployed surveillance technology and digital repression tactics
AI Analysis
Technical Summary
The security threat identified as CVE-2024-38402 pertains to the use of surveillance technology and digital repression tactics by Serbian authorities, specifically involving the Qualcomm Digital Signal Processor (DSP) driver. This vulnerability is categorized under OSINT (Open Source Intelligence) and relates to network activity and external analysis rather than a traditional software flaw with patchable code. The Qualcomm DSP driver is a critical component in many mobile devices, responsible for handling audio, sensor data, and other real-time processing tasks. While no specific affected versions or patch information are provided, the threat highlights how state actors may leverage proprietary hardware drivers and embedded system components to conduct surveillance and digital repression. The technical details indicate a low severity rating and no known exploits in the wild, suggesting limited immediate risk from a technical exploitation standpoint. However, the nature of the threat is more strategic and operational, focusing on the deployment of surveillance infrastructure and tactics rather than a direct vulnerability that can be exploited by external attackers. The involvement of Serbian authorities and the tagging of the threat with country-specific metadata imply a geopolitical dimension, where surveillance technology is used for monitoring and potentially repressing digital communications within Serbia. This OSINT report underscores the importance of understanding how hardware-level components like the Qualcomm DSP driver can be manipulated or utilized in state-sponsored surveillance campaigns, which may not be mitigated by traditional software patches or updates.
Potential Impact
For European organizations, particularly those operating in or with ties to Serbia and the Western Balkans, this threat signals potential risks related to privacy, data confidentiality, and freedom of communication. While the direct technical exploitation risk is low, the strategic use of surveillance technology by state actors can lead to unauthorized monitoring of communications, data interception, and digital repression of activists, journalists, or political opponents. Organizations handling sensitive information or engaging in activities that may attract state scrutiny could face increased risks of surveillance and data leakage. This could undermine trust, lead to reputational damage, and potentially expose confidential business or personal information. Additionally, the use of embedded system components like the Qualcomm DSP driver in mobile devices means that mobile communications could be a vector for surveillance, impacting mobile workforce security and cross-border communications. The broader impact includes chilling effects on digital rights and privacy within affected regions, which can indirectly affect European organizations through regulatory, legal, and operational challenges.
Mitigation Recommendations
Given the nature of this threat as an OSINT-identified state surveillance tactic rather than a conventional software vulnerability, mitigation requires a multi-layered approach beyond typical patching. European organizations should: 1) Conduct thorough risk assessments for operations in Serbia and neighboring countries, focusing on potential surveillance risks. 2) Employ end-to-end encryption for all sensitive communications, including voice, messaging, and data transfers, to reduce interception risks even if hardware-level surveillance is present. 3) Use mobile devices with hardware and software security features that limit unauthorized DSP access or allow for secure boot and trusted execution environments. 4) Implement strict operational security (OpSec) protocols for employees traveling to or working within high-risk regions, including the use of secure communication apps and minimizing sensitive data on devices. 5) Monitor OSINT and threat intelligence feeds for updates on surveillance tactics and emerging vulnerabilities related to embedded system components. 6) Engage with privacy-focused technology providers and consider hardware that supports open-source firmware or has transparent security audits to reduce reliance on potentially compromised proprietary drivers. 7) Collaborate with legal and compliance teams to understand local laws and advocate for digital rights protections. These measures go beyond generic advice by focusing on the unique challenges posed by hardware-level surveillance and state-sponsored digital repression.
Affected Countries
Serbia, Bosnia and Herzegovina, Montenegro, North Macedonia, Croatia, Slovenia, Hungary
Indicators of Compromise
- domain: 176.223.111.131
- domain: 195.178.51.251
- domain: 94.140.125.174
- domain: 178.220.122.57
- domain: 185.86.148.174
- domain: 188.93.127.34
- domain: 79.101.110.108
- vulnerability: CVE-2024-38402
- vulnerability: CVE-2024-49848
- vulnerability: CVE-2024-21455
- vulnerability: CVE-2024-43047
- vulnerability: CVE-2024-33060
- text: stix 2.1
- stix2-pattern: [app:id='com.gu.activity']
- text: stix 2.1
- stix2-pattern: [app:id='com.serv.services']
- text: stix 2.1
- stix2-pattern: [app:id='com.li.activity']
- text: stix 2.1
- stix2-pattern: [app:id='com.accesibilityservice']
- text: stix 2.1
- stix2-pattern: [app:cert.sha256='3ac97735164824657b683e805133b1274b2dedabf9fdd6aa9aca31089d501e64']
- text: stix 2.1
- stix2-pattern: [app:cert.sha256='35926e966186c8f2deec66864389d73989c75c85cb6668da2f455db6fe67e91f']
- text: stix 2.1
- stix2-pattern: [app:cert.sha256='38693e1ea0fbf39d28f66b1714fdeed4e23b3973276481097d2d66e87f3647eb']
- text: stix 2.1
- stix2-pattern: [file:hashes.sha256='d55e492d5fce87898e065572a5553d1ac1389cd12bf3d28cabc1218cb29780af']
- text: stix 2.1
- stix2-pattern: [file:hashes.sha256='54ee2c4f3e2396b6f92def135d68abd35d63ca7f9c304633a36f705ba4728cb7']
- text: stix 2.1
- stix2-pattern: [file:hashes.sha256='99673ce7f10e938ed73ed4a99930fbd6499983caa7a2c1b9e3f0e0bb0a5df602']
- text: stix 2.1
- stix2-pattern: [file:hashes.sha256='087fc1217c897033425fe7f1f12b913cd48918c875e99c25bdb9e1ffcf80f57e']
- text: IOCs for Serbian NoviSpy Android spyware
- boolean: 0
- text: NoviSpy
- file: novispy.stix2
- text: 2.1
- text: com.serv.services
- text: com.gu.activity
- text: com.li.activity
- text: com.accesibilityservice
- hash: 3ac97735164824657b683e805133b1274b2dedabf9fdd6aa9aca31089d501e64
- hash: 35926e966186c8f2deec66864389d73989c75c85cb6668da2f455db6fe67e91f
- hash: 38693e1ea0fbf39d28f66b1714fdeed4e23b3973276481097d2d66e87f3647eb
- vulnerability: CVE-2024-33060
- datetime: 2024-09-02T10:22:46.127000+00:00
- datetime: 2024-09-05T03:56:12.175000+00:00
- text: PUBLISHED
- link: https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html
- cpe: cpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:c-v2x_9150_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:mdm9250_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm2150_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qdu1000_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qdu1010_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qdu1110_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qdu1210_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qdx1010_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qdx1011_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qep8111_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qru1032_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qru1052_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qru1062_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qualcomm_215_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:robotics_rb5_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sd626_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sdx20m_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sdx61_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sm6370_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:smart_audio_400_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_429_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_460_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_660_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_662_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_670_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_675_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_690_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_710_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_720g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_750g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_820_automotive_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_835_mobile_pc_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_855_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x12_lte_modem_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x20_lte_modem_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x35_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x50_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x62_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x72_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_xr1_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_auto_4g_modem_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:srv1l_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sxr1120_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:talynplus_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:vision_intelligence_400_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3680_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*
- vulnerability: CVE-2024-43047
- datetime: 2024-10-07T12:59:01.656000+00:00
- datetime: 2024-10-09T12:57:09.326000+00:00
- text: PUBLISHED
- link: https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html
- cpe: cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_660_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_865\+_5g_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_888\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sm6225-ad_firmware:-:*:*:*:*:*:*:*
- vulnerability: CVE-2024-21455
- datetime: 2024-10-07T12:58:42.341000+00:00
- datetime: 2024-10-07T13:19:44.091000+00:00
- text: PUBLISHED
- link: https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html
- cpe: cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*
- vulnerability: CVE-2024-21455
- datetime: 2024-10-07T12:58:42.341000+00:00
- datetime: 2024-10-07T13:19:44.091000+00:00
- text: PUBLISHED
- link: https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html
- cpe: cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*
- vulnerability: CVE-2024-38402
- datetime: 2024-09-02T10:22:48.204000+00:00
- datetime: 2024-09-06T16:19:57.498000+00:00
- text: PUBLISHED
- link: https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html
- cpe: cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qdu1000_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qdu1010_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qdu1110_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qdu1210_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qdx1010_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qdx1011_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qep8111_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qru1032_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qru1052_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qru1062_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:robotics_rb5_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sdx61_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sm6370_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:smart_audio_400_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_460_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_662_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x12_lte_modem_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x35_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x62_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x72_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:srv1l_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:talynplus_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*
- cpe: cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*
- ip: 195.178.51.251
- ip: 79.101.110.108
- ip: 188.93.127.34
- ip: 178.220.122.57
- ip: 94.140.125.174
- ip: 185.86.148.174
- ip: 176.223.111.131
- text: Serbia
- text: RS
- float: 44
- float: 21
- text: db_source: GeoOpen-Country. build_db: 2023-11-20 12:50:37. Latitude and longitude are country average.
- text: Serbia
- text: RS
- float: 44
- float: 21
- text: db_source: GeoOpen-Country-ASN. build_db: 2023-11-20 15:49:14. Latitude and longitude are country average.
- text: 8400
- text: ASNOrganization: TELEKOM-AS. db_source: GeoOpen-Country-ASN. build_db: 2023-11-20 15:49:14.
- text: all
- yara: rule APT_serbia_novispy_android_accesibilityservice { meta: description = "Rule for Serbian NoviSpy Android spyware APK, com.accesibilityservice version" author = "Donncha O Cearbhaill, Amnesty International" sample = "99673ce7f10e938ed73ed4a99930fbd6499983caa7a2c1b9e3f0e0bb0a5df602" strings: $dex = { 64 65 78 0A 30 33 ?? 00 } // C2 communication $c2_1 = "195.178.51.251" $c2_2 = "79.101.110.108" $c2_3 = "188.93.127.34" // Unique Strings $u_1 = "kataklinger vibercajzna" ascii nocase $u_2 = "select action_command.* from action_command where action_id = ? and trigger_type = ?" ascii nocase $u_3 = "6FDF20EAFA2D58AF609C72AE7092BB45" ascii nocase $u_4 = "{\"cellChangeMonitoring\":true,\"signalStrengthMonitoring\":true,\"temperatureDelta\":1," ascii nocase $u_5 = "{\"fileUpload\":false,\"audioRecording\":false,\"cellChangeMonitoring\":true,"ascii nocase $u_6 = "\"serverIp\":\"188.93.127.34\"" ascii nocase $u_7 = "ucitavanjepodataka" ascii nocase // Other strings $s_1 = "test.dat" ascii $s_2 = "/active.config" ascii $s_3 = "message_map.ser" ascii $s_4 = "event type =" ascii $s_5 = "change type subtree" ascii $s_6 = "change type content description" ascii $s_7 = "change type pane title" ascii $s_8 = "content change type pane_appeared" ascii $s_9 = "window state changed" ascii $s_10 = "notification state changed" ascii $s_11 = "window content changed" ascii $s_12 = "view scrolled" ascii $s_13 = "type selection changed" ascii $s_14 = "type announcement" ascii $s_15 = "scroll position =" ascii $s_16 = "imei=%s;imsi=%s;phone=%s;sim_serial=%s;os=%s" $s_17 = "imei=%s;imsi=%s;phone=%s;sim_serial=%s;roaming=%s;os=%s" $s_18 = "last message = %s, level = %d, hash = %s, node count = %d" $s_19 = "MyAccessibilityService" condition: $dex at 0 and ( any of ($u*) or any of ($c2*) or 7 of ($s*) ) }
- text: APT_serbia_novispy_android_accesibilityservice
- text: all
- yara: rule APT_serbia_novispy_android_serv_services { meta: description = "Rule for Serbian NoviSpy Android spyware APK, com.serv.services version" author = "Donncha O Cearbhaill, Amnesty International" sample = "087fc1217c897033425fe7f1f12b913cd48918c875e99c25bdb9e1ffcf80f57e" strings: $dex = { 64 65 78 0A 30 33 ?? 00 } // C2 communication $c2_comm_1 = "178.220.122.57" // Unique Strings // C2 commands received via SMS $sms_c2_cmd_1 = "C_ARF" ascii $sms_c2_cmd_2 = "C_ARN" ascii $sms_c2_cmd_3 = "C_AWF" ascii $sms_c2_cmd_4 = "C_AWI" ascii $sms_c2_cmd_5 = "C_AWN" ascii $sms_c2_cmd_6 = "C_CRF" ascii $sms_c2_cmd_7 = "C_CRN" ascii $sms_c2_cmd_8 = "C_LCW" ascii $sms_c2_cmd_9 = "C_MNS" ascii $sms_c2_cmd_10 = "C_MXS" ascii $sms_c2_cmd_11 = "C_R_F" ascii $sms_c2_cmd_12 = "C_R_N" ascii $sms_c2_cmd_13 = "C_SMF" ascii $sms_c2_cmd_14 = "C_SMN" ascii $sms_c2_cmd_15 = "C_SWF" ascii $sms_c2_cmd_16 = "C_SWN" ascii $sms_c2_cmd_17 = "C_UIR" ascii $sms_c2_cmd_18 = "C_UMF" ascii $sms_c2_cmd_19 = "C_UMN" ascii $sms_c2_cmd_20 = "C_UWF" ascii $sms_c2_cmd_21 = "C_UWN" ascii $sms_c2_cmd_22 = "C_WLF" ascii $sms_c2_cmd_23 = "C_WLN" ascii // C2 commands received via FTP. // This is not a comprehensive list of commands, generic command names are excluded to prevent false positives. $ftp_c2_cmd_1 = "CALL_REC_OFF" ascii $ftp_c2_cmd_2 = "CALL_REC_ON" ascii $ftp_c2_cmd_3 = "CHARGING_REC_OFF" ascii $ftp_c2_cmd_4 = "CHARGING_REC_ON" ascii $ftp_c2_cmd_5 = "SECURE_REC_OFF" ascii $ftp_c2_cmd_6 = "SECURE_REC_ON" ascii $ftp_c2_cmd_7 = "SSD_MOBILE_OFF" ascii $ftp_c2_cmd_8 = "SSD_MOBILE_ON" ascii $ftp_c2_cmd_9 = "SSD_WIFI_OFF" ascii $ftp_c2_cmd_10 = "SSD_WIFI_ON" ascii $ftp_c2_cmd_11 = "UPLOAD_INTERVAL" ascii $ftp_c2_cmd_12 = "UPLOAD_MOBILE_OFF" ascii $ftp_c2_cmd_13 = "UPLOAD_MOBILE_ON" ascii $ftp_c2_cmd_14 = "UPLOAD_WIFI_OFF" ascii $ftp_c2_cmd_15 = "UPLOAD_WIFI_ON" ascii $ftp_c2_cmd_16 = "AUTO_WIFI_INTERVAL" ascii $ftp_c2_cmd_17 = "WIFI_LOCK_ON" ascii $ftp_c2_cmd_18 = "WIFI_LOCK_OFF" ascii $ftp_c2_cmd_19 = "AUTO_WIFI_ON" ascii $ftp_c2_cmd_20 = "AUTO_WIFI_OFF" ascii $ftp_c2_cmd_21 = "START_AUDIO" ascii // App local settings configured based on C2 commands. $setting_1 = "UIR" ascii $setting_2 = "ULW" ascii $setting_3 = "ULM" ascii $setting_4 = "SSW" ascii $setting_5 = "SSM" ascii $setting_6 = "CRN" ascii $setting_7 = "SRN" ascii $setting_8 = "CRC" ascii $setting_9 = "MXS" ascii $setting_10 = "MNS" ascii $setting_11 = "AWF" ascii $setting_12 = "AWI" ascii $setting_13 = "CHR" ascii $setting_14 = "WLS" ascii $setting_15 = "A_R_N" ascii $setting_16 = "A_R_F" ascii $setting_17 = "U_I" ascii $setting_18 = "U_W_N" ascii $setting_19 = "S_W_N" ascii $setting_20 = "U_M_F" ascii $setting_21 = "S_M_F" ascii $setting_22 = "A_W_F" ascii $setting_23 = "A_W_I" ascii $setting_24 = "W_L_N" ascii $setting_25 = "C_R_F" ascii $setting_26 = "CH_R_F" ascii $setting_27 = "S_R_N" ascii condition: $dex at 0 and ( any of ($c2_comm*) or 20 of ($sms_c2_cmd*) or 20 of ($ftp_c2_cmd*) or 20 of ($setting*) ) }
- text: APT_serbia_novispy_android_serv_services
OSINT - The Qualcomm DSP Driver - How Serbian authorities have deployed surveillance technology and digital repression tactics
Description
OSINT - The Qualcomm DSP Driver - How Serbian authorities have deployed surveillance technology and digital repression tactics
AI-Powered Analysis
Technical Analysis
The security threat identified as CVE-2024-38402 pertains to the use of surveillance technology and digital repression tactics by Serbian authorities, specifically involving the Qualcomm Digital Signal Processor (DSP) driver. This vulnerability is categorized under OSINT (Open Source Intelligence) and relates to network activity and external analysis rather than a traditional software flaw with patchable code. The Qualcomm DSP driver is a critical component in many mobile devices, responsible for handling audio, sensor data, and other real-time processing tasks. While no specific affected versions or patch information are provided, the threat highlights how state actors may leverage proprietary hardware drivers and embedded system components to conduct surveillance and digital repression. The technical details indicate a low severity rating and no known exploits in the wild, suggesting limited immediate risk from a technical exploitation standpoint. However, the nature of the threat is more strategic and operational, focusing on the deployment of surveillance infrastructure and tactics rather than a direct vulnerability that can be exploited by external attackers. The involvement of Serbian authorities and the tagging of the threat with country-specific metadata imply a geopolitical dimension, where surveillance technology is used for monitoring and potentially repressing digital communications within Serbia. This OSINT report underscores the importance of understanding how hardware-level components like the Qualcomm DSP driver can be manipulated or utilized in state-sponsored surveillance campaigns, which may not be mitigated by traditional software patches or updates.
Potential Impact
For European organizations, particularly those operating in or with ties to Serbia and the Western Balkans, this threat signals potential risks related to privacy, data confidentiality, and freedom of communication. While the direct technical exploitation risk is low, the strategic use of surveillance technology by state actors can lead to unauthorized monitoring of communications, data interception, and digital repression of activists, journalists, or political opponents. Organizations handling sensitive information or engaging in activities that may attract state scrutiny could face increased risks of surveillance and data leakage. This could undermine trust, lead to reputational damage, and potentially expose confidential business or personal information. Additionally, the use of embedded system components like the Qualcomm DSP driver in mobile devices means that mobile communications could be a vector for surveillance, impacting mobile workforce security and cross-border communications. The broader impact includes chilling effects on digital rights and privacy within affected regions, which can indirectly affect European organizations through regulatory, legal, and operational challenges.
Mitigation Recommendations
Given the nature of this threat as an OSINT-identified state surveillance tactic rather than a conventional software vulnerability, mitigation requires a multi-layered approach beyond typical patching. European organizations should: 1) Conduct thorough risk assessments for operations in Serbia and neighboring countries, focusing on potential surveillance risks. 2) Employ end-to-end encryption for all sensitive communications, including voice, messaging, and data transfers, to reduce interception risks even if hardware-level surveillance is present. 3) Use mobile devices with hardware and software security features that limit unauthorized DSP access or allow for secure boot and trusted execution environments. 4) Implement strict operational security (OpSec) protocols for employees traveling to or working within high-risk regions, including the use of secure communication apps and minimizing sensitive data on devices. 5) Monitor OSINT and threat intelligence feeds for updates on surveillance tactics and emerging vulnerabilities related to embedded system components. 6) Engage with privacy-focused technology providers and consider hardware that supports open-source firmware or has transparent security audits to reduce reliance on potentially compromised proprietary drivers. 7) Collaborate with legal and compliance teams to understand local laws and advocate for digital rights protections. These measures go beyond generic advice by focusing on the unique challenges posed by hardware-level surveillance and state-sponsored digital repression.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Threat Level
- 3
- Analysis
- 0
- Uuid
- 87c159e3-5105-491e-87ba-94a7f0a52e09
- Original Timestamp
- 1734533886
Indicators of Compromise
Domain
Value | Description | Copy |
---|---|---|
domain176.223.111.131 | Merged from event 270542 | |
domain195.178.51.251 | Merged from event 270542 | |
domain94.140.125.174 | Merged from event 270542 | |
domain178.220.122.57 | Merged from event 270542 | |
domain185.86.148.174 | Merged from event 270542 | |
domain188.93.127.34 | Merged from event 270542 | |
domain79.101.110.108 | Merged from event 270542 |
Vulnerability
Value | Description | Copy |
---|---|---|
vulnerabilityCVE-2024-38402 | — | |
vulnerabilityCVE-2024-49848 | — | |
vulnerabilityCVE-2024-21455 | — | |
vulnerabilityCVE-2024-43047 | — | |
vulnerabilityCVE-2024-33060 | — | |
vulnerabilityCVE-2024-33060 | — | |
vulnerabilityCVE-2024-43047 | — | |
vulnerabilityCVE-2024-21455 | — | |
vulnerabilityCVE-2024-21455 | — | |
vulnerabilityCVE-2024-38402 | — |
Text
Value | Description | Copy |
---|---|---|
textstix 2.1 | — | |
textstix 2.1 | — | |
textstix 2.1 | — | |
textstix 2.1 | — | |
textstix 2.1 | — | |
textstix 2.1 | — | |
textstix 2.1 | — | |
textstix 2.1 | — | |
textstix 2.1 | — | |
textstix 2.1 | — | |
textstix 2.1 | — | |
textIOCs for Serbian NoviSpy Android spyware | — | |
textNoviSpy | — | |
text2.1 | — | |
textcom.serv.services | — | |
textcom.gu.activity | — | |
textcom.li.activity | — | |
textcom.accesibilityservice | — | |
textPUBLISHED | — | |
textPUBLISHED | — | |
textPUBLISHED | — | |
textPUBLISHED | — | |
textPUBLISHED | — | |
textSerbia | — | |
textRS | — | |
textdb_source: GeoOpen-Country. build_db: 2023-11-20 12:50:37. Latitude and longitude are country average. | — | |
textSerbia | — | |
textRS | — | |
textdb_source: GeoOpen-Country-ASN. build_db: 2023-11-20 15:49:14. Latitude and longitude are country average. | — | |
text8400 | — | |
textASNOrganization: TELEKOM-AS. db_source: GeoOpen-Country-ASN. build_db: 2023-11-20 15:49:14. | — | |
textall | — | |
textAPT_serbia_novispy_android_accesibilityservice | — | |
textall | — | |
textAPT_serbia_novispy_android_serv_services | — |
Stix2 pattern
Value | Description | Copy |
---|---|---|
stix2-pattern[app:id='com.gu.activity'] | — | |
stix2-pattern[app:id='com.serv.services'] | — | |
stix2-pattern[app:id='com.li.activity'] | — | |
stix2-pattern[app:id='com.accesibilityservice'] | — | |
stix2-pattern[app:cert.sha256='3ac97735164824657b683e805133b1274b2dedabf9fdd6aa9aca31089d501e64'] | — | |
stix2-pattern[app:cert.sha256='35926e966186c8f2deec66864389d73989c75c85cb6668da2f455db6fe67e91f'] | — | |
stix2-pattern[app:cert.sha256='38693e1ea0fbf39d28f66b1714fdeed4e23b3973276481097d2d66e87f3647eb'] | — | |
stix2-pattern[file:hashes.sha256='d55e492d5fce87898e065572a5553d1ac1389cd12bf3d28cabc1218cb29780af'] | — | |
stix2-pattern[file:hashes.sha256='54ee2c4f3e2396b6f92def135d68abd35d63ca7f9c304633a36f705ba4728cb7'] | — | |
stix2-pattern[file:hashes.sha256='99673ce7f10e938ed73ed4a99930fbd6499983caa7a2c1b9e3f0e0bb0a5df602'] | — | |
stix2-pattern[file:hashes.sha256='087fc1217c897033425fe7f1f12b913cd48918c875e99c25bdb9e1ffcf80f57e'] | — |
Boolean
Value | Description | Copy |
---|---|---|
boolean0 | — |
File
Value | Description | Copy |
---|---|---|
filenovispy.stix2 | — |
Hash
Value | Description | Copy |
---|---|---|
hash3ac97735164824657b683e805133b1274b2dedabf9fdd6aa9aca31089d501e64 | — | |
hash35926e966186c8f2deec66864389d73989c75c85cb6668da2f455db6fe67e91f | — | |
hash38693e1ea0fbf39d28f66b1714fdeed4e23b3973276481097d2d66e87f3647eb | — |
Datetime
Value | Description | Copy |
---|---|---|
datetime2024-09-02T10:22:46.127000+00:00 | — | |
datetime2024-09-05T03:56:12.175000+00:00 | — | |
datetime2024-10-07T12:59:01.656000+00:00 | — | |
datetime2024-10-09T12:57:09.326000+00:00 | — | |
datetime2024-10-07T12:58:42.341000+00:00 | — | |
datetime2024-10-07T13:19:44.091000+00:00 | — | |
datetime2024-10-07T12:58:42.341000+00:00 | — | |
datetime2024-10-07T13:19:44.091000+00:00 | — | |
datetime2024-09-02T10:22:48.204000+00:00 | — | |
datetime2024-09-06T16:19:57.498000+00:00 | — |
Link
Value | Description | Copy |
---|---|---|
linkhttps://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html | — | |
linkhttps://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html | — | |
linkhttps://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html | — | |
linkhttps://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html | — | |
linkhttps://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html | — |
Cpe
Value | Description | Copy |
---|---|---|
cpecpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:c-v2x_9150_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:mdm9250_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm2150_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qdu1000_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qdu1010_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qdu1110_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qdu1210_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qdx1010_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qdx1011_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qep8111_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qru1032_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qru1052_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qru1062_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qualcomm_215_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:robotics_rb5_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sd626_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sdx20m_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sdx61_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sm6370_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:smart_audio_400_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_429_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_460_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_660_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_662_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_670_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_675_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_690_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_710_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_720g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_750g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_820_automotive_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_835_mobile_pc_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_855_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x12_lte_modem_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x20_lte_modem_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x35_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x50_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x62_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x72_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_xr1_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_auto_4g_modem_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:srv1l_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sxr1120_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:talynplus_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:vision_intelligence_400_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3680_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_660_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_865\+_5g_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_888\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sm6225-ad_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qdu1000_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qdu1010_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qdu1110_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qdu1210_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qdx1010_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qdx1011_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qep8111_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qru1032_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qru1052_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qru1062_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:robotics_rb5_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sdx61_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sm6370_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:smart_audio_400_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_460_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_662_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x12_lte_modem_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x35_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x62_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x72_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:srv1l_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:talynplus_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:* | — | |
cpecpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:* | — |
Ip
Value | Description | Copy |
---|---|---|
ip195.178.51.251 | — | |
ip79.101.110.108 | — | |
ip188.93.127.34 | — | |
ip178.220.122.57 | — | |
ip94.140.125.174 | — | |
ip185.86.148.174 | — | |
ip176.223.111.131 | — |
Float
Value | Description | Copy |
---|---|---|
float44 | — | |
float21 | — | |
float44 | — | |
float21 | — |
Yara
Value | Description | Copy |
---|---|---|
yararule APT_serbia_novispy_android_accesibilityservice {
meta:
description = "Rule for Serbian NoviSpy Android spyware APK, com.accesibilityservice version"
author = "Donncha O Cearbhaill, Amnesty International"
sample = "99673ce7f10e938ed73ed4a99930fbd6499983caa7a2c1b9e3f0e0bb0a5df602"
strings:
$dex = { 64 65 78 0A 30 33 ?? 00 }
// C2 communication
$c2_1 = "195.178.51.251"
$c2_2 = "79.101.110.108"
$c2_3 = "188.93.127.34"
// Unique Strings
$u_1 = "kataklinger vibercajzna" ascii nocase
$u_2 = "select action_command.* from action_command where action_id = ? and trigger_type = ?" ascii nocase
$u_3 = "6FDF20EAFA2D58AF609C72AE7092BB45" ascii nocase
$u_4 = "{\"cellChangeMonitoring\":true,\"signalStrengthMonitoring\":true,\"temperatureDelta\":1," ascii nocase
$u_5 = "{\"fileUpload\":false,\"audioRecording\":false,\"cellChangeMonitoring\":true,"ascii nocase
$u_6 = "\"serverIp\":\"188.93.127.34\"" ascii nocase
$u_7 = "ucitavanjepodataka" ascii nocase
// Other strings
$s_1 = "test.dat" ascii
$s_2 = "/active.config" ascii
$s_3 = "message_map.ser" ascii
$s_4 = "event type =" ascii
$s_5 = "change type subtree" ascii
$s_6 = "change type content description" ascii
$s_7 = "change type pane title" ascii
$s_8 = "content change type pane_appeared" ascii
$s_9 = "window state changed" ascii
$s_10 = "notification state changed" ascii
$s_11 = "window content changed" ascii
$s_12 = "view scrolled" ascii
$s_13 = "type selection changed" ascii
$s_14 = "type announcement" ascii
$s_15 = "scroll position =" ascii
$s_16 = "imei=%s;imsi=%s;phone=%s;sim_serial=%s;os=%s"
$s_17 = "imei=%s;imsi=%s;phone=%s;sim_serial=%s;roaming=%s;os=%s"
$s_18 = "last message = %s, level = %d, hash = %s, node count = %d"
$s_19 = "MyAccessibilityService"
condition:
$dex at 0 and (
any of ($u*) or
any of ($c2*) or
7 of ($s*)
)
} | — | |
yararule APT_serbia_novispy_android_serv_services {
meta:
description = "Rule for Serbian NoviSpy Android spyware APK, com.serv.services version"
author = "Donncha O Cearbhaill, Amnesty International"
sample = "087fc1217c897033425fe7f1f12b913cd48918c875e99c25bdb9e1ffcf80f57e"
strings:
$dex = { 64 65 78 0A 30 33 ?? 00 }
// C2 communication
$c2_comm_1 = "178.220.122.57"
// Unique Strings
// C2 commands received via SMS
$sms_c2_cmd_1 = "C_ARF" ascii
$sms_c2_cmd_2 = "C_ARN" ascii
$sms_c2_cmd_3 = "C_AWF" ascii
$sms_c2_cmd_4 = "C_AWI" ascii
$sms_c2_cmd_5 = "C_AWN" ascii
$sms_c2_cmd_6 = "C_CRF" ascii
$sms_c2_cmd_7 = "C_CRN" ascii
$sms_c2_cmd_8 = "C_LCW" ascii
$sms_c2_cmd_9 = "C_MNS" ascii
$sms_c2_cmd_10 = "C_MXS" ascii
$sms_c2_cmd_11 = "C_R_F" ascii
$sms_c2_cmd_12 = "C_R_N" ascii
$sms_c2_cmd_13 = "C_SMF" ascii
$sms_c2_cmd_14 = "C_SMN" ascii
$sms_c2_cmd_15 = "C_SWF" ascii
$sms_c2_cmd_16 = "C_SWN" ascii
$sms_c2_cmd_17 = "C_UIR" ascii
$sms_c2_cmd_18 = "C_UMF" ascii
$sms_c2_cmd_19 = "C_UMN" ascii
$sms_c2_cmd_20 = "C_UWF" ascii
$sms_c2_cmd_21 = "C_UWN" ascii
$sms_c2_cmd_22 = "C_WLF" ascii
$sms_c2_cmd_23 = "C_WLN" ascii
// C2 commands received via FTP.
// This is not a comprehensive list of commands, generic command names are excluded to prevent false positives.
$ftp_c2_cmd_1 = "CALL_REC_OFF" ascii
$ftp_c2_cmd_2 = "CALL_REC_ON" ascii
$ftp_c2_cmd_3 = "CHARGING_REC_OFF" ascii
$ftp_c2_cmd_4 = "CHARGING_REC_ON" ascii
$ftp_c2_cmd_5 = "SECURE_REC_OFF" ascii
$ftp_c2_cmd_6 = "SECURE_REC_ON" ascii
$ftp_c2_cmd_7 = "SSD_MOBILE_OFF" ascii
$ftp_c2_cmd_8 = "SSD_MOBILE_ON" ascii
$ftp_c2_cmd_9 = "SSD_WIFI_OFF" ascii
$ftp_c2_cmd_10 = "SSD_WIFI_ON" ascii
$ftp_c2_cmd_11 = "UPLOAD_INTERVAL" ascii
$ftp_c2_cmd_12 = "UPLOAD_MOBILE_OFF" ascii
$ftp_c2_cmd_13 = "UPLOAD_MOBILE_ON" ascii
$ftp_c2_cmd_14 = "UPLOAD_WIFI_OFF" ascii
$ftp_c2_cmd_15 = "UPLOAD_WIFI_ON" ascii
$ftp_c2_cmd_16 = "AUTO_WIFI_INTERVAL" ascii
$ftp_c2_cmd_17 = "WIFI_LOCK_ON" ascii
$ftp_c2_cmd_18 = "WIFI_LOCK_OFF" ascii
$ftp_c2_cmd_19 = "AUTO_WIFI_ON" ascii
$ftp_c2_cmd_20 = "AUTO_WIFI_OFF" ascii
$ftp_c2_cmd_21 = "START_AUDIO" ascii
// App local settings configured based on C2 commands.
$setting_1 = "UIR" ascii
$setting_2 = "ULW" ascii
$setting_3 = "ULM" ascii
$setting_4 = "SSW" ascii
$setting_5 = "SSM" ascii
$setting_6 = "CRN" ascii
$setting_7 = "SRN" ascii
$setting_8 = "CRC" ascii
$setting_9 = "MXS" ascii
$setting_10 = "MNS" ascii
$setting_11 = "AWF" ascii
$setting_12 = "AWI" ascii
$setting_13 = "CHR" ascii
$setting_14 = "WLS" ascii
$setting_15 = "A_R_N" ascii
$setting_16 = "A_R_F" ascii
$setting_17 = "U_I" ascii
$setting_18 = "U_W_N" ascii
$setting_19 = "S_W_N" ascii
$setting_20 = "U_M_F" ascii
$setting_21 = "S_M_F" ascii
$setting_22 = "A_W_F" ascii
$setting_23 = "A_W_I" ascii
$setting_24 = "W_L_N" ascii
$setting_25 = "C_R_F" ascii
$setting_26 = "CH_R_F" ascii
$setting_27 = "S_R_N" ascii
condition:
$dex at 0 and (
any of ($c2_comm*) or
20 of ($sms_c2_cmd*) or
20 of ($ftp_c2_cmd*) or
20 of ($setting*)
)
} | — |
Threat ID: 682c7ad6e3e6de8ceb775699
Added to database: 5/20/2025, 12:51:34 PM
Last enriched: 6/19/2025, 2:32:35 PM
Last updated: 8/16/2025, 7:26:19 PM
Views: 13
Related Threats
ThreatFox IOCs for 2025-08-18
MediumCVE-2025-43733: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
LowCVE-2025-54234: Server-Side Request Forgery (SSRF) (CWE-918) in Adobe ColdFusion
LowCVE-2025-3639: CWE-288: Authentication Bypass Using an Alternate Path or Channel in Liferay Portal
LowThreatFox IOCs for 2025-08-17
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.