Multiple vulnerabilities in Qualcomm chipsets



Published: 2021-12-07
Risk High
Patch available YES
Number of vulnerabilities 28
CVE-ID CVE-2021-30270
CVE-2021-30293
CVE-2021-30283
CVE-2021-30282
CVE-2021-30279
CVE-2021-30278
CVE-2021-30274
CVE-2021-30273
CVE-2021-30272
CVE-2021-30271
CVE-2021-30269
CVE-2021-30351
CVE-2021-1918
CVE-2021-1894
CVE-2020-11263
CVE-2021-30276
CVE-2021-30275
CVE-2021-35093
CVE-2021-30348
CVE-2021-30298
CVE-2021-30337
CVE-2021-30335
CVE-2021-30289
CVE-2021-30268
CVE-2021-30267
CVE-2021-30303
CVE-2021-30336
CVE-2021-30262
CWE-ID CWE-476
CWE-617
CWE-129
CWE-284
CWE-200
CWE-190
CWE-119
CWE-264
CWE-400
CWE-416
CWE-121
Exploitation vector Network
Public exploit Public exploit code for vulnerability #12 is available.
Vulnerable software
Subscribe
APQ8009W
Mobile applications / Mobile firmware & hardware

APQ8064AU
Mobile applications / Mobile firmware & hardware

AR6003
Mobile applications / Mobile firmware & hardware

AR8031
Mobile applications / Mobile firmware & hardware

AR8035
Mobile applications / Mobile firmware & hardware

CSRA6620
Mobile applications / Mobile firmware & hardware

CSRA6640
Mobile applications / Mobile firmware & hardware

CSRB31024
Mobile applications / Mobile firmware & hardware

FSM10055
Mobile applications / Mobile firmware & hardware

FSM10056
Mobile applications / Mobile firmware & hardware

IPQ8070
Mobile applications / Mobile firmware & hardware

IPQ8070A
Mobile applications / Mobile firmware & hardware

IPQ8071
Mobile applications / Mobile firmware & hardware

IPQ8072
Mobile applications / Mobile firmware & hardware

IPQ8072A
Mobile applications / Mobile firmware & hardware

IPQ8074A
Mobile applications / Mobile firmware & hardware

IPQ8076A
Mobile applications / Mobile firmware & hardware

IPQ8078
Mobile applications / Mobile firmware & hardware

IPQ8078A
Mobile applications / Mobile firmware & hardware

MDM8207
Mobile applications / Mobile firmware & hardware

MDM8215
Mobile applications / Mobile firmware & hardware

MDM8215M
Mobile applications / Mobile firmware & hardware

MDM8615M
Mobile applications / Mobile firmware & hardware

MDM9205
Mobile applications / Mobile firmware & hardware

MDM9207
Mobile applications / Mobile firmware & hardware

MDM9215
Mobile applications / Mobile firmware & hardware

MDM9250
Mobile applications / Mobile firmware & hardware

MDM9310
Mobile applications / Mobile firmware & hardware

MDM9615
Mobile applications / Mobile firmware & hardware

MDM9615M
Mobile applications / Mobile firmware & hardware

MDM9628
Mobile applications / Mobile firmware & hardware

QCA2066
Mobile applications / Mobile firmware & hardware

QCA4004
Mobile applications / Mobile firmware & hardware

QCA6390
Mobile applications / Mobile firmware & hardware

QCA6391
Mobile applications / Mobile firmware & hardware

QCA6426
Mobile applications / Mobile firmware & hardware

QCA6428
Mobile applications / Mobile firmware & hardware

QCA6436
Mobile applications / Mobile firmware & hardware

QCA6438
Mobile applications / Mobile firmware & hardware

QCA6564
Mobile applications / Mobile firmware & hardware

QCA6564A
Mobile applications / Mobile firmware & hardware

QCA6564AU
Mobile applications / Mobile firmware & hardware

QCA6574
Mobile applications / Mobile firmware & hardware

QCA6574A
Mobile applications / Mobile firmware & hardware

QCA6584
Mobile applications / Mobile firmware & hardware

QCA6584AU
Mobile applications / Mobile firmware & hardware

QCA6595AU
Mobile applications / Mobile firmware & hardware

QCA6696
Mobile applications / Mobile firmware & hardware

QCA8081
Mobile applications / Mobile firmware & hardware

QCA9367
Mobile applications / Mobile firmware & hardware

QCA9889
Mobile applications / Mobile firmware & hardware

QCA9984
Mobile applications / Mobile firmware & hardware

QCM2290
Mobile applications / Mobile firmware & hardware

QCM4290
Mobile applications / Mobile firmware & hardware

QCM6490
Mobile applications / Mobile firmware & hardware

QCS2290
Mobile applications / Mobile firmware & hardware

QCS410
Mobile applications / Mobile firmware & hardware

QCS4290
Mobile applications / Mobile firmware & hardware

QCS603
Mobile applications / Mobile firmware & hardware

QCS610
Mobile applications / Mobile firmware & hardware

QCS6490
Mobile applications / Mobile firmware & hardware

QCX315
Mobile applications / Mobile firmware & hardware

QRB5165
Mobile applications / Mobile firmware & hardware

QRB5165N
Mobile applications / Mobile firmware & hardware

QSM8250
Mobile applications / Mobile firmware & hardware

QSW8573
Mobile applications / Mobile firmware & hardware

SA415M
Mobile applications / Mobile firmware & hardware

SA6145P
Mobile applications / Mobile firmware & hardware

SA6150P
Mobile applications / Mobile firmware & hardware

SA6155
Mobile applications / Mobile firmware & hardware

SA8145P
Mobile applications / Mobile firmware & hardware

SA8150P
Mobile applications / Mobile firmware & hardware

SA8155
Mobile applications / Mobile firmware & hardware

SA8155P
Mobile applications / Mobile firmware & hardware

SA8195P
Mobile applications / Mobile firmware & hardware

SD 675
Mobile applications / Mobile firmware & hardware

SD 8CX
Mobile applications / Mobile firmware & hardware

SD429
Mobile applications / Mobile firmware & hardware

SD460
Mobile applications / Mobile firmware & hardware

SD480
Mobile applications / Mobile firmware & hardware

SD662
Mobile applications / Mobile firmware & hardware

SD678
Mobile applications / Mobile firmware & hardware

SD690 5G
Mobile applications / Mobile firmware & hardware

SD720G
Mobile applications / Mobile firmware & hardware

SD750G
Mobile applications / Mobile firmware & hardware

SD765
Mobile applications / Mobile firmware & hardware

SD765G
Mobile applications / Mobile firmware & hardware

SD768G
Mobile applications / Mobile firmware & hardware

SD778G
Mobile applications / Mobile firmware & hardware

SD780G
Mobile applications / Mobile firmware & hardware

SD7c
Mobile applications / Mobile firmware & hardware

SD865 5G
Mobile applications / Mobile firmware & hardware

SD870
Mobile applications / Mobile firmware & hardware

SD888 5G
Mobile applications / Mobile firmware & hardware

SDA429W
Mobile applications / Mobile firmware & hardware

SDW2500
Mobile applications / Mobile firmware & hardware

SDX12
Mobile applications / Mobile firmware & hardware

SDX55M
Mobile applications / Mobile firmware & hardware

SDXR1
Mobile applications / Mobile firmware & hardware

SDXR2 5G
Mobile applications / Mobile firmware & hardware

SM6225
Mobile applications / Mobile firmware & hardware

SM6250
Mobile applications / Mobile firmware & hardware

SM6250P
Mobile applications / Mobile firmware & hardware

SM6375
Mobile applications / Mobile firmware & hardware

SM7250P
Mobile applications / Mobile firmware & hardware

SM7315
Mobile applications / Mobile firmware & hardware

SM7325P
Mobile applications / Mobile firmware & hardware

WCD9306
Mobile applications / Mobile firmware & hardware

WCD9330
Mobile applications / Mobile firmware & hardware

WCD9370
Mobile applications / Mobile firmware & hardware

WCD9375
Mobile applications / Mobile firmware & hardware

WCD9380
Mobile applications / Mobile firmware & hardware

WCD9385
Mobile applications / Mobile firmware & hardware

WCN3610
Mobile applications / Mobile firmware & hardware

WCN3620
Mobile applications / Mobile firmware & hardware

WCN3910
Mobile applications / Mobile firmware & hardware

WCN3950
Mobile applications / Mobile firmware & hardware

WCN3988
Mobile applications / Mobile firmware & hardware

WCN3991
Mobile applications / Mobile firmware & hardware

WCN3999
Mobile applications / Mobile firmware & hardware

WCN6740
Mobile applications / Mobile firmware & hardware

WCN6750
Mobile applications / Mobile firmware & hardware

WCN6850
Mobile applications / Mobile firmware & hardware

WCN6851
Mobile applications / Mobile firmware & hardware

WCN6855
Mobile applications / Mobile firmware & hardware

WCN6856
Mobile applications / Mobile firmware & hardware

WSA8830
Mobile applications / Mobile firmware & hardware

WSA8835
Mobile applications / Mobile firmware & hardware

QCA8337
Mobile applications / Mobile firmware & hardware

SDX65
Mobile applications / Mobile firmware & hardware

SM8450
Mobile applications / Mobile firmware & hardware

SM8450P
Mobile applications / Mobile firmware & hardware

WCD9340
Mobile applications / Mobile firmware & hardware

WCN3998
Mobile applications / Mobile firmware & hardware

WSA8810
Mobile applications / Mobile firmware & hardware

WSA8815
Mobile applications / Mobile firmware & hardware

CSR8811
Mobile applications / Mobile firmware & hardware

IPQ6000
Mobile applications / Mobile firmware & hardware

IPQ6005
Mobile applications / Mobile firmware & hardware

IPQ6010
Mobile applications / Mobile firmware & hardware

IPQ6018
Mobile applications / Mobile firmware & hardware

IPQ6028
Mobile applications / Mobile firmware & hardware

QCA8072
Mobile applications / Mobile firmware & hardware

QCA8075
Mobile applications / Mobile firmware & hardware

QCN5021
Mobile applications / Mobile firmware & hardware

QCN5022
Mobile applications / Mobile firmware & hardware

QCN5052
Mobile applications / Mobile firmware & hardware

QCN5121
Mobile applications / Mobile firmware & hardware

QCN5122
Mobile applications / Mobile firmware & hardware

QCN5152
Mobile applications / Mobile firmware & hardware

QCN6023
Mobile applications / Mobile firmware & hardware

QCN6024
Mobile applications / Mobile firmware & hardware

QCN9000
Mobile applications / Mobile firmware & hardware

QCN9022
Mobile applications / Mobile firmware & hardware

QCN9024
Mobile applications / Mobile firmware & hardware

QCN9070
Mobile applications / Mobile firmware & hardware

QCN9072
Mobile applications / Mobile firmware & hardware

QCN9074
Mobile applications / Mobile firmware & hardware

SA515M
Mobile applications / Mobile firmware & hardware

WCD9335
Mobile applications / Mobile firmware & hardware

SD660
Mobile applications / Mobile firmware & hardware

SDX57M
Mobile applications / Mobile firmware & hardware

WCD9341
Mobile applications / Mobile firmware & hardware

WCN3980
Mobile applications / Mobile firmware & hardware

WCN3990
Mobile applications / Mobile firmware & hardware

QET4101
Mobile applications / Mobile firmware & hardware

WCN3660B
Mobile applications / Mobile firmware & hardware

IPQ5010
Mobile applications / Mobile firmware & hardware

IPQ5018
Mobile applications / Mobile firmware & hardware

IPQ5028
Mobile applications / Mobile firmware & hardware

IPQ8071A
Mobile applications / Mobile firmware & hardware

IPQ8076
Mobile applications / Mobile firmware & hardware

IPQ8173
Mobile applications / Mobile firmware & hardware

IPQ8174
Mobile applications / Mobile firmware & hardware

PMP8074
Mobile applications / Mobile firmware & hardware

QCA1062
Mobile applications / Mobile firmware & hardware

QCA1064
Mobile applications / Mobile firmware & hardware

QCA4024
Mobile applications / Mobile firmware & hardware

QCA9888
Mobile applications / Mobile firmware & hardware

QCN5024
Mobile applications / Mobile firmware & hardware

QCN5054
Mobile applications / Mobile firmware & hardware

QCN5064
Mobile applications / Mobile firmware & hardware

QCN5124
Mobile applications / Mobile firmware & hardware

QCN5154
Mobile applications / Mobile firmware & hardware

QCN5164
Mobile applications / Mobile firmware & hardware

QCN5550
Mobile applications / Mobile firmware & hardware

QCN6122
Mobile applications / Mobile firmware & hardware

QCN7606
Mobile applications / Mobile firmware & hardware

QCN9012
Mobile applications / Mobile firmware & hardware

QCN9100
Mobile applications / Mobile firmware & hardware

SC8280XP
Mobile applications / Mobile firmware & hardware

MDM9635M
Mobile applications / Mobile firmware & hardware

MDM9645
Mobile applications / Mobile firmware & hardware

MDM9655
Mobile applications / Mobile firmware & hardware

QCA2062
Mobile applications / Mobile firmware & hardware

QCA2064
Mobile applications / Mobile firmware & hardware

QCA2065
Mobile applications / Mobile firmware & hardware

WCD9360
Mobile applications / Mobile firmware & hardware

AQT1000
Mobile applications / Mobile firmware & hardware

AR9380
Mobile applications / Mobile firmware & hardware

IPQ4018
Mobile applications / Mobile firmware & hardware

IPQ4028
Mobile applications / Mobile firmware & hardware

IPQ4029
Mobile applications / Mobile firmware & hardware

IPQ8065
Mobile applications / Mobile firmware & hardware

IPQ8068
Mobile applications / Mobile firmware & hardware

QCA7500
Mobile applications / Mobile firmware & hardware

QCA9880
Mobile applications / Mobile firmware & hardware

QCA9886
Mobile applications / Mobile firmware & hardware

QCA9898
Mobile applications / Mobile firmware & hardware

QCA9985
Mobile applications / Mobile firmware & hardware

QCA9990
Mobile applications / Mobile firmware & hardware

QCA9992
Mobile applications / Mobile firmware & hardware

QCA9994
Mobile applications / Mobile firmware & hardware

Qualcomm215
Mobile applications / Mobile firmware & hardware

WCD9326
Mobile applications / Mobile firmware & hardware

WCN3615
Mobile applications / Mobile firmware & hardware

WCN3680B
Mobile applications / Mobile firmware & hardware

QCA6175A
Mobile applications / Mobile firmware & hardware

QCA6420
Mobile applications / Mobile firmware & hardware

QCA6430
Mobile applications / Mobile firmware & hardware

AR7420
Mobile applications / Mobile firmware & hardware

IPQ8069
Mobile applications / Mobile firmware & hardware

QCA1023
Mobile applications / Mobile firmware & hardware

QCA4531
Mobile applications / Mobile firmware & hardware

QCA6320
Mobile applications / Mobile firmware & hardware

QCA7520
Mobile applications / Mobile firmware & hardware

QCA7550
Mobile applications / Mobile firmware & hardware

QCA9378
Mobile applications / Mobile firmware & hardware

QCA9561
Mobile applications / Mobile firmware & hardware

QCA9563
Mobile applications / Mobile firmware & hardware

QCA9882
Mobile applications / Mobile firmware & hardware

QCA9887
Mobile applications / Mobile firmware & hardware

QCA9896
Mobile applications / Mobile firmware & hardware

QCA9986
Mobile applications / Mobile firmware & hardware

QCA9987
Mobile applications / Mobile firmware & hardware

QCA9988
Mobile applications / Mobile firmware & hardware

QCN5501
Mobile applications / Mobile firmware & hardware

QCN5502
Mobile applications / Mobile firmware & hardware

APQ8017
Hardware solutions / Firmware

APQ8096AU
Hardware solutions / Firmware

IPQ8074
Hardware solutions / Firmware

MDM9150
Hardware solutions / Firmware

MDM9206
Hardware solutions / Firmware

MDM9607
Hardware solutions / Firmware

MDM9640
Hardware solutions / Firmware

MDM9650
Hardware solutions / Firmware

MSM8909W
Hardware solutions / Firmware

MSM8996AU
Hardware solutions / Firmware

QCA6174A
Hardware solutions / Firmware

QCA6574AU
Hardware solutions / Firmware

QCA9377
Hardware solutions / Firmware

QCS405
Hardware solutions / Firmware

QCS605
Hardware solutions / Firmware

SA6155P
Hardware solutions / Firmware

SD205
Hardware solutions / Firmware

SD210
Hardware solutions / Firmware

SD665
Hardware solutions / Firmware

SD675
Hardware solutions / Firmware

SD730
Hardware solutions / Firmware

SD850
Hardware solutions / Firmware

SD888
Hardware solutions / Firmware

SDM429W
Hardware solutions / Firmware

SDX20
Hardware solutions / Firmware

SDX24
Hardware solutions / Firmware

SDX55
Hardware solutions / Firmware

QCN6132
Hardware solutions / Firmware

QCN7605
Hardware solutions / Firmware

QCS8155
Hardware solutions / Firmware

SA8540P
Hardware solutions / Firmware

SA9000P
Hardware solutions / Firmware

APQ8009
Hardware solutions / Firmware

IPQ8064
Hardware solutions / Firmware

QCA9980
Hardware solutions / Firmware

SD845
Hardware solutions / Firmware

SD855
Hardware solutions / Firmware

CSR8510 A10
Hardware solutions / Firmware

CSR8811 A12
Hardware solutions / Firmware

QCA9379
Hardware solutions / Firmware

IPQ4019
Hardware solutions / Firmware

QCA9531
Hardware solutions / Firmware

QCA9558
Hardware solutions / Firmware

Vendor Qualcomm

Security Bulletin

This security bulletin contains information about 28 vulnerabilities.

1) NULL pointer dereference

EUVDB-ID: #VU58569

Risk: Low

CVSSv3.1: 7.3 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-30270

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local attacker to execute arbitrary code on the system.

The vulnerability exists due to a NULL pointer dereference error in Kernel. A local attacker can pass specially crafted data to the application and execute arbitrary code on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

APQ8009W: All versions

APQ8017: All versions

APQ8064AU: All versions

APQ8096AU: All versions

AR6003: All versions

AR8031: All versions

AR8035: All versions

CSRA6620: All versions

CSRA6640: All versions

CSRB31024: All versions

FSM10055: All versions

FSM10056: All versions

IPQ8070: All versions

IPQ8070A: All versions

IPQ8071: All versions

IPQ8072: All versions

IPQ8072A: All versions

IPQ8074: All versions

IPQ8074A: All versions

IPQ8076A: All versions

IPQ8078: All versions

IPQ8078A: All versions

MDM8207: All versions

MDM8215: All versions

MDM8215M: All versions

MDM8615M: All versions

MDM9150: All versions

MDM9205: All versions

MDM9206: All versions

MDM9207: All versions

MDM9215: All versions

MDM9250: All versions

MDM9310: All versions

MDM9607: All versions

MDM9615: All versions

MDM9615M: All versions

MDM9628: All versions

MDM9640: All versions

MDM9650: All versions

MSM8909W: All versions

MSM8996AU: All versions

QCA2066: All versions

QCA4004: All versions

QCA6174A: All versions

QCA6390: All versions

QCA6391: All versions

QCA6426: All versions

QCA6428: All versions

QCA6436: All versions

QCA6438: All versions

QCA6564: All versions

QCA6564A: All versions

QCA6564AU: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6584: All versions

QCA6584AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA8081: All versions

QCA9367: All versions

QCA9377: All versions

QCA9889: All versions

QCA9984: All versions

QCM2290: All versions

QCM4290: All versions

QCM6490: All versions

QCS2290: All versions

QCS405: All versions

QCS410: All versions

QCS4290: All versions

QCS603: All versions

QCS605: All versions

QCS610: All versions

QCS6490: All versions

QCX315: All versions

QRB5165: All versions

QRB5165N: All versions

QSM8250: All versions

QSW8573: All versions

SA415M: All versions

SA6145P: All versions

SA6150P: All versions

SA6155: All versions

SA6155P: All versions

SA8145P: All versions

SA8150P: All versions

SA8155: All versions

SA8155P: All versions

SA8195P: All versions

SD 675: All versions

SD 8CX: All versions

SD205: All versions

SD210: All versions

SD429: All versions

SD460: All versions

SD480: All versions

SD662: All versions

SD665: All versions

SD675: All versions

SD678: All versions

SD690 5G: All versions

SD720G: All versions

SD730: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD780G: All versions

SD7c: All versions

SD850: All versions

SD865 5G: All versions

SD870: All versions

SD888: All versions

SD888 5G: All versions

SDA429W: All versions

SDM429W: All versions

SDW2500: All versions

SDX12: All versions

SDX20: All versions

SDX24: All versions

SDX55: All versions

SDX55M: All versions

SDXR1: All versions

SDXR2 5G: All versions

SM6225: All versions

SM6250: All versions

SM6250P: All versions

SM6375: All versions

SM7250P: All versions

SM7315: All versions

SM7325P: All versions

WCD9306: All versions

WCD9330: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3610: All versions

WCN3620: All versions

WCN3910: All versions

WCN3950: All versions

WCN3988: All versions

WCN3991: All versions

WCN3999: All versions

WCN6740: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Reachable Assertion

EUVDB-ID: #VU58579

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-30293

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion in Modem. A remote attacker can cause a denial of service condition on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

AR6003: All versions

AR8035: All versions

CSRB31024: All versions

FSM10055: All versions

MDM9215: All versions

MDM9607: All versions

MDM9615: All versions

MDM9628: All versions

MDM9640: All versions

MDM9650: All versions

MSM8996AU: All versions

QCA6174A: All versions

QCA6390: All versions

QCA6391: All versions

QCA6426: All versions

QCA6436: All versions

QCA6564A: All versions

QCA6564AU: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6584AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA8081: All versions

QCA8337: All versions

QCA9377: All versions

QCS410: All versions

QCS603: All versions

QCS605: All versions

QCS610: All versions

QCX315: All versions

QRB5165: All versions

QRB5165N: All versions

QSM8250: All versions

SA415M: All versions

SD 675: All versions

SD205: All versions

SD210: All versions

SD480: All versions

SD675: All versions

SD678: All versions

SD690 5G: All versions

SD730: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD865 5G: All versions

SD870: All versions

SDX55: All versions

SDX55M: All versions

SDX65: All versions

SDXR1: All versions

SDXR2 5G: All versions

SM6375: All versions

SM7250P: All versions

SM8450: All versions

SM8450P: All versions

WCD9340: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3610: All versions

WCN3950: All versions

WCN3988: All versions

WCN3991: All versions

WCN3998: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Detection of Error Condition Without Action

EUVDB-ID: #VU58578

Risk: Low

CVSSv3.1: 6.2 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-30283

CWE-ID: N/A

Exploit availability: No

Description

The vulnerability allows a local attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper handling of debug register trap from user applications. A local attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

QCA6391: All versions

QCM6490: All versions

QCS6490: All versions

QRB5165: All versions

QRB5165N: All versions

SD778G: All versions

SD888 5G: All versions

SM7325P: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Improper Validation of Array Index

EUVDB-ID: #VU58577

Risk: Low

CVSSv3.1: 7.3 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-30282

CWE-ID: CWE-129 - Improper Validation of Array Index

Exploit availability: No

Description

The vulnerability allows a local attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error in Core. A local attacker can trigger out-of-bounds write and execute arbitrary code on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

AR8031: All versions

AR8035: All versions

CSR8811: All versions

CSRA6620: All versions

CSRA6640: All versions

CSRB31024: All versions

FSM10055: All versions

FSM10056: All versions

IPQ6000: All versions

IPQ6005: All versions

IPQ6010: All versions

IPQ6018: All versions

IPQ6028: All versions

MDM9150: All versions

MDM9205: All versions

QCA4004: All versions

QCA6174A: All versions

QCA6390: All versions

QCA6391: All versions

QCA6426: All versions

QCA6436: All versions

QCA6564: All versions

QCA6564A: All versions

QCA6564AU: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA8072: All versions

QCA8075: All versions

QCA8081: All versions

QCA8337: All versions

QCA9377: All versions

QCA9984: All versions

QCM2290: All versions

QCM4290: All versions

QCM6490: All versions

QCN5021: All versions

QCN5022: All versions

QCN5052: All versions

QCN5121: All versions

QCN5122: All versions

QCN5152: All versions

QCN6023: All versions

QCN6024: All versions

QCN9000: All versions

QCN9022: All versions

QCN9024: All versions

QCN9070: All versions

QCN9072: All versions

QCN9074: All versions

QCS2290: All versions

QCS405: All versions

QCS410: All versions

QCS4290: All versions

QCS603: All versions

QCS605: All versions

QCS610: All versions

QCS6490: All versions

QCX315: All versions

QRB5165: All versions

QRB5165N: All versions

QSM8250: All versions

SA415M: All versions

SA515M: All versions

SA6145P: All versions

SA6150P: All versions

SA6155: All versions

SA6155P: All versions

SA8145P: All versions

SA8150P: All versions

SA8155: All versions

SA8155P: All versions

SA8195P: All versions

SD 675: All versions

SD 8CX: All versions

SD460: All versions

SD480: All versions

SD662: All versions

SD665: All versions

SD675: All versions

SD678: All versions

SD690 5G: All versions

SD720G: All versions

SD730: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD7c: All versions

SD865 5G: All versions

SD870: All versions

SD888 5G: All versions

SDX24: All versions

SDX55: All versions

SDX55M: All versions

SDXR1: All versions

SDXR2 5G: All versions

SM6225: All versions

SM6250: All versions

SM6250P: All versions

SM6375: All versions

SM7250P: All versions

SM7325P: All versions

WCD9306: All versions

WCD9335: All versions

WCD9340: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3910: All versions

WCN3950: All versions

WCN3988: All versions

WCN3991: All versions

WCN3999: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Improper access control

EUVDB-ID: #VU58576

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-30279

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a local user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in Core. A local user can bypass implemented security restrictions and gain unauthorized access to the application.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

AR8035: All versions

QCA6390: All versions

QCA6391: All versions

QCA6426: All versions

QCA6436: All versions

QCA8337: All versions

QCA9984: All versions

QCM2290: All versions

QCM4290: All versions

QCM6490: All versions

QCS2290: All versions

QCS405: All versions

QCS4290: All versions

QCS6490: All versions

QCX315: All versions

QRB5165: All versions

QRB5165N: All versions

QSM8250: All versions

SD460: All versions

SD480: All versions

SD660: All versions

SD662: All versions

SD690 5G: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD865 5G: All versions

SD870: All versions

SD888 5G: All versions

SDX55: All versions

SDX55M: All versions

SDX57M: All versions

SDXR2 5G: All versions

SM6225: All versions

SM6375: All versions

SM7250P: All versions

SM7325P: All versions

WCD9335: All versions

WCD9341: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3910: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3990: All versions

WCN3991: All versions

WCN3998: All versions

WCN3999: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Information disclosure

EUVDB-ID: #VU58575

Risk: Low

CVSSv3.1: 6.2 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-30278

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local attacker to gain access to potentially sensitive information.

The vulnerability exists due to improper input validation in Core. A local attacker can gain unauthorized access to sensitive information on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

AR8031: All versions

AR8035: All versions

CSR8811: All versions

CSRA6620: All versions

CSRA6640: All versions

CSRB31024: All versions

FSM10055: All versions

FSM10056: All versions

IPQ6000: All versions

IPQ6005: All versions

IPQ6010: All versions

IPQ6018: All versions

IPQ6028: All versions

MDM9150: All versions

MDM9205: All versions

QCA4004: All versions

QCA6174A: All versions

QCA6390: All versions

QCA6391: All versions

QCA6426: All versions

QCA6436: All versions

QCA6564: All versions

QCA6564A: All versions

QCA6564AU: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA8072: All versions

QCA8075: All versions

QCA8081: All versions

QCA8337: All versions

QCA9377: All versions

QCA9984: All versions

QCM2290: All versions

QCM4290: All versions

QCM6490: All versions

QCN5021: All versions

QCN5022: All versions

QCN5052: All versions

QCN5121: All versions

QCN5122: All versions

QCN5152: All versions

QCN6023: All versions

QCN6024: All versions

QCN9000: All versions

QCN9022: All versions

QCN9024: All versions

QCN9070: All versions

QCN9072: All versions

QCN9074: All versions

QCS2290: All versions

QCS405: All versions

QCS410: All versions

QCS4290: All versions

QCS610: All versions

QCS6490: All versions

QCX315: All versions

QRB5165: All versions

QRB5165N: All versions

QSM8250: All versions

SA415M: All versions

SA515M: All versions

SA6145P: All versions

SA6150P: All versions

SA6155: All versions

SA6155P: All versions

SA8145P: All versions

SA8150P: All versions

SA8155: All versions

SA8155P: All versions

SA8195P: All versions

SD 675: All versions

SD 8CX: All versions

SD460: All versions

SD480: All versions

SD660: All versions

SD662: All versions

SD665: All versions

SD675: All versions

SD678: All versions

SD690 5G: All versions

SD720G: All versions

SD730: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD7c: All versions

SD850: All versions

SD865 5G: All versions

SD870: All versions

SD888 5G: All versions

SDX24: All versions

SDX55: All versions

SDX55M: All versions

SDXR2 5G: All versions

SM6225: All versions

SM6250: All versions

SM6250P: All versions

SM6375: All versions

SM7250P: All versions

SM7325P: All versions

WCD9306: All versions

WCD9335: All versions

WCD9340: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3910: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3990: All versions

WCN3991: All versions

WCN3999: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Integer overflow

EUVDB-ID: #VU58574

Risk: Low

CVSSv3.1: 7.3 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-30274

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in Core. A local attacker can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

AR8031: All versions

AR8035: All versions

CSR8811: All versions

CSRA6620: All versions

CSRA6640: All versions

CSRB31024: All versions

FSM10055: All versions

FSM10056: All versions

IPQ6000: All versions

IPQ6005: All versions

IPQ6010: All versions

IPQ6018: All versions

IPQ6028: All versions

MDM9150: All versions

MDM9205: All versions

QCA4004: All versions

QCA6174A: All versions

QCA6390: All versions

QCA6391: All versions

QCA6426: All versions

QCA6436: All versions

QCA6564: All versions

QCA6564A: All versions

QCA6564AU: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA8072: All versions

QCA8075: All versions

QCA8081: All versions

QCA8337: All versions

QCA9377: All versions

QCA9984: All versions

QCM2290: All versions

QCM4290: All versions

QCM6490: All versions

QCN5021: All versions

QCN5022: All versions

QCN5052: All versions

QCN5121: All versions

QCN5122: All versions

QCN5152: All versions

QCN6023: All versions

QCN6024: All versions

QCN9000: All versions

QCN9022: All versions

QCN9024: All versions

QCN9070: All versions

QCN9072: All versions

QCN9074: All versions

QCS2290: All versions

QCS405: All versions

QCS410: All versions

QCS4290: All versions

QCS610: All versions

QCS6490: All versions

QCX315: All versions

QRB5165: All versions

QRB5165N: All versions

QSM8250: All versions

SA415M: All versions

SA515M: All versions

SA6145P: All versions

SA6150P: All versions

SA6155: All versions

SA6155P: All versions

SA8145P: All versions

SA8150P: All versions

SA8155: All versions

SA8155P: All versions

SA8195P: All versions

SD 675: All versions

SD 8CX: All versions

SD460: All versions

SD480: All versions

SD660: All versions

SD662: All versions

SD665: All versions

SD675: All versions

SD678: All versions

SD690 5G: All versions

SD720G: All versions

SD730: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD7c: All versions

SD865 5G: All versions

SD870: All versions

SD888 5G: All versions

SDX24: All versions

SDX55: All versions

SDX55M: All versions

SDX57M: All versions

SDXR2 5G: All versions

SM6225: All versions

SM6250: All versions

SM6250P: All versions

SM6375: All versions

SM7250P: All versions

SM7325P: All versions

WCD9306: All versions

WCD9335: All versions

WCD9340: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3910: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3990: All versions

WCN3991: All versions

WCN3999: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Reachable Assertion

EUVDB-ID: #VU58573

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-30273

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion in Data Modem. A remote attacker can cause a denial of service condition on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

APQ8009W: All versions

APQ8096AU: All versions

AR6003: All versions

CSRB31024: All versions

MDM8207: All versions

MDM9205: All versions

MDM9206: All versions

MDM9207: All versions

MDM9215: All versions

MDM9250: All versions

MDM9607: All versions

MDM9615: All versions

MDM9628: All versions

MDM9640: All versions

MDM9650: All versions

MSM8909W: All versions

MSM8996AU: All versions

QCA4004: All versions

QCA6174A: All versions

QCA6564A: All versions

QCA6564AU: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6584: All versions

QCA6584AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA9367: All versions

QCA9377: All versions

QCS410: All versions

QCS610: All versions

QET4101: All versions

QSW8573: All versions

SA415M: All versions

SA6145P: All versions

SA6150P: All versions

SA6155P: All versions

SA8145P: All versions

SA8150P: All versions

SA8155P: All versions

SA8195P: All versions

SD 675: All versions

SD 8CX: All versions

SD205: All versions

SD210: All versions

SD429: All versions

SD665: All versions

SD675: All versions

SD678: All versions

SD720G: All versions

SD730: All versions

SDA429W: All versions

SDM429W: All versions

SDW2500: All versions

SDX20: All versions

SDX24: All versions

SM6250: All versions

SM6250P: All versions

WCD9306: All versions

WCD9330: All versions

WCD9335: All versions

WCD9340: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCN3610: All versions

WCN3620: All versions

WCN3660B: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3990: All versions

WCN3991: All versions

External links

http://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) NULL pointer dereference

EUVDB-ID: #VU58572

Risk: Low

CVSSv3.1: 7.3 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-30272

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local attacker to execute arbitrary code on the system.

The vulnerability exists due to a NULL pointer dereference error in Kernel. A local attacker can pass specially crafted data to the application and execute arbitrary code on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

APQ8009W: All versions

APQ8017: All versions

APQ8096AU: All versions

AR8031: All versions

AR8035: All versions

CSR8811: All versions

CSRA6620: All versions

CSRA6640: All versions

CSRB31024: All versions

FSM10055: All versions

FSM10056: All versions

IPQ5010: All versions

IPQ5018: All versions

IPQ5028: All versions

IPQ6000: All versions

IPQ6005: All versions

IPQ6010: All versions

IPQ6018: All versions

IPQ6028: All versions

IPQ8070: All versions

IPQ8070A: All versions

IPQ8071: All versions

IPQ8071A: All versions

IPQ8072: All versions

IPQ8072A: All versions

IPQ8074: All versions

IPQ8074A: All versions

IPQ8076: All versions

IPQ8076A: All versions

IPQ8078: All versions

IPQ8078A: All versions

IPQ8173: All versions

IPQ8174: All versions

MDM8207: All versions

MDM9150: All versions

MDM9205: All versions

MDM9206: All versions

MDM9207: All versions

MDM9607: All versions

MDM9628: All versions

MDM9640: All versions

MDM9650: All versions

MSM8909W: All versions

MSM8996AU: All versions

PMP8074: All versions

QCA1062: All versions

QCA1064: All versions

QCA4004: All versions

QCA4024: All versions

QCA6174A: All versions

QCA6390: All versions

QCA6391: All versions

QCA6426: All versions

QCA6428: All versions

QCA6436: All versions

QCA6438: All versions

QCA6564: All versions

QCA6564A: All versions

QCA6564AU: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6584: All versions

QCA6584AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA8072: All versions

QCA8075: All versions

QCA8081: All versions

QCA8337: All versions

QCA9367: All versions

QCA9377: All versions

QCA9888: All versions

QCA9889: All versions

QCA9984: All versions

QCM2290: All versions

QCM4290: All versions

QCM6490: All versions

QCN5021: All versions

QCN5022: All versions

QCN5024: All versions

QCN5052: All versions

QCN5054: All versions

QCN5064: All versions

QCN5121: All versions

QCN5122: All versions

QCN5124: All versions

QCN5152: All versions

QCN5154: All versions

QCN5164: All versions

QCN5550: All versions

QCN6023: All versions

QCN6024: All versions

QCN6122: All versions

QCN6132: All versions

QCN7605: All versions

QCN7606: All versions

QCN9000: All versions

QCN9012: All versions

QCN9022: All versions

QCN9024: All versions

QCN9070: All versions

QCN9072: All versions

QCN9074: All versions

QCN9100: All versions

QCS2290: All versions

QCS405: All versions

QCS410: All versions

QCS4290: All versions

QCS603: All versions

QCS605: All versions

QCS610: All versions

QCS6490: All versions

QCX315: All versions

QRB5165: All versions

QRB5165N: All versions

QSW8573: All versions

SA415M: All versions

SA515M: All versions

SA6145P: All versions

SA6150P: All versions

SA6155: All versions

SA6155P: All versions

SA8145P: All versions

SA8150P: All versions

SA8155: All versions

SA8155P: All versions

SA8195P: All versions

SC8280XP: All versions

SD 675: All versions

SD 8CX: All versions

SD205: All versions

SD210: All versions

SD429: All versions

SD460: All versions

SD480: All versions

SD662: All versions

SD665: All versions

SD675: All versions

SD678: All versions

SD690 5G: All versions

SD720G: All versions

SD730: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD780G: All versions

SD7c: All versions

SD850: All versions

SD865 5G: All versions

SD870: All versions

SD888: All versions

SD888 5G: All versions

SDA429W: All versions

SDM429W: All versions

SDW2500: All versions

SDX12: All versions

SDX20: All versions

SDX24: All versions

SDX55: All versions

SDX55M: All versions

SDX65: All versions

SDXR1: All versions

SDXR2 5G: All versions

SM6225: All versions

SM6250: All versions

SM6250P: All versions

SM6375: All versions

SM7250P: All versions

SM7315: All versions

SM7325P: All versions

SM8450: All versions

SM8450P: All versions

WCD9306: All versions

WCD9330: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3610: All versions

WCN3620: All versions

WCN3910: All versions

WCN3950: All versions

WCN3988: All versions

WCN3991: All versions

WCN3999: All versions

WCN6740: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) NULL pointer dereference

EUVDB-ID: #VU58570

Risk: Low

CVSSv3.1: 7.3 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-30271

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local attacker to execute arbitrary code on the system.

The vulnerability exists due to a NULL pointer dereference error in Kernel. A local attacker can pass specially crafted data to the application and execute arbitrary code on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

APQ8009W: All versions

APQ8017: All versions

APQ8096AU: All versions

AR8031: All versions

AR8035: All versions

CSR8811: All versions

CSRA6620: All versions

CSRA6640: All versions

CSRB31024: All versions

FSM10055: All versions

FSM10056: All versions

IPQ5010: All versions

IPQ5018: All versions

IPQ5028: All versions

IPQ6010: All versions

IPQ6018: All versions

IPQ6028: All versions

IPQ8070A: All versions

IPQ8071A: All versions

IPQ8072A: All versions

IPQ8074A: All versions

IPQ8076: All versions

IPQ8076A: All versions

IPQ8078: All versions

IPQ8078A: All versions

IPQ8173: All versions

IPQ8174: All versions

MDM8207: All versions

MDM9150: All versions

MDM9205: All versions

MDM9206: All versions

MDM9207: All versions

MDM9250: All versions

MDM9607: All versions

MDM9628: All versions

MDM9635M: All versions

MDM9640: All versions

MDM9645: All versions

MDM9650: All versions

MDM9655: All versions

MSM8909W: All versions

MSM8996AU: All versions

QCA2062: All versions

QCA2064: All versions

QCA2065: All versions

QCA2066: All versions

QCA4004: All versions

QCA4024: All versions

QCA6174A: All versions

QCA6390: All versions

QCA6391: All versions

QCA6564: All versions

QCA6564A: All versions

QCA6564AU: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6584: All versions

QCA6584AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA8075: All versions

QCA8081: All versions

QCA8337: All versions

QCA9367: All versions

QCA9377: All versions

QCA9888: All versions

QCA9889: All versions

QCA9984: All versions

QCN5022: All versions

QCN5024: All versions

QCN5052: All versions

QCN5122: All versions

QCN5124: All versions

QCN5152: All versions

QCN5154: All versions

QCN5164: All versions

QCN6023: All versions

QCN6024: All versions

QCN6122: All versions

QCN6132: All versions

QCN7605: All versions

QCN7606: All versions

QCN9022: All versions

QCN9024: All versions

QCN9070: All versions

QCN9072: All versions

QCN9074: All versions

QCS405: All versions

QCS410: All versions

QCS603: All versions

QCS605: All versions

QCS610: All versions

QCX315: All versions

QSW8573: All versions

SA415M: All versions

SA515M: All versions

SA6145P: All versions

SA6150P: All versions

SA6155: All versions

SA6155P: All versions

SA8145P: All versions

SA8150P: All versions

SA8155: All versions

SA8155P: All versions

SA8195P: All versions

SC8280XP: All versions

SD 675: All versions

SD 8CX: All versions

SD205: All versions

SD210: All versions

SD429: All versions

SD460: All versions

SD480: All versions

SD662: All versions

SD665: All versions

SD675: All versions

SD678: All versions

SD690 5G: All versions

SD720G: All versions

SD730: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD7c: All versions

SD850: All versions

SD865 5G: All versions

SD870: All versions

SD888: All versions

SD888 5G: All versions

SDA429W: All versions

SDM429W: All versions

SDW2500: All versions

SDX12: All versions

SDX20: All versions

SDX24: All versions

SDX55: All versions

SDX55M: All versions

SDX65: All versions

SDXR1: All versions

SM6225: All versions

SM6250: All versions

SM6250P: All versions

SM6375: All versions

SM7250P: All versions

SM8450: All versions

SM8450P: All versions

WCD9306: All versions

WCD9330: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3610: All versions

WCN3620: All versions

WCN3950: All versions

WCN3988: All versions

WCN3991: All versions

WCN3999: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) NULL pointer dereference

EUVDB-ID: #VU58568

Risk: Low

CVSSv3.1: 7.3 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-30269

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local attacker to execute arbitrary code on the system.

The vulnerability exists due to a NULL pointer dereference error in Kernel. A local attacker can pass specially crafted data to the application and execute arbitrary code on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

AR8031: All versions

AR8035: All versions

CSRA6620: All versions

CSRA6640: All versions

CSRB31024: All versions

FSM10055: All versions

FSM10056: All versions

MDM9150: All versions

MDM9205: All versions

QCA2066: All versions

QCA4004: All versions

QCA6174A: All versions

QCA6390: All versions

QCA6391: All versions

QCA6426: All versions

QCA6436: All versions

QCA6564: All versions

QCA6564A: All versions

QCA6564AU: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA8081: All versions

QCA8337: All versions

QCA9377: All versions

QCA9984: All versions

QCM2290: All versions

QCM4290: All versions

QCM6490: All versions

QCN7605: All versions

QCN7606: All versions

QCS2290: All versions

QCS405: All versions

QCS410: All versions

QCS4290: All versions

QCS603: All versions

QCS605: All versions

QCS610: All versions

QCS6490: All versions

QCS8155: All versions

QCX315: All versions

QRB5165: All versions

QRB5165N: All versions

QSM8250: All versions

SA415M: All versions

SA515M: All versions

SA6145P: All versions

SA6150P: All versions

SA6155: All versions

SA6155P: All versions

SA8145P: All versions

SA8150P: All versions

SA8155: All versions

SA8155P: All versions

SA8195P: All versions

SA8540P: All versions

SA9000P: All versions

SC8280XP: All versions

SD 675: All versions

SD 8CX: All versions

SD460: All versions

SD480: All versions

SD662: All versions

SD665: All versions

SD675: All versions

SD678: All versions

SD690 5G: All versions

SD720G: All versions

SD730: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD780G: All versions

SD7c: All versions

SD850: All versions

SD865 5G: All versions

SD870: All versions

SD888: All versions

SD888 5G: All versions

SDX24: All versions

SDX55: All versions

SDX55M: All versions

SDX65: All versions

SDXR1: All versions

SDXR2 5G: All versions

SM6225: All versions

SM6250: All versions

SM6250P: All versions

SM6375: All versions

SM7250P: All versions

SM7315: All versions

SM7325P: All versions

SM8450: All versions

SM8450P: All versions

WCD9306: All versions

WCD9360: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3910: All versions

WCN3950: All versions

WCN3988: All versions

WCN3991: All versions

WCN3999: All versions

WCN6740: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Buffer overflow

EUVDB-ID: #VU58554

Risk: High

CVSSv3.1: 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2021-30351

CWE-ID: CWE-119 - Memory corruption

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in Audio. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

APQ8009: All versions

APQ8009W: All versions

APQ8017: All versions

AQT1000: All versions

AR8031: All versions

AR8035: All versions

AR9380: All versions

CSR8811: All versions

CSRA6620: All versions

CSRA6640: All versions

CSRB31024: All versions

FSM10055: All versions

FSM10056: All versions

IPQ4018: All versions

IPQ4028: All versions

IPQ4029: All versions

IPQ6000: All versions

IPQ6010: All versions

IPQ6018: All versions

IPQ6028: All versions

IPQ8064: All versions

IPQ8065: All versions

IPQ8068: All versions

IPQ8070: All versions

IPQ8070A: All versions

IPQ8071: All versions

IPQ8071A: All versions

IPQ8072: All versions

IPQ8072A: All versions

IPQ8074: All versions

IPQ8074A: All versions

IPQ8076: All versions

IPQ8076A: All versions

IPQ8078A: All versions

IPQ8173: All versions

IPQ8174: All versions

MDM9150: All versions

MDM9206: All versions

MDM9250: All versions

MDM9607: All versions

MDM9628: All versions

MSM8909W: All versions

MSM8996AU: All versions

QCA4024: All versions

QCA6174A: All versions

QCA6390: All versions

QCA6391: All versions

QCA6426: All versions

QCA6428: All versions

QCA6436: All versions

QCA6438: All versions

QCA6564: All versions

QCA6564A: All versions

QCA6564AU: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6584AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA7500: All versions

QCA8075: All versions

QCA8081: All versions

QCA8337: All versions

QCA9367: All versions

QCA9377: All versions

QCA9880: All versions

QCA9886: All versions

QCA9888: All versions

QCA9889: All versions

QCA9898: All versions

QCA9980: All versions

QCA9984: All versions

QCA9985: All versions

QCA9990: All versions

QCA9992: All versions

QCA9994: All versions

QCM2290: All versions

QCM4290: All versions

QCM6490: All versions

QCN5022: All versions

QCN5024: All versions

QCN5052: All versions

QCN5064: All versions

QCN5122: All versions

QCN5124: All versions

QCN5152: All versions

QCN5164: All versions

QCN5550: All versions

QCN9000: All versions

QCN9074: All versions

QCS2290: All versions

QCS405: All versions

QCS410: All versions

QCS4290: All versions

QCS603: All versions

QCS605: All versions

QCS610: All versions

QCS6490: All versions

QCX315: All versions

QET4101: All versions

QRB5165: All versions

QRB5165N: All versions

QSM8250: All versions

QSW8573: All versions

Qualcomm215: All versions

SA415M: All versions

SA515M: All versions

SA6145P: All versions

SA6150P: All versions

SA6155: All versions

SA6155P: All versions

SA8145P: All versions

SA8150P: All versions

SA8155: All versions

SA8155P: All versions

SA8195P: All versions

SD 675: All versions

SD205: All versions

SD210: All versions

SD429: All versions

SD460: All versions

SD480: All versions

SD660: All versions

SD662: All versions

SD665: All versions

SD675: All versions

SD678: All versions

SD690 5G: All versions

SD720G: All versions

SD730: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD780G: All versions

SD845: All versions

SD855: All versions

SD865 5G: All versions

SD870: All versions

SD888: All versions

SD888 5G: All versions

SDA429W: All versions

SDM429W: All versions

SDW2500: All versions

SDX12: All versions

SDX20: All versions

SDX24: All versions

SDX55: All versions

SDX55M: All versions

SDX65: All versions

SDXR1: All versions

SDXR2 5G: All versions

SM6225: All versions

SM6250: All versions

SM6250P: All versions

SM6375: All versions

SM7250P: All versions

SM7315: All versions

SM7325P: All versions

SM8450: All versions

SM8450P: All versions

WCD9326: All versions

WCD9330: All versions

WCD9335: All versions

WCD9340: All versions

WCD9341: All versions

WCD9360: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3610: All versions

WCN3615: All versions

WCN3620: All versions

WCN3660B: All versions

WCN3680B: All versions

WCN3910: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3990: All versions

WCN3991: All versions

WCN3998: All versions

WCN3999: All versions

WCN6740: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

13) Information disclosure

EUVDB-ID: #VU58567

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-1918

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application in Kernel. A local user can gain unauthorized access to sensitive information on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

QCA6391: All versions

QCM6490: All versions

QCS6490: All versions

QRB5165: All versions

QRB5165N: All versions

SD690 5G: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD888 5G: All versions

SM7250P: All versions

SM7325P: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3988: All versions

WCN3991: All versions

WCN3998: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU58566

Risk: Low

CVSSv3.1: 6.2 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-1894

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in TrustZone, which leads to security restrictions bypass and privilege escalation.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

AR8031: All versions

AR8035: All versions

CSRA6620: All versions

CSRA6640: All versions

CSRB31024: All versions

FSM10055: All versions

FSM10056: All versions

MDM9150: All versions

MDM9205: All versions

MDM9628: All versions

QCA4004: All versions

QCA6174A: All versions

QCA6390: All versions

QCA6391: All versions

QCA6426: All versions

QCA6436: All versions

QCA6564: All versions

QCA6564A: All versions

QCA6564AU: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA8081: All versions

QCA8337: All versions

QCA9367: All versions

QCA9377: All versions

QCA9984: All versions

QCM2290: All versions

QCM4290: All versions

QCM6490: All versions

QCS2290: All versions

QCS405: All versions

QCS410: All versions

QCS4290: All versions

QCS610: All versions

QCS6490: All versions

QCS8155: All versions

QCX315: All versions

QRB5165: All versions

QRB5165N: All versions

QSM8250: All versions

SA415M: All versions

SA515M: All versions

SA6145P: All versions

SA6150P: All versions

SA6155: All versions

SA6155P: All versions

SA8145P: All versions

SA8150P: All versions

SA8155: All versions

SA8155P: All versions

SA8195P: All versions

SA8540P: All versions

SA9000P: All versions

SC8280XP: All versions

SD 675: All versions

SD 8CX: All versions

SD460: All versions

SD480: All versions

SD662: All versions

SD665: All versions

SD675: All versions

SD678: All versions

SD690 5G: All versions

SD720G: All versions

SD730: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD780G: All versions

SD7c: All versions

SD850: All versions

SD865 5G: All versions

SD870: All versions

SD888: All versions

SD888 5G: All versions

SDX24: All versions

SDX55: All versions

SDX55M: All versions

SDX65: All versions

SDXR1: All versions

SDXR2 5G: All versions

SM6225: All versions

SM6250: All versions

SM6250P: All versions

SM6375: All versions

SM7250P: All versions

SM7315: All versions

SM7325P: All versions

SM8450: All versions

SM8450P: All versions

WCD9306: All versions

WCD9330: All versions

WCD9335: All versions

WCD9340: All versions

WCD9360: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3910: All versions

WCN3950: All versions

WCN3988: All versions

WCN3991: All versions

WCN3999: All versions

WCN6740: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Integer overflow

EUVDB-ID: #VU58565

Risk: Low

CVSSv3.1: 7.1 [CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-11263

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in Core. A local administrator can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

AR8035: All versions

QCA6390: All versions

QCA6391: All versions

QCA6426: All versions

QCA6436: All versions

QCA8337: All versions

QCA9984: All versions

QCM2290: All versions

QCM4290: All versions

QCS2290: All versions

QCS405: All versions

QCS410: All versions

QCS4290: All versions

QCS610: All versions

QCX315: All versions

QRB5165: All versions

QRB5165N: All versions

QSM8250: All versions

SD 675: All versions

SD460: All versions

SD480: All versions

SD662: All versions

SD675: All versions

SD678: All versions

SD690 5G: All versions

SD720G: All versions

SD730: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD7c: All versions

SD865 5G: All versions

SD870: All versions

SDX55: All versions

SDX55M: All versions

SDXR2 5G: All versions

SM6225: All versions

SM6250: All versions

SM6250P: All versions

SM6375: All versions

SM7250P: All versions

WCD9341: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3910: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3990: All versions

WCN3991: All versions

WCN3998: All versions

WCN3999: All versions

WCN6850: All versions

WCN6851: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Improper access control

EUVDB-ID: #VU58564

Risk: Low

CVSSv3.1: 8.1 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-30276

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a local attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in Core. A local attacker can bypass implemented security restrictions and gain unauthorized access to the application.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

AR8035: All versions

QCA6390: All versions

QCA6391: All versions

QCA6426: All versions

QCA6436: All versions

QCA8337: All versions

QCA9984: All versions

QCM2290: All versions

QCM4290: All versions

QCM6490: All versions

QCS2290: All versions

QCS405: All versions

QCS4290: All versions

QCS6490: All versions

QCX315: All versions

QRB5165: All versions

QRB5165N: All versions

QSM8250: All versions

SD460: All versions

SD480: All versions

SD660: All versions

SD662: All versions

SD690 5G: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD865 5G: All versions

SD870: All versions

SD888 5G: All versions

SDX55: All versions

SDX55M: All versions

SDX57M: All versions

SDXR2 5G: All versions

SM6225: All versions

SM6375: All versions

SM7250P: All versions

SM7325P: All versions

WCD9335: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3910: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3990: All versions

WCN3991: All versions

WCN3999: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Integer overflow

EUVDB-ID: #VU58563

Risk: Low

CVSSv3.1: 8.1 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-30275

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in Core. A local attacker can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

AR8031: All versions

AR8035: All versions

CSR8811: All versions

CSRA6620: All versions

CSRA6640: All versions

CSRB31024: All versions

FSM10055: All versions

FSM10056: All versions

IPQ6000: All versions

IPQ6005: All versions

IPQ6010: All versions

IPQ6018: All versions

IPQ6028: All versions

MDM9150: All versions

MDM9205: All versions

QCA4004: All versions

QCA6174A: All versions

QCA6390: All versions

QCA6391: All versions

QCA6426: All versions

QCA6436: All versions

QCA6564: All versions

QCA6564A: All versions

QCA6564AU: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA8072: All versions

QCA8075: All versions

QCA8081: All versions

QCA8337: All versions

QCA9377: All versions

QCA9984: All versions

QCM2290: All versions

QCM4290: All versions

QCM6490: All versions

QCN5021: All versions

QCN5022: All versions

QCN5052: All versions

QCN5121: All versions

QCN5122: All versions

QCN5152: All versions

QCN6023: All versions

QCN6024: All versions

QCN9000: All versions

QCN9022: All versions

QCN9024: All versions

QCN9070: All versions

QCN9072: All versions

QCN9074: All versions

QCS2290: All versions

QCS405: All versions

QCS410: All versions

QCS4290: All versions

QCS610: All versions

QCS6490: All versions

QCX315: All versions

QRB5165: All versions

QRB5165N: All versions

QSM8250: All versions

SA415M: All versions

SA515M: All versions

SA6145P: All versions

SA6150P: All versions

SA6155: All versions

SA6155P: All versions

SA8145P: All versions

SA8150P: All versions

SA8155: All versions

SA8155P: All versions

SA8195P: All versions

SD 675: All versions

SD 8CX: All versions

SD460: All versions

SD480: All versions

SD660: All versions

SD662: All versions

SD665: All versions

SD675: All versions

SD678: All versions

SD690 5G: All versions

SD720G: All versions

SD730: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD7c: All versions

SD850: All versions

SD865 5G: All versions

SD870: All versions

SD888 5G: All versions

SDX24: All versions

SDX55: All versions

SDX55M: All versions

SDX57M: All versions

SDXR2 5G: All versions

SM6225: All versions

SM6250: All versions

SM6250P: All versions

SM6375: All versions

SM7250P: All versions

SM7325P: All versions

WCD9306: All versions

WCD9335: All versions

WCD9340: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3910: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3990: All versions

WCN3991: All versions

WCN3999: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Buffer overflow

EUVDB-ID: #VU58562

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-35093

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in Bluetooth Controller Firmware. A remote attacker on the local network can trigger memory corruption and cause a denial of service condition on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

CSR8510 A10: All versions

CSR8811 A12: All versions

External links

http://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Resource exhaustion

EUVDB-ID: #VU58561

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-30348

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources in Bluetooth. A remote attacker on the local network can trigger resource exhaustion and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

APQ8009: All versions

APQ8017: All versions

APQ8064AU: All versions

APQ8096AU: All versions

AQT1000: All versions

AR8031: All versions

AR8035: All versions

CSRA6620: All versions

CSRA6640: All versions

CSRB31024: All versions

MDM9250: All versions

MDM9607: All versions

MDM9628: All versions

MDM9640: All versions

MDM9650: All versions

MSM8996AU: All versions

QCA1062: All versions

QCA1064: All versions

QCA2062: All versions

QCA2064: All versions

QCA2065: All versions

QCA2066: All versions

QCA6174A: All versions

QCA6175A: All versions

QCA6390: All versions

QCA6391: All versions

QCA6420: All versions

QCA6426: All versions

QCA6430: All versions

QCA6436: All versions

QCA6564: All versions

QCA6564A: All versions

QCA6564AU: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6584: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA8081: All versions

QCA8337: All versions

QCA9377: All versions

QCA9379: All versions

QCA9886: All versions

QCM2290: All versions

QCM4290: All versions

QCM6490: All versions

QCN7605: All versions

QCN7606: All versions

QCS2290: All versions

QCS405: All versions

QCS410: All versions

QCS4290: All versions

QCS603: All versions

QCS605: All versions

QCS610: All versions

QCS6490: All versions

QCX315: All versions

QRB5165: All versions

QRB5165N: All versions

SA415M: All versions

SA515M: All versions

SA6145P: All versions

SA6150P: All versions

SA6155: All versions

SA6155P: All versions

SA8145P: All versions

SA8150P: All versions

SA8155: All versions

SA8155P: All versions

SA8195P: All versions

SC8280XP: All versions

SD 675: All versions

SD 8CX: All versions

SD460: All versions

SD480: All versions

SD660: All versions

SD662: All versions

SD665: All versions

SD675: All versions

SD678: All versions

SD690 5G: All versions

SD720G: All versions

SD730: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD780G: All versions

SD7c: All versions

SD845: All versions

SD850: All versions

SD855: All versions

SD865 5G: All versions

SD870: All versions

SD888: All versions

SD888 5G: All versions

SDX55: All versions

SDX55M: All versions

SDX65: All versions

SDXR1: All versions

SDXR2 5G: All versions

SM6225: All versions

SM6250: All versions

SM6250P: All versions

SM6375: All versions

SM7250P: All versions

SM7315: All versions

SM7325P: All versions

SM8450: All versions

SM8450P: All versions

WCD9326: All versions

WCD9335: All versions

WCD9340: All versions

WCD9341: All versions

WCD9360: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3610: All versions

WCN3660B: All versions

WCN3910: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3990: All versions

WCN3991: All versions

WCN3998: All versions

WCN3999: All versions

WCN6740: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Buffer overflow

EUVDB-ID: #VU58560

Risk: Low

CVSSv3.1: 5.8 [CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-30298

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in DIAG Services. A local administrator can trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

AR8031: All versions

AR8035: All versions

CSRA6620: All versions

CSRA6640: All versions

FSM10055: All versions

FSM10056: All versions

IPQ8072A: All versions

IPQ8074A: All versions

IPQ8076A: All versions

MDM9150: All versions

QCA6390: All versions

QCA6391: All versions

QCA6574AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA8337: All versions

QCN9000: All versions

QCN9074: All versions

QCS405: All versions

QCS410: All versions

QCS610: All versions

QRB5165: All versions

QRB5165N: All versions

Qualcomm215: All versions

SA8155P: All versions

SD205: All versions

SD210: All versions

SD460: All versions

SD662: All versions

SD665: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD865 5G: All versions

SD870: All versions

SDA429W: All versions

SDX55: All versions

SDX55M: All versions

SM7250P: All versions

WCD9335: All versions

WCD9340: All versions

WCD9341: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3610: All versions

WCN3620: All versions

WCN3660B: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3991: All versions

WCN3998: All versions

WCN3999: All versions

WCN6850: All versions

WCN6851: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Use-after-free

EUVDB-ID: #VU58559

Risk: Low

CVSSv3.1: 7.3 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-30337

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in DSP Services. A local attacker can execute arbitrary code on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

APQ8009: All versions

APQ8009W: All versions

APQ8017: All versions

APQ8096AU: All versions

AQT1000: All versions

AR8031: All versions

AR8035: All versions

AR9380: All versions

CSR8811: All versions

CSRA6620: All versions

CSRA6640: All versions

CSRB31024: All versions

FSM10055: All versions

FSM10056: All versions

IPQ4018: All versions

IPQ4019: All versions

IPQ4028: All versions

IPQ4029: All versions

IPQ5010: All versions

IPQ5018: All versions

IPQ5028: All versions

IPQ6000: All versions

IPQ6010: All versions

IPQ6018: All versions

IPQ6028: All versions

IPQ8064: All versions

IPQ8065: All versions

IPQ8068: All versions

IPQ8070: All versions

IPQ8070A: All versions

IPQ8071: All versions

IPQ8071A: All versions

IPQ8072: All versions

IPQ8072A: All versions

IPQ8074: All versions

IPQ8074A: All versions

IPQ8076: All versions

IPQ8076A: All versions

IPQ8078: All versions

IPQ8078A: All versions

IPQ8173: All versions

IPQ8174: All versions

MDM9150: All versions

MDM9206: All versions

MDM9250: All versions

MDM9607: All versions

MDM9628: All versions

MDM9640: All versions

MDM9650: All versions

MSM8909W: All versions

MSM8996AU: All versions

PMP8074: All versions

QCA4024: All versions

QCA6174A: All versions

QCA6390: All versions

QCA6391: All versions

QCA6426: All versions

QCA6428: All versions

QCA6436: All versions

QCA6438: All versions

QCA6564: All versions

QCA6564A: All versions

QCA6564AU: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6584: All versions

QCA6584AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA7500: All versions

QCA8072: All versions

QCA8075: All versions

QCA8081: All versions

QCA8337: All versions

QCA9367: All versions

QCA9377: All versions

QCA9880: All versions

QCA9886: All versions

QCA9888: All versions

QCA9889: All versions

QCA9898: All versions

QCA9980: All versions

QCA9984: All versions

QCA9985: All versions

QCA9990: All versions

QCA9992: All versions

QCA9994: All versions

QCM2290: All versions

QCM4290: All versions

QCM6490: All versions

QCN5021: All versions

QCN5022: All versions

QCN5024: All versions

QCN5052: All versions

QCN5054: All versions

QCN5064: All versions

QCN5122: All versions

QCN5124: All versions

QCN5152: All versions

QCN5154: All versions

QCN5164: All versions

QCN5550: All versions

QCN6023: All versions

QCN6024: All versions

QCN6122: All versions

QCN6132: All versions

QCN9000: All versions

QCN9012: All versions

QCN9022: All versions

QCN9024: All versions

QCN9070: All versions

QCN9072: All versions

QCN9074: All versions

QCN9100: All versions

QCS2290: All versions

QCS405: All versions

QCS410: All versions

QCS4290: All versions

QCS603: All versions

QCS605: All versions

QCS610: All versions

QCS6490: All versions

QCX315: All versions

QET4101: All versions

QRB5165: All versions

QRB5165N: All versions

QSM8250: All versions

QSW8573: All versions

Qualcomm215: All versions

SA415M: All versions

SA515M: All versions

SA6145P: All versions

SA6150P: All versions

SA6155: All versions

SA6155P: All versions

SA8145P: All versions

SA8150P: All versions

SA8155: All versions

SA8155P: All versions

SA8195P: All versions

SD 675: All versions

SD205: All versions

SD210: All versions

SD429: All versions

SD460: All versions

SD660: All versions

SD662: All versions

SD665: All versions

SD675: All versions

SD678: All versions

SD690 5G: All versions

SD720G: All versions

SD730: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD845: All versions

SD855: All versions

SD865 5G: All versions

SD870: All versions

SDA429W: All versions

SDM429W: All versions

SDW2500: All versions

SDX12: All versions

SDX20: All versions

SDX24: All versions

SDX55: All versions

SDX55M: All versions

SDXR1: All versions

SDXR2 5G: All versions

SM6225: All versions

SM6250: All versions

SM6250P: All versions

SM7250P: All versions

SM8450: All versions

SM8450P: All versions

WCD9326: All versions

WCD9330: All versions

WCD9335: All versions

WCD9340: All versions

WCD9341: All versions

WCD9360: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3610: All versions

WCN3615: All versions

WCN3620: All versions

WCN3660B: All versions

WCN3680B: All versions

WCN3910: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3990: All versions

WCN3991: All versions

WCN3998: All versions

WCN3999: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) Reachable Assertion

EUVDB-ID: #VU58558

Risk: Low

CVSSv3.1: 7.3 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-30335

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a local attacker to execute arbitrary code on the system.

The vulnerability exists due to a reachable assertion in DSP Services. A local attacker can execute arbitrary code on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

APQ8009W: All versions

AQT1000: All versions

AR8031: All versions

AR8035: All versions

AR9380: All versions

CSR8811: All versions

CSRA6620: All versions

CSRA6640: All versions

CSRB31024: All versions

FSM10055: All versions

FSM10056: All versions

IPQ4018: All versions

IPQ4019: All versions

IPQ4028: All versions

IPQ4029: All versions

IPQ5010: All versions

IPQ5018: All versions

IPQ5028: All versions

IPQ6000: All versions

IPQ6005: All versions

IPQ6010: All versions

IPQ6018: All versions

IPQ6028: All versions

IPQ8064: All versions

IPQ8065: All versions

IPQ8068: All versions

IPQ8070: All versions

IPQ8070A: All versions

IPQ8071: All versions

IPQ8071A: All versions

IPQ8072: All versions

IPQ8072A: All versions

IPQ8074: All versions

IPQ8074A: All versions

IPQ8076: All versions

IPQ8076A: All versions

IPQ8078: All versions

IPQ8078A: All versions

IPQ8173: All versions

IPQ8174: All versions

MDM9150: All versions

MSM8909W: All versions

PMP8074: All versions

QCA4024: All versions

QCA6174A: All versions

QCA6390: All versions

QCA6391: All versions

QCA6428: All versions

QCA6438: All versions

QCA6564: All versions

QCA6564A: All versions

QCA6564AU: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA7500: All versions

QCA8072: All versions

QCA8075: All versions

QCA8081: All versions

QCA8337: All versions

QCA9377: All versions

QCA9880: All versions

QCA9886: All versions

QCA9888: All versions

QCA9889: All versions

QCA9898: All versions

QCA9980: All versions

QCA9984: All versions

QCA9985: All versions

QCA9990: All versions

QCA9992: All versions

QCA9994: All versions

QCM2290: All versions

QCM4290: All versions

QCN5021: All versions

QCN5022: All versions

QCN5024: All versions

QCN5052: All versions

QCN5054: All versions

QCN5064: All versions

QCN5121: All versions

QCN5122: All versions

QCN5124: All versions

QCN5152: All versions

QCN5154: All versions

QCN5164: All versions

QCN5550: All versions

QCN6023: All versions

QCN6024: All versions

QCN6122: All versions

QCN6132: All versions

QCN9000: All versions

QCN9012: All versions

QCN9022: All versions

QCN9024: All versions

QCN9070: All versions

QCN9072: All versions

QCN9074: All versions

QCN9100: All versions

QCS2290: All versions

QCS405: All versions

QCS410: All versions

QCS4290: All versions

QCS603: All versions

QCS605: All versions

QCS610: All versions

QCX315: All versions

QET4101: All versions

QRB5165: All versions

QRB5165N: All versions

QSM8250: All versions

QSW8573: All versions

Qualcomm215: All versions

SA415M: All versions

SA515M: All versions

SA6145P: All versions

SA6150P: All versions

SA6155: All versions

SA6155P: All versions

SA8145P: All versions

SA8150P: All versions

SA8155: All versions

SA8155P: All versions

SA8195P: All versions

SD 675: All versions

SD205: All versions

SD210: All versions

SD429: All versions

SD665: All versions

SD675: All versions

SD678: All versions

SD690 5G: All versions

SD720G: All versions

SD730: All versions

SD750G: All versions

SD845: All versions

SD855: All versions

SD865 5G: All versions

SD870: All versions

SDA429W: All versions

SDM429W: All versions

SDX24: All versions

SDX55: All versions

SDXR1: All versions

SM6250: All versions

SM6250P: All versions

WCD9326: All versions

WCD9335: All versions

WCD9340: All versions

WCD9341: All versions

WCD9360: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3610: All versions

WCN3615: All versions

WCN3620: All versions

WCN3660B: All versions

WCN3680B: All versions

WCN3910: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3990: All versions

WCN3991: All versions

WCN3998: All versions

WCN3999: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Detection of Error Condition Without Action

EUVDB-ID: #VU58557

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-30289

CWE-ID: N/A

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error while processing a DIAG command for COEX management in Modem. A local user can trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

APQ8009W: All versions

APQ8017: All versions

APQ8096AU: All versions

AQT1000: All versions

CSRB31024: All versions

FSM10055: All versions

FSM10056: All versions

MDM8207: All versions

MDM9150: All versions

MDM9205: All versions

MDM9206: All versions

MDM9207: All versions

MDM9250: All versions

MDM9607: All versions

MDM9628: All versions

MDM9640: All versions

MDM9650: All versions

MSM8909W: All versions

MSM8996AU: All versions

QCA4004: All versions

QCA6174A: All versions

QCA6420: All versions

QCA6430: All versions

QCA6564A: All versions

QCA6564AU: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6584: All versions

QCA6584AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA9367: All versions

QCA9377: All versions

QCM2290: All versions

QCM4290: All versions

QCS2290: All versions

QCS410: All versions

QCS4290: All versions

QCS603: All versions

QCS605: All versions

QCS610: All versions

QET4101: All versions

QSW8573: All versions

Qualcomm215: All versions

SA415M: All versions

SA6145P: All versions

SA6150P: All versions

SA6155P: All versions

SA8145P: All versions

SA8150P: All versions

SA8155P: All versions

SA8195P: All versions

SD 675: All versions

SD 8CX: All versions

SD205: All versions

SD210: All versions

SD429: All versions

SD460: All versions

SD660: All versions

SD662: All versions

SD665: All versions

SD675: All versions

SD678: All versions

SD720G: All versions

SD730: All versions

SD7c: All versions

SD845: All versions

SD850: All versions

SD855: All versions

SDA429W: All versions

SDM429W: All versions

SDW2500: All versions

SDX12: All versions

SDX20: All versions

SDX24: All versions

SDXR1: All versions

SM6225: All versions

SM6250: All versions

SM6250P: All versions

WCD9306: All versions

WCD9326: All versions

WCD9330: All versions

WCD9335: All versions

WCD9340: All versions

WCD9341: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCN3610: All versions

WCN3615: All versions

WCN3620: All versions

WCN3660B: All versions

WCN3680B: All versions

WCN3910: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3990: All versions

WCN3991: All versions

WCN3998: All versions

WSA8810: All versions

WSA8815: All versions

External links

http://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) Buffer overflow

EUVDB-ID: #VU58556

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-30268

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in Modem. A local user can trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

APQ8009W: All versions

APQ8017: All versions

APQ8096AU: All versions

AQT1000: All versions

AR6003: All versions

AR8035: All versions

CSRB31024: All versions

FSM10055: All versions

FSM10056: All versions

MDM8207: All versions

MDM8215: All versions

MDM8215M: All versions

MDM8615M: All versions

MDM9150: All versions

MDM9205: All versions

MDM9206: All versions

MDM9207: All versions

MDM9215: All versions

MDM9250: All versions

MDM9310: All versions

MDM9607: All versions

MDM9615: All versions

MDM9615M: All versions

MDM9628: All versions

MDM9640: All versions

MDM9650: All versions

MSM8909W: All versions

MSM8996AU: All versions

QCA4004: All versions

QCA6174A: All versions

QCA6390: All versions

QCA6391: All versions

QCA6420: All versions

QCA6426: All versions

QCA6430: All versions

QCA6436: All versions

QCA6564A: All versions

QCA6564AU: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6584: All versions

QCA6584AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA8081: All versions

QCA8337: All versions

QCA9367: All versions

QCA9377: All versions

QCM2290: All versions

QCM4290: All versions

QCS2290: All versions

QCS410: All versions

QCS4290: All versions

QCS603: All versions

QCS605: All versions

QCS610: All versions

QCX315: All versions

QET4101: All versions

QSW8573: All versions

Qualcomm215: All versions

SA415M: All versions

SA515M: All versions

SD 675: All versions

SD 8CX: All versions

SD205: All versions

SD210: All versions

SD429: All versions

SD460: All versions

SD480: All versions

SD660: All versions

SD662: All versions

SD665: All versions

SD675: All versions

SD678: All versions

SD690 5G: All versions

SD720G: All versions

SD730: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD7c: All versions

SD845: All versions

SD850: All versions

SD855: All versions

SD865 5G: All versions

SD870: All versions

SDA429W: All versions

SDM429W: All versions

SDW2500: All versions

SDX12: All versions

SDX20: All versions

SDX24: All versions

SDX55: All versions

SDX55M: All versions

SDX65: All versions

SDXR1: All versions

SDXR2 5G: All versions

SM6225: All versions

SM6250: All versions

SM6250P: All versions

SM6375: All versions

SM7250P: All versions

SM8450: All versions

SM8450P: All versions

WCD9306: All versions

WCD9326: All versions

WCD9330: All versions

WCD9335: All versions

WCD9340: All versions

WCD9341: All versions

WCD9360: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3610: All versions

WCN3615: All versions

WCN3620: All versions

WCN3660B: All versions

WCN3680B: All versions

WCN3910: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3990: All versions

WCN3991: All versions

WCN3998: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) Integer overflow

EUVDB-ID: #VU58555

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-30267

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in Modem. A local user can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

AQT1000: All versions

AR8035: All versions

CSRB31024: All versions

FSM10055: All versions

FSM10056: All versions

MDM9150: All versions

MDM9250: All versions

MDM9650: All versions

QCA6174A: All versions

QCA6390: All versions

QCA6391: All versions

QCA6420: All versions

QCA6426: All versions

QCA6430: All versions

QCA6436: All versions

QCA6564A: All versions

QCA6564AU: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA8081: All versions

QCA8337: All versions

QCA9377: All versions

QCS410: All versions

QCS603: All versions

QCS605: All versions

QCS610: All versions

QCX315: All versions

SA415M: All versions

SA515M: All versions

SD 675: All versions

SD 8CX: All versions

SD480: All versions

SD660: All versions

SD665: All versions

SD675: All versions

SD678: All versions

SD690 5G: All versions

SD720G: All versions

SD730: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD7c: All versions

SD845: All versions

SD850: All versions

SD855: All versions

SD865 5G: All versions

SD870: All versions

SDX12: All versions

SDX20: All versions

SDX24: All versions

SDX55: All versions

SDX55M: All versions

SDX65: All versions

SDXR1: All versions

SDXR2 5G: All versions

SM6250: All versions

SM6250P: All versions

SM6375: All versions

SM7250P: All versions

SM8450: All versions

SM8450P: All versions

WCD9326: All versions

WCD9335: All versions

WCD9340: All versions

WCD9341: All versions

WCD9360: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3990: All versions

WCN3991: All versions

WCN3998: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

26) Stack-based buffer overflow

EUVDB-ID: #VU58580

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-30303

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in WLAN. A local user can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

APQ8009: All versions

APQ8017: All versions

APQ8064AU: All versions

APQ8096AU: All versions

AQT1000: All versions

AR7420: All versions

AR8031: All versions

AR8035: All versions

AR9380: All versions

CSR8811: All versions

CSRA6620: All versions

CSRA6640: All versions

CSRB31024: All versions

IPQ4018: All versions

IPQ4019: All versions

IPQ4028: All versions

IPQ4029: All versions

IPQ5010: All versions

IPQ5018: All versions

IPQ5028: All versions

IPQ6000: All versions

IPQ6005: All versions

IPQ6010: All versions

IPQ6018: All versions

IPQ6028: All versions

IPQ8064: All versions

IPQ8065: All versions

IPQ8068: All versions

IPQ8069: All versions

IPQ8070: All versions

IPQ8070A: All versions

IPQ8071: All versions

IPQ8071A: All versions

IPQ8072: All versions

IPQ8072A: All versions

IPQ8074: All versions

IPQ8074A: All versions

IPQ8076: All versions

IPQ8076A: All versions

IPQ8078: All versions

IPQ8078A: All versions

IPQ8173: All versions

IPQ8174: All versions

MDM9206: All versions

MDM9250: All versions

MDM9607: All versions

MDM9628: All versions

MDM9640: All versions

MDM9650: All versions

MSM8996AU: All versions

PMP8074: All versions

QCA1023: All versions

QCA2062: All versions

QCA2064: All versions

QCA2065: All versions

QCA2066: All versions

QCA4024: All versions

QCA4531: All versions

QCA6174A: All versions

QCA6175A: All versions

QCA6320: All versions

QCA6390: All versions

QCA6391: All versions

QCA6420: All versions

QCA6426: All versions

QCA6428: All versions

QCA6430: All versions

QCA6436: All versions

QCA6438: All versions

QCA6564: All versions

QCA6564A: All versions

QCA6564AU: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6584: All versions

QCA6584AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA7500: All versions

QCA7520: All versions

QCA7550: All versions

QCA8072: All versions

QCA8075: All versions

QCA8081: All versions

QCA8337: All versions

QCA9367: All versions

QCA9377: All versions

QCA9378: All versions

QCA9379: All versions

QCA9531: All versions

QCA9558: All versions

QCA9561: All versions

QCA9563: All versions

QCA9880: All versions

QCA9882: All versions

QCA9886: All versions

QCA9887: All versions

QCA9888: All versions

QCA9889: All versions

QCA9896: All versions

QCA9898: All versions

QCA9980: All versions

QCA9984: All versions

QCA9985: All versions

QCA9986: All versions

QCA9987: All versions

QCA9988: All versions

QCA9990: All versions

QCA9992: All versions

QCA9994: All versions

QCM2290: All versions

QCM4290: All versions

QCM6490: All versions

QCN5021: All versions

QCN5022: All versions

QCN5024: All versions

QCN5052: All versions

QCN5054: All versions

QCN5064: All versions

QCN5121: All versions

QCN5122: All versions

QCN5124: All versions

QCN5152: All versions

QCN5154: All versions

QCN5164: All versions

QCN5501: All versions

QCN5502: All versions

QCN5550: All versions

QCN6023: All versions

QCN6024: All versions

QCN6122: All versions

QCN6132: All versions

QCN7605: All versions

QCN7606: All versions

QCN9000: All versions

QCN9012: All versions

QCN9022: All versions

QCN9024: All versions

QCN9070: All versions

QCN9072: All versions

QCN9074: All versions

QCN9100: All versions

QCS2290: All versions

QCS405: All versions

QCS410: All versions

QCS4290: All versions

QCS603: All versions

QCS605: All versions

QCS610: All versions

QCS6490: All versions

QCX315: All versions

QRB5165: All versions

QRB5165N: All versions

SA415M: All versions

SA515M: All versions

SA6145P: All versions

SA6150P: All versions

SA6155: All versions

SA6155P: All versions

SA8145P: All versions

SA8150P: All versions

SA8155: All versions

SA8155P: All versions

SA8195P: All versions

SC8280XP: All versions

SD 675: All versions

SD 8CX: All versions

SD460: All versions

SD480: All versions

SD660: All versions

SD662: All versions

SD665: All versions

SD675: All versions

SD678: All versions

SD690 5G: All versions

SD720G: All versions

SD730: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD780G: All versions

SD7c: All versions

SD845: All versions

SD850: All versions

SD855: All versions

SD865 5G: All versions

SD870: All versions

SD888: All versions

SD888 5G: All versions

SDX12: All versions

SDX20: All versions

SDX24: All versions

SDX55: All versions

SDX55M: All versions

SDX65: All versions

SDXR1: All versions

SDXR2 5G: All versions

SM6225: All versions

SM6250: All versions

SM6250P: All versions

SM6375: All versions

SM7250P: All versions

SM7315: All versions

SM7325P: All versions

SM8450: All versions

SM8450P: All versions

WCD9326: All versions

WCD9330: All versions

WCD9335: All versions

WCD9340: All versions

WCD9341: All versions

WCD9360: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3610: All versions

WCN3660B: All versions

WCN3910: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3990: All versions

WCN3991: All versions

WCN3998: All versions

WCN3999: All versions

WCN6740: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

27) Buffer overflow

EUVDB-ID: #VU58581

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-30336

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in DSP Services. A local user can trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

QCA6390: All versions

QCA6391: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCM2290: All versions

QCM4290: All versions

QCM6490: All versions

QCS2290: All versions

QCS4290: All versions

QCS6490: All versions

Qualcomm215: All versions

SA6145P: All versions

SA6150P: All versions

SA6155: All versions

SA6155P: All versions

SA8145P: All versions

SA8150P: All versions

SA8155: All versions

SA8155P: All versions

SA8195P: All versions

SD 675: All versions

SD460: All versions

SD480: All versions

SD662: All versions

SD665: All versions

SD675: All versions

SD678: All versions

SD690 5G: All versions

SD720G: All versions

SD730: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD780G: All versions

SD865 5G: All versions

SD870: All versions

SD888: All versions

SD888 5G: All versions

SDA429W: All versions

SDX55M: All versions

SDXR1: All versions

SM6225: All versions

SM6250: All versions

SM6375: All versions

SM7250P: All versions

SM7315: All versions

SM7325P: All versions

SM8450: All versions

SM8450P: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3610: All versions

WCN3660B: All versions

WCN3910: All versions

WCN3950: All versions

WCN3988: All versions

WCN3991: All versions

WCN6740: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

28) Use-after-free

EUVDB-ID: #VU58582

Risk: Low

CVSSv3.1: 7.3 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-30262

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local attacker to execute arbitrary code on the system.

The vulnerability exists due to a NULL pointer dereference error in Modem. A local attacker can pass specially crafted data to the application and execute arbitrary code on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

APQ8009W: All versions

AQT1000: All versions

AR8031: All versions

AR8035: All versions

CSRA6620: All versions

CSRA6640: All versions

CSRB31024: All versions

FSM10055: All versions

FSM10056: All versions

MDM9150: All versions

MDM9640: All versions

MSM8909W: All versions

QCA6174A: All versions

QCA6390: All versions

QCA6391: All versions

QCA6426: All versions

QCA6436: All versions

QCA6564: All versions

QCA6564A: All versions

QCA6564AU: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA8337: All versions

QCA9377: All versions

QCS405: All versions

QCS410: All versions

QCS603: All versions

QCS605: All versions

QCS610: All versions

QET4101: All versions

QRB5165: All versions

QRB5165N: All versions

QSM8250: All versions

QSW8573: All versions

Qualcomm215: All versions

SA415M: All versions

SA6145P: All versions

SA6150P: All versions

SA6155: All versions

SA6155P: All versions

SA8145P: All versions

SA8150P: All versions

SA8155: All versions

SA8155P: All versions

SA8195P: All versions

SD 675: All versions

SD205: All versions

SD210: All versions

SD429: All versions

SD460: All versions

SD660: All versions

SD662: All versions

SD665: All versions

SD675: All versions

SD678: All versions

SD690 5G: All versions

SD720G: All versions

SD730: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD845: All versions

SD855: All versions

SD865 5G: All versions

SD870: All versions

SDA429W: All versions

SDM429W: All versions

SDX24: All versions

SDX55: All versions

SDX55M: All versions

SDXR1: All versions

SDXR2 5G: All versions

SM6225: All versions

SM6250: All versions

SM6250P: All versions

SM7250P: All versions

WCD9326: All versions

WCD9335: All versions

WCD9340: All versions

WCD9341: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3610: All versions

WCN3620: All versions

WCN3660B: All versions

WCN3680B: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3990: All versions

WCN3991: All versions

WCN3998: All versions

WCN3999: All versions

WCN6850: All versions

WCN6851: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###