Multiple vulnerabilities in Qualcomm chipsets



Published: 2022-05-12 | Updated: 2023-12-05
Risk High
Patch available YES
Number of vulnerabilities 23
CVE-ID CVE-2021-35076
CVE-2022-22065
CVE-2022-22064
CVE-2021-35079
CVE-2021-35116
CVE-2021-35096
CVE-2021-35094
CVE-2021-35087
CVE-2021-35086
CVE-2021-35080
CVE-2021-35078
CVE-2021-35073
CVE-2021-35072
CVE-2021-35090
CVE-2021-35082
CVE-2021-35098
CVE-2021-35092
CVE-2021-35085
CVE-2021-35084
CVE-2022-22071
CVE-2022-22068
CVE-2022-22057
CVE-2022-22072
CWE-ID CWE-476
CWE-126
CWE-264
CWE-20
CWE-285
CWE-200
CWE-401
CWE-617
CWE-129
CWE-367
CWE-823
CWE-416
CWE-120
Exploitation vector Network
Public exploit Vulnerability #20 is being exploited in the wild.
Vulnerable software
Subscribe
AR8035
Mobile applications / Mobile firmware & hardware

QCA6390
Mobile applications / Mobile firmware & hardware

QCA6391
Mobile applications / Mobile firmware & hardware

QCA6421
Mobile applications / Mobile firmware & hardware

QCA6426
Mobile applications / Mobile firmware & hardware

QCA6431
Mobile applications / Mobile firmware & hardware

QCA6436
Mobile applications / Mobile firmware & hardware

QCA6574A
Mobile applications / Mobile firmware & hardware

QCA6595AU
Mobile applications / Mobile firmware & hardware

QCA6696
Mobile applications / Mobile firmware & hardware

QCA8081
Mobile applications / Mobile firmware & hardware

QCA8337
Mobile applications / Mobile firmware & hardware

QCM6490
Mobile applications / Mobile firmware & hardware

QCS6490
Mobile applications / Mobile firmware & hardware

SA515M
Mobile applications / Mobile firmware & hardware

SD 8 Gen1 5G
Mobile applications / Mobile firmware & hardware

SD480
Mobile applications / Mobile firmware & hardware

SD690 5G
Mobile applications / Mobile firmware & hardware

SD695
Mobile applications / Mobile firmware & hardware

SD750G
Mobile applications / Mobile firmware & hardware

SD765
Mobile applications / Mobile firmware & hardware

SD765G
Mobile applications / Mobile firmware & hardware

SD768G
Mobile applications / Mobile firmware & hardware

SD778G
Mobile applications / Mobile firmware & hardware

SD780G
Mobile applications / Mobile firmware & hardware

SD865 5G
Mobile applications / Mobile firmware & hardware

SD870
Mobile applications / Mobile firmware & hardware

SD888 5G
Mobile applications / Mobile firmware & hardware

SDX55M
Mobile applications / Mobile firmware & hardware

SDX65
Mobile applications / Mobile firmware & hardware

SDXR2 5G
Mobile applications / Mobile firmware & hardware

SM7250P
Mobile applications / Mobile firmware & hardware

SM7315
Mobile applications / Mobile firmware & hardware

SM7325P
Mobile applications / Mobile firmware & hardware

WCD9341
Mobile applications / Mobile firmware & hardware

WCD9360
Mobile applications / Mobile firmware & hardware

WCD9370
Mobile applications / Mobile firmware & hardware

WCD9375
Mobile applications / Mobile firmware & hardware

WCD9380
Mobile applications / Mobile firmware & hardware

WCD9385
Mobile applications / Mobile firmware & hardware

WCN3988
Mobile applications / Mobile firmware & hardware

WCN3991
Mobile applications / Mobile firmware & hardware

WCN3998
Mobile applications / Mobile firmware & hardware

WCN6740
Mobile applications / Mobile firmware & hardware

WCN6750
Mobile applications / Mobile firmware & hardware

WCN6850
Mobile applications / Mobile firmware & hardware

WCN6851
Mobile applications / Mobile firmware & hardware

WCN6855
Mobile applications / Mobile firmware & hardware

WCN6856
Mobile applications / Mobile firmware & hardware

WSA8810
Mobile applications / Mobile firmware & hardware

WSA8815
Mobile applications / Mobile firmware & hardware

WSA8830
Mobile applications / Mobile firmware & hardware

WSA8835
Mobile applications / Mobile firmware & hardware

APQ8009W
Mobile applications / Mobile firmware & hardware

AQT1000
Mobile applications / Mobile firmware & hardware

AR8031
Mobile applications / Mobile firmware & hardware

CSRA6620
Mobile applications / Mobile firmware & hardware

CSRA6640
Mobile applications / Mobile firmware & hardware

CSRB31024
Mobile applications / Mobile firmware & hardware

MDM9250
Mobile applications / Mobile firmware & hardware

MDM9626
Mobile applications / Mobile firmware & hardware

MDM9628
Mobile applications / Mobile firmware & hardware

QCA4020
Mobile applications / Mobile firmware & hardware

QCA6175A
Mobile applications / Mobile firmware & hardware

QCA6310
Mobile applications / Mobile firmware & hardware

QCA6320
Mobile applications / Mobile firmware & hardware

QCA6335
Mobile applications / Mobile firmware & hardware

QCA6420
Mobile applications / Mobile firmware & hardware

QCA6430
Mobile applications / Mobile firmware & hardware

QCA6564
Mobile applications / Mobile firmware & hardware

QCA6564A
Mobile applications / Mobile firmware & hardware

QCA6564AU
Mobile applications / Mobile firmware & hardware

QCA6574
Mobile applications / Mobile firmware & hardware

QCA6584
Mobile applications / Mobile firmware & hardware

QCA6595
Mobile applications / Mobile firmware & hardware

QCA9367
Mobile applications / Mobile firmware & hardware

QCM2290
Mobile applications / Mobile firmware & hardware

QCM4290
Mobile applications / Mobile firmware & hardware

QCN7606
Mobile applications / Mobile firmware & hardware

QCS2290
Mobile applications / Mobile firmware & hardware

QCS410
Mobile applications / Mobile firmware & hardware

QCS4290
Mobile applications / Mobile firmware & hardware

QCS603
Mobile applications / Mobile firmware & hardware

QCS610
Mobile applications / Mobile firmware & hardware

QRB5165
Mobile applications / Mobile firmware & hardware

QRB5165M
Mobile applications / Mobile firmware & hardware

QRB5165N
Mobile applications / Mobile firmware & hardware

Qualcomm215
Mobile applications / Mobile firmware & hardware

SA415M
Mobile applications / Mobile firmware & hardware

SA6145P
Mobile applications / Mobile firmware & hardware

SA6155
Mobile applications / Mobile firmware & hardware

SA8155
Mobile applications / Mobile firmware & hardware

SA8155P
Mobile applications / Mobile firmware & hardware

SA8195P
Mobile applications / Mobile firmware & hardware

SD 636
Mobile applications / Mobile firmware & hardware

SD 675
Mobile applications / Mobile firmware & hardware

SD429
Mobile applications / Mobile firmware & hardware

SD439
Mobile applications / Mobile firmware & hardware

SD460
Mobile applications / Mobile firmware & hardware

SD632
Mobile applications / Mobile firmware & hardware

SD660
Mobile applications / Mobile firmware & hardware

SD662
Mobile applications / Mobile firmware & hardware

SD678
Mobile applications / Mobile firmware & hardware

SD680
Mobile applications / Mobile firmware & hardware

SD720G
Mobile applications / Mobile firmware & hardware

SDW2500
Mobile applications / Mobile firmware & hardware

SDX12
Mobile applications / Mobile firmware & hardware

SDX50M
Mobile applications / Mobile firmware & hardware

SDXR1
Mobile applications / Mobile firmware & hardware

SM4125
Mobile applications / Mobile firmware & hardware

SM6250
Mobile applications / Mobile firmware & hardware

SM6250P
Mobile applications / Mobile firmware & hardware

SW5100
Mobile applications / Mobile firmware & hardware

SW5100P
Mobile applications / Mobile firmware & hardware

WCD9326
Mobile applications / Mobile firmware & hardware

WCD9330
Mobile applications / Mobile firmware & hardware

WCD9335
Mobile applications / Mobile firmware & hardware

WCD9340
Mobile applications / Mobile firmware & hardware

WCD9371
Mobile applications / Mobile firmware & hardware

WCN3610
Mobile applications / Mobile firmware & hardware

WCN3615
Mobile applications / Mobile firmware & hardware

WCN3620
Mobile applications / Mobile firmware & hardware

WCN3660
Mobile applications / Mobile firmware & hardware

WCN3660B
Mobile applications / Mobile firmware & hardware

WCN3680
Mobile applications / Mobile firmware & hardware

WCN3680B
Mobile applications / Mobile firmware & hardware

WCN3910
Mobile applications / Mobile firmware & hardware

WCN3950
Mobile applications / Mobile firmware & hardware

WCN3980
Mobile applications / Mobile firmware & hardware

WCN3990
Mobile applications / Mobile firmware & hardware

WCN3999
Mobile applications / Mobile firmware & hardware

WCN7850
Mobile applications / Mobile firmware & hardware

WCN7851
Mobile applications / Mobile firmware & hardware

PM8937
Mobile applications / Mobile firmware & hardware

QCM6125
Mobile applications / Mobile firmware & hardware

QCS6125
Mobile applications / Mobile firmware & hardware

SD820
Mobile applications / Mobile firmware & hardware

QSM8350
Mobile applications / Mobile firmware & hardware

SD 8cx Gen3
Mobile applications / Mobile firmware & hardware

SC8180X+SDX55
Mobile applications / Mobile firmware & hardware

SD 8CX
Mobile applications / Mobile firmware & hardware

SD 8cx Gen2
Mobile applications / Mobile firmware & hardware

SD7c
Mobile applications / Mobile firmware & hardware

APQ8037
Mobile applications / Mobile firmware & hardware

MSM8108
Mobile applications / Mobile firmware & hardware

MSM8208
Mobile applications / Mobile firmware & hardware

MSM8209
Mobile applications / Mobile firmware & hardware

MSM8608
Mobile applications / Mobile firmware & hardware

SD821
Mobile applications / Mobile firmware & hardware

QCA6574AU
Hardware solutions / Firmware

SD855
Hardware solutions / Firmware

SD888
Hardware solutions / Firmware

SDX55
Hardware solutions / Firmware

APQ8009
Hardware solutions / Firmware

APQ8017
Hardware solutions / Firmware

APQ8053
Hardware solutions / Firmware

APQ8096AU
Hardware solutions / Firmware

MDM9150
Hardware solutions / Firmware

MDM9206
Hardware solutions / Firmware

MDM9607
Hardware solutions / Firmware

MDM9640
Hardware solutions / Firmware

MDM9650
Hardware solutions / Firmware

MSM8909W
Hardware solutions / Firmware

MSM8917
Hardware solutions / Firmware

MSM8953
Hardware solutions / Firmware

MSM8996AU
Hardware solutions / Firmware

QCA6174A
Hardware solutions / Firmware

QCA9377
Hardware solutions / Firmware

QCA9379
Hardware solutions / Firmware

QCN7605
Hardware solutions / Firmware

QCS405
Hardware solutions / Firmware

QCS605
Hardware solutions / Firmware

SA6155P
Hardware solutions / Firmware

SD450
Hardware solutions / Firmware

SD665
Hardware solutions / Firmware

SD670
Hardware solutions / Firmware

SD675
Hardware solutions / Firmware

SD710
Hardware solutions / Firmware

SD730
Hardware solutions / Firmware

SD835
Hardware solutions / Firmware

SD845
Hardware solutions / Firmware

SDM429W
Hardware solutions / Firmware

SDM630
Hardware solutions / Firmware

SDX20
Hardware solutions / Firmware

SDX24
Hardware solutions / Firmware

MSM8937
Hardware solutions / Firmware

SA8540P
Hardware solutions / Firmware

SA9000P
Hardware solutions / Firmware

SD712
Hardware solutions / Firmware

MSM8920
Hardware solutions / Firmware

MSM8940
Hardware solutions / Firmware

SD210
Hardware solutions / Firmware

Vendor Qualcomm

Security Bulletin

This security bulletin contains information about 23 vulnerabilities.

1) NULL pointer dereference

EUVDB-ID: #VU63106

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-35076

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference error in LTE component. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

AR8035: All versions

QCA6390: All versions

QCA6391: All versions

QCA6421: All versions

QCA6426: All versions

QCA6431: All versions

QCA6436: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA8081: All versions

QCA8337: All versions

QCM6490: All versions

QCS6490: All versions

SA515M: All versions

SD 8 Gen1 5G: All versions

SD480: All versions

SD690 5G: All versions

SD695: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD780G: All versions

SD855: All versions

SD865 5G: All versions

SD870: All versions

SD888: All versions

SD888 5G: All versions

SDX55: All versions

SDX55M: All versions

SDX65: All versions

SDXR2 5G: All versions

SM7250P: All versions

SM7315: All versions

SM7325P: All versions

WCD9341: All versions

WCD9360: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3988: All versions

WCN3991: All versions

WCN3998: All versions

WCN6740: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://docs.qualcomm.com/bundle/publicresource/HD-10000-1/topics/may-2022-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Buffer Over-read

EUVDB-ID: #VU63120

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-22065

CWE-ID: CWE-126 - Buffer over-read

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause a denial of service.

The vulnerability exists due to buffer over-read error in the WLAN HOST component. A remote attacker can trigger buffer over-read error and cause a denial of service.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

APQ8009: All versions

APQ8009W: All versions

APQ8017: All versions

APQ8053: All versions

APQ8096AU: All versions

AQT1000: All versions

AR8031: All versions

AR8035: All versions

CSRA6620: All versions

CSRA6640: All versions

CSRB31024: All versions

MDM9150: All versions

MDM9206: All versions

MDM9250: All versions

MDM9607: All versions

MDM9626: All versions

MDM9628: All versions

MDM9640: All versions

MDM9650: All versions

MSM8909W: All versions

MSM8917: All versions

MSM8953: All versions

MSM8996AU: All versions

QCA4020: All versions

QCA6174A: All versions

QCA6175A: All versions

QCA6310: All versions

QCA6320: All versions

QCA6335: All versions

QCA6390: All versions

QCA6391: All versions

QCA6420: All versions

QCA6426: All versions

QCA6430: All versions

QCA6436: All versions

QCA6564: All versions

QCA6564A: All versions

QCA6564AU: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6584: All versions

QCA6595: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA8081: All versions

QCA8337: All versions

QCA9367: All versions

QCA9377: All versions

QCA9379: All versions

QCM2290: All versions

QCM4290: All versions

QCM6490: All versions

QCN7605: All versions

QCN7606: All versions

QCS2290: All versions

QCS405: All versions

QCS410: All versions

QCS4290: All versions

QCS603: All versions

QCS605: All versions

QCS610: All versions

QCS6490: All versions

QRB5165: All versions

QRB5165M: All versions

QRB5165N: All versions

Qualcomm215: All versions

SA415M: All versions

SA515M: All versions

SA6145P: All versions

SA6155: All versions

SA6155P: All versions

SA8155: All versions

SA8155P: All versions

SA8195P: All versions

SD 636: All versions

SD 675: All versions

SD 8 Gen1 5G: All versions

SD429: All versions

SD439: All versions

SD450: All versions

SD460: All versions

SD480: All versions

SD632: All versions

SD660: All versions

SD662: All versions

SD665: All versions

SD670: All versions

SD675: All versions

SD678: All versions

SD680: All versions

SD690 5G: All versions

SD695: All versions

SD710: All versions

SD720G: All versions

SD730: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD780G: All versions

SD835: All versions

SD845: All versions

SD855: All versions

SD865 5G: All versions

SD870: All versions

SD888: All versions

SD888 5G: All versions

SDM429W: All versions

SDM630: All versions

SDW2500: All versions

SDX12: All versions

SDX20: All versions

SDX24: All versions

SDX50M: All versions

SDX55: All versions

SDX55M: All versions

SDX65: All versions

SDXR1: All versions

SDXR2 5G: All versions

SM4125: All versions

SM6250: All versions

SM6250P: All versions

SM7250P: All versions

SM7315: All versions

SM7325P: All versions

SW5100: All versions

SW5100P: All versions

WCD9326: All versions

WCD9330: All versions

WCD9335: All versions

WCD9340: All versions

WCD9341: All versions

WCD9360: All versions

WCD9370: All versions

WCD9371: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3610: All versions

WCN3615: All versions

WCN3620: All versions

WCN3660: All versions

WCN3660B: All versions

WCN3680: All versions

WCN3680B: All versions

WCN3910: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3990: All versions

WCN3991: All versions

WCN3998: All versions

WCN3999: All versions

WCN6740: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WCN7850: All versions

WCN7851: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://docs.qualcomm.com/bundle/publicresource/HD-10000-1/topics/may-2022-bulletin.html
http://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=d737412829798dd54e8355074f4653662a763c02
http://source.codeaurora.org/quic/le/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=33a33b2eedc4349d73796f585986cdee7680310c
http://source.codeaurora.org/quic/le/platform/vendor/qcom-opensource/wlan/prima/commit/?id=edc957bca2d254d202765b7fd131261ad2b75a29


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Buffer Over-read

EUVDB-ID: #VU63118

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-22064

CWE-ID: CWE-126 - Buffer over-read

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause a denial of service.

The vulnerability exists due to buffer over-read error in the WLAN HOST component. A remote attacker can trigger buffer over-read error and cause a denial of service.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

APQ8009: All versions

APQ8009W: All versions

APQ8017: All versions

APQ8053: All versions

APQ8096AU: All versions

AQT1000: All versions

AR8031: All versions

AR8035: All versions

CSRA6620: All versions

CSRA6640: All versions

CSRB31024: All versions

MDM9150: All versions

MDM9206: All versions

MDM9250: All versions

MDM9607: All versions

MDM9626: All versions

MDM9628: All versions

MDM9640: All versions

MDM9650: All versions

MSM8909W: All versions

MSM8917: All versions

MSM8937: All versions

MSM8953: All versions

MSM8996AU: All versions

PM8937: All versions

QCA4020: All versions

QCA6174A: All versions

QCA6175A: All versions

QCA6310: All versions

QCA6320: All versions

QCA6390: All versions

QCA6391: All versions

QCA6420: All versions

QCA6426: All versions

QCA6430: All versions

QCA6436: All versions

QCA6564: All versions

QCA6564A: All versions

QCA6564AU: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6584: All versions

QCA6595: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA8081: All versions

QCA8337: All versions

QCA9367: All versions

QCA9377: All versions

QCA9379: All versions

QCM2290: All versions

QCM4290: All versions

QCM6125: All versions

QCN7605: All versions

QCN7606: All versions

QCS2290: All versions

QCS405: All versions

QCS410: All versions

QCS4290: All versions

QCS603: All versions

QCS605: All versions

QCS610: All versions

QCS6125: All versions

QRB5165: All versions

QRB5165M: All versions

QRB5165N: All versions

Qualcomm215: All versions

SA415M: All versions

SA515M: All versions

SA6145P: All versions

SA6155: All versions

SA6155P: All versions

SA8155: All versions

SA8155P: All versions

SA8195P: All versions

SD 675: All versions

SD 8 Gen1 5G: All versions

SD429: All versions

SD439: All versions

SD450: All versions

SD460: All versions

SD480: All versions

SD632: All versions

SD660: All versions

SD662: All versions

SD665: All versions

SD670: All versions

SD675: All versions

SD678: All versions

SD680: All versions

SD690 5G: All versions

SD695: All versions

SD710: All versions

SD720G: All versions

SD730: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD780G: All versions

SD820: All versions

SD835: All versions

SD845: All versions

SD855: All versions

SD865 5G: All versions

SD870: All versions

SD888 5G: All versions

SDM429W: All versions

SDW2500: All versions

SDX12: All versions

SDX20: All versions

SDX24: All versions

SDX50M: All versions

SDX55: All versions

SDX55M: All versions

SDX65: All versions

SDXR1: All versions

SDXR2 5G: All versions

SM4125: All versions

SM6250: All versions

SM7250P: All versions

SM7325P: All versions

WCD9326: All versions

WCD9330: All versions

WCD9335: All versions

WCD9340: All versions

WCD9341: All versions

WCD9360: All versions

WCD9370: All versions

WCD9371: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3610: All versions

WCN3615: All versions

WCN3620: All versions

WCN3660: All versions

WCN3660B: All versions

WCN3680: All versions

WCN3680B: All versions

WCN3910: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3990: All versions

WCN3991: All versions

WCN3998: All versions

WCN3999: All versions

WCN6740: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WCN7850: All versions

WCN7851: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://docs.qualcomm.com/bundle/publicresource/HD-10000-1/topics/may-2022-bulletin.html
http://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=9e8dbd5b761e9a152cb77562ec20124b5b69c7cf
http://source.codeaurora.org/quic/le/platform/vendor/qcom-opensource/wlan/prima/commit/?id=b84f0da6a06d2f4c6f497b1bf3c291e71fb37838
http://source.codeaurora.org/quic/le/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=6fba8935de694cc61a13bba40fd1251097cdc014
http://source.codeaurora.org/quic/le/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=ba9e94231a2b072f44ba702682bd0dc23cb37edc
http://source.codeaurora.org/quic/le/platform/vendor/qcom-opensource/wlan/prima/commit/?id=d2a6e223866ca0de9af3fad7a2ad7a44658f479d


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU63117

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-35079

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local application to cause a denial of service.

The vulnerability exists due to lack of size validation while unpacking frame in the WLAN HOST component. A local application can cause a denial of service.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

APQ8053: All versions

AQT1000: All versions

MSM8953: All versions

QCA6390: All versions

QCA6391: All versions

QCA6420: All versions

QCA6426: All versions

QCA6430: All versions

QCA6436: All versions

QCM4290: All versions

QCS4290: All versions

QCS603: All versions

QCS605: All versions

Qualcomm215: All versions

SD460: All versions

SD480: All versions

SD662: All versions

SD680: All versions

SD690 5G: All versions

SD695: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD780G: All versions

SD855: All versions

SD865 5G: All versions

SD870: All versions

SD888 5G: All versions

SDX55: All versions

SDX55M: All versions

SDXR2 5G: All versions

SM7250P: All versions

SM7325P: All versions

WCD9326: All versions

WCD9341: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3615: All versions

WCN3660B: All versions

WCN3680: All versions

WCN3680B: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3990: All versions

WCN3991: All versions

WCN3998: All versions

WCN6740: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://docs.qualcomm.com/bundle/publicresource/HD-10000-1/topics/may-2022-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Input validation error

EUVDB-ID: #VU63116

Risk: Medium

CVSSv3.1: 6.7 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-35116

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in the Android Neural Networks component. A local application can load a crafted model into the CDSP and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

APQ8009: All versions

APQ8009W: All versions

APQ8096AU: All versions

AQT1000: All versions

CSRB31024: All versions

MDM9607: All versions

MDM9626: All versions

MDM9628: All versions

MDM9640: All versions

MSM8909W: All versions

MSM8937: All versions

MSM8996AU: All versions

PM8937: All versions

QCA6174A: All versions

QCA6310: All versions

QCA6320: All versions

QCA6390: All versions

QCA6391: All versions

QCA6420: All versions

QCA6430: All versions

QCA6564A: All versions

QCA6564AU: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA9377: All versions

QCM2290: All versions

QCM4290: All versions

QCM6490: All versions

QCS2290: All versions

QCS4290: All versions

QCS603: All versions

QCS605: All versions

QCS6490: All versions

SA415M: All versions

SA6155: All versions

SA6155P: All versions

SA8155: All versions

SA8155P: All versions

SA8195P: All versions

SD 675: All versions

SD 8 Gen1 5G: All versions

SD429: All versions

SD460: All versions

SD480: All versions

SD660: All versions

SD662: All versions

SD665: All versions

SD675: All versions

SD678: All versions

SD680: All versions

SD690 5G: All versions

SD695: All versions

SD720G: All versions

SD730: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD780G: All versions

SD820: All versions

SD835: All versions

SD855: All versions

SD865 5G: All versions

SD870: All versions

SD888: All versions

SD888 5G: All versions

SDM429W: All versions

SDW2500: All versions

SDX12: All versions

SDX50M: All versions

SDX55: All versions

SDX55M: All versions

SDX65: All versions

SM4125: All versions

SM6250: All versions

SM7250P: All versions

SM7315: All versions

SM7325P: All versions

WCD9326: All versions

WCD9335: All versions

WCD9340: All versions

WCD9341: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3610: All versions

WCN3615: All versions

WCN3620: All versions

WCN3660B: All versions

WCN3910: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3990: All versions

WCN3991: All versions

WCN3998: All versions

WCN6740: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WCN7850: All versions

WCN7851: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://docs.qualcomm.com/bundle/publicresource/HD-10000-1/topics/may-2022-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Input validation error

EUVDB-ID: #VU63113

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-35096

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper memory allocation during counter check DLM handling. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

AR8035: All versions

QCA6390: All versions

QCA6391: All versions

QCA6421: All versions

QCA6426: All versions

QCA6431: All versions

QCA6436: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA8081: All versions

QCA8337: All versions

QCM6490: All versions

QCS6490: All versions

SA515M: All versions

SD 8 Gen1 5G: All versions

SD480: All versions

SD690 5G: All versions

SD695: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD780G: All versions

SD855: All versions

SD865 5G: All versions

SD870: All versions

SD888: All versions

SD888 5G: All versions

SDX55: All versions

SDX55M: All versions

SDX65: All versions

SDXR2 5G: All versions

SM7250P: All versions

SM7315: All versions

WCD9341: All versions

WCD9360: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3988: All versions

WCN3991: All versions

WCN3998: All versions

WCN6740: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://docs.qualcomm.com/bundle/publicresource/HD-10000-1/topics/may-2022-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Improper Authorization

EUVDB-ID: #VU63111

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-35094

CWE-ID: CWE-285 - Improper Authorization

Exploit availability: No

Description

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to improper verification of timeout-based authentication in the HLOS component. A local application can escalate privileges on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

AQT1000: All versions

QCA6390: All versions

QCA6391: All versions

QCA6420: All versions

QCA6421: All versions

QCA6426: All versions

QCA6430: All versions

QCA6431: All versions

QCA6436: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCM2290: All versions

QCM4290: All versions

QCM6490: All versions

QCS2290: All versions

QCS4290: All versions

QCS6490: All versions

QSM8350: All versions

SA6155: All versions

SA6155P: All versions

SA8155: All versions

SA8155P: All versions

SA8195P: All versions

SA8540P: All versions

SA9000P: All versions

SD 675: All versions

SD 8cx Gen3: All versions

SD460: All versions

SD480: All versions

SD662: All versions

SD665: All versions

SD675: All versions

SD678: All versions

SD680: All versions

SD690 5G: All versions

SD695: All versions

SD720G: All versions

SD730: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD780G: All versions

SD855: All versions

SD865 5G: All versions

SD870: All versions

SD888 5G: All versions

SDX50M: All versions

SDX55M: All versions

SDXR2 5G: All versions

SM4125: All versions

SM6250: All versions

SM7250P: All versions

SM7325P: All versions

WCD9341: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3910: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3991: All versions

WCN3998: All versions

WCN6740: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WCN7850: All versions

WCN7851: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://docs.qualcomm.com/bundle/publicresource/HD-10000-1/topics/may-2022-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) NULL pointer dereference

EUVDB-ID: #VU63110

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-35087

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper validation of system information message to be processed in Modem component. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

AR8035: All versions

QCA6390: All versions

QCA6391: All versions

QCA8081: All versions

QCA8337: All versions

QCM6490: All versions

QCS6490: All versions

SD 8 Gen1 5G: All versions

SD480: All versions

SD690 5G: All versions

SD695: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD780G: All versions

SD865 5G: All versions

SD870: All versions

SD888 5G: All versions

SDX55: All versions

SDX55M: All versions

SDX65: All versions

SM7250P: All versions

WCD9341: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3988: All versions

WCN3991: All versions

WCN3998: All versions

WCN6740: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://docs.qualcomm.com/bundle/publicresource/HD-10000-1/topics/may-2022-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) NULL pointer dereference

EUVDB-ID: #VU63109

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-35086

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper validation of SIB type when processing a NR system Information message in Modem component. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

AR8035: All versions

QCA6390: All versions

QCA6391: All versions

QCA6421: All versions

QCA6426: All versions

QCA6431: All versions

QCA6436: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA8081: All versions

QCA8337: All versions

QCM6490: All versions

QCS6490: All versions

SA515M: All versions

SD 8 Gen1 5G: All versions

SD480: All versions

SD690 5G: All versions

SD695: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD855: All versions

SD865 5G: All versions

SD870: All versions

SD888: All versions

SD888 5G: All versions

SDX55: All versions

SDX55M: All versions

SDX65: All versions

SDXR2 5G: All versions

SM7250P: All versions

SM7315: All versions

SM7325P: All versions

WCD9341: All versions

WCD9360: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3988: All versions

WCN3991: All versions

WCN3998: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://docs.qualcomm.com/bundle/publicresource/HD-10000-1/topics/may-2022-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Information disclosure

EUVDB-ID: #VU63108

Risk: Medium

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-35080

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local appliction to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application in KERNEL component. A local appliction can gain unauthorized access to sensitive information on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

QCM2290: All versions

QCM4290: All versions

QCS2290: All versions

QCS4290: All versions

SD460: All versions

SD480: All versions

SD662: All versions

SD680: All versions

SD695: All versions

SM4125: All versions

SW5100: All versions

SW5100P: All versions

WCD9370: All versions

WCD9375: All versions

WCD9385: All versions

WCN3910: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3991: All versions

WCN3998: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://docs.qualcomm.com/bundle/publicresource/HD-10000-1/topics/may-2022-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Memory leak

EUVDB-ID: #VU63107

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-35078

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform DoS attack on the target system.

The vulnerability exists due to memory leak while parsing server certificate chain in Data Modem component. A remote attacker can force the application to leak memory and perform denial of service attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

AQT1000: All versions

AR8035: All versions

CSRB31024: All versions

QCA6174A: All versions

QCA6390: All versions

QCA6391: All versions

QCA6420: All versions

QCA6421: All versions

QCA6426: All versions

QCA6430: All versions

QCA6431: All versions

QCA6436: All versions

QCA6564AU: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA8081: All versions

QCA8337: All versions

QCA9377: All versions

QCM2290: All versions

QCM4290: All versions

QCM6125: All versions

QCM6490: All versions

QCS2290: All versions

QCS410: All versions

QCS4290: All versions

QCS603: All versions

QCS605: All versions

QCS610: All versions

QCS6125: All versions

QCS6490: All versions

SA415M: All versions

SA515M: All versions

SC8180X+SDX55: All versions

SD 675: All versions

SD 8 Gen1 5G: All versions

SD 8CX: All versions

SD 8cx Gen2: All versions

SD460: All versions

SD480: All versions

SD662: All versions

SD665: All versions

SD670: All versions

SD675: All versions

SD678: All versions

SD680: All versions

SD690 5G: All versions

SD695: All versions

SD710: All versions

SD712: All versions

SD720G: All versions

SD730: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD780G: All versions

SD7c: All versions

SD855: All versions

SD865 5G: All versions

SD870: All versions

SD888: All versions

SD888 5G: All versions

SDX24: All versions

SDX50M: All versions

SDX55: All versions

SDX55M: All versions

SDX65: All versions

SDXR1: All versions

SDXR2 5G: All versions

SM4125: All versions

SM6250: All versions

SM6250P: All versions

SM7250P: All versions

SM7315: All versions

SM7325P: All versions

SW5100: All versions

SW5100P: All versions

WCD9326: All versions

WCD9335: All versions

WCD9340: All versions

WCD9341: All versions

WCD9360: All versions

WCD9370: All versions

WCD9371: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3910: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3990: All versions

WCN3991: All versions

WCN3998: All versions

WCN6740: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://docs.qualcomm.com/bundle/publicresource/HD-10000-1/topics/may-2022-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Reachable Assertion

EUVDB-ID: #VU63105

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-35073

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper validation of rank restriction field in Modem component. A remote attacker can pass a specially crafted data and cause a denial of service.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

AR8035: All versions

QCA6390: All versions

QCA6391: All versions

QCA6421: All versions

QCA6426: All versions

QCA6431: All versions

QCA6436: All versions

QCA6574A: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA8081: All versions

QCA8337: All versions

QCM6490: All versions

QCS6490: All versions

SA515M: All versions

SD 8 Gen1 5G: All versions

SD480: All versions

SD690 5G: All versions

SD695: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD780G: All versions

SD855: All versions

SD865 5G: All versions

SD870: All versions

SD888: All versions

SD888 5G: All versions

SDX55: All versions

SDX55M: All versions

SDX65: All versions

SDXR2 5G: All versions

SM7250P: All versions

SM7315: All versions

SM7325P: All versions

WCD9341: All versions

WCD9360: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3988: All versions

WCN3991: All versions

WCN3998: All versions

WCN6740: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://docs.qualcomm.com/bundle/publicresource/HD-10000-1/topics/may-2022-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Improper Validation of Array Index

EUVDB-ID: #VU63089

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-35072

CWE-ID: CWE-129 - Improper Validation of Array Index

Exploit availability: No

Description

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error in RFA component when processing external DIAG command. A local application can trigger buffer overflow and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

APQ8009: All versions

APQ8009W: All versions

APQ8017: All versions

APQ8037: All versions

APQ8053: All versions

APQ8096AU: All versions

MDM9150: All versions

MDM9206: All versions

MDM9250: All versions

MDM9607: All versions

MDM9628: All versions

MDM9640: All versions

MDM9650: All versions

MSM8108: All versions

MSM8208: All versions

MSM8209: All versions

MSM8608: All versions

MSM8909W: All versions

MSM8917: All versions

MSM8920: All versions

MSM8937: All versions

MSM8940: All versions

MSM8953: All versions

MSM8996AU: All versions

QCA6174A: All versions

QCA6310: All versions

QCA6320: All versions

QCA6564A: All versions

QCA6564AU: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6584: All versions

QCA9367: All versions

QCA9377: All versions

QCA9379: All versions

QCM2290: All versions

QCM4290: All versions

QCS2290: All versions

QCS4290: All versions

Qualcomm215: All versions

SD210: All versions

SD429: All versions

SD439: All versions

SD450: All versions

SD460: All versions

SD632: All versions

SD662: All versions

SD680: All versions

SD820: All versions

SD821: All versions

SD835: All versions

SDM429W: All versions

SDW2500: All versions

SDX12: All versions

SM4125: All versions

SW5100: All versions

SW5100P: All versions

WCD9326: All versions

WCD9330: All versions

WCD9335: All versions

WCD9340: All versions

WCD9341: All versions

WCD9370: All versions

WCD9375: All versions

WCN3610: All versions

WCN3615: All versions

WCN3620: All versions

WCN3660: All versions

WCN3660B: All versions

WCN3680: All versions

WCN3680B: All versions

WCN3910: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3990: All versions

WCN3998: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://docs.qualcomm.com/bundle/publicresource/HD-10000-1/topics/may-2022-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Time-of-check Time-of-use (TOCTOU) Race Condition

EUVDB-ID: #VU63104

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-35090

CWE-ID: CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition

Exploit availability: No

Description

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to TOC TOU race condition when updating address mappings within KERNEL component. A local appliction can send specially crafted data and execute arbitrary code with elevated privileges.


Mitigation

Install updates from vendor's website.

Vulnerable software versions

AQT1000: All versions

QCA6390: All versions

QCA6391: All versions

QCA6420: All versions

QCA6421: All versions

QCA6426: All versions

QCA6430: All versions

QCA6431: All versions

QCA6436: All versions

QCM6490: All versions

QCS6490: All versions

QRB5165: All versions

QRB5165M: All versions

QRB5165N: All versions

QSM8350: All versions

SA8540P: All versions

SA9000P: All versions

SD 8CX: All versions

SD 8cx Gen2: All versions

SD690 5G: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD780G: All versions

SD865 5G: All versions

SD870: All versions

SD888: All versions

SD888 5G: All versions

SDX55M: All versions

SDXR2 5G: All versions

SM7250P: All versions

SM7315: All versions

SM7325P: All versions

WCD9340: All versions

WCD9341: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3988: All versions

WCN3991: All versions

WCN3998: All versions

WCN6740: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WCN7850: All versions

WCN7851: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://docs.qualcomm.com/bundle/publicresource/HD-10000-1/topics/may-2022-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Time-of-check Time-of-use (TOCTOU) Race Condition

EUVDB-ID: #VU63087

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-35082

CWE-ID: CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the affected device.

The vulnerability exists due to race condition between PDCP and RRC tasks within NB1 component. A remote attacker can send specially crafted traffic after a valid RRC security mode command packet has been received and execute arbitrary code on the system.


Mitigation

Install updates from vendor's website.

Vulnerable software versions

MDM9206: All versions

QCA9367: All versions

QCA9377: All versions

External links

http://docs.qualcomm.com/bundle/publicresource/HD-10000-1/topics/may-2022-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Use of Out-of-range Pointer Offset

EUVDB-ID: #VU63103

Risk: Low

CVSSv3.1: 5.8 [CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-35098

CWE-ID: CWE-823 - Use of Out-of-range Pointer Offset

Exploit availability: No

Description

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to an improper validation of session id in PCM routing process. A local appliction can trigger a use of out-of-range pointer offset and escalate privileges on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

APQ8053: All versions

APQ8096AU: All versions

AQT1000: All versions

AR8031: All versions

CSRA6620: All versions

CSRA6640: All versions

MDM9150: All versions

MDM9640: All versions

MDM9650: All versions

MSM8953: All versions

QCA6174A: All versions

QCA6390: All versions

QCA6391: All versions

QCA6420: All versions

QCA6426: All versions

QCA6430: All versions

QCA6436: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA9377: All versions

QCM4290: All versions

QCM6125: All versions

QCS405: All versions

QCS410: All versions

QCS4290: All versions

QCS603: All versions

QCS605: All versions

QCS610: All versions

QCS6125: All versions

QRB5165: All versions

QRB5165M: All versions

QRB5165N: All versions

Qualcomm215: All versions

SA515M: All versions

SD429: All versions

SD460: All versions

SD480: All versions

SD662: All versions

SD680: All versions

SD690 5G: All versions

SD695: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD780G: All versions

SD855: All versions

SD865 5G: All versions

SD870: All versions

SD888 5G: All versions

SDM429W: All versions

SDX12: All versions

SDX55: All versions

SDX55M: All versions

SDXR2 5G: All versions

SM7250P: All versions

SM7325P: All versions

WCD9326: All versions

WCD9335: All versions

WCD9341: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3615: All versions

WCN3620: All versions

WCN3660B: All versions

WCN3680: All versions

WCN3680B: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3990: All versions

WCN3991: All versions

WCN3998: All versions

WCN6740: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://docs.qualcomm.com/bundle/publicresource/HD-10000-1/topics/may-2022-bulletin.html
http://source.codeaurora.org/quic/qsdk/platform/vendor/opensource/audio-kernel/commit/?id=1d3fb0289f8f1c7f53027933ea9b3922dfc58d90


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Input validation error

EUVDB-ID: #VU63098

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-35092

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input when processing DCB/AVB algorithm with an invalid queue index from IOCTL request. A local application can cause an arbitrary address modification and escalate privileges on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

APQ8053: All versions

APQ8096AU: All versions

AQT1000: All versions

AR8031: All versions

AR8035: All versions

CSRA6620: All versions

CSRA6640: All versions

MDM9150: All versions

MDM9650: All versions

MSM8953: All versions

QCA6174A: All versions

QCA6390: All versions

QCA6391: All versions

QCA6420: All versions

QCA6430: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA8081: All versions

QCA8337: All versions

QCA9377: All versions

QCS405: All versions

QCS410: All versions

QCS605: All versions

QCS610: All versions

QRB5165: All versions

QRB5165M: All versions

QRB5165N: All versions

Qualcomm215: All versions

SD 8 Gen1 5G: All versions

SD460: All versions

SD480: All versions

SD662: All versions

SD680: All versions

SD690 5G: All versions

SD695: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD780G: All versions

SD855: All versions

SD865 5G: All versions

SD870: All versions

SD888 5G: All versions

SDX12: All versions

SDX55: All versions

SDX55M: All versions

SDX65: All versions

SM7250P: All versions

SM7325P: All versions

WCD9326: All versions

WCD9335: All versions

WCD9341: All versions

WCD9360: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3615: All versions

WCN3660B: All versions

WCN3680: All versions

WCN3680B: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3990: All versions

WCN3991: All versions

WCN3998: All versions

WCN6740: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WCN7850: All versions

WCN7851: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://docs.qualcomm.com/bundle/publicresource/HD-10000-1/topics/may-2022-bulletin.html
http://source.codeaurora.org/quic/qsdk/platform/vendor/qcom-opensource/data-kernel/commit/?id=750c833c5fff296626289fc804a3065b37ce191f
http://source.codeaurora.org/quic/la/kernel/msm-4.14/commit/?id=b48cdc1354929396bdc24194f94349d41e685f76


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Buffer Over-read

EUVDB-ID: #VU63097

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-35085

CWE-ID: CWE-126 - Buffer over-read

Exploit availability: No

Description

The vulnerability allows a local application to cause a denial of service.

The vulnerability exists due to buffer over-read error in the WLAN Host Communication component. A local application can trigger buffer over-read error and cause a denial of service.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

AQT1000: All versions

AR8035: All versions

CSRB31024: All versions

QCA6175A: All versions

QCA6390: All versions

QCA6391: All versions

QCA6420: All versions

QCA6426: All versions

QCA6430: All versions

QCA6436: All versions

QCA6564AU: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA8081: All versions

QCA8337: All versions

QCM4290: All versions

QCS4290: All versions

SA415M: All versions

SA515M: All versions

SA6155P: All versions

SA8155P: All versions

SA8195P: All versions

SD 8 Gen1 5G: All versions

SD460: All versions

SD480: All versions

SD662: All versions

SD680: All versions

SD690 5G: All versions

SD695: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD780G: All versions

SD855: All versions

SD865 5G: All versions

SD870: All versions

SD888 5G: All versions

SDX55: All versions

SDX55M: All versions

SDX65: All versions

SDXR2 5G: All versions

SM7250P: All versions

SM7325P: All versions

WCD9341: All versions

WCD9360: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3950: All versions

WCN3988: All versions

WCN3991: All versions

WCN3998: All versions

WCN6740: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WCN7850: All versions

WCN7851: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://docs.qualcomm.com/bundle/publicresource/HD-10000-1/topics/may-2022-bulletin.html
http://source.codeaurora.org/quic/qsdk/platform/vendor/qcom-opensource/wlan/qca-wifi-host-cmn/commit/?id=e1aea60710fbd4590f78bfc0c7d559f7669f0d4c


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Buffer Over-read

EUVDB-ID: #VU63095

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-35084

CWE-ID: CWE-126 - Buffer over-read

Exploit availability: No

Description

The vulnerability allows a local application to cause a denial of service.

The vulnerability exists due to buffer over-read error in Automotive Connectivity component. A local application can trigger buffer over-read error and cause a denial of service.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

AQT1000: All versions

AR8031: All versions

AR8035: All versions

CSRA6620: All versions

CSRA6640: All versions

CSRB31024: All versions

QCA6174A: All versions

QCA6175A: All versions

QCA6390: All versions

QCA6391: All versions

QCA6420: All versions

QCA6426: All versions

QCA6430: All versions

QCA6436: All versions

QCA6564AU: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA8081: All versions

QCA8337: All versions

QCA9377: All versions

QCA9379: All versions

QCM4290: All versions

QCM6125: All versions

QCN7605: All versions

QCN7606: All versions

QCS405: All versions

QCS410: All versions

QCS4290: All versions

QCS605: All versions

QCS610: All versions

QCS6125: All versions

QRB5165: All versions

QRB5165M: All versions

QRB5165N: All versions

SA415M: All versions

SA515M: All versions

SA6155P: All versions

SA8155P: All versions

SA8195P: All versions

SD 8 Gen1 5G: All versions

SD460: All versions

SD480: All versions

SD662: All versions

SD680: All versions

SD690 5G: All versions

SD695: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD780G: All versions

SD855: All versions

SD865 5G: All versions

SD870: All versions

SD888 5G: All versions

SDX12: All versions

SDX55: All versions

SDX55M: All versions

SDX65: All versions

SDXR2 5G: All versions

SM7250P: All versions

SM7325P: All versions

WCD9335: All versions

WCD9341: All versions

WCD9360: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3990: All versions

WCN3991: All versions

WCN3998: All versions

WCN3999: All versions

WCN6740: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WCN7850: All versions

WCN7851: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://docs.qualcomm.com/bundle/publicresource/HD-10000-1/topics/may-2022-bulletin.html
http://source.codeaurora.org/quic/qsdk/platform/vendor/qcom-opensource/wlan/qca-wifi-host-cmn/commit/?id=022554eb485fe7ecd251341c6115e5ece40f3927


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Use-after-free

EUVDB-ID: #VU63093

Risk: Low

CVSSv3.1: 7.5 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C]

CVE-ID: CVE-2022-22071

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in the Automotive Android OS when process shell memory is freed using IOCTL munmap call and process initialization is in progress. A local application can trigger a use-after-free error and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

APQ8053: All versions

AR8031: All versions

AR8035: All versions

CSRA6620: All versions

CSRA6640: All versions

MDM9150: All versions

MSM8953: All versions

QCA6174A: All versions

QCA6390: All versions

QCA6391: All versions

QCA6426: All versions

QCA6436: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA8081: All versions

QCA8337: All versions

QCA9377: All versions

QCM2290: All versions

QCM4290: All versions

QCM6490: All versions

QCS2290: All versions

QCS405: All versions

QCS410: All versions

QCS4290: All versions

QCS610: All versions

QCS6490: All versions

QRB5165: All versions

QRB5165M: All versions

QRB5165N: All versions

Qualcomm215: All versions

SA6155P: All versions

SA8155P: All versions

SA8195P: All versions

SD439: All versions

SD460: All versions

SD480: All versions

SD662: All versions

SD680: All versions

SD690 5G: All versions

SD695: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD780G: All versions

SD855: All versions

SD865 5G: All versions

SD870: All versions

SD888 5G: All versions

SDX12: All versions

SDX55: All versions

SDX55M: All versions

SDX65: All versions

SDXR2 5G: All versions

SM4125: All versions

SM7250P: All versions

SM7325P: All versions

WCD9326: All versions

WCD9335: All versions

WCD9341: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3615: All versions

WCN3660B: All versions

WCN3680B: All versions

WCN3910: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3991: All versions

WCN3998: All versions

WCN3999: All versions

WCN6740: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WCN7850: All versions

WCN7851: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://docs.qualcomm.com/bundle/publicresource/HD-10000-1/topics/may-2022-bulletin.html
http://source.codeaurora.org/quic/la/kernel/msm-5.4/commit/?id=586840fde350d7b8563df9889c8ce397e2c20dda


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.

21) Use-after-free

EUVDB-ID: #VU63092

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-22068

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in NPU component. A local application can trigger a use-after-free error and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

APQ8053: All versions

AQT1000: All versions

AR8031: All versions

AR8035: All versions

CSRA6620: All versions

CSRA6640: All versions

MDM9150: All versions

MSM8953: All versions

QCA6174A: All versions

QCA6390: All versions

QCA6391: All versions

QCA6420: All versions

QCA6426: All versions

QCA6430: All versions

QCA6436: All versions

QCA6564: All versions

QCA6564A: All versions

QCA6564AU: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA8081: All versions

QCA8337: All versions

QCA9377: All versions

QCM2290: All versions

QCM4290: All versions

QCS2290: All versions

QCS405: All versions

QCS410: All versions

QCS4290: All versions

QCS610: All versions

QRB5165: All versions

QRB5165M: All versions

QRB5165N: All versions

Qualcomm215: All versions

SA415M: All versions

SA515M: All versions

SA6145P: All versions

SA6155: All versions

SA6155P: All versions

SA8155: All versions

SA8155P: All versions

SA8195P: All versions

SD 675: All versions

SD439: All versions

SD460: All versions

SD480: All versions

SD660: All versions

SD662: All versions

SD665: All versions

SD675: All versions

SD678: All versions

SD680: All versions

SD690 5G: All versions

SD695: All versions

SD720G: All versions

SD730: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD780G: All versions

SD855: All versions

SD865 5G: All versions

SD870: All versions

SD888: All versions

SD888 5G: All versions

SDX12: All versions

SDX50M: All versions

SDX55: All versions

SDX55M: All versions

SDX65: All versions

SDXR2 5G: All versions

SM4125: All versions

SM6250: All versions

SM6250P: All versions

SM7250P: All versions

SM7315: All versions

SM7325P: All versions

SW5100: All versions

SW5100P: All versions

WCD9326: All versions

WCD9335: All versions

WCD9341: All versions

WCD9360: All versions

WCD9370: All versions

WCD9371: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3615: All versions

WCN3660B: All versions

WCN3680B: All versions

WCN3910: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3990: All versions

WCN3991: All versions

WCN3998: All versions

WCN3999: All versions

WCN6740: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WCN7850: All versions

WCN7851: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://docs.qualcomm.com/bundle/publicresource/HD-10000-1/topics/may-2022-bulletin.html
http://source.codeaurora.org/quic/la/kernel/msm-5.4/commit/?id=57a6844ba565447f802abecc9e47b39f33187ef2
http://source.codeaurora.org/quic/le/kernel/msm-4.19/commit/?id=0098ef73cc8d83fce4583252d3fe5e95642e9a9f


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) Use-after-free

EUVDB-ID: #VU63088

Risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-22057

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in graphics fence caused by a race condition while closing fence file descriptor and destroy graphics timeline simultaneously. A remote attacker can trick the victim to open a specially crafted file, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

APQ8053: All versions

AR8035: All versions

MSM8953: All versions

QCA6174A: All versions

QCA6390: All versions

QCA6391: All versions

QCA6426: All versions

QCA6436: All versions

QCA6595AU: All versions

QCA8081: All versions

QCA8337: All versions

QCA9377: All versions

QCM2290: All versions

QCM4290: All versions

QCM6490: All versions

QCS2290: All versions

QCS4290: All versions

QCS6490: All versions

QRB5165: All versions

QRB5165M: All versions

QRB5165N: All versions

Qualcomm215: All versions

SA6155P: All versions

SA8155P: All versions

SA8195P: All versions

SD 8 Gen1 5G: All versions

SD439: All versions

SD460: All versions

SD480: All versions

SD662: All versions

SD680: All versions

SD690 5G: All versions

SD695: All versions

SD750G: All versions

SD765: All versions

SD765G: All versions

SD768G: All versions

SD778G: All versions

SD780G: All versions

SD865 5G: All versions

SD870: All versions

SD888: All versions

SD888 5G: All versions

SDX12: All versions

SDX55M: All versions

SDX65: All versions

SDXR2 5G: All versions

SM7250P: All versions

SM7315: All versions

SM7325P: All versions

SW5100: All versions

SW5100P: All versions

WCD9326: All versions

WCD9335: All versions

WCD9341: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCN3615: All versions

WCN3660B: All versions

WCN3680B: All versions

WCN3910: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3991: All versions

WCN3998: All versions

WCN6740: All versions

WCN6750: All versions

WCN6850: All versions

WCN6851: All versions

WCN6855: All versions

WCN6856: All versions

WCN7850: All versions

WCN7851: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

External links

http://docs.qualcomm.com/bundle/publicresource/HD-10000-1/topics/may-2022-bulletin.html
http://source.codeaurora.org/quic/la/kernel/msm-5.4/commit/?id=339824df70a0e9e08f2a7151b776d72421050f04


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Buffer overflow

EUVDB-ID: #VU63091

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-22072

CWE-ID: CWE-120 - Buffer overflow

Exploit availability: No

Description

The vulnerability allows a local application to compromise vulnerable system.

The vulnerability exists due to a buffer overflow in the WLAN Host Communication component caused by an improper validation of NDP application information length. A local application can trigger a buffer overflow and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

APQ8009: All versions

APQ8017: All versions

APQ8053: All versions

APQ8096AU: All versions

AR8031: All versions

CSRA6620: All versions

CSRA6640: All versions

MDM9150: All versions

MDM9206: All versions

MDM9250: All versions

MDM9607: All versions

MDM9626: All versions

MDM9628: All versions

MDM9650: All versions

MSM8937: All versions

PM8937: All versions

QCA4020: All versions

QCA6174A: All versions

QCA6175A: All versions

QCA6310: All versions

QCA6320: All versions

QCA6335: All versions

QCA6564A: All versions

QCA6564AU: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA9367: All versions

QCA9377: All versions

QCA9379: All versions

QCS405: All versions

QCS603: All versions

QCS605: All versions

SA515M: All versions

SD670: All versions

SD710: All versions

SD820: All versions

SD835: All versions

SD845: All versions

SDX12: All versions

SDX20: All versions

SDX24: All versions

SDXR1: All versions

WCD9326: All versions

WCD9330: All versions

WCD9335: All versions

WCD9340: All versions

WCD9341: All versions

WCN3610: All versions

WCN3615: All versions

WCN3660B: All versions

WCN3680B: All versions

WCN3980: All versions

WCN3990: All versions

WCN3998: All versions

WCN3999: All versions

WSA8810: All versions

WSA8815: All versions

External links

http://docs.qualcomm.com/bundle/publicresource/HD-10000-1/topics/may-2022-bulletin.html
http://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=34fa11aeb2d9232d4ed4b4babab0e4760f04aa92
http://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=18eae871c458008b7b7fcb729a3c9a73e4fdc135
http://source.codeaurora.org/quic/le/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=36dd3a5a3c4278272cbe2c78392499bee51671c4


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###