Use-after-free in Qualcomm products - CVE-2021-1958
Published: September 6, 2021
Vulnerability identifier: #VU56352
CSH Severity: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2021-1958
CWE-ID: CWE-416
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
QCA6574A
QCA6595
QCA6595AU
QCA6696
SA6145P
SA6150P
SA8145P
SA8150P
SA8155
SA8155P
SA8195P
SD480
SD778G
SD780G
SD8885G
SDA429W
SM7325
WCD9341
WCD9370
WCD9375
WCD9380
WCD9385
WCN3610
WCN3620
WCN3660B
WCN3980
WCN3988
WCN3991
WCN6740
WCN6750
WCN6850
WCN6851
WCN6855
WCN6856
WSA8830
WSA8835
QCA6574AU
SA6155P
QCA6574A
QCA6595
QCA6595AU
QCA6696
SA6145P
SA6150P
SA8145P
SA8150P
SA8155
SA8155P
SA8195P
SD480
SD778G
SD780G
SD8885G
SDA429W
SM7325
WCD9341
WCD9370
WCD9375
WCD9380
WCD9385
WCN3610
WCN3620
WCN3660B
WCN3980
WCN3988
WCN3991
WCN6740
WCN6750
WCN6850
WCN6851
WCN6855
WCN6856
WSA8830
WSA8835
QCA6574AU
SA6155P
Software vendor:
Qualcomm
Qualcomm
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error caused by a race condition in fastrpc kernel driver for dynamic process creation in DSP Service. A local user can escalate privileges on the system.
Remediation
Install updates from vendor's website.