#VU59183 Buffer overflow in Qualcomm products - CVE-2021-30308
Published: January 4, 2022
Vulnerability identifier: #VU59183
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2021-30308
CWE-ID: CWE-120
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
AQT1000
AR8035
CSRB31024
FSM10056
MDM9250
QCA6390
QCA6391
QCA6420
QCA6426
QCA6430
QCA6436
QCA6564A
QCA6564AU
QCA6574A
QCA6595AU
QCA6696
QCA8081
QCA8337
QCS410
QCS603
QCS610
QCX315
SA415M
SA515M
SD8Gen15G
SD8cxGen2
SD480
SD660
SD678
SD6905G
SD720G
SD750G
SD765
SD765G
SD768G
SD7c
SD8655G
SD870
SDX12
SDX55M
SDX65
SDXR1
SDXR25G
SM6250
SM6250P
SM6375
SM7250P
WCD9326
WCD9335
WCD9340
WCD9341
WCD9360
WCD9370
WCD9375
WCD9380
WCD9385
WCN3950
WCN3980
WCN3988
WCN3990
WCN3991
WCN3998
WCN6850
WCN6851
WCN6855
WCN6856
WSA8810
WSA8815
WSA8830
WSA8835
MDM9150
MDM9650
QCA6174A
QCA6574AU
QCA9377
QCS605
SD675
SD665
SD730
SD845
SD850
SD855
SDX20
SDX24
SDX55
AQT1000
AR8035
CSRB31024
FSM10056
MDM9250
QCA6390
QCA6391
QCA6420
QCA6426
QCA6430
QCA6436
QCA6564A
QCA6564AU
QCA6574A
QCA6595AU
QCA6696
QCA8081
QCA8337
QCS410
QCS603
QCS610
QCX315
SA415M
SA515M
SD8Gen15G
SD8cxGen2
SD480
SD660
SD678
SD6905G
SD720G
SD750G
SD765
SD765G
SD768G
SD7c
SD8655G
SD870
SDX12
SDX55M
SDX65
SDXR1
SDXR25G
SM6250
SM6250P
SM6375
SM7250P
WCD9326
WCD9335
WCD9340
WCD9341
WCD9360
WCD9370
WCD9375
WCD9380
WCD9385
WCN3950
WCN3980
WCN3988
WCN3990
WCN3991
WCN3998
WCN6850
WCN6851
WCN6855
WCN6856
WSA8810
WSA8815
WSA8830
WSA8835
MDM9150
MDM9650
QCA6174A
QCA6574AU
QCA9377
QCS605
SD675
SD665
SD730
SD845
SD850
SD855
SDX20
SDX24
SDX55
Software vendor:
Qualcomm
Qualcomm
Description
The vulnerability allows a malicious application to escalate privileges on the system.
The vulnerability exists due to a buffer overflow in RFA in the Modem component while printing the HARQ memory partition detail. A malicious application can trigger buffer overflow and execute arbitrary code with elevated privileges.
Remediation
Install updates from vendor's website.