#VU54551 Reachable Assertion in Qualcomm products - CVE-2021-1907
Published: July 5, 2021
Vulnerability identifier: #VU54551
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2021-1907
CWE-ID: CWE-617
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
APQ8053
MSM8953
QCA6574AU
SA6155P
SD636
SD665
SD670
SD710
SD835
SD845
SD855
SD888
SDM630
SDX55
CSRB31024
QCA6175A
QCA6390
QCA6391
QCA6426
QCA6436
QCA6564A
QCA6564AU
QCA6574
QCA6574A
QCA6584AU
QCA6595
QCA6595AU
QCA6696
QCM4290
QCM6125
QCS4290
QCS6125
SA415M
SA515M
SA6145P
SA6150P
SA6155
SA8145P
SA8150P
SA8155
SA8155P
SA8195P
SD480
SD660
SD765
SD765G
SD768G
SD778G
SD780G
SD8655G
SD870
SD8885G
SDX55M
SDXR25G
SM7250P
SM7315
SM7325P
WCD9326
WCD9335
WCD9340
WCD9341
WCD9370
WCD9375
WCD9380
WCD9385
WCN3615
WCN3680B
WCN3910
WCN3950
WCN3980
WCN3988
WCN3990
WCN3991
WCN3998
WCN6740
WCN6750
WCN6850
WCN6851
WCN6855
WCN6856
WSA8810
WSA8815
WSA8830
WSA8835
APQ8053
MSM8953
QCA6574AU
SA6155P
SD636
SD665
SD670
SD710
SD835
SD845
SD855
SD888
SDM630
SDX55
CSRB31024
QCA6175A
QCA6390
QCA6391
QCA6426
QCA6436
QCA6564A
QCA6564AU
QCA6574
QCA6574A
QCA6584AU
QCA6595
QCA6595AU
QCA6696
QCM4290
QCM6125
QCS4290
QCS6125
SA415M
SA515M
SA6145P
SA6150P
SA6155
SA8145P
SA8150P
SA8155
SA8155P
SA8195P
SD480
SD660
SD765
SD765G
SD768G
SD778G
SD780G
SD8655G
SD870
SD8885G
SDX55M
SDXR25G
SM7250P
SM7315
SM7325P
WCD9326
WCD9335
WCD9340
WCD9341
WCD9370
WCD9375
WCD9380
WCD9385
WCN3615
WCN3680B
WCN3910
WCN3950
WCN3980
WCN3988
WCN3990
WCN3991
WCN3998
WCN6740
WCN6750
WCN6850
WCN6851
WCN6855
WCN6856
WSA8810
WSA8815
WSA8830
WSA8835
Software vendor:
Qualcomm
Qualcomm
Description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a reachable assertion caused by lack of length check in BA request in WLAN HOST. A remote attacker can send specially crafted traffic to the device and perform a denial of service attack.
Remediation
Install updates from vendor's website.