#VU56339 Buffer overflow in Qualcomm products - CVE-2021-1962
Published: September 6, 2021
Vulnerability identifier: #VU56339
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2021-1962
CWE-ID: CWE-120
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
AQT1000
AR9380
FSM10055
FSM10056
IPQ8065
IPQ8068
IPQ8069
QCA6391
QCA6420
QCA6430
QCA6574
QCA6574A
QCA6584AU
QCA6595
QCA6595AU
QCA6696
QCA9561
QCA9563
QCA9880
QCA9882
QCA9886
QCA9887
QCA9888
QCA9889
QCA9896
QCA9898
QCA9982
QCA9984
QCA9990
QCA9992
QCA9994
QCS410
QCS610
Qualcomm215
SA6145P
SA6150P
SA6155
SA8145P
SA8150P
SA8155
SA8155P
SA8195P
SD678
SD720G
SDA429W
SDX50M
SDX55M
SM6250
WCD9326
WCD9335
WCD9340
WCD9341
WCD9370
WCD9375
WCD9380
WCN3610
WCN3615
WCN3620
WCN3660B
WCN3680
WCN3950
WCN3980
WCN3988
WCN3990
WCN3991
WCN3998
WSA8810
WSA8815
IPQ8064
MDM9150
QCA6574AU
QCA9531
QCA9558
QCA9980
QCS605
SA6155P
SD675
SD205
SD210
SD665
SD730
SD855
SDX55
AQT1000
AR9380
FSM10055
FSM10056
IPQ8065
IPQ8068
IPQ8069
QCA6391
QCA6420
QCA6430
QCA6574
QCA6574A
QCA6584AU
QCA6595
QCA6595AU
QCA6696
QCA9561
QCA9563
QCA9880
QCA9882
QCA9886
QCA9887
QCA9888
QCA9889
QCA9896
QCA9898
QCA9982
QCA9984
QCA9990
QCA9992
QCA9994
QCS410
QCS610
Qualcomm215
SA6145P
SA6150P
SA6155
SA8145P
SA8150P
SA8155
SA8155P
SA8195P
SD678
SD720G
SDA429W
SDX50M
SDX55M
SM6250
WCD9326
WCD9335
WCD9340
WCD9341
WCD9370
WCD9375
WCD9380
WCN3610
WCN3615
WCN3620
WCN3660B
WCN3680
WCN3950
WCN3980
WCN3988
WCN3990
WCN3991
WCN3998
WSA8810
WSA8815
IPQ8064
MDM9150
QCA6574AU
QCA9531
QCA9558
QCA9980
QCS605
SA6155P
SD675
SD205
SD210
SD665
SD730
SD855
SDX55
Software vendor:
Qualcomm
Qualcomm
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error while processing IOCTL for getting peripheral endpoint information within the Data Network Stack & Connectivity component. A local user can execute arbitrary code with elevated privileges.
Remediation
Install updates from vendor's website.