#VU58573 Reachable Assertion in Qualcomm Hardware solutions


Published: 2021-12-07

Vulnerability identifier: #VU58573

Vulnerability risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-30273

CWE-ID: CWE-617

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
APQ8009W
Mobile applications / Mobile firmware & hardware
AR6003
Mobile applications / Mobile firmware & hardware
CSRB31024
Mobile applications / Mobile firmware & hardware
MDM8207
Mobile applications / Mobile firmware & hardware
MDM9205
Mobile applications / Mobile firmware & hardware
MDM9207
Mobile applications / Mobile firmware & hardware
MDM9215
Mobile applications / Mobile firmware & hardware
MDM9250
Mobile applications / Mobile firmware & hardware
MDM9615
Mobile applications / Mobile firmware & hardware
MDM9628
Mobile applications / Mobile firmware & hardware
QCA4004
Mobile applications / Mobile firmware & hardware
QCA6564A
Mobile applications / Mobile firmware & hardware
QCA6564AU
Mobile applications / Mobile firmware & hardware
QCA6574
Mobile applications / Mobile firmware & hardware
QCA6574A
Mobile applications / Mobile firmware & hardware
QCA6584
Mobile applications / Mobile firmware & hardware
QCA6584AU
Mobile applications / Mobile firmware & hardware
QCA6595AU
Mobile applications / Mobile firmware & hardware
QCA6696
Mobile applications / Mobile firmware & hardware
QCA9367
Mobile applications / Mobile firmware & hardware
QCS410
Mobile applications / Mobile firmware & hardware
QCS610
Mobile applications / Mobile firmware & hardware
QET4101
Mobile applications / Mobile firmware & hardware
QSW8573
Mobile applications / Mobile firmware & hardware
SA415M
Mobile applications / Mobile firmware & hardware
SA6145P
Mobile applications / Mobile firmware & hardware
SA6150P
Mobile applications / Mobile firmware & hardware
SA8145P
Mobile applications / Mobile firmware & hardware
SA8150P
Mobile applications / Mobile firmware & hardware
SA8155P
Mobile applications / Mobile firmware & hardware
SA8195P
Mobile applications / Mobile firmware & hardware
SD 675
Mobile applications / Mobile firmware & hardware
SD 8CX
Mobile applications / Mobile firmware & hardware
SD429
Mobile applications / Mobile firmware & hardware
SD678
Mobile applications / Mobile firmware & hardware
SD720G
Mobile applications / Mobile firmware & hardware
SDA429W
Mobile applications / Mobile firmware & hardware
SDW2500
Mobile applications / Mobile firmware & hardware
SM6250
Mobile applications / Mobile firmware & hardware
SM6250P
Mobile applications / Mobile firmware & hardware
WCD9306
Mobile applications / Mobile firmware & hardware
WCD9330
Mobile applications / Mobile firmware & hardware
WCD9335
Mobile applications / Mobile firmware & hardware
WCD9340
Mobile applications / Mobile firmware & hardware
WCD9370
Mobile applications / Mobile firmware & hardware
WCD9375
Mobile applications / Mobile firmware & hardware
WCD9380
Mobile applications / Mobile firmware & hardware
WCN3610
Mobile applications / Mobile firmware & hardware
WCN3620
Mobile applications / Mobile firmware & hardware
WCN3660B
Mobile applications / Mobile firmware & hardware
WCN3950
Mobile applications / Mobile firmware & hardware
WCN3980
Mobile applications / Mobile firmware & hardware
WCN3988
Mobile applications / Mobile firmware & hardware
WCN3990
Mobile applications / Mobile firmware & hardware
WCN3991
Mobile applications / Mobile firmware & hardware
APQ8096AU
Hardware solutions / Firmware
MDM9206
Hardware solutions / Firmware
MDM9607
Hardware solutions / Firmware
MDM9640
Hardware solutions / Firmware
MDM9650
Hardware solutions / Firmware
MSM8909W
Hardware solutions / Firmware
MSM8996AU
Hardware solutions / Firmware
QCA6174A
Hardware solutions / Firmware
QCA6574AU
Hardware solutions / Firmware
QCA9377
Hardware solutions / Firmware
SA6155P
Hardware solutions / Firmware
SD205
Hardware solutions / Firmware
SD210
Hardware solutions / Firmware
SD665
Hardware solutions / Firmware
SD675
Hardware solutions / Firmware
SD730
Hardware solutions / Firmware
SDM429W
Hardware solutions / Firmware
SDX20
Hardware solutions / Firmware
SDX24
Hardware solutions / Firmware

Vendor: Qualcomm

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion in Data Modem. A remote attacker can cause a denial of service condition on the target system.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

APQ8009W: All versions

APQ8096AU: All versions

AR6003: All versions

CSRB31024: All versions

MDM8207: All versions

MDM9205: All versions

MDM9206: All versions

MDM9207: All versions

MDM9215: All versions

MDM9250: All versions

MDM9607: All versions

MDM9615: All versions

MDM9628: All versions

MDM9640: All versions

MDM9650: All versions

MSM8909W: All versions

MSM8996AU: All versions

QCA4004: All versions

QCA6174A: All versions

QCA6564A: All versions

QCA6564AU: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6584: All versions

QCA6584AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA9367: All versions

QCA9377: All versions

QCS410: All versions

QCS610: All versions

QET4101: All versions

QSW8573: All versions

SA415M: All versions

SA6145P: All versions

SA6150P: All versions

SA6155P: All versions

SA8145P: All versions

SA8150P: All versions

SA8155P: All versions

SA8195P: All versions

SD 675: All versions

SD 8CX: All versions

SD205: All versions

SD210: All versions

SD429: All versions

SD665: All versions

SD675: All versions

SD678: All versions

SD720G: All versions

SD730: All versions

SDA429W: All versions

SDM429W: All versions

SDW2500: All versions

SDX20: All versions

SDX24: All versions

SM6250: All versions

SM6250P: All versions

WCD9306: All versions

WCD9330: All versions

WCD9335: All versions

WCD9340: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCN3610: All versions

WCN3620: All versions

WCN3660B: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3990: All versions

WCN3991: All versions


External links
http://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability