#VU60359 Buffer overflow


Published: 2022-02-08 | Updated: 2023-02-06

Vulnerability identifier: #VU60359

Vulnerability risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-30309

CWE-ID: CWE-119

Exploitation vector: Local

Exploit availability: No

Description

The vulnerability allows a malicious application to escalate privileges on the system.

The vulnerability exists due to a boundary error when processing arguments for the QXDM command in UTILS. A malicious application can trigger a buffer overflow by supplying an overly long argument and execute arbitrary code.

Mitigation
Install updates from vendor's website.

External links
http://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability