← Volver a CVEs
CVE-2021-1968
MEDIUM6.2
Descripcion
Improper validation of kernel buffer address while copying information back to user buffer can lead to kernel memory information exposure to user space in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
Detalles CVE
Puntuacion CVSS v3.16.2
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado10/20/2021
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
qualcomm:aqt1000qualcomm:aqt1000_firmwarequalcomm:ar8031qualcomm:ar8031_firmwarequalcomm:ar8035qualcomm:ar8035_firmwarequalcomm:csra6620qualcomm:csra6620_firmwarequalcomm:csra6640qualcomm:csra6640_firmwarequalcomm:fsm10055qualcomm:fsm10055_firmwarequalcomm:fsm10056qualcomm:fsm10056_firmwarequalcomm:mdm9150qualcomm:mdm9150_firmwarequalcomm:qca6391qualcomm:qca6391_firmwarequalcomm:qca6420qualcomm:qca6420_firmwarequalcomm:qca6430qualcomm:qca6430_firmwarequalcomm:qca6574qualcomm:qca6574_firmwarequalcomm:qca6574aqualcomm:qca6574a_firmwarequalcomm:qca6574auqualcomm:qca6574au_firmwarequalcomm:qca6584auqualcomm:qca6584au_firmwarequalcomm:qca6595qualcomm:qca6595_firmwarequalcomm:qca6595auqualcomm:qca6595au_firmwarequalcomm:qca6696qualcomm:qca6696_firmwarequalcomm:qca8337qualcomm:qca8337_firmwarequalcomm:qcm6125qualcomm:qcm6125_firmwarequalcomm:qcs405qualcomm:qcs405_firmwarequalcomm:qcs410qualcomm:qcs410_firmwarequalcomm:qcs610qualcomm:qcs610_firmwarequalcomm:qcs6125qualcomm:qcs6125_firmwarequalcomm:sa6145pqualcomm:sa6145p_firmwarequalcomm:sa6150pqualcomm:sa6150p_firmwarequalcomm:sa6155qualcomm:sa6155_firmwarequalcomm:sa6155pqualcomm:sa6155p_firmwarequalcomm:sa8145pqualcomm:sa8145p_firmwarequalcomm:sa8150pqualcomm:sa8150p_firmwarequalcomm:sa8155qualcomm:sa8155_firmwarequalcomm:sa8155pqualcomm:sa8155p_firmwarequalcomm:sa8195pqualcomm:sa8195p_firmwarequalcomm:sd665qualcomm:sd665_firmwarequalcomm:sd675qualcomm:sd675_firmwarequalcomm:sd678qualcomm:sd678_firmwarequalcomm:sd720gqualcomm:sd720g_firmwarequalcomm:sd855qualcomm:sd855_firmwarequalcomm:sd_675qualcomm:sd_675_firmwarequalcomm:sd_8cqualcomm:sd_8c_firmwarequalcomm:sd_8cxqualcomm:sd_8cx_firmwarequalcomm:sda429wqualcomm:sda429w_firmwarequalcomm:sdx55qualcomm:sdx55_firmwarequalcomm:sdx55mqualcomm:sdx55m_firmwarequalcomm:sm6250qualcomm:sm6250_firmwarequalcomm:wcd9335qualcomm:wcd9335_firmwarequalcomm:wcd9340qualcomm:wcd9340_firmwarequalcomm:wcd9341qualcomm:wcd9341_firmwarequalcomm:wcd9370qualcomm:wcd9370_firmwarequalcomm:wcd9375qualcomm:wcd9375_firmwarequalcomm:wcd9380qualcomm:wcd9380_firmwarequalcomm:wcn3610qualcomm:wcn3610_firmwarequalcomm:wcn3620qualcomm:wcn3620_firmwarequalcomm:wcn3660bqualcomm:wcn3660b_firmwarequalcomm:wcn3950qualcomm:wcn3950_firmwarequalcomm:wcn3980qualcomm:wcn3980_firmwarequalcomm:wcn3988qualcomm:wcn3988_firmwarequalcomm:wcn3991qualcomm:wcn3991_firmwarequalcomm:wcn3998qualcomm:wcn3998_firmwarequalcomm:wcn3999qualcomm:wcn3999_firmwarequalcomm:wsa8810qualcomm:wsa8810_firmwarequalcomm:wsa8815qualcomm:wsa8815_firmware
Debilidades (CWE)
CWE-20
Referencias
http://packetstormsecurity.com/files/172856/Qualcomm-NPU-Use-After-Free-Information-Leak.html(product-security@qualcomm.com)
https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin(product-security@qualcomm.com)
http://packetstormsecurity.com/files/172856/Qualcomm-NPU-Use-After-Free-Information-Leak.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.