← Zuruck zu CVEs
CVE-2021-1969
MEDIUM6.2
Beschreibung
Improper validation of kernel buffer address while copying information back to user buffer can lead to kernel memory information exposure to user space in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CVE Details
CVSS v3.1 Bewertung6.2
SchweregradMEDIUM
CVSS VektorCVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
AngriffsvektorLOCAL
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht10/20/2021
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
qualcomm:aqt1000qualcomm:aqt1000_firmwarequalcomm:ar8031qualcomm:ar8031_firmwarequalcomm:ar8035qualcomm:ar8035_firmwarequalcomm:csra6620qualcomm:csra6620_firmwarequalcomm:csra6640qualcomm:csra6640_firmwarequalcomm:fsm10055qualcomm:fsm10055_firmwarequalcomm:fsm10056qualcomm:fsm10056_firmwarequalcomm:mdm9150qualcomm:mdm9150_firmwarequalcomm:qca6391qualcomm:qca6391_firmwarequalcomm:qca6420qualcomm:qca6420_firmwarequalcomm:qca6430qualcomm:qca6430_firmwarequalcomm:qca6574qualcomm:qca6574_firmwarequalcomm:qca6574aqualcomm:qca6574a_firmwarequalcomm:qca6574auqualcomm:qca6574au_firmwarequalcomm:qca6584auqualcomm:qca6584au_firmwarequalcomm:qca6595qualcomm:qca6595_firmwarequalcomm:qca6595auqualcomm:qca6595au_firmwarequalcomm:qca6696qualcomm:qca6696_firmwarequalcomm:qca8337qualcomm:qca8337_firmwarequalcomm:qcm6125qualcomm:qcm6125_firmwarequalcomm:qcs405qualcomm:qcs405_firmwarequalcomm:qcs410qualcomm:qcs410_firmwarequalcomm:qcs610qualcomm:qcs610_firmwarequalcomm:qcs6125qualcomm:qcs6125_firmwarequalcomm:sa6145pqualcomm:sa6145p_firmwarequalcomm:sa6150pqualcomm:sa6150p_firmwarequalcomm:sa6155qualcomm:sa6155_firmwarequalcomm:sa6155pqualcomm:sa6155p_firmwarequalcomm:sa8145pqualcomm:sa8145p_firmwarequalcomm:sa8150pqualcomm:sa8150p_firmwarequalcomm:sa8155qualcomm:sa8155_firmwarequalcomm:sa8155pqualcomm:sa8155p_firmwarequalcomm:sa8195pqualcomm:sa8195p_firmwarequalcomm:sd665qualcomm:sd665_firmwarequalcomm:sd675qualcomm:sd675_firmwarequalcomm:sd678qualcomm:sd678_firmwarequalcomm:sd720gqualcomm:sd720g_firmwarequalcomm:sd855qualcomm:sd855_firmwarequalcomm:sd_675qualcomm:sd_675_firmwarequalcomm:sd_8cqualcomm:sd_8c_firmwarequalcomm:sd_8cxqualcomm:sd_8cx_firmwarequalcomm:sda429wqualcomm:sda429w_firmwarequalcomm:sdx55qualcomm:sdx55_firmwarequalcomm:sdx55mqualcomm:sdx55m_firmwarequalcomm:sm6250qualcomm:sm6250_firmwarequalcomm:wcd9335qualcomm:wcd9335_firmwarequalcomm:wcd9340qualcomm:wcd9340_firmwarequalcomm:wcd9341qualcomm:wcd9341_firmwarequalcomm:wcd9370qualcomm:wcd9370_firmwarequalcomm:wcd9375qualcomm:wcd9375_firmwarequalcomm:wcd9380qualcomm:wcd9380_firmwarequalcomm:wcn3610qualcomm:wcn3610_firmwarequalcomm:wcn3620qualcomm:wcn3620_firmwarequalcomm:wcn3660bqualcomm:wcn3660b_firmwarequalcomm:wcn3950qualcomm:wcn3950_firmwarequalcomm:wcn3980qualcomm:wcn3980_firmwarequalcomm:wcn3988qualcomm:wcn3988_firmwarequalcomm:wcn3991qualcomm:wcn3991_firmwarequalcomm:wcn3998qualcomm:wcn3998_firmwarequalcomm:wcn3999qualcomm:wcn3999_firmwarequalcomm:wsa8810qualcomm:wsa8810_firmwarequalcomm:wsa8815qualcomm:wsa8815_firmware
Schwachen (CWE)
CWE-20
Referenzen
http://packetstormsecurity.com/files/172856/Qualcomm-NPU-Use-After-Free-Information-Leak.html(product-security@qualcomm.com)
https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin(product-security@qualcomm.com)
http://packetstormsecurity.com/files/172856/Qualcomm-NPU-Use-After-Free-Information-Leak.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.