Vulnerabilites related to Qualcomm, Inc. - Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Wired Infrastructure and Networking
CVE-2021-1892 (GCVE-0-2021-1892)
Vulnerability from cvelistv5
Published
2021-04-07 07:55
Modified
2024-08-03 16:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Improper Input Validation in WLAN
Summary
Memory corruption due to improper input validation while processing IO control which is nonstandard in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Wired Infrastructure and Networking
References
▼ | URL | Tags |
---|---|---|
https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Qualcomm, Inc. | Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Wired Infrastructure and Networking |
Version: AQT1000, PM8005, PM855, PM855P, PM8998, PMI8998, QAT3550, QCA1062, QCA1064, QCA2066, QCA6164, QCA6174, QCA6174A, QCA6310, QCA6335, QCA6391, QCA6420, QCA6430, QCA6595AU, QCA9377, QCN7605, QCN7606, QET4100, QFE2081FC, QFE2082FC, QFE3100, QFE3440FC, QFE4455FC, QLN1035BD, SD 8C, SD 8CX, SD835, SD845, SD850, SDR8150, SMB1350, SMB1351, SMB1380, SMB1381, SMB1390, SMB2351, WCD9335, WCD9340, WCD9341, WCN3990, WCN3998, WCN6850, WCN6851, WCN6855, WCN6856, WGR7640, WSA8810, WSA8815, WTR5975 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:25:06.439Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Wired Infrastructure and Networking", "vendor": "Qualcomm, Inc.", "versions": [ { "status": "affected", "version": "AQT1000, PM8005, PM855, PM855P, PM8998, PMI8998, QAT3550, QCA1062, QCA1064, QCA2066, QCA6164, QCA6174, QCA6174A, QCA6310, QCA6335, QCA6391, QCA6420, QCA6430, QCA6595AU, QCA9377, QCN7605, QCN7606, QET4100, QFE2081FC, QFE2082FC, QFE3100, QFE3440FC, QFE4455FC, QLN1035BD, SD 8C, SD 8CX, SD835, SD845, SD850, SDR8150, SMB1350, SMB1351, SMB1380, SMB1381, SMB1390, SMB2351, WCD9335, WCD9340, WCD9341, WCN3990, WCN3998, WCN6850, WCN6851, WCN6855, WCN6856, WGR7640, WSA8810, WSA8815, WTR5975" } ] } ], "descriptions": [ { "lang": "en", "value": "Memory corruption due to improper input validation while processing IO control which is nonstandard in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Wired Infrastructure and Networking" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation in WLAN", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-07T07:55:36", "orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "shortName": "qualcomm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@qualcomm.com", "ID": "CVE-2021-1892", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Wired Infrastructure and Networking", "version": { "version_data": [ { "version_value": "AQT1000, PM8005, PM855, PM855P, PM8998, PMI8998, QAT3550, QCA1062, QCA1064, QCA2066, QCA6164, QCA6174, QCA6174A, QCA6310, QCA6335, QCA6391, QCA6420, QCA6430, QCA6595AU, QCA9377, QCN7605, QCN7606, QET4100, QFE2081FC, QFE2082FC, QFE3100, QFE3440FC, QFE4455FC, QLN1035BD, SD 8C, SD 8CX, SD835, SD845, SD850, SDR8150, SMB1350, SMB1351, SMB1380, SMB1381, SMB1390, SMB2351, WCD9335, WCD9340, WCD9341, WCN3990, WCN3998, WCN6850, WCN6851, WCN6855, WCN6856, WGR7640, WSA8810, WSA8815, WTR5975" } ] } } ] }, "vendor_name": "Qualcomm, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Memory corruption due to improper input validation while processing IO control which is nonstandard in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Wired Infrastructure and Networking" } ] }, "impact": { "cvss": { "baseScore": "8.4", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation in WLAN" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin", "refsource": "CONFIRM", "url": "https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin" } ] } } } }, "cveMetadata": { "assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "assignerShortName": "qualcomm", "cveId": "CVE-2021-1892", "datePublished": "2021-04-07T07:55:36", "dateReserved": "2020-12-08T00:00:00", "dateUpdated": "2024-08-03T16:25:06.439Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }