Lucene search

K
cve[email protected]CVE-2021-1969
HistoryOct 20, 2021 - 7:15 a.m.

CVE-2021-1969

2021-10-2007:15:07
CWE-20
web.nvd.nist.gov
26
cve-2021-1969
information security
kernel buffer
memory exposure
snapdragon auto
snapdragon compute
snapdragon consumer iot
snapdragon industrial iot
snapdragon mobile
snapdragon voice & music
snapdragon wearables
nvd

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

6.2 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

5.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.6%

Improper validation of kernel buffer address while copying information back to user buffer can lead to kernel memory information exposure to user space in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Affected configurations

NVD
Node
qualcommaqt1000_firmwareMatch-
AND
qualcommaqt1000Match-
Node
qualcommar8031_firmwareMatch-
AND
qualcommar8031Match-
Node
qualcommar8035_firmwareMatch-
AND
qualcommar8035Match-
Node
qualcommcsra6620_firmwareMatch-
AND
qualcommcsra6620Match-
Node
qualcommcsra6640_firmwareMatch-
AND
qualcommcsra6640Match-
Node
qualcommfsm10055_firmwareMatch-
AND
qualcommfsm10055Match-
Node
qualcommfsm10056_firmwareMatch-
AND
qualcommfsm10056Match-
Node
qualcommmdm9150_firmwareMatch-
AND
qualcommmdm9150Match-
Node
qualcommqca6391_firmwareMatch-
AND
qualcommqca6391Match-
Node
qualcommqca6420_firmwareMatch-
AND
qualcommqca6420Match-
Node
qualcommqca6430_firmwareMatch-
AND
qualcommqca6430Match-
Node
qualcommqca6574_firmwareMatch-
AND
qualcommqca6574Match-
Node
qualcommqca6574a_firmwareMatch-
AND
qualcommqca6574aMatch-
Node
qualcommqca6574au_firmwareMatch-
AND
qualcommqca6574auMatch-
Node
qualcommqca6584au_firmwareMatch-
AND
qualcommqca6584auMatch-
Node
qualcommqca6595_firmwareMatch-
AND
qualcommqca6595Match-
Node
qualcommqca6595au_firmwareMatch-
AND
qualcommqca6595auMatch-
Node
qualcommqca6696_firmwareMatch-
AND
qualcommqca6696Match-
Node
qualcommqca8337_firmwareMatch-
AND
qualcommqca8337Match-
Node
qualcommqcm6125_firmwareMatch-
AND
qualcommqcm6125Match-
Node
qualcommqcs405_firmwareMatch-
AND
qualcommqcs405Match-
Node
qualcommqcs410_firmwareMatch-
AND
qualcommqcs410Match-
Node
qualcommqcs610_firmwareMatch-
AND
qualcommqcs610Match-
Node
qualcommqcs6125_firmwareMatch-
AND
qualcommqcs6125Match-
Node
qualcommsa6145p_firmwareMatch-
AND
qualcommsa6145pMatch-
Node
qualcommsa6150p_firmwareMatch-
AND
qualcommsa6150pMatch-
Node
qualcommsa6155_firmwareMatch-
AND
qualcommsa6155Match-
Node
qualcommsa6155p_firmwareMatch-
AND
qualcommsa6155pMatch-
Node
qualcommsa8145p_firmwareMatch-
AND
qualcommsa8145pMatch-
Node
qualcommsa8150p_firmwareMatch-
AND
qualcommsa8150pMatch-
Node
qualcommsa8155_firmwareMatch-
AND
qualcommsa8155Match-
Node
qualcommsa8155p_firmwareMatch-
AND
qualcommsa8155pMatch-
Node
qualcommsa8195p_firmwareMatch-
AND
qualcommsa8195pMatch-
Node
qualcommsd_675_firmwareMatch-
AND
qualcommsd_675Match-
Node
qualcommsd_8c_firmwareMatch-
AND
qualcommsd_8cMatch-
Node
qualcommsd_8cx_firmwareMatch-
AND
qualcommsd_8cxMatch-
Node
qualcommsd665_firmwareMatch-
AND
qualcommsd665Match-
Node
qualcommsd675_firmwareMatch-
AND
qualcommsd675Match-
Node
qualcommsd678_firmwareMatch-
AND
qualcommsd678Match-
Node
qualcommsd720g_firmwareMatch-
AND
qualcommsd720gMatch-
Node
qualcommsd855_firmwareMatch-
AND
qualcommsd855Match-
Node
qualcommsda429w_firmwareMatch-
AND
qualcommsda429wMatch-
Node
qualcommsdx55_firmwareMatch-
AND
qualcommsdx55Match-
Node
qualcommsdx55m_firmwareMatch-
AND
qualcommsdx55mMatch-
Node
qualcommsm6250_firmwareMatch-
AND
qualcommsm6250Match-
Node
qualcommwcd9335_firmwareMatch-
AND
qualcommwcd9335Match-
Node
qualcommwcd9340_firmwareMatch-
AND
qualcommwcd9340Match-
Node
qualcommwcd9341_firmwareMatch-
AND
qualcommwcd9341Match-
Node
qualcommwcd9370_firmwareMatch-
AND
qualcommwcd9370Match-
Node
qualcommwcd9375_firmwareMatch-
AND
qualcommwcd9375Match-
Node
qualcommwcd9380_firmwareMatch-
AND
qualcommwcd9380Match-
Node
qualcommwcn3610_firmwareMatch-
AND
qualcommwcn3610Match-
Node
qualcommwcn3620_firmwareMatch-
AND
qualcommwcn3620Match-
Node
qualcommwcn3660b_firmwareMatch-
AND
qualcommwcn3660bMatch-
Node
qualcommwcn3950_firmwareMatch-
AND
qualcommwcn3950Match-
Node
qualcommwcn3980_firmwareMatch-
AND
qualcommwcn3980Match-
Node
qualcommwcn3988_firmwareMatch-
AND
qualcommwcn3988Match-
Node
qualcommwcn3991_firmwareMatch-
AND
qualcommwcn3991Match-
Node
qualcommwcn3998_firmwareMatch-
AND
qualcommwcn3998Match-
Node
qualcommwcn3999_firmwareMatch-
AND
qualcommwcn3999Match-
Node
qualcommwsa8810_firmwareMatch-
AND
qualcommwsa8810Match-
Node
qualcommwsa8815_firmwareMatch-
AND
qualcommwsa8815Match-

CNA Affected

[
  {
    "vendor": "Qualcomm, Inc.",
    "product": "Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables",
    "versions": [
      {
        "version": "AQT1000, AR8031, AR8035, CSRA6620, CSRA6640, FSM10055, FSM10056, MDM9150, QCA6391, QCA6420, QCA6430, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6696, QCA8337, QCM6125, QCS405, QCS410, QCS610, QCS6125, SA6145P, SA6150P, SA6155, SA6155P, SA8145P, SA8150P, SA8155, SA8155P, SA8195P, SD 675, SD 8C, SD 8CX, SD665, SD675, SD678, SD720G, SD855, SDA429W, SDX55, SDX55M, SM6250, WCD9335, WCD9340, WCD9341, WCD9370, WCD9375, WCD9380, WCN3610, WCN3620, WCN3660B, WCN3950, WCN3980, WCN3988, WCN3991, WCN3998, WCN3999, WSA8810, WSA8815",
        "status": "affected"
      }
    ]
  }
]

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

6.2 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

5.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.6%

Related for CVE-2021-1969