Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-30283 (GCVE-0-2021-30283)
Vulnerability from cvelistv5 – Published: 2022-01-03 07:25 – Updated: 2024-08-03 22:32
VLAI?
EPSS
Summary
Possible denial of service due to improper handling of debug register trap from user applications in Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
Severity ?
7.1 (High)
CWE
- Detection of Error Condition Without Action in Kernel
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Qualcomm, Inc. | Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile |
Affected:
QCA6391, QCM6490, QCS6490, QRB5165, QRB5165N, SD778G, SD888 5G, SM7325P, WCD9370, WCD9375, WCD9380, WCD9385, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WSA8830, WSA8835
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T22:32:39.957Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile",
"vendor": "Qualcomm, Inc.",
"versions": [
{
"status": "affected",
"version": "QCA6391, QCM6490, QCS6490, QRB5165, QRB5165N, SD778G, SD888 5G, SM7325P, WCD9370, WCD9375, WCD9380, WCD9385, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WSA8830, WSA8835"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Possible denial of service due to improper handling of debug register trap from user applications in Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Detection of Error Condition Without Action in Kernel",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-01-03T07:25:59.000Z",
"orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f",
"shortName": "qualcomm"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "product-security@qualcomm.com",
"ID": "CVE-2021-30283",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile",
"version": {
"version_data": [
{
"version_value": "QCA6391, QCM6490, QCS6490, QRB5165, QRB5165N, SD778G, SD888 5G, SM7325P, WCD9370, WCD9375, WCD9380, WCD9385, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WSA8830, WSA8835"
}
]
}
}
]
},
"vendor_name": "Qualcomm, Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Possible denial of service due to improper handling of debug register trap from user applications in Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile"
}
]
},
"impact": {
"cvss": {
"baseScore": 7.1,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Detection of Error Condition Without Action in Kernel"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin",
"refsource": "CONFIRM",
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f",
"assignerShortName": "qualcomm",
"cveId": "CVE-2021-30283",
"datePublished": "2022-01-03T07:25:59.000Z",
"dateReserved": "2021-04-07T00:00:00.000Z",
"dateUpdated": "2024-08-03T22:32:39.957Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
FKIE_CVE-2021-30283
Vulnerability from fkie_nvd - Published: 2022-01-03 08:15 - Updated: 2024-11-21 06:03
Severity ?
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
Possible denial of service due to improper handling of debug register trap from user applications in Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADD6D51E-5787-42A6-8A02-4EBBAFFF9C94",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
"matchCriteriaId": "99AA0291-B822-4CAD-BA17-81B632FC3FEF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FAC140F-FC5E-4C88-B777-7F5EBF49A695",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:qrb5165_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89A1AAD0-9336-4657-8E1E-74E8F490C06E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:qrb5165:-:*:*:*:*:*:*:*",
"matchCriteriaId": "386F2F37-974B-40F2-9B23-ABD49C60E32D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97BB1EB7-D194-4FE2-B4F6-A7A52F344DDE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA2C90E7-0F3A-43BB-ABF7-63CEA7A85ADA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sd778g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13286F2B-0FD1-474A-A632-1AA19B110536",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sd778g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F6EA3F98-0F45-44D3-9305-4F548B437011",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B991D515-9072-488F-B338-D7776C70FB62",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3F65BF0A-CC8F-4A4B-9FD4-7FC7066424F6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BEC725F-19B1-4078-B13D-CE624BE23344",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EA43E38-A12D-49C3-B05C-A2AF07ED2710",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8EE21BA-7178-4D69-852D-2322844FC6B9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9BACB28-F6EA-445A-B74F-0C3881FE59CB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3293739B-53D5-48C1-BC3A-FAA74D6C7954",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E650C510-037F-47DB-A486-EBF871C73278",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD031A8D-A48A-4363-8C00-C1FF5458D0FB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64F5D7CA-6F31-4842-AC66-EB975C19C83D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "180EB150-C114-429D-941F-9B99CDA4F810",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93BA62AF-3555-463A-8B51-76F07BF0B87E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54C616C5-6480-4FE0-9A1C-08026CCB08D8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7D8E02BA-3A7E-4B13-A8D7-20FD0FAE3187",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Possible denial of service due to improper handling of debug register trap from user applications in Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile"
},
{
"lang": "es",
"value": "Una posible denegaci\u00f3n de servicio debido al manejo inapropiado de la trampa de registro de depuraci\u00f3n de las aplicaciones de usuario en Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile"
}
],
"id": "CVE-2021-30283",
"lastModified": "2024-11-21T06:03:41.287",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.5,
"impactScore": 4.0,
"source": "product-security@qualcomm.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-01-03T08:15:08.550",
"references": [
{
"source": "product-security@qualcomm.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin"
}
],
"sourceIdentifier": "product-security@qualcomm.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-755"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CERTFR-2021-AVI-920
Vulnerability from certfr_avis - Published: 2021-12-07 - Updated: 2021-12-07
De multiples vulnérabilités ont été découvertes dans Android. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
References
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Google Android toutes versions sans les correctifs du 07 d\u00e9cembre 2021",
"product": {
"name": "Android",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-0904",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0904"
},
{
"name": "CVE-2021-1017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1017"
},
{
"name": "CVE-2021-39653",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39653"
},
{
"name": "CVE-2021-0996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0996"
},
{
"name": "CVE-2021-39655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39655"
},
{
"name": "CVE-2021-1004",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1004"
},
{
"name": "CVE-2021-1021",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1021"
},
{
"name": "CVE-2021-0982",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0982"
},
{
"name": "CVE-2021-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1020"
},
{
"name": "CVE-2021-0989",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0989"
},
{
"name": "CVE-2021-1894",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1894"
},
{
"name": "CVE-2021-0995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0995"
},
{
"name": "CVE-2021-0973",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0973"
},
{
"name": "CVE-2021-39643",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39643"
},
{
"name": "CVE-2021-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1012"
},
{
"name": "CVE-2021-30337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30337"
},
{
"name": "CVE-2021-1031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1031"
},
{
"name": "CVE-2021-30275",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30275"
},
{
"name": "CVE-2021-30335",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30335"
},
{
"name": "CVE-2021-0969",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0969"
},
{
"name": "CVE-2021-1047",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1047"
},
{
"name": "CVE-2021-39644",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39644"
},
{
"name": "CVE-2021-0986",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0986"
},
{
"name": "CVE-2021-30279",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30279"
},
{
"name": "CVE-2021-0998",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0998"
},
{
"name": "CVE-2021-1025",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1025"
},
{
"name": "CVE-2021-300269",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-300269"
},
{
"name": "CVE-2021-39657",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39657"
},
{
"name": "CVE-2021-1024",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1024"
},
{
"name": "CVE-2021-1007",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1007"
},
{
"name": "CVE-2021-39645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39645"
},
{
"name": "CVE-2021-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38204"
},
{
"name": "CVE-2021-0984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0984"
},
{
"name": "CVE-2021-1022",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1022"
},
{
"name": "CVE-2021-0991",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0991"
},
{
"name": "CVE-2021-30293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30293"
},
{
"name": "CVE-2021-0963",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0963"
},
{
"name": "CVE-2021-39647",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39647"
},
{
"name": "CVE-2021-0999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0999"
},
{
"name": "CVE-2021-1005",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1005"
},
{
"name": "CVE-2021-1030",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1030"
},
{
"name": "CVE-2021-0956",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0956"
},
{
"name": "CVE-2021-1032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1032"
},
{
"name": "CVE-2021-1009",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1009"
},
{
"name": "CVE-2021-39638",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39638"
},
{
"name": "CVE-2021-0968",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0968"
},
{
"name": "CVE-2021-0983",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0983"
},
{
"name": "CVE-2021-0953",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0953"
},
{
"name": "CVE-2021-0961",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0961"
},
{
"name": "CVE-2021-39650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39650"
},
{
"name": "CVE-2021-0966",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0966"
},
{
"name": "CVE-2021-39640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39640"
},
{
"name": "CVE-2021-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1016"
},
{
"name": "CVE-2021-0769",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0769"
},
{
"name": "CVE-2021-39652",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39652"
},
{
"name": "CVE-2021-30271",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30271"
},
{
"name": "CVE-2021-1046",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1046"
},
{
"name": "CVE-2021-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1013"
},
{
"name": "CVE-2021-1028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1028"
},
{
"name": "CVE-2021-0987",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0987"
},
{
"name": "CVE-2021-0976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0976"
},
{
"name": "CVE-2021-0978",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0978"
},
{
"name": "CVE-2021-1006",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1006"
},
{
"name": "CVE-2021-39649",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39649"
},
{
"name": "CVE-2021-30273",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30273"
},
{
"name": "CVE-2021-30289",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30289"
},
{
"name": "CVE-2021-0952",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0952"
},
{
"name": "CVE-2021-39646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39646"
},
{
"name": "CVE-2021-0985",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0985"
},
{
"name": "CVE-2021-39637",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39637"
},
{
"name": "CVE-2021-39642",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39642"
},
{
"name": "CVE-2021-1018",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1018"
},
{
"name": "CVE-2021-39639",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39639"
},
{
"name": "CVE-2021-0955",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0955"
},
{
"name": "CVE-2021-0675",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0675"
},
{
"name": "CVE-2021-1034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1034"
},
{
"name": "CVE-2021-1019",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1019"
},
{
"name": "CVE-2021-1027",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1027"
},
{
"name": "CVE-2021-30303",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30303"
},
{
"name": "CVE-2021-0979",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0979"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-30278",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30278"
},
{
"name": "CVE-2021-1026",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1026"
},
{
"name": "CVE-2021-30268",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30268"
},
{
"name": "CVE-2021-30336",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30336"
},
{
"name": "CVE-2021-1008",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1008"
},
{
"name": "CVE-2021-0994",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0994"
},
{
"name": "CVE-2021-0954",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0954"
},
{
"name": "CVE-2021-0958",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0958"
},
{
"name": "CVE-2021-30351",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30351"
},
{
"name": "CVE-2021-0981",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0981"
},
{
"name": "CVE-2021-30274",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30274"
},
{
"name": "CVE-2021-0704",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0704"
},
{
"name": "CVE-2021-0992",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0992"
},
{
"name": "CVE-2020-25668",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25668"
},
{
"name": "CVE-2021-30270",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30270"
},
{
"name": "CVE-2021-0993",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0993"
},
{
"name": "CVE-2021-1010",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1010"
},
{
"name": "CVE-2020-11263",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11263"
},
{
"name": "CVE-2021-39641",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39641"
},
{
"name": "CVE-2021-0997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0997"
},
{
"name": "CVE-2021-0970",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0970"
},
{
"name": "CVE-2021-30298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30298"
},
{
"name": "CVE-2021-0990",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0990"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-30262",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30262"
},
{
"name": "CVE-2021-0977",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0977"
},
{
"name": "CVE-2021-30282",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30282"
},
{
"name": "CVE-2021-30267",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30267"
},
{
"name": "CVE-2021-30272",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30272"
},
{
"name": "CVE-2021-0971",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0971"
},
{
"name": "CVE-2021-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1011"
},
{
"name": "CVE-2021-30276",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30276"
},
{
"name": "CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"name": "CVE-2021-1023",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1023"
},
{
"name": "CVE-2021-0988",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0988"
},
{
"name": "CVE-2021-39651",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39651"
},
{
"name": "CVE-2021-1003",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1003"
},
{
"name": "CVE-2021-39656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39656"
},
{
"name": "CVE-2021-39648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39648"
},
{
"name": "CVE-2021-30283",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30283"
},
{
"name": "CVE-2021-1029",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1029"
},
{
"name": "CVE-2021-1015",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1015"
},
{
"name": "CVE-2021-1918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1918"
},
{
"name": "CVE-2021-0967",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0967"
},
{
"name": "CVE-2021-0965",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0965"
},
{
"name": "CVE-2021-1001",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1001"
},
{
"name": "CVE-2021-1014",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1014"
},
{
"name": "CVE-2021-0964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0964"
},
{
"name": "CVE-2021-39636",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39636"
},
{
"name": "CVE-2021-1002",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1002"
}
],
"initial_release_date": "2021-12-07T00:00:00",
"last_revision_date": "2021-12-07T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-920",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-07T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Android. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance, un d\u00e9ni de service et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Android",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Android 2012-12-01 du 06 d\u00e9cembre 2021",
"url": "https://source.android.com/security/bulletin/2021-12-01"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Pixel 2012-12-01 du 06 d\u00e9cembre 2021",
"url": "https://source.android.com/security/bulletin/pixel/2021-12-01"
}
]
}
GSD-2021-30283
Vulnerability from gsd - Updated: 2023-12-13 01:23Details
Possible denial of service due to improper handling of debug register trap from user applications in Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2021-30283",
"description": "Possible denial of service due to improper handling of debug register trap from user applications in Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile",
"id": "GSD-2021-30283"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-30283"
],
"details": "Possible denial of service due to improper handling of debug register trap from user applications in Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile",
"id": "GSD-2021-30283",
"modified": "2023-12-13T01:23:31.589761Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "product-security@qualcomm.com",
"ID": "CVE-2021-30283",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile",
"version": {
"version_data": [
{
"version_value": "QCA6391, QCM6490, QCS6490, QRB5165, QRB5165N, SD778G, SD888 5G, SM7325P, WCD9370, WCD9375, WCD9380, WCD9385, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WSA8830, WSA8835"
}
]
}
}
]
},
"vendor_name": "Qualcomm, Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Possible denial of service due to improper handling of debug register trap from user applications in Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile"
}
]
},
"impact": {
"cvss": {
"baseScore": 7.1,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Detection of Error Condition Without Action in Kernel"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin",
"refsource": "CONFIRM",
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:qualcomm:qrb5165_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qrb5165:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:qualcomm:sd778g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sd778g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security.cna@qualcomm.com",
"ID": "CVE-2021-30283"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Possible denial of service due to improper handling of debug register trap from user applications in Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-755"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2022-01-12T17:58Z",
"publishedDate": "2022-01-03T08:15Z"
}
}
}
GHSA-FWHH-8J4M-VVW8
Vulnerability from github – Published: 2022-01-04 00:01 – Updated: 2022-01-13 00:01
VLAI?
Details
Possible denial of service due to improper handling of debug register trap from user applications in Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
{
"affected": [],
"aliases": [
"CVE-2021-30283"
],
"database_specific": {
"cwe_ids": [
"CWE-755"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-01-03T08:15:00Z",
"severity": "MODERATE"
},
"details": "Possible denial of service due to improper handling of debug register trap from user applications in Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile",
"id": "GHSA-fwhh-8j4m-vvw8",
"modified": "2022-01-13T00:01:43Z",
"published": "2022-01-04T00:01:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30283"
},
{
"type": "WEB",
"url": "https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin"
}
],
"schema_version": "1.4.0",
"severity": []
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…