8.4
HIGH
CVE-2021-1892
Qualcomm Snapdragon Memory Corruption Input Validation Vulnerability
Description

Memory corruption due to improper input validation while processing IO control which is nonstandard in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Wired Infrastructure and Networking

INFO

Published Date :

April 7, 2021, 8:15 a.m.

Last Modified :

Nov. 21, 2024, 5:45 a.m.

Remotely Exploitable :

No

Impact Score :

5.9

Exploitability Score :

2.5
Affected Products

The following products are affected by CVE-2021-1892 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Qualcomm aqt1000_firmware
2 Qualcomm qca6391_firmware
3 Qualcomm qca6420_firmware
4 Qualcomm qca6430_firmware
5 Qualcomm qca6595au_firmware
6 Qualcomm wcd9341_firmware
7 Qualcomm wcn3998_firmware
8 Qualcomm wcn6850_firmware
9 Qualcomm wcn6851_firmware
10 Qualcomm wcn6855_firmware
11 Qualcomm wcn6856_firmware
12 Qualcomm wsa8810_firmware
13 Qualcomm wsa8815_firmware
14 Qualcomm qca1062_firmware
15 Qualcomm qca1064_firmware
16 Qualcomm qca2066_firmware
17 Qualcomm qca6310_firmware
18 Qualcomm qca6335_firmware
19 Qualcomm wcd9335_firmware
20 Qualcomm wcd9340_firmware
21 Qualcomm wcn3990_firmware
22 Qualcomm qca6174a_firmware
23 Qualcomm qca9377_firmware
24 Qualcomm sd845_firmware
25 Qualcomm sd850_firmware
26 Qualcomm qcn7606_firmware
27 Qualcomm sd835_firmware
28 Qualcomm qcn7605_firmware
29 Qualcomm qca6164_firmware
30 Qualcomm qca6174_firmware
31 Qualcomm pm8005_firmware
32 Qualcomm pm855_firmware
33 Qualcomm pm855p_firmware
34 Qualcomm pm8998_firmware
35 Qualcomm pmi8998_firmware
36 Qualcomm qat3550_firmware
37 Qualcomm qet4100_firmware
38 Qualcomm qfe2081fc_firmware
39 Qualcomm qfe2082fc_firmware
40 Qualcomm qfe3100_firmware
41 Qualcomm qfe3440fc_firmware
42 Qualcomm qfe4455fc_firmware
43 Qualcomm qln1035bd_firmware
44 Qualcomm sdr8150_firmware
45 Qualcomm smb1351_firmware
46 Qualcomm smb1380_firmware
47 Qualcomm smb1381_firmware
48 Qualcomm smb1390_firmware
49 Qualcomm smb2351_firmware
50 Qualcomm wgr7640_firmware
51 Qualcomm wtr5975_firmware
52 Qualcomm sd8c_firmware
53 Qualcomm sd8cx_firmware
54 Qualcomm smb1350_firmware
55 Qualcomm aqt1000
56 Qualcomm pm8005
57 Qualcomm pm855
58 Qualcomm pm855p
59 Qualcomm pm8998
60 Qualcomm pmi8998
61 Qualcomm qat3550
62 Qualcomm qca6174
63 Qualcomm qca6174a
64 Qualcomm qca6310
65 Qualcomm qca6335
66 Qualcomm qca6391
67 Qualcomm qca6420
68 Qualcomm qca6430
69 Qualcomm qca6595au
70 Qualcomm qet4100
71 Qualcomm qfe2081fc
72 Qualcomm qfe2082fc
73 Qualcomm qfe3100
74 Qualcomm qfe3440fc
75 Qualcomm qfe4455fc
76 Qualcomm qln1035bd
77 Qualcomm sd835
78 Qualcomm sd845
79 Qualcomm sd850
80 Qualcomm sdr8150
81 Qualcomm smb1350
82 Qualcomm smb1351
83 Qualcomm smb1380
84 Qualcomm smb1381
85 Qualcomm smb1390
86 Qualcomm smb2351
87 Qualcomm wcd9335
88 Qualcomm wcd9340
89 Qualcomm wcd9341
90 Qualcomm wcn3990
91 Qualcomm wcn3998
92 Qualcomm wcn6850
93 Qualcomm wcn6851
94 Qualcomm wcn6856
95 Qualcomm wgr7640
96 Qualcomm wsa8810
97 Qualcomm wsa8815
98 Qualcomm wtr5975
99 Qualcomm sd8c
100 Qualcomm sd8cx
101 Qualcomm qca9377
102 Qualcomm qcn7605
103 Qualcomm qcn7606
104 Qualcomm wcn6855
105 Qualcomm qca1062
106 Qualcomm qca1064
107 Qualcomm qca2066
108 Qualcomm qca6164
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2021-1892.

URL Resource
https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin Vendor Advisory
https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2021-1892 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2021-1892 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CWE Remap by [email protected]

    Jun. 28, 2022

    Action Type Old Value New Value
    Changed CWE CWE-20 CWE-787
  • Initial Analysis by [email protected]

    Apr. 12, 2021

    Action Type Old Value New Value
    Added CVSS V2 NIST (AV:L/AC:L/Au:N/C:C/I:C/A:C)
    Added CVSS V3.1 NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin No Types Assigned https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin Vendor Advisory
    Added CWE NIST CWE-20
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm8005_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm8005:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm855_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm855:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm855p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm855p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pm8998_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pm8998:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pmi8998_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pmi8998:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qat3550_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qat3550:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca1062_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca1062:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca1064_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca1064:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca2066_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca2066:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6164_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6164:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6174_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6174:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6335_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6335:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn7605_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn7605:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn7606_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn7606:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qet4100_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qet4100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qfe2081fc_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qfe2081fc:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qfe2082fc_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qfe2082fc:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qfe3100_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qfe3100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qfe3440fc_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qfe3440fc:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qfe4455fc_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qfe4455fc:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qln1035bd_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qln1035bd:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd8c_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd8c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd8cx_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd8cx:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd845_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd845:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd850_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd850:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdr8150_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdr8150:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:smb1350_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:smb1350:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:smb1351_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:smb1351:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:smb1380_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:smb1380:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:smb1381_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:smb1381:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:smb1390_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:smb1390:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:smb2351_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:smb2351:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wgr7640_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wgr7640:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wtr5975_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wtr5975:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2021-1892 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2021-1892 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.04 }} 0.00%

score

0.10264

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability