7.5
HIGH
CVE-2021-30327
Snapdragon Mobile Buffer Overflow Vulnerability
Description

Buffer overflow in sahara protocol while processing commands leads to overwrite of secure configuration data in Snapdragon Mobile, Snapdragon Compute, Snapdragon Auto, Snapdragon IOT, Snapdragon Connectivity, Snapdragon Voice & Music

INFO

Published Date :

June 14, 2022, 10:15 a.m.

Last Modified :

June 27, 2022, 6:15 a.m.

Remotely Exploitable :

No

Impact Score :

6.0

Exploitability Score :

0.9
Affected Products

The following products are affected by CVE-2021-30327 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Qualcomm qca6595au_firmware
2 Qualcomm sa6145p_firmware
3 Qualcomm sa8150p_firmware
4 Qualcomm sa8155p_firmware
5 Qualcomm sa8195p_firmware
6 Qualcomm ipq6000_firmware
7 Qualcomm ipq6010_firmware
8 Qualcomm ipq6018_firmware
9 Qualcomm ipq6028_firmware
10 Qualcomm qca6595_firmware
11 Qualcomm sa4150p_firmware
12 Qualcomm sa8155_firmware
13 Qualcomm sdx55_firmware
14 Qualcomm sm6250_firmware
15 Qualcomm sm6250p_firmware
16 Qualcomm sm7250p_firmware
17 Qualcomm sdm660_firmware
18 Qualcomm sm7125_firmware
19 Qualcomm sm8150_firmware
20 Qualcomm sm8250_firmware
21 Qualcomm sxr2130_firmware
22 Qualcomm sa515m_firmware
23 Qualcomm sa415m_firmware
24 Qualcomm sa4155p_firmware
25 Qualcomm sdx24_firmware
26 Qualcomm qcn7606_firmware
27 Qualcomm qcs405_firmware
28 Qualcomm qcn7605_firmware
29 Qualcomm ipq6005_firmware
30 Qualcomm mdm9205_firmware
31 Qualcomm apq8097_firmware
32 Qualcomm apq8098_firmware
33 Qualcomm msm8997_firmware
34 Qualcomm msm8998_firmware
35 Qualcomm qcn7605w_firmware
36 Qualcomm qcn7606w_firmware
37 Qualcomm qcs401_firmware
38 Qualcomm qcs402_firmware
39 Qualcomm qcs403_firmware
40 Qualcomm qcs404_firmware
41 Qualcomm qcs407_firmware
42 Qualcomm sa2145p_firmware
43 Qualcomm sa2150p_firmware
44 Qualcomm sa4250p_firmware
45 Qualcomm sa6115_firmware
46 Qualcomm sa6115p_firmware
47 Qualcomm sa6125_firmware
48 Qualcomm sa6125p_firmware
49 Qualcomm sa6145_firmware
50 Qualcomm sa615x_firmware
51 Qualcomm sa615xp_firmware
52 Qualcomm sc7180_firmware
53 Qualcomm sc7180p_firmware
54 Qualcomm sc8180x_firmware
55 Qualcomm sc8180xp_firmware
56 Qualcomm sda658_firmware
57 Qualcomm sda660_firmware
58 Qualcomm sda670_firmware
59 Qualcomm sda830_firmware
60 Qualcomm sda845_firmware
61 Qualcomm sdm640_firmware
62 Qualcomm sdm658_firmware
63 Qualcomm sdm845_firmware
64 Qualcomm sdm670_firmware
65 Qualcomm sdm710_firmware
66 Qualcomm sdm712_firmware
67 Qualcomm sdm830_firmware
68 Qualcomm sdm850_firmware
69 Qualcomm sdpx55m_firmware
70 Qualcomm sdx24m_firmware
71 Qualcomm sm4250_firmware
72 Qualcomm sm6125_firmware
73 Qualcomm sm6150_firmware
74 Qualcomm sm6150p_firmware
75 Qualcomm sm7150_firmware
76 Qualcomm sm7150p_firmware
77 Qualcomm sm7250_firmware
78 Qualcomm sm8150p_firmware
79 Qualcomm sxr2130p_firmware
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2021-30327.

URL Resource
https://www.qualcomm.com/company/product-security/bulletins/april-2022-bulletin Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2021-30327 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2021-30327 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Jun. 27, 2022

    Action Type Old Value New Value
    Added CVSS V3.1 Qualcomm, Inc. AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L
  • Initial Analysis by [email protected]

    Jun. 22, 2022

    Action Type Old Value New Value
    Added CVSS V2 NIST (AV:L/AC:L/Au:N/C:C/I:C/A:C)
    Added CVSS V3.1 NIST AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://www.qualcomm.com/company/product-security/bulletins/april-2022-bulletin No Types Assigned https://www.qualcomm.com/company/product-security/bulletins/april-2022-bulletin Vendor Advisory
    Added CWE NIST CWE-120
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:apq8097_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:apq8097:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:apq8098_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:apq8098:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq6000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq6000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq6005_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq6005:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq6010_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq6010:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq6028_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq6028:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:mdm9205_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:mdm9205:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8997_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8997:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8998_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8998:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn7605_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn7605:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn7605w_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn7605w:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn7606_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn7606:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn7606w_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn7606w:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs401_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs401:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs402_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs402:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs403_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs403:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs404_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs404:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs407_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs407:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa2145p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa2145p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa2150p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa2150p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa4150p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa4155p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa415m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa415m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa4250p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa4250p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa515m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa515m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa6115_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa6115:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa6115p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa6115p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa6125_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa6125:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa6125p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa6125p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa6145_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa6145:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa615x_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa615x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa615xp_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa615xp:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc7180_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc7180:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc7180p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc7180p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc8180x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc8180xp_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc8180xp:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sda658_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sda658:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sda670_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sda670:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sda830_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sda830:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdm640_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdm640:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdm658_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdm658:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdm712_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdm712:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdm830_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdm830:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdm850_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdm850:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdpx55m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdpx55m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx24m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx24m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm4250_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm4250:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm6125_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm6125:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm6150p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm6150p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7125_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7125:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7150p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7150p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7250_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7250:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8150p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8150p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sxr2130p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sxr2130p:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2021-30327 is associated with the following CWEs:

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.07 }} 0.00%

score

0.28753

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability