7.5
HIGH
CVE-2021-30327
Snapdragon Mobile Buffer Overflow Vulnerability
Description

Buffer overflow in sahara protocol while processing commands leads to overwrite of secure configuration data in Snapdragon Mobile, Snapdragon Compute, Snapdragon Auto, Snapdragon IOT, Snapdragon Connectivity, Snapdragon Voice & Music

INFO

Published Date :

June 14, 2022, 10:15 a.m.

Last Modified :

Nov. 21, 2024, 6:03 a.m.

Remotely Exploitable :

No

Impact Score :

6.0

Exploitability Score :

0.9
Affected Products

The following products are affected by CVE-2021-30327 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Qualcomm qca6595au_firmware
2 Qualcomm sa6145p_firmware
3 Qualcomm sa8150p_firmware
4 Qualcomm sa8155p_firmware
5 Qualcomm sa8195p_firmware
6 Qualcomm ipq6000_firmware
7 Qualcomm ipq6010_firmware
8 Qualcomm ipq6018_firmware
9 Qualcomm ipq6028_firmware
10 Qualcomm qca6595_firmware
11 Qualcomm sa4150p_firmware
12 Qualcomm sa8155_firmware
13 Qualcomm sdx55_firmware
14 Qualcomm sm6250_firmware
15 Qualcomm sm6250p_firmware
16 Qualcomm sm7250p_firmware
17 Qualcomm sdm660_firmware
18 Qualcomm sm7125_firmware
19 Qualcomm sm8150_firmware
20 Qualcomm sm8250_firmware
21 Qualcomm sxr2130_firmware
22 Qualcomm sa515m_firmware
23 Qualcomm sa415m_firmware
24 Qualcomm sa4155p_firmware
25 Qualcomm sdx24_firmware
26 Qualcomm qcn7606_firmware
27 Qualcomm qcs405_firmware
28 Qualcomm qcn7605_firmware
29 Qualcomm ipq6005_firmware
30 Qualcomm mdm9205_firmware
31 Qualcomm apq8097_firmware
32 Qualcomm apq8098_firmware
33 Qualcomm msm8997_firmware
34 Qualcomm msm8998_firmware
35 Qualcomm qcn7605w_firmware
36 Qualcomm qcn7606w_firmware
37 Qualcomm qcs401_firmware
38 Qualcomm qcs402_firmware
39 Qualcomm qcs403_firmware
40 Qualcomm qcs404_firmware
41 Qualcomm qcs407_firmware
42 Qualcomm sa2145p_firmware
43 Qualcomm sa2150p_firmware
44 Qualcomm sa4250p_firmware
45 Qualcomm sa6115_firmware
46 Qualcomm sa6115p_firmware
47 Qualcomm sa6125_firmware
48 Qualcomm sa6125p_firmware
49 Qualcomm sa6145_firmware
50 Qualcomm sa615x_firmware
51 Qualcomm sa615xp_firmware
52 Qualcomm sc7180_firmware
53 Qualcomm sc7180p_firmware
54 Qualcomm sc8180x_firmware
55 Qualcomm sc8180xp_firmware
56 Qualcomm sda658_firmware
57 Qualcomm sda660_firmware
58 Qualcomm sda670_firmware
59 Qualcomm sda830_firmware
60 Qualcomm sda845_firmware
61 Qualcomm sdm640_firmware
62 Qualcomm sdm658_firmware
63 Qualcomm sdm845_firmware
64 Qualcomm sdm670_firmware
65 Qualcomm sdm710_firmware
66 Qualcomm sdm712_firmware
67 Qualcomm sdm830_firmware
68 Qualcomm sdm850_firmware
69 Qualcomm sdpx55m_firmware
70 Qualcomm sdx24m_firmware
71 Qualcomm sm4250_firmware
72 Qualcomm sm6125_firmware
73 Qualcomm sm6150_firmware
74 Qualcomm sm6150p_firmware
75 Qualcomm sm7150_firmware
76 Qualcomm sm7150p_firmware
77 Qualcomm sm7250_firmware
78 Qualcomm sm8150p_firmware
79 Qualcomm sxr2130p_firmware
80 Qualcomm qca6595
81 Qualcomm qca6595au
82 Qualcomm qcs405
83 Qualcomm sa415m
84 Qualcomm sa6145p
85 Qualcomm sa8150p
86 Qualcomm sa8155
87 Qualcomm sa8155p
88 Qualcomm sa8195p
89 Qualcomm sdm830
90 Qualcomm sdx55
91 Qualcomm sm6250
92 Qualcomm sm6250p
93 Qualcomm sm7250p
94 Qualcomm mdm9205
95 Qualcomm sa515m
96 Qualcomm sdx24
97 Qualcomm ipq6000
98 Qualcomm ipq6005
99 Qualcomm ipq6010
100 Qualcomm ipq6018
101 Qualcomm ipq6028
102 Qualcomm qcn7605
103 Qualcomm qcn7606
104 Qualcomm apq8098
105 Qualcomm msm8998
106 Qualcomm qcs404
107 Qualcomm sc7180
108 Qualcomm sc8180x
109 Qualcomm sda660
110 Qualcomm sda845
111 Qualcomm sdm660
112 Qualcomm sdm670
113 Qualcomm sdm710
114 Qualcomm sdm845
115 Qualcomm sdm850
116 Qualcomm sm6150
117 Qualcomm sm7150
118 Qualcomm sm8150
119 Qualcomm sm8250
120 Qualcomm sxr2130
121 Qualcomm sa4150p
122 Qualcomm sa4155p
123 Qualcomm sm6125
124 Qualcomm sdm712
125 Qualcomm sm7125
126 Qualcomm sa2150p
127 Qualcomm sc8180xp
128 Qualcomm sm4250
129 Qualcomm sm7250
130 Qualcomm sm8150p
131 Qualcomm sxr2130p
132 Qualcomm sda670
133 Qualcomm sdm640
134 Qualcomm sm6150p
135 Qualcomm sm7150p
136 Qualcomm sa6145
137 Qualcomm apq8097
138 Qualcomm msm8997
139 Qualcomm qcn7605w
140 Qualcomm qcn7606w
141 Qualcomm qcs401
142 Qualcomm qcs402
143 Qualcomm qcs403
144 Qualcomm qcs407
145 Qualcomm sa2145p
146 Qualcomm sa4250p
147 Qualcomm sa6115
148 Qualcomm sa6115p
149 Qualcomm sa6125
150 Qualcomm sa6125p
151 Qualcomm sa615x
152 Qualcomm sa615xp
153 Qualcomm sc7180p
154 Qualcomm sda658
155 Qualcomm sda830
156 Qualcomm sdm658
157 Qualcomm sdpx55m
158 Qualcomm sdx24m
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2021-30327.

URL Resource
https://www.qualcomm.com/company/product-security/bulletins/april-2022-bulletin Vendor Advisory
https://www.qualcomm.com/company/product-security/bulletins/april-2022-bulletin Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2021-30327 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2021-30327 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://www.qualcomm.com/company/product-security/bulletins/april-2022-bulletin
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Jun. 27, 2022

    Action Type Old Value New Value
    Added CVSS V3.1 Qualcomm, Inc. AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L
  • Initial Analysis by [email protected]

    Jun. 22, 2022

    Action Type Old Value New Value
    Added CVSS V2 NIST (AV:L/AC:L/Au:N/C:C/I:C/A:C)
    Added CVSS V3.1 NIST AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://www.qualcomm.com/company/product-security/bulletins/april-2022-bulletin No Types Assigned https://www.qualcomm.com/company/product-security/bulletins/april-2022-bulletin Vendor Advisory
    Added CWE NIST CWE-120
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:apq8097_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:apq8097:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:apq8098_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:apq8098:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq6000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq6000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq6005_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq6005:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq6010_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq6010:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq6028_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq6028:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:mdm9205_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:mdm9205:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8997_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8997:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:msm8998_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:msm8998:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn7605_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn7605:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn7605w_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn7605w:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn7606_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn7606:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn7606w_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn7606w:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs401_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs401:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs402_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs402:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs403_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs403:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs404_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs404:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs407_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs407:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa2145p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa2145p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa2150p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa2150p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa4150p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa4155p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa415m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa415m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa4250p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa4250p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa515m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa515m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa6115_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa6115:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa6115p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa6115p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa6125_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa6125:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa6125p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa6125p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa6145_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa6145:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa615x_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa615x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa615xp_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa615xp:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc7180_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc7180:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc7180p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc7180p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc8180x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc8180xp_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc8180xp:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sda658_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sda658:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sda670_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sda670:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sda830_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sda830:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdm640_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdm640:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdm658_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdm658:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdm712_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdm712:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdm830_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdm830:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdm850_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdm850:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdpx55m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdpx55m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx24m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx24m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm4250_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm4250:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm6125_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm6125:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm6150p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm6150p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7125_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7125:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7150p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7150p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7250_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7250:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8150p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8150p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sxr2130p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sxr2130p:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2021-30327 is associated with the following CWEs:

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.07 }} 0.00%

score

0.28753

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability