cve/2021/CVE-2021-1889.md
2025-09-29 21:09:30 +02:00

18 lines
2.5 KiB
Markdown

### [CVE-2021-1889](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1889)
![](https://img.shields.io/static/v1?label=Product&message=Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20IoT%2C%20Snapdragon%20Voice%20%26%20Music%2C%20Snapdragon%20Wearables&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=APQ8017%2C%20APQ8037%2C%20APQ8053%2C%20APQ8064AU%2C%20APQ8096AU%2C%20AQT1000%2C%20AR8031%2C%20AR8035%2C%20CSRA6620%2C%20CSRA6640%2C%20CSRB31024%2C%20FSM10055%2C%20FSM10056%2C%20MDM9205%2C%20MDM9640%2C%20MDM9650%2C%20MDM9655%2C%20MSM8917%2C%20MSM8920%2C%20MSM8937%2C%20MSM8940%2C%20MSM8953%2C%20MSM8996AU%2C%20PM8937%2C%20QCA4004%2C%20QCA4020%2C%20QCA6174A%2C%20QCA6175A%2C%20QCA6234%2C%20QCA6320%2C%20QCA6390%2C%20QCA6391%2C%20QCA6420%2C%20QCA6421%2C%20QCA6426%2C%20QCA6430%2C%20QCA6431%2C%20QCA6436%2C%20QCA6564%2C%20QCA6564A%2C%20QCA6564AU%2C%20QCA6574%2C%20QCA6574A%2C%20QCA6574AU%2C%20QCA6584AU%2C%20QCA6595%2C%20QCA6595AU%2C%20QCA6694%2C%20QCA6694AU%2C%20QCA6696%2C%20QCA8337%2C%20QCA9377%2C%20QCA9379%2C%20QCM2290%2C%20QCM4290%2C%20QCM6125%2C%20QCS2290%2C%20QCS405%2C%20QCS410%2C%20QCS4290%2C%20QCS603%2C%20QCS605%2C%20QCS610%2C%20QCS6125%2C%20QSM8250%2C%20QSM8350%2C%20Qualcomm215%2C%20SA415M%2C%20SA515M%2C%20SA6145P%2C%20SA6150P%2C%20SA6155%2C%20SA6155P%2C%20SA8145P%2C%20SA8150P%2C%20SA8155%2C%20SA8155P%2C%20SA8195P%2C%20SC8180X%2BSDX55%2C%20SD%20455%2C%20SD%20636%2C%20SD%20675%2C%20SD%208C%2C%20SD%208CX%2C%20SD429%2C%20SD439%2C%20SD450%2C%20SD460%2C%20SD480%2C%20SD632%2C%20SD660%2C%20SD662%2C%20SD665%2C%20SD670%2C%20SD675%2C%20SD678%2C%20SD690%205G%2C%20SD712%2C%20SD720G%2C%20SD730%2C%20SD750G%2C%20SD765%2C%20SD765G%2C%20SD768G%2C%20SD778G%2C%20SD780G%2C%20SD7c%2C%20SD820%2C%20SD821%2C%20SD835%2C%20SD850%2C%20SD855%2C%20SD865%205G%2C%20SD870%2C%20SD888%205G%2C%20SDA%20...%5Btruncated*%5D%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20in%20Trusted%20Application&color=brightgreen)
### Description
Possible buffer overflow due to lack of length check in Trusted Application in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Voice & Music, Snapdragon Wearables
### POC
#### Reference
- https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin
#### Github
No PoCs found on GitHub currently.