cve/2021/CVE-2021-30274.md
2025-09-29 21:09:30 +02:00

18 lines
2.5 KiB
Markdown

### [CVE-2021-30274](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30274)
![](https://img.shields.io/static/v1?label=Product&message=Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Voice%20%26%20Music%2C%20Snapdragon%20Wired%20Infrastructure%20and%20Networking&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=AR8031%2C%20AR8035%2C%20CSR8811%2C%20CSRA6620%2C%20CSRA6640%2C%20CSRB31024%2C%20FSM10055%2C%20FSM10056%2C%20IPQ6000%2C%20IPQ6005%2C%20IPQ6010%2C%20IPQ6018%2C%20IPQ6028%2C%20MDM9150%2C%20MDM9205%2C%20QCA4004%2C%20QCA6174A%2C%20QCA6390%2C%20QCA6391%2C%20QCA6426%2C%20QCA6436%2C%20QCA6564%2C%20QCA6564A%2C%20QCA6564AU%2C%20QCA6574%2C%20QCA6574A%2C%20QCA6574AU%2C%20QCA6595AU%2C%20QCA6696%2C%20QCA8072%2C%20QCA8075%2C%20QCA8081%2C%20QCA8337%2C%20QCA9377%2C%20QCA9984%2C%20QCM2290%2C%20QCM4290%2C%20QCM6490%2C%20QCN5021%2C%20QCN5022%2C%20QCN5052%2C%20QCN5121%2C%20QCN5122%2C%20QCN5152%2C%20QCN6023%2C%20QCN6024%2C%20QCN9000%2C%20QCN9022%2C%20QCN9024%2C%20QCN9070%2C%20QCN9072%2C%20QCN9074%2C%20QCS2290%2C%20QCS405%2C%20QCS410%2C%20QCS4290%2C%20QCS610%2C%20QCS6490%2C%20QCX315%2C%20QRB5165%2C%20QRB5165N%2C%20QSM8250%2C%20SA415M%2C%20SA515M%2C%20SA6145P%2C%20SA6150P%2C%20SA6155%2C%20SA6155P%2C%20SA8145P%2C%20SA8150P%2C%20SA8155%2C%20SA8155P%2C%20SA8195P%2C%20SD%20675%2C%20SD%208CX%2C%20SD460%2C%20SD480%2C%20SD660%2C%20SD662%2C%20SD665%2C%20SD675%2C%20SD678%2C%20SD690%205G%2C%20SD720G%2C%20SD730%2C%20SD750G%2C%20SD765%2C%20SD765G%2C%20SD768G%2C%20SD778G%2C%20SD7c%2C%20SD865%205G%2C%20SD870%2C%20SD888%205G%2C%20SDX24%2C%20SDX55%2C%20SDX55M%2C%20SDX57M%2C%20SDXR2%205G%2C%20SM6225%2C%20SM6250%2C%20SM6250P%2C%20SM6375%2C%20SM7250P%2C%20SM7325P%2C%20WCD9306%2C%20WCD9335%2C%20WCD9340%2C%20WCD9370%2C%20WCD9375%2C%20WCD9380%2C%20WCD9385%2C%20WCN3910%2C%20WCN3950%2C%20WCN3980%2C%20WC%20...%5Btruncated*%5D%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Integer%20Overflow%20or%20Wraparound%20in%20Core&color=brightgreen)
### Description
Possible integer overflow in access control initialization interface due to lack and size and address validation in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
### POC
#### Reference
- https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin
#### Github
No PoCs found on GitHub currently.