cve/2021/CVE-2021-30278.md
2025-09-29 21:09:30 +02:00

18 lines
2.5 KiB
Markdown

### [CVE-2021-30278](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30278)
![](https://img.shields.io/static/v1?label=Product&message=Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Voice%20%26%20Music%2C%20Snapdragon%20Wired%20Infrastructure%20and%20Networking&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=AR8031%2C%20AR8035%2C%20CSR8811%2C%20CSRA6620%2C%20CSRA6640%2C%20CSRB31024%2C%20FSM10055%2C%20FSM10056%2C%20IPQ6000%2C%20IPQ6005%2C%20IPQ6010%2C%20IPQ6018%2C%20IPQ6028%2C%20MDM9150%2C%20MDM9205%2C%20QCA4004%2C%20QCA6174A%2C%20QCA6390%2C%20QCA6391%2C%20QCA6426%2C%20QCA6436%2C%20QCA6564%2C%20QCA6564A%2C%20QCA6564AU%2C%20QCA6574%2C%20QCA6574A%2C%20QCA6574AU%2C%20QCA6595AU%2C%20QCA6696%2C%20QCA8072%2C%20QCA8075%2C%20QCA8081%2C%20QCA8337%2C%20QCA9377%2C%20QCA9984%2C%20QCM2290%2C%20QCM4290%2C%20QCM6490%2C%20QCN5021%2C%20QCN5022%2C%20QCN5052%2C%20QCN5121%2C%20QCN5122%2C%20QCN5152%2C%20QCN6023%2C%20QCN6024%2C%20QCN9000%2C%20QCN9022%2C%20QCN9024%2C%20QCN9070%2C%20QCN9072%2C%20QCN9074%2C%20QCS2290%2C%20QCS405%2C%20QCS410%2C%20QCS4290%2C%20QCS610%2C%20QCS6490%2C%20QCX315%2C%20QRB5165%2C%20QRB5165N%2C%20QSM8250%2C%20SA415M%2C%20SA515M%2C%20SA6145P%2C%20SA6150P%2C%20SA6155%2C%20SA6155P%2C%20SA8145P%2C%20SA8150P%2C%20SA8155%2C%20SA8155P%2C%20SA8195P%2C%20SD%20675%2C%20SD%208CX%2C%20SD460%2C%20SD480%2C%20SD660%2C%20SD662%2C%20SD665%2C%20SD675%2C%20SD678%2C%20SD690%205G%2C%20SD720G%2C%20SD730%2C%20SD750G%2C%20SD765%2C%20SD765G%2C%20SD768G%2C%20SD778G%2C%20SD7c%2C%20SD850%2C%20SD865%205G%2C%20SD870%2C%20SD888%205G%2C%20SDX24%2C%20SDX55%2C%20SDX55M%2C%20SDXR2%205G%2C%20SM6225%2C%20SM6250%2C%20SM6250P%2C%20SM6375%2C%20SM7250P%2C%20SM7325P%2C%20WCD9306%2C%20WCD9335%2C%20WCD9340%2C%20WCD9370%2C%20WCD9375%2C%20WCD9380%2C%20WCD9385%2C%20WCN3910%2C%20WCN3950%2C%20WCN3980%2C%20WCN%20...%5Btruncated*%5D%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20Input%20Validation%20in%20Core&color=brightgreen)
### Description
Improper input validation in TrustZone memory transfer interface can lead to information disclosure in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
### POC
#### Reference
- https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin
#### Github
No PoCs found on GitHub currently.