cvelist/2021/30xxx/CVE-2021-30327.json

69 lines
2.7 KiB
JSON
Raw Normal View History

2021-04-07 21:00:59 +00:00
{
2022-06-14 15:36:24 +05:30
"CVE_data_meta": {
2022-06-27 11:14:15 +05:30
"ASSIGNER": "product-security@qualcomm.com",
"ID": "CVE-2021-30327",
2022-06-14 15:36:24 +05:30
"STATE": "PUBLIC"
2022-06-27 11:14:15 +05:30
},
2022-06-14 15:36:24 +05:30
"affects": {
"vendor": {
"vendor_data": [
2021-04-07 21:00:59 +00:00
{
2022-06-14 15:36:24 +05:30
"product": {
"product_data": [
{
2022-06-27 11:14:15 +05:30
"product_name": "Snapdragon Mobile, Snapdragon Compute, Snapdragon Auto, Snapdragon IOT, Snapdragon Connectivity, Snapdragon Voice & Music",
2022-06-14 15:36:24 +05:30
"version": {
"version_data": [
{
"version_value": "APQ8097, APQ8098, IPQ6000, IPQ6005, IPQ6010, IPQ6018, IPQ6028, MDM9205, MSM8997, MSM8998, QCA6595, QCA6595AU, QCN7605, QCN7605W, QCN7606, QCN7606W, QCS401, QCS402, QCS403, QCS404, QCS405, QCS407, SA2145P, SA2150P, SA4150P, SA4155P, SA415M, SA4250P, SA515M, SA6115, SA6115P, SA6125, SA6125P, SA6145, SA6145P, SA615x, SA615xP, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SC7180P, SC8180X, SC8180XP, SDA658, SDA660, SDA670, SDA830, SDA845, SDM640, SDM658, SDM660, SDM670, SDM710, SDM712, SDM830, SDM845, SDM850, SDPX55M, SDX24, SDX24M, SDX55, SM4250, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM7125, SM7150, SM7150P, SM7250, SM7250P, SM8150, SM8150P, SM8250, SXR2130, SXR2130P"
}
]
}
}
]
2022-06-27 11:14:15 +05:30
},
2022-06-14 15:36:24 +05:30
"vendor_name": "Qualcomm, Inc."
2021-04-07 21:00:59 +00:00
}
2022-06-14 15:36:24 +05:30
]
}
2022-06-27 11:14:15 +05:30
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2022-06-14 15:36:24 +05:30
"description": {
"description_data": [
{
2022-06-27 11:14:15 +05:30
"lang": "eng",
2022-06-14 15:36:24 +05:30
"value": "Buffer overflow in sahara protocol while processing commands leads to overwrite of secure configuration data in Snapdragon Mobile, Snapdragon Compute, Snapdragon Auto, Snapdragon IOT, Snapdragon Connectivity, Snapdragon Voice & Music"
}
]
2022-06-27 11:14:15 +05:30
},
2022-06-14 15:36:24 +05:30
"impact": {
"cvss": {
2022-06-27 11:14:15 +05:30
"baseScore": "7.5",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L",
2022-06-14 15:36:24 +05:30
"version": "3.1"
}
2022-06-27 11:14:15 +05:30
},
2022-06-14 15:36:24 +05:30
"problemtype": {
"problemtype_data": [
{
"description": [
{
2022-06-27 11:14:15 +05:30
"lang": "eng",
2022-06-14 15:36:24 +05:30
"value": "Buffer overflow in EDL Sahara protocol"
}
]
}
]
2022-06-27 11:14:15 +05:30
},
2022-06-14 15:36:24 +05:30
"references": {
"reference_data": [
{
2022-06-27 11:14:15 +05:30
"name": "https://www.qualcomm.com/company/product-security/bulletins/april-2022-bulletin",
"refsource": "CONFIRM",
2022-06-14 15:36:24 +05:30
"url": "https://www.qualcomm.com/company/product-security/bulletins/april-2022-bulletin"
}
]
}
2021-04-07 21:00:59 +00:00
}