#VU55522 Integer underflow in Qualcomm products - CVE-2021-1920 

 

#VU55522 Integer underflow in Qualcomm products - CVE-2021-1920

Published: August 3, 2021


Vulnerability identifier: #VU55522
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2021-1920
CWE-ID: CWE-191
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
APQ8009
APQ8017
APQ8053
APQ8096AU
MDM9150
MDM9206
MDM9607
MDM9640
MDM9650
MSM8909W
MSM8917
MSM8920
MSM8937
MSM8940
MSM8953
MSM8996AU
QCA6174A
QCA6574AU
QCA9377
QCA9379
QCS605
SD636
SD675
SD205
SD210
SD450
SD665
SD670
SD712
SD730
SD835
SD845
SD850
SD855
SDM630
SDX20
SDX24
SDX55
APQ8009W
APQ8037
APQ8084
AQT1000
AR6003
CSR6030
CSRB31024
MDM8207
MDM8215
MDM8215M
MDM8615M
MDM9205
MDM9207
MDM9215
MDM9230
MDM9250
MDM9310
MDM9330
MDM9615
MDM9615M
MDM9625
MDM9628
MDM9630
MDM9635M
MDM9645
MDM9655
MSM8108
MSM8208
MSM8209
MSM8608
MSM8976
MSM8976SG
QCA1990
QCA4004
QCA6174
QCA6310
QCA6320
QCA6335
QCA6390
QCA6391
QCA6420
QCA6421
QCA6426
QCA6430
QCA6431
QCA6436
QCA6564A
QCA6564AU
QCA6574
QCA6574A
QCA6584
QCA6584AU
QCA6595AU
QCA6694
QCA6694AU
QCA6696
QCA9367
QCM4290
QCM6125
QCS410
QCS4290
QCS603
QCS610
QCS6125
QCX315
QSW8573
Qualcomm215
SA415M
SA515M
SA8155
SA8155P
SC8180X+SDX55
SD455
SD8C
SD8CX
SD429
SD439
SD480
SD632
SD678
SD6905G
SD720G
SD750G
SD765
SD765G
SD768G
SD778G
SD820
SD821
SD8655G
SD870
SD8885G
SDW2500
SDX12
SDX50M
SDX55M
SDXR1
SDXR25G
SM6250
SM6250P
SM7250
WCD9306
WCD9330
WCD9340
WCD9360
WCD9370
WCD9371
WCD9375
WCD9380
WCD9385
WCN3610
WCN3615
WCN3620
WCN3660
WCN3660B
WCN3680
WCN3680B
WCN3910
WCN3950
WCN3988
WCN3991
WCN3998
WCN6750
WCN6850
WCN6851
WCN6855
WCN6856
WHS9410
WSA8810
WSA8815
WSA8830
WSA8835
Software vendor:
Qualcomm

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer underflow in Data Modem when processing RTCP packets. A remote attacker can send specially crafted traffic to the system, trigger integer underflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install updates from vendor's website.

External links