ID

VAR-202203-0057


CVE

CVE-2021-35115


TITLE

Use of freed memory vulnerability in multiple Qualcomm products

Trust: 0.8

sources: JVNDB: JVNDB-2021-019204

DESCRIPTION

Improper handling of multiple session supported by PVM backend can lead to use after free in Snapdragon Auto, Snapdragon Mobile. APQ8096AU firmware, AR6003 firmware, MDM8215 Multiple Qualcomm products, such as firmware, contain vulnerabilities related to use of freed memory.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.62

sources: NVD: CVE-2021-35115 // JVNDB: JVNDB-2021-019204

AFFECTED PRODUCTS

vendor:qualcommmodel:mdm9615mscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdx55mscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sa6145pscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qca6696scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sa8155pscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm8215mscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sa8145pscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9310scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9215scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sa6150pscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sa8540pscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:apq8096auscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qca6564auscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sa6155pscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sa9000pscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qca6574ascope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm8215scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9615scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qca6574auscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:ar6003scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:msm8996auscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qca6584auscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sa8195pscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm8615mscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qca6564ascope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdx55scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:wcd9341scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sa8150pscope:eqversion: -

Trust: 1.0

vendor:クアルコムmodel:msm8996auscope: - version: -

Trust: 0.8

vendor:クアルコムmodel:mdm9215scope: - version: -

Trust: 0.8

vendor:クアルコムmodel:ar6003scope: - version: -

Trust: 0.8

vendor:クアルコムmodel:apq8096auscope: - version: -

Trust: 0.8

vendor:クアルコムmodel:mdm9615mscope: - version: -

Trust: 0.8

vendor:クアルコムmodel:mdm9615scope: - version: -

Trust: 0.8

vendor:クアルコムmodel:mdm8215scope: - version: -

Trust: 0.8

vendor:クアルコムmodel:mdm9310scope: - version: -

Trust: 0.8

vendor:クアルコムmodel:mdm8615mscope: - version: -

Trust: 0.8

vendor:クアルコムmodel:mdm8215mscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-019204 // NVD: CVE-2021-35115

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-35115
value: HIGH

Trust: 1.0

product-security@qualcomm.com: CVE-2021-35115
value: HIGH

Trust: 1.0

NVD: CVE-2021-35115
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202203-611
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2021-35115
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

nvd@nist.gov: CVE-2021-35115
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

product-security@qualcomm.com: CVE-2021-35115
baseSeverity: HIGH
baseScore: 8.4
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.5
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2021-35115
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2021-019204 // CNNVD: CNNVD-202203-611 // NVD: CVE-2021-35115 // NVD: CVE-2021-35115

PROBLEMTYPE DATA

problemtype:CWE-416

Trust: 1.0

problemtype:Use of freed memory (CWE-416) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-019204 // NVD: CVE-2021-35115

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202203-611

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-202203-611

PATCH

title:Qualcomm Repair measures for chip resource management errors and loopholesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=185046

Trust: 0.6

sources: CNNVD: CNNVD-202203-611

EXTERNAL IDS

db:NVDid:CVE-2021-35115

Trust: 3.2

db:JVNDBid:JVNDB-2021-019204

Trust: 0.8

db:CS-HELPid:SB2022030719

Trust: 0.6

db:CNNVDid:CNNVD-202203-611

Trust: 0.6

sources: JVNDB: JVNDB-2021-019204 // CNNVD: CNNVD-202203-611 // NVD: CVE-2021-35115

REFERENCES

url:https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin

Trust: 3.0

url:https://nvd.nist.gov/vuln/detail/cve-2021-35115

Trust: 0.8

url:https://www.cybersecurity-help.cz/vdb/sb2022030719

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2021-35115/

Trust: 0.6

sources: JVNDB: JVNDB-2021-019204 // CNNVD: CNNVD-202203-611 // NVD: CVE-2021-35115

SOURCES

db:JVNDBid:JVNDB-2021-019204
db:CNNVDid:CNNVD-202203-611
db:NVDid:CVE-2021-35115

LAST UPDATE DATE

2024-08-14T12:22:02.663000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2021-019204date:2023-07-19T08:29:00
db:CNNVDid:CNNVD-202203-611date:2022-04-11T00:00:00
db:NVDid:CVE-2021-35115date:2022-04-09T00:30:58.090

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2021-019204date:2023-07-19T00:00:00
db:CNNVDid:CNNVD-202203-611date:2022-03-07T00:00:00
db:NVDid:CVE-2021-35115date:2022-04-01T05:15:07.680