Vulnerability Name:

CVE-2021-35101

Assigned:2021-06-21
Published:2022-06-14
Updated:2022-06-22
Summary:Improper handling of writes to virtual GICR control can lead to assertion failure in the hypervisor in Snapdragon Auto, Snapdragon Compute, Snapdragon Mobile
CVSS v3 Severity:6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:4.9 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
4.9 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-617
References:Source: MITRE
Type: CNA
CVE-2021-35101

Source: CONFIRM
Type: Vendor Advisory
https://www.qualcomm.com/company/product-security/bulletins/june-2022-bulletin

Vulnerable Configuration:Configuration 1:
  • cpe:/o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:aqt1000:-:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:qca6390:-:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:qca6391:-:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:qca6420:-:*:*:*:*:*:*:*

  • Configuration 5:
  • cpe:/o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:qca6421:-:*:*:*:*:*:*:*

  • Configuration 6:
  • cpe:/o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:qca6426:-:*:*:*:*:*:*:*

  • Configuration 7:
  • cpe:/o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:qca6430:-:*:*:*:*:*:*:*

  • Configuration 8:
  • cpe:/o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:qca6431:-:*:*:*:*:*:*:*

  • Configuration 9:
  • cpe:/o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:qca6436:-:*:*:*:*:*:*:*

  • Configuration 10:
  • cpe:/o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sa8540p:-:*:*:*:*:*:*:*

  • Configuration 11:
  • cpe:/o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sa9000p:-:*:*:*:*:*:*:*

  • Configuration 12:
  • cpe:/o:qualcomm:sd_8cx_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_8cx:-:*:*:*:*:*:*:*

  • Configuration 13:
  • cpe:/o:qualcomm:sd_8cx_gen2_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_8cx_gen2:-:*:*:*:*:*:*:*

  • Configuration 14:
  • cpe:/o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*

  • Configuration 15:
  • cpe:/o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd870:-:*:*:*:*:*:*:*

  • Configuration 16:
  • cpe:/o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*

  • Configuration 17:
  • cpe:/o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sdx55m:-:*:*:*:*:*:*:*

  • Configuration 18:
  • cpe:/o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:*

  • Configuration 19:
  • cpe:/o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:wcd9340:-:*:*:*:*:*:*:*

  • Configuration 20:
  • cpe:/o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:wcd9341:-:*:*:*:*:*:*:*

  • Configuration 21:
  • cpe:/o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:wcd9380:-:*:*:*:*:*:*:*

  • Configuration 22:
  • cpe:/o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:wcn3998:-:*:*:*:*:*:*:*

  • Configuration 23:
  • cpe:/o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:wsa8810:-:*:*:*:*:*:*:*

  • Configuration 24:
  • cpe:/o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:wsa8815:-:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    qualcomm aqt1000 firmware -
    qualcomm aqt1000 -
    qualcomm qca6390 firmware -
    qualcomm qca6390 -
    qualcomm qca6391 firmware -
    qualcomm qca6391 -
    qualcomm qca6420 firmware -
    qualcomm qca6420 -
    qualcomm qca6421 firmware -
    qualcomm qca6421 -
    qualcomm qca6426 firmware -
    qualcomm qca6426 -
    qualcomm qca6430 firmware -
    qualcomm qca6430 -
    qualcomm qca6431 firmware -
    qualcomm qca6431 -
    qualcomm qca6436 firmware -
    qualcomm qca6436 -
    qualcomm sa8540p firmware -
    qualcomm sa8540p -
    qualcomm sa9000p firmware -
    qualcomm sa9000p -
    qualcomm sd 8cx firmware -
    qualcomm sd 8cx -
    qualcomm sd 8cx gen2 firmware -
    qualcomm sd 8cx gen2 -
    qualcomm sd865 5g firmware -
    qualcomm sd865 5g -
    qualcomm sd870 firmware -
    qualcomm sd870 -
    qualcomm sd888 5g firmware -
    qualcomm sd888 5g -
    qualcomm sdx55m firmware -
    qualcomm sdx55m -
    qualcomm sdxr2 5g firmware -
    qualcomm sdxr2 5g -
    qualcomm wcd9340 firmware -
    qualcomm wcd9340 -
    qualcomm wcd9341 firmware -
    qualcomm wcd9341 -
    qualcomm wcd9380 firmware -
    qualcomm wcd9380 -
    qualcomm wcn3998 firmware -
    qualcomm wcn3998 -
    qualcomm wsa8810 firmware -
    qualcomm wsa8810 -
    qualcomm wsa8815 firmware -
    qualcomm wsa8815 -