Learn about CVE-2021-35077, a high-severity vulnerability in Qualcomm Snapdragon products. Understand the impact, affected systems, exploitation, and mitigation steps.
This article provides detailed information about CVE-2021-35077, a vulnerability found in multiple Qualcomm products, leading to a possible use-after-free scenario in compute offloads to DSP. The impact, affected systems, exploitation mechanism, and mitigation steps are discussed below.
Understanding CVE-2021-35077
CVE-2021-35077 is a vulnerability in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, and Snapdragon Mobile products, allowing a potential use-after-free scenario in compute offloads to the DSP.
What is CVE-2021-35077?
The vulnerability in CVE-2021-35077 arises from multiple calls spawning a dynamic process, which can lead to a use-after-free scenario in the affected Qualcomm products.
The Impact of CVE-2021-35077
With a CVSS base score of 8.4, this high-severity vulnerability can have significant confidentiality, integrity, and availability impacts on the affected systems. The attack complexity is low with a local attack vector.
Technical Details of CVE-2021-35077
CVE-2021-35077 is classified as a "Use After Free in DSP Services" vulnerability affecting a wide range of Qualcomm products. The versions include AR8035, QCA6174A, QCA6390, and many others.
Vulnerability Description
The vulnerability allows for a possible use-after-free scenario in compute offloads to the DSP.
Affected Systems and Versions
Qualcomm products affected by CVE-2021-35077 include Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, and Snapdragon Mobile, with specific versions mentioned in the data.
Exploitation Mechanism
The vulnerability can be exploited when multiple calls spawn a dynamic process, resulting in an unexpected use-after-free scenario.
Mitigation and Prevention
To mitigate the risks associated with CVE-2021-35077, immediate steps should be taken, followed by the implementation of long-term security practices.
Immediate Steps to Take
Users are advised to apply patches or updates provided by Qualcomm to address this vulnerability as soon as possible.
Long-Term Security Practices
Ensure regular security updates are applied, maintain system integrity, and monitor for any unusual activities that could indicate exploitation.
Patching and Updates
Qualcomm has released security bulletins, such as the February 2022 bulletin, containing necessary patches and updates to address CVE-2021-35077.