Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2021-35077 : Vulnerability Insights and Analysis

Learn about CVE-2021-35077, a high-severity vulnerability in Qualcomm Snapdragon products. Understand the impact, affected systems, exploitation, and mitigation steps.

This article provides detailed information about CVE-2021-35077, a vulnerability found in multiple Qualcomm products, leading to a possible use-after-free scenario in compute offloads to DSP. The impact, affected systems, exploitation mechanism, and mitigation steps are discussed below.

Understanding CVE-2021-35077

CVE-2021-35077 is a vulnerability in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, and Snapdragon Mobile products, allowing a potential use-after-free scenario in compute offloads to the DSP.

What is CVE-2021-35077?

The vulnerability in CVE-2021-35077 arises from multiple calls spawning a dynamic process, which can lead to a use-after-free scenario in the affected Qualcomm products.

The Impact of CVE-2021-35077

With a CVSS base score of 8.4, this high-severity vulnerability can have significant confidentiality, integrity, and availability impacts on the affected systems. The attack complexity is low with a local attack vector.

Technical Details of CVE-2021-35077

CVE-2021-35077 is classified as a "Use After Free in DSP Services" vulnerability affecting a wide range of Qualcomm products. The versions include AR8035, QCA6174A, QCA6390, and many others.

Vulnerability Description

The vulnerability allows for a possible use-after-free scenario in compute offloads to the DSP.

Affected Systems and Versions

Qualcomm products affected by CVE-2021-35077 include Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, and Snapdragon Mobile, with specific versions mentioned in the data.

Exploitation Mechanism

The vulnerability can be exploited when multiple calls spawn a dynamic process, resulting in an unexpected use-after-free scenario.

Mitigation and Prevention

To mitigate the risks associated with CVE-2021-35077, immediate steps should be taken, followed by the implementation of long-term security practices.

Immediate Steps to Take

Users are advised to apply patches or updates provided by Qualcomm to address this vulnerability as soon as possible.

Long-Term Security Practices

Ensure regular security updates are applied, maintain system integrity, and monitor for any unusual activities that could indicate exploitation.

Patching and Updates

Qualcomm has released security bulletins, such as the February 2022 bulletin, containing necessary patches and updates to address CVE-2021-35077.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now