Learn about CVE-2021-35109, a vulnerability in Qualcomm's Snapdragon Connectivity and Snapdragon Mobile allowing address manipulation during RG configuration, impacting confidentiality and integrity.
This article provides an overview of CVE-2021-35109, detailing the vulnerability found in Snapdragon Connectivity and Snapdragon Mobile by Qualcomm, Inc.
Understanding CVE-2021-35109
CVE-2021-35109 involves possible address manipulation from APP-NS during the configuration of an RG by APP-S, leading to address range merging in Snapdragon Connectivity and Snapdragon Mobile.
What is CVE-2021-35109?
The vulnerability in CVE-2021-35109 allows for address manipulation during RG configuration, potentially impacting the security and integrity of affected Qualcomm products.
The Impact of CVE-2021-35109
With a CVSS base score of 6.8, this medium severity vulnerability poses a high impact on confidentiality, integrity, and availability, affecting a range of Snapdragon Connectivity and Snapdragon Mobile versions.
Technical Details of CVE-2021-35109
CVE-2021-35109 falls under the category of 'Improper Input Validation in Core', with a CVSS V3.1 base score of 6.8. The attack complexity is low, and the attack vector is physical.
Vulnerability Description
The vulnerability arises from improper input validation during address range merging in Snapdragon Connectivity and Snapdragon Mobile, potentially leading to security risks.
Affected Systems and Versions
Products impacted include SD 8 Gen1 5G, SM7450, SM8475, and various others listed under Qualcomm, Inc.
Exploitation Mechanism
Exploitation of this vulnerability requires no privileges, and can be executed physically, impacting confidentiality, integrity, and availability of the systems.
Mitigation and Prevention
To address CVE-2021-35109, immediate action is required to ensure the security of affected systems.
Immediate Steps to Take
Users are advised to apply relevant updates and patches provided by Qualcomm to mitigate the vulnerability and enhance system security.
Long-Term Security Practices
Implementing robust input validation mechanisms and regular security updates can help prevent similar vulnerabilities in the future.
Patching and Updates
Regularly check for security bulletins and updates from Qualcomm to stay informed about the latest patches and security enhancements.