Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2021-35120 : What You Need to Know

Learn about CVE-2021-35120 affecting Qualcomm Snapdragon Compute, Connectivity, Industrial IOT, and Mobile products due to mishandling between export and release functions, leading to a use-after-free vulnerability. Take immediate steps for mitigation.

This CVE-2021-35120 affects a range of Qualcomm products including Snapdragon Compute, Connectivity, Industrial IOT, and Mobile, resulting from improper handling between export and release functions. This can lead to a use-after-free vulnerability.

Understanding CVE-2021-35120

This vulnerability stems from mishandling a situation where export and release functions operate on the same handle from the client, allowing for exploitation in various Qualcomm products.

What is CVE-2021-35120?

The vulnerability arises due to improper handling between export and release functions on the same handle in Snapdragon Compute, Connectivity, Industrial IOT, and Mobile, which can be exploited to trigger a use-after-free situation.

The Impact of CVE-2021-35120

The vulnerability has a medium severity base score of 6.7 under CVSS v3.1. It has a high impact on availability, confidentiality, and integrity, with high privileges required for exploitation. The attack complexity is low and requires no user interaction.

Technical Details of CVE-2021-35120

This section provides detailed technical insights into the vulnerability.

Vulnerability Description

The flaw results in a use-after-free condition exploiting handling between export and release functions.

Affected Systems and Versions

Qualcomm products impacted include Snapdragon Compute, Connectivity, Industrial IOT, and Mobile. The affected versions range across a wide array of Qualcomm chips and modules.

Exploitation Mechanism

By manipulating the export and release functions on the same handle, threat actors can exploit the vulnerability to trigger a use-after-free condition.

Mitigation and Prevention

Discover the necessary steps to mitigate and prevent potential exploitation.

Immediate Steps to Take

Ensure relevant patches and updates are applied promptly across affected Qualcomm devices. Monitor for any suspicious activities related to the vulnerability.

Long-Term Security Practices

Adopt robust security practices, including regular security assessments and audits, to fortify systems against potential vulnerabilities.

Patching and Updates

Stay informed about security advisories and update mechanisms provided by Qualcomm to deploy necessary patches and updates effectively.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now