Lucene search

K
cve[email protected]CVE-2021-1950
HistoryApr 01, 2022 - 5:15 a.m.

CVE-2021-1950

2022-04-0105:15:07
CWE-287
web.nvd.nist.gov
60
cve-2021-1950
security
memory
authentication bypass
snapdragon auto
snapdragon compute
snapdragon connectivity
snapdragon industrial iot
snapdragon mobile
snapdragon wired infrastructure
networking

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.8%

Improper cleaning of secure memory between authenticated users can lead to face authentication bypass in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking

Affected configurations

NVD
Node
qualcommar8035_firmwareMatch-
AND
qualcommar8035Match-
Node
qualcommcsr8811_firmwareMatch-
AND
qualcommcsr8811Match-
Node
qualcommipq6000_firmwareMatch-
AND
qualcommipq6000Match-
Node
qualcommipq6005_firmwareMatch-
AND
qualcommipq6005Match-
Node
qualcommipq6010_firmwareMatch-
AND
qualcommipq6010Match-
Node
qualcommipq6018_firmwareMatch-
AND
qualcommipq6018Match-
Node
qualcommipq6028_firmwareMatch-
AND
qualcommipq6028Match-
Node
qualcommqca4024_firmwareMatch-
AND
qualcommqca4024Match-
Node
qualcommqca6390_firmwareMatch-
AND
qualcommqca6390Match-
Node
qualcommqca6391_firmwareMatch-
AND
qualcommqca6391Match-
Node
qualcommqca6426_firmwareMatch-
AND
qualcommqca6426Match-
Node
qualcommqca6436_firmwareMatch-
AND
qualcommqca6436Match-
Node
qualcommqca6574au_firmwareMatch-
AND
qualcommqca6574auMatch-
Node
qualcommqca6696_firmwareMatch-
AND
qualcommqca6696Match-
Node
qualcommqca8072_firmwareMatch-
AND
qualcommqca8072Match-
Node
qualcommqca8075_firmwareMatch-
AND
qualcommqca8075Match-
Node
qualcommqca8081_firmwareMatch-
AND
qualcommqca8081Match-
Node
qualcommqca9984_firmwareMatch-
AND
qualcommqca9984Match-
Node
qualcommqcm2290_firmwareMatch-
AND
qualcommqcm2290Match-
Node
qualcommqcm4290_firmwareMatch-
AND
qualcommqcm4290Match-
Node
qualcommqcm6490_firmwareMatch-
AND
qualcommqcm6490Match-
Node
qualcommqcn5021_firmwareMatch-
AND
qualcommqcn5021Match-
Node
qualcommqcn5022_firmwareMatch-
AND
qualcommqcn5022Match-
Node
qualcommqcn5052_firmwareMatch-
AND
qualcommqcn5052Match-
Node
qualcommqcn5121_firmwareMatch-
AND
qualcommqcn5121Match-
Node
qualcommqcn5122_firmwareMatch-
AND
qualcommqcn5122Match-
Node
qualcommqcn5152_firmwareMatch-
AND
qualcommqcn5152Match-
Node
qualcommqcn6023_firmwareMatch-
AND
qualcommqcn6023Match-
Node
qualcommqcn6024_firmwareMatch-
AND
qualcommqcn6024Match-
Node
qualcommqcn9000_firmwareMatch-
AND
qualcommqcn9000Match-
Node
qualcommqcn9022_firmwareMatch-
AND
qualcommqcn9022Match-
Node
qualcommqcn9024_firmwareMatch-
AND
qualcommqcn9024Match-
Node
qualcommqcn9070_firmwareMatch-
AND
qualcommqcn9070Match-
Node
qualcommqcn9072_firmwareMatch-
AND
qualcommqcn9072Match-
Node
qualcommqcn9074_firmwareMatch-
AND
qualcommqcn9074Match-
Node
qualcommqcs2290_firmwareMatch-
AND
qualcommqcs2290Match-
Node
qualcommqcs405_firmwareMatch-
AND
qualcommqcs405Match-
Node
qualcommqcs4290_firmwareMatch-
AND
qualcommqcs4290Match-
Node
qualcommqcs610_firmwareMatch-
AND
qualcommqcs610Match-
Node
qualcommqcs6490_firmwareMatch-
AND
qualcommqcs6490Match-
Node
qualcommqsm8250_firmwareMatch-
AND
qualcommqsm8250Match-
Node
qualcommsa6145p_firmwareMatch-
AND
qualcommsa6145pMatch-
Node
qualcommsa6150p_firmwareMatch-
AND
qualcommsa6150pMatch-
Node
qualcommsa6155p_firmwareMatch-
AND
qualcommsa6155pMatch-
Node
qualcommsa8145p_firmwareMatch-
AND
qualcommsa8145pMatch-
Node
qualcommsa8150p_firmwareMatch-
AND
qualcommsa8150pMatch-
Node
qualcommsa8155p_firmwareMatch-
AND
qualcommsa8155pMatch-
Node
qualcommsa8195p_firmwareMatch-
AND
qualcommsa8195pMatch-
Node
qualcommsa8540p_firmwareMatch-
AND
qualcommsa8540pMatch-
Node
qualcommsa9000p_firmwareMatch-
AND
qualcommsa9000pMatch-
Node
qualcommsd460_firmwareMatch-
AND
qualcommsd460Match-
Node
qualcommsd480_firmwareMatch-
AND
qualcommsd480Match-
Node
qualcommsd662_firmwareMatch-
AND
qualcommsd662Match-
Node
qualcommsd690_5g_firmwareMatch-
AND
qualcommsd690_5gMatch-
Node
qualcommsd750g_firmwareMatch-
AND
qualcommsd750gMatch-
Node
qualcommsd765_firmwareMatch-
AND
qualcommsd765Match-
Node
qualcommsd765g_firmwareMatch-
AND
qualcommsd765gMatch-
Node
qualcommsd768g_firmwareMatch-
AND
qualcommsd768gMatch-
Node
qualcommsd778g_firmwareMatch-
AND
qualcommsd778gMatch-
Node
qualcommsd865_5g_firmwareMatch-
AND
qualcommsd865_5gMatch-
Node
qualcommsd870_firmwareMatch-
AND
qualcommsd870Match-
Node
qualcommsd888_5g_firmwareMatch-
AND
qualcommsd888_5gMatch-
Node
qualcommsdx55_firmwareMatch-
AND
qualcommsdx55Match-
Node
qualcommsdx55m_firmwareMatch-
AND
qualcommsdx55mMatch-
Node
qualcommsdx57m_firmwareMatch-
AND
qualcommsdx57mMatch-
Node
qualcommsdxr2_5g_firmwareMatch-
AND
qualcommsdxr2_5gMatch-
Node
qualcommsm6225_firmwareMatch-
AND
qualcommsm6225Match-
Node
qualcommsm6375_firmwareMatch-
AND
qualcommsm6375Match-
Node
qualcommsm7250p_firmwareMatch-
AND
qualcommsm7250pMatch-
Node
qualcommsm7325p_firmwareMatch-
AND
qualcommsm7325pMatch-
Node
qualcommsxr2150p_firmwareMatch-
AND
qualcommsxr2150pMatch-
Node
qualcommwcd9341_firmwareMatch-
AND
qualcommwcd9341Match-
Node
qualcommwcd9370_firmwareMatch-
AND
qualcommwcd9370Match-
Node
qualcommwcd9375_firmwareMatch-
AND
qualcommwcd9375Match-
Node
qualcommwcd9380_firmwareMatch-
AND
qualcommwcd9380Match-
Node
qualcommwcd9385_firmwareMatch-
AND
qualcommwcd9385Match-
Node
qualcommwcn3910_firmwareMatch-
AND
qualcommwcn3910Match-
Node
qualcommwcn3950_firmwareMatch-
AND
qualcommwcn3950Match-
Node
qualcommwcn3980_firmwareMatch-
AND
qualcommwcn3980Match-
Node
qualcommwcn3988_firmwareMatch-
AND
qualcommwcn3988Match-
Node
qualcommwcn3991_firmwareMatch-
AND
qualcommwcn3991Match-
Node
qualcommwcn3998_firmwareMatch-
AND
qualcommwcn3998Match-
Node
qualcommwcn3999_firmwareMatch-
AND
qualcommwcn3999Match-
Node
qualcommwcn6750_firmwareMatch-
AND
qualcommwcn6750Match-
Node
qualcommwcn6850_firmwareMatch-
AND
qualcommwcn6850Match-
Node
qualcommwcn6851_firmwareMatch-
AND
qualcommwcn6851Match-
Node
qualcommwcn6855_firmwareMatch-
AND
qualcommwcn6855Match-
Node
qualcommwcn6856_firmwareMatch-
AND
qualcommwcn6856Match-
Node
qualcommwsa8810_firmwareMatch-
AND
qualcommwsa8810Match-
Node
qualcommwsa8815_firmwareMatch-
AND
qualcommwsa8815Match-
Node
qualcommwsa8830_firmwareMatch-
AND
qualcommwsa8830Match-
Node
qualcommwsa8835_firmwareMatch-
AND
qualcommwsa8835Match-

CNA Affected

[
  {
    "product": "Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking",
    "vendor": "Qualcomm, Inc.",
    "versions": [
      {
        "status": "affected",
        "version": "AR8035, CSR8811, IPQ6000, IPQ6005, IPQ6010, IPQ6018, IPQ6028, QCA4024, QCA6390, QCA6391, QCA6426, QCA6436, QCA6574AU, QCA6696, QCA8072, QCA8075, QCA8081, QCA9984, QCM2290, QCM4290, QCM6490, QCN5021, QCN5022, QCN5052, QCN5121, QCN5122, QCN5152, QCN6023, QCN6024, QCN9000, QCN9022, QCN9024, QCN9070, QCN9072, QCN9074, QCS2290, QCS405, QCS4290, QCS610, QCS6490, QSM8250, SA6145P, SA6150P, SA6155P, SA8145P, SA8150P, SA8155P, SA8195P, SA8540P, SA9000P, SD460, SD480, SD662, SD690 5G, SD750G, SD765, SD765G, SD768G, SD778G, SD865 5G, SD870, SD888 5G, SDX55, SDX55M, SDX57M, SDXR2 5G, SM6225, SM6375, SM7250P, SM7325P, SXR2150P, WCD9341, WCD9370, WCD9375, WCD9380, WCD9385, WCN3910, WCN3950, WCN3980, WCN3988, WCN3991, WCN3998, WCN3999, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WSA8810, WSA8815, WSA8830, WSA8835"
      }
    ]
  }
]

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.8%

Related for CVE-2021-1950