Improper Key Generation in Qualcomm Snapdragon Products
CVE-2021-30339

9CRITICAL

Summary

A vulnerability exists in Qualcomm Snapdragon products where reading Pseudorandom Number Generator (PRNG) output may lead to improper key generation. This issue arises from the lack of buffer validation, potentially compromising the security of the products. Affected devices include Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, and Snapdragon Wired Infrastructure and Networking.

Affected Version(s)

Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking AR8035, QCA6391, QCA8081, QCA8337, QCA9984, QCM2290, QCM4290, QCM6490, QCS2290, QCS405, QCS4290, QCS6490, SD 8 Gen1 5G, SD460, SD480, SD662, SD680, SD690 5G, SD750G, SD765, SD765G, SD768G, SD778G, SD780G, SD888, SD888 5G, SDX57M, SDX65, SM6375, SM7250P, SM7315, SM7325P, SW5100, SW5100P, WCD9370, WCD9375, WCD9380, WCD9385, WCN3910, WCN3950, WCN3980, WCN3988, WCN3991, WCN3998, WCN3999, WCN6740, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WSA8810, WSA8815, WSA8830, WSA8835

References

CVSS V3.1

Score:
9
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.