Vulnerability

CVE-2021-30327

Component: BOOT
Location: FIRMWARE
Buffer overflow in sahara protocol while processing commands leads to overwrite of secure configuration data in Snapdragon Mobile, Snapdragon Compute, Snapdragon Auto, Snapdragon IOT, Snapdragon Connectivity, Snapdragon Voice & Music

Impact

Severity (Manufact.)

HIGH

Severity (NIST)

6.8

Severity (Android)

N/A

Chipsets

15

Devices

637

Affected Hardware

NameAlso known asManufacturer
SDM660
Snapdragon 660
Qualcomm
SM6125
Snapdragon 665
Qualcomm
SDM670
Snapdragon 670
Qualcomm
SM6150
Snapdragon 675
Qualcomm
SDM710
Snapdragon 710
Qualcomm
SDM712
Snapdragon 712
Qualcomm
SM7125
Snapdragon 720G
Qualcomm
MSM8998
Snapdragon 835
Snapdragon 835 Mobile PC Platform
Qualcomm
SDM845
Snapdragon 845
Qualcomm
SM8150
Snapdragon 855
Qualcomm
15 of 15 row(s) shown.

Rows per page

Page 1 of 2

Timeline

Introduced (est):
Apr 1, 2017
Reported:
Oct 19, 2021
Advisory Published:
Apr 4, 2022
CVE Published:
Jun 14, 2022
Android Patch Level:
None
For more information and a detailed analysis of the data presented on this website, please see our paper, to be presented at NDSS'25.
Follow us on Twitter