Vulnerability
CVE-2021-30327
Component: BOOT
Location: FIRMWARE
Buffer overflow in sahara protocol while processing commands leads to overwrite of secure configuration data in Snapdragon Mobile, Snapdragon Compute, Snapdragon Auto, Snapdragon IOT, Snapdragon Connectivity, Snapdragon Voice & Music
Impact
Severity (Manufact.)
HIGH
Severity (NIST)
6.8
Severity (Android)
N/A
Chipsets
15
Devices
637
Affected Hardware
Name | Also known as | Manufacturer |
---|---|---|
SDM660 | Snapdragon 660 | Qualcomm |
SM6125 | Snapdragon 665 | Qualcomm |
SDM670 | Snapdragon 670 | Qualcomm |
SM6150 | Snapdragon 675 | Qualcomm |
SDM710 | Snapdragon 710 | Qualcomm |
SDM712 | Snapdragon 712 | Qualcomm |
SM7125 | Snapdragon 720G | Qualcomm |
MSM8998 | Snapdragon 835 Snapdragon 835 Mobile PC Platform | Qualcomm |
SDM845 | Snapdragon 845 | Qualcomm |
SM8150 | Snapdragon 855 | Qualcomm |
15 of 15 row(s) shown.
Rows per page
Page 1 of 2
Information reliability
The information on this website is intended to provide information on the big picture of chipset security and measure trends within the industry. Our information is obtained from several vantage points, checked for consistency, and automatically cross-referenced. However, this process may not always yield reliable information. Do not use the information on a particular vulnerability, chipset or device to verify your individual exposure in cases where inaccuracies are inacceptable, for instance to assess risks if you are a Politically Exposed Person.
Timeline
Introduced (est):
Apr 1, 2017
Reported:
Oct 19, 2021
Advisory Published:
Apr 4, 2022
CVE Published:
Jun 14, 2022
Android Patch Level:
None