CVE-2021-1946

9.8 CRITICAL

📋 TL;DR

A null pointer dereference vulnerability in Qualcomm Snapdragon chipsets allows remote attackers to cause denial of service or potentially execute arbitrary code by sending a specially crafted SDP (Session Description Protocol) body. This affects numerous Snapdragon platforms including Auto, Compute, Connectivity, Consumer IoT, Industrial IoT, and Mobile devices. The vulnerability is remotely exploitable without authentication.

💻 Affected Systems

Products:
  • Snapdragon Auto
  • Snapdragon Compute
  • Snapdragon Connectivity
  • Snapdragon Consumer IOT
  • Snapdragon Industrial IOT
  • Snapdragon Mobile
Versions: Multiple Snapdragon chipset versions (specific versions in Qualcomm advisory)
Operating Systems: Android, Linux-based embedded systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices using vulnerable Snapdragon chipsets with SDP processing enabled

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, data exfiltration, or persistent backdoor installation

🟠

Likely Case

Device crash/reboot causing denial of service, potentially leading to system instability

🟢

If Mitigated

Limited impact with proper network segmentation and input validation controls

🌐 Internet-Facing: HIGH - Remote exploitation without authentication via network protocols
🏢 Internal Only: MEDIUM - Requires network access but could be exploited internally via malicious packets

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting malicious SDP packets but no authentication needed

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Qualcomm September 2021 security bulletin for specific chipset patches

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin

Restart Required: Yes

Instructions:

1. Check device manufacturer for firmware updates 2. Apply Qualcomm-provided patches 3. Reboot device 4. Verify patch installation

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices from untrusted networks

Firewall Rules

all

Block unnecessary SDP traffic at network perimeter

🧯 If You Can't Patch

  • Segment affected devices in isolated network zones
  • Implement strict network access controls and monitor for anomalous SDP traffic

🔍 How to Verify

Check if Vulnerable:

Check device chipset version and compare against Qualcomm advisory

Check Version:

Device-specific commands vary by manufacturer (e.g., Android: getprop ro.bootloader)

Verify Fix Applied:

Verify firmware version has been updated to patched release

📡 Detection & Monitoring

Log Indicators:

  • Device crashes/reboots
  • Kernel panic logs
  • SDP protocol errors

Network Indicators:

  • Malformed SDP packets
  • Unusual SDP traffic patterns

SIEM Query:

search 'SDP protocol error' OR 'kernel panic' OR device_reboot

🔗 References

📤 Share & Export