CVE-2021-1950

7.8 HIGH

📋 TL;DR

This vulnerability allows authenticated users to bypass face authentication on affected Qualcomm Snapdragon devices due to improper secure memory cleaning between user sessions. It affects multiple Snapdragon platforms including Auto, Compute, Connectivity, Industrial IoT, Mobile, and Wired Infrastructure/Networking. Attackers with physical access or local privileges could potentially authenticate as other users.

💻 Affected Systems

Products:
  • Snapdragon Auto
  • Snapdragon Compute
  • Snapdragon Connectivity
  • Snapdragon Industrial IOT
  • Snapdragon Mobile
  • Snapdragon Wired Infrastructure and Networking
Versions: Specific affected versions not detailed in provided references; consult Qualcomm bulletins for exact version ranges.
Operating Systems: Android and other embedded OS using affected Snapdragon chipsets
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the Qualcomm Secure Processing Environment (SPE) implementation; affects devices with face authentication enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with physical access could bypass biometric authentication to gain unauthorized access to devices, potentially compromising sensitive data or device functionality.

🟠

Likely Case

Local authenticated users could bypass face authentication to escalate privileges or access other users' data on shared devices.

🟢

If Mitigated

With proper access controls and device security policies, impact is limited to local privilege escalation rather than remote compromise.

🌐 Internet-Facing: LOW - This is primarily a local authentication bypass requiring physical or local access to the device.
🏢 Internal Only: MEDIUM - Shared devices in enterprise environments could be vulnerable to privilege escalation between authenticated users.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access to the device; exploitation involves manipulating secure memory between authentication sessions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Qualcomm March 2022 security bulletin for specific patched versions

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin

Restart Required: Yes

Instructions:

1. Check device manufacturer for firmware updates. 2. Apply Qualcomm-provided patches through OEM updates. 3. Reboot device after update. 4. Verify patch installation through version checks.

🔧 Temporary Workarounds

Disable Face Authentication

all

Temporarily disable face authentication feature until patches can be applied

Device-specific: Navigate to Settings > Security > Face Unlock > Disable

Enforce Strong Alternative Authentication

all

Require strong PIN/password authentication instead of or in addition to biometrics

Device-specific: Settings > Security > Screen lock > Set strong PIN/password

🧯 If You Can't Patch

  • Implement strict physical access controls for affected devices
  • Use device encryption and remote wipe capabilities to protect data if device is compromised

🔍 How to Verify

Check if Vulnerable:

Check device chipset model and firmware version against Qualcomm's affected product list in March 2022 bulletin

Check Version:

Android: Settings > About phone > Build number / Kernel version

Verify Fix Applied:

Verify firmware version has been updated to a version after the March 2022 Qualcomm security patches

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed face authentication attempts followed by successful authentication
  • Unusual authentication pattern changes

Network Indicators:

  • Not applicable - local vulnerability

SIEM Query:

Not applicable for this local authentication bypass vulnerability

🔗 References

📤 Share & Export