CVE-2021-30278

7.1 HIGH

📋 TL;DR

This vulnerability in Qualcomm's TrustZone memory transfer interface allows improper input validation that could lead to information disclosure. It affects multiple Snapdragon platforms including Auto, Compute, Connectivity, Consumer IoT, Industrial IoT, Voice & Music, and Wired Infrastructure and Networking. Attackers could potentially access sensitive data from protected memory regions.

💻 Affected Systems

Products:
  • Snapdragon Auto
  • Snapdragon Compute
  • Snapdragon Connectivity
  • Snapdragon Consumer IOT
  • Snapdragon Industrial IOT
  • Snapdragon Voice & Music
  • Snapdragon Wired Infrastructure and Networking
Versions: Multiple specific chipset versions - see Qualcomm advisory for exact affected versions
Operating Systems: Android, Linux-based embedded systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices using vulnerable Qualcomm chipsets; requires local access or malicious app execution.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of TrustZone secure environment, allowing extraction of cryptographic keys, biometric data, DRM content, and other sensitive information stored in secure memory.

🟠

Likely Case

Limited information disclosure from TrustZone memory, potentially exposing some protected data but not full system compromise.

🟢

If Mitigated

No impact if patched; with proper security controls, exploitation would be prevented or detected.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires local access and knowledge of TrustZone internals; no public exploits known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Varies by device manufacturer - check with OEM for specific patch versions

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin

Restart Required: Yes

Instructions:

1. Check with device manufacturer for available security updates. 2. Apply the latest firmware/security patch from OEM. 3. Reboot device after update. 4. Verify patch installation.

🔧 Temporary Workarounds

Restrict local access

all

Limit physical and logical access to vulnerable devices

Application sandboxing

all

Implement strict application isolation and privilege separation

🧯 If You Can't Patch

  • Isolate affected devices from untrusted networks and users
  • Implement strict access controls and monitoring for suspicious TrustZone access attempts

🔍 How to Verify

Check if Vulnerable:

Check device chipset version and compare against Qualcomm's affected list; check Android security patch level (should be December 2021 or later)

Check Version:

On Android: Settings > About phone > Android security patch level

Verify Fix Applied:

Verify Android security patch level is December 2021 or later; check with device manufacturer for specific patch verification

📡 Detection & Monitoring

Log Indicators:

  • Unusual TrustZone API calls
  • Memory access violations in secure environment
  • Failed TrustZone operations

Network Indicators:

  • Not network exploitable - local vulnerability

SIEM Query:

Not applicable - local hardware vulnerability

🔗 References

📤 Share & Export