CVE-2021-30343

9.1 CRITICAL

📋 TL;DR

This vulnerability in Qualcomm Snapdragon chipsets allows improper integrity checks leading to race conditions between PDCP and RRC tasks after receiving valid RRC Command packets. Attackers could potentially execute arbitrary code or cause denial of service. Affected devices include automotive, compute, connectivity, industrial IoT, and mobile platforms using vulnerable Snapdragon chipsets.

💻 Affected Systems

Products:
  • Snapdragon Auto
  • Snapdragon Compute
  • Snapdragon Connectivity
  • Snapdragon Industrial IOT
  • Snapdragon Mobile
Versions: Specific chipset versions not detailed in public advisory
Operating Systems: Android, Linux-based automotive/embedded systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with vulnerable Qualcomm baseband/modems. Exact chipset models require checking Qualcomm's detailed advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with kernel privileges leading to complete device compromise, data theft, or persistent backdoor installation.

🟠

Likely Case

Denial of service causing device crashes or instability, potentially requiring physical reset.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: HIGH

Exploitation requires specialized knowledge of cellular protocols and chipset internals. No public exploits known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Qualcomm April 2022 security bulletin for specific chipset updates

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/april-2022-bulletin

Restart Required: Yes

Instructions:

1. Contact device manufacturer for firmware updates. 2. Apply Qualcomm-provided patches through OEM channels. 3. Reboot device after update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate vulnerable devices from untrusted networks

Access Control

all

Restrict cellular/baseband interface access to trusted sources only

🧯 If You Can't Patch

  • Deploy network monitoring for anomalous cellular/baseband traffic
  • Implement strict device isolation in critical environments

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against manufacturer's patched versions. Use 'getprop ro.build.fingerprint' on Android devices.

Check Version:

Android: getprop ro.build.fingerprint; Linux-based: check manufacturer-specific firmware version commands

Verify Fix Applied:

Confirm firmware version matches patched version from manufacturer advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected baseband crashes
  • Abnormal RRC/PDCP protocol errors
  • Kernel panic logs related to modem

Network Indicators:

  • Anomalous cellular protocol traffic patterns
  • Unexpected RRC command sequences

SIEM Query:

Not applicable - requires specialized baseband monitoring tools

🔗 References

📤 Share & Export