CVE-2021-35069

7.8 HIGH

📋 TL;DR

This vulnerability allows improper validation of data length from DMA buffers, leading to memory corruption in Qualcomm Snapdragon chipsets. It affects multiple Snapdragon product lines including Auto, Compute, Mobile, and others. Attackers could potentially execute arbitrary code or cause denial of service.

💻 Affected Systems

Products:
  • Snapdragon Auto
  • Snapdragon Compute
  • Snapdragon Connectivity
  • Snapdragon Consumer IOT
  • Snapdragon Industrial IOT
  • Snapdragon Mobile
  • Snapdragon Voice & Music
  • Snapdragon Wired Infrastructure and Networking
Versions: Specific chipset versions not detailed in CVE; refer to Qualcomm bulletins for exact affected versions
Operating Systems: Android, Linux-based embedded systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices using vulnerable Qualcomm Snapdragon chipsets; exact device models depend on chipset implementation

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data exfiltration, or persistent backdoor installation.

🟠

Likely Case

Denial of service (system crash/reboot) or limited information disclosure through memory corruption.

🟢

If Mitigated

No impact if patched or if exploit attempts are blocked by security controls.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires DMA access and understanding of chipset memory management; no public exploits known

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Qualcomm February 2022 security bulletin for specific patch versions

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin

Restart Required: Yes

Instructions:

1. Check device manufacturer for firmware updates. 2. Apply Qualcomm-provided patches through OEM updates. 3. Reboot device after update.

🔧 Temporary Workarounds

Disable DMA access

linux

Restrict DMA buffer access to trusted processes only

Device-specific configuration; consult manufacturer documentation

🧯 If You Can't Patch

  • Isolate affected devices from untrusted networks
  • Implement strict access controls and monitoring for DMA operations

🔍 How to Verify

Check if Vulnerable:

Check device chipset version and compare against Qualcomm's affected list in February 2022 bulletin

Check Version:

Device-specific commands; typically 'cat /proc/cpuinfo' or manufacturer-specific firmware check

Verify Fix Applied:

Verify firmware version has been updated to post-February 2022 patch level

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • Memory corruption errors in system logs
  • Unexpected DMA operation patterns

Network Indicators:

  • Unusual DMA-related network traffic patterns

SIEM Query:

Search for kernel panic events or memory corruption alerts on Snapdragon-based devices

🔗 References

📤 Share & Export