CVE-2021-35112

8.4 HIGH

📋 TL;DR

This vulnerability allows a user with standard permissions to access protected graphics memory regions due to improper access control in register configuration on Qualcomm Snapdragon chips. It affects multiple Snapdragon product lines including Auto, Compute, Mobile, and Wearables. Attackers could potentially read or modify sensitive graphics data.

💻 Affected Systems

Products:
  • Snapdragon Auto
  • Snapdragon Compute
  • Snapdragon Connectivity
  • Snapdragon Consumer IOT
  • Snapdragon Industrial IOT
  • Snapdragon Mobile
  • Snapdragon Voice & Music
  • Snapdragon Wearables
Versions: Specific chipset versions not detailed in bulletin; affected by firmware/software versions before April 2022 patches
Operating Systems: Android, Linux-based systems using affected Snapdragon chips
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices using vulnerable Qualcomm Snapdragon chipsets with unpatched firmware/drivers.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could exfiltrate sensitive graphics data (including potentially protected content like DRM-protected media), modify graphics rendering to bypass security controls, or cause system instability/crashes.

🟠

Likely Case

Information disclosure of graphics memory contents, potentially exposing sensitive application data or protected content.

🟢

If Mitigated

Limited impact with proper privilege separation and memory protection mechanisms in place.

🌐 Internet-Facing: LOW - This is a local hardware/firmware vulnerability requiring local access or code execution.
🏢 Internal Only: MEDIUM - Could be exploited by malicious insiders or through malware with user-level privileges on affected devices.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user-level access to execute malicious code; exploitation involves manipulating graphics register configurations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware/driver updates released in April 2022 security bulletins

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/april-2022-bulletin

Restart Required: Yes

Instructions:

1. Check with device manufacturer for firmware updates. 2. Apply Qualcomm-provided patches through OEM update channels. 3. Reboot device after update installation.

🔧 Temporary Workarounds

Restrict user privileges

all

Limit user accounts to minimal necessary privileges to reduce attack surface

Application sandboxing

linux

Use containerization or sandboxing to isolate applications from accessing protected memory regions

🧯 If You Can't Patch

  • Implement strict access controls and monitor for unusual graphics memory access patterns
  • Isolate affected devices from sensitive networks and implement network segmentation

🔍 How to Verify

Check if Vulnerable:

Check device chipset model and firmware version against Qualcomm's April 2022 security bulletin

Check Version:

On Android: 'getprop ro.bootloader' or check Settings > About Phone > Build Number

Verify Fix Applied:

Verify firmware version has been updated to post-April 2022 patches from device manufacturer

📡 Detection & Monitoring

Log Indicators:

  • Unusual graphics driver errors
  • Access violations in graphics memory regions
  • Privilege escalation attempts

Network Indicators:

  • Not network-exploitable; local vulnerability

SIEM Query:

Search for graphics driver access violations or privilege escalation events in system logs

🔗 References

📤 Share & Export