### [CVE-2021-30293](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30293) ![](https://img.shields.io/static/v1?label=Product&message=Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=AR6003%2C%20AR8035%2C%20CSRB31024%2C%20FSM10055%2C%20MDM9215%2C%20MDM9607%2C%20MDM9615%2C%20MDM9628%2C%20MDM9640%2C%20MDM9650%2C%20MSM8996AU%2C%20QCA6174A%2C%20QCA6390%2C%20QCA6391%2C%20QCA6426%2C%20QCA6436%2C%20QCA6564A%2C%20QCA6564AU%2C%20QCA6574A%2C%20QCA6574AU%2C%20QCA6584AU%2C%20QCA6595AU%2C%20QCA6696%2C%20QCA8081%2C%20QCA8337%2C%20QCA9377%2C%20QCS410%2C%20QCS603%2C%20QCS605%2C%20QCS610%2C%20QCX315%2C%20QRB5165%2C%20QRB5165N%2C%20QSM8250%2C%20SA415M%2C%20SD%20675%2C%20SD205%2C%20SD210%2C%20SD480%2C%20SD675%2C%20SD678%2C%20SD690%205G%2C%20SD730%2C%20SD750G%2C%20SD765%2C%20SD765G%2C%20SD768G%2C%20SD865%205G%2C%20SD870%2C%20SDX55%2C%20SDX55M%2C%20SDX65%2C%20SDXR1%2C%20SDXR2%205G%2C%20SM6375%2C%20SM7250P%2C%20SM8450%2C%20SM8450P%2C%20WCD9340%2C%20WCD9370%2C%20WCD9375%2C%20WCD9380%2C%20WCD9385%2C%20WCN3610%2C%20WCN3950%2C%20WCN3988%2C%20WCN3991%2C%20WCN3998%2C%20WCN6850%2C%20WCN6851%2C%20WCN6855%2C%20WCN6856%2C%20WSA8810%2C%20WSA8815%2C%20WSA8830%2C%20WSA8835%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Reachable%20Assertion%20in%20Modem&color=brightgreen) ### Description Possible assertion due to lack of input validation in PUSCH configuration in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT ### POC #### Reference - https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin #### Github No PoCs found on GitHub currently.