Files
CVEs-PoC/2021/CVE-2021-1943.md
2025-09-29 21:09:30 +02:00

18 lines
2.4 KiB
Markdown

### [CVE-2021-1943](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1943)
![](https://img.shields.io/static/v1?label=Product&message=Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Wired%20Infrastructure%20and%20Networking&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=APQ8053%2C%20AQT1000%2C%20AR9380%2C%20CSR8811%2C%20CSRB31024%2C%20IPQ4018%2C%20IPQ4019%2C%20IPQ4028%2C%20IPQ4029%2C%20IPQ5010%2C%20IPQ5018%2C%20IPQ5028%2C%20IPQ6000%2C%20IPQ6005%2C%20IPQ6010%2C%20IPQ6018%2C%20IPQ6028%2C%20IPQ8064%2C%20IPQ8065%2C%20IPQ8068%2C%20IPQ8070%2C%20IPQ8070A%2C%20IPQ8071%2C%20IPQ8071A%2C%20IPQ8072%2C%20IPQ8072A%2C%20IPQ8074%2C%20IPQ8074A%2C%20IPQ8076%2C%20IPQ8076A%2C%20IPQ8078%2C%20IPQ8078A%2C%20IPQ8173%2C%20IPQ8174%2C%20MSM8953%2C%20PMP8074%2C%20QCA4024%2C%20QCA6175A%2C%20QCA6390%2C%20QCA6391%2C%20QCA6420%2C%20QCA6426%2C%20QCA6428%2C%20QCA6430%2C%20QCA6436%2C%20QCA6438%2C%20QCA6564A%2C%20QCA6564AU%2C%20QCA6574%2C%20QCA6574A%2C%20QCA6574AU%2C%20QCA6584AU%2C%20QCA6595%2C%20QCA6595AU%2C%20QCA6696%2C%20QCA7500%2C%20QCA8072%2C%20QCA8075%2C%20QCA8081%2C%20QCA9531%2C%20QCA9558%2C%20QCA9561%2C%20QCA9563%2C%20QCA9880%2C%20QCA9886%2C%20QCA9887%2C%20QCA9888%2C%20QCA9889%2C%20QCA9896%2C%20QCA9898%2C%20QCA9980%2C%20QCA9982%2C%20QCA9984%2C%20QCA9985%2C%20QCA9990%2C%20QCA9992%2C%20QCA9994%2C%20QCN5021%2C%20QCN5022%2C%20QCN5024%2C%20QCN5052%2C%20QCN5054%2C%20QCN5064%2C%20QCN5121%2C%20QCN5122%2C%20QCN5124%2C%20QCN5152%2C%20QCN5154%2C%20QCN5164%2C%20QCN5500%2C%20QCN5502%2C%20QCN5550%2C%20QCN6023%2C%20QCN6024%2C%20QCN6122%2C%20QCN9000%2C%20QCN9012%2C%20QCN9022%2C%20QCN9024%2C%20QCN9070%2C%20QCN9072%2C%20QCN9074%2C%20QCN9100%2C%20SA415M%2C%20SA515M%2C%20SA6145P%2C%20SA6150P%2C%20SA6155%2C%20SA6155P%2C%20SA8145P%2C%20SA8%20...%5Btruncated*%5D%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Buffer%20Over-read%20in%20WLAN&color=brightgreen)
### Description
Possible buffer out of bound read can occur due to improper validation of TBTT count and length while parsing the beacon response in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking
### POC
#### Reference
- https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin
#### Github
No PoCs found on GitHub currently.