Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2021-1918: Information Exposure in Kernel in Qualcomm, Inc. Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

0
Medium
VulnerabilityCVE-2021-1918cvecve-2021-1918
Published: Mon Jan 03 2022 (01/03/2022, 07:25:38 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

Description

Improper handling of resource allocation in virtual machines can lead to information exposure in Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

AI-Powered Analysis

AILast updated: 07/08/2025, 06:27:39 UTC

Technical Analysis

CVE-2021-1918 is a medium-severity vulnerability affecting multiple Qualcomm Snapdragon platforms, including Consumer IoT, Industrial IoT, and Mobile devices. The root cause is improper handling of resource allocation within virtual machines, which leads to information exposure. Specifically, the vulnerability arises from the way virtualized environments on affected Snapdragon chipsets manage resource allocation, potentially allowing an attacker with limited privileges to access sensitive information across virtual machine boundaries. The affected chipsets include a broad range of Qualcomm products such as QCA6391, QCM6490, QCS6490, QRB5165 series, various Snapdragon 600 and 700 series (e.g., SD690 5G, SD750G, SD765, SD765G, SD768G, SD778G, SD888 5G), and several wireless connectivity modules (e.g., WCD9370 series, WCN3988 series, WSA88xx series). The vulnerability is classified under CWE-668, which relates to improper resource allocation, and has a CVSS v3.1 base score of 6.5, indicating a medium severity level. The CVSS vector (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N) shows that exploitation requires local access with low privileges, no user interaction, and results in high confidentiality impact but no integrity or availability impact. The scope is changed, meaning the vulnerability affects resources beyond the initially vulnerable component. No known exploits are currently reported in the wild, and no patches are linked in the provided data, suggesting that mitigation may rely on vendor updates or configuration changes. This vulnerability is particularly relevant in environments where Snapdragon chipsets are used in virtualized contexts, such as IoT gateways, industrial controllers, or mobile devices running multiple virtual machines or containers.

Potential Impact

For European organizations, the impact of CVE-2021-1918 can be significant in sectors relying on Qualcomm Snapdragon-based IoT and mobile devices, especially where virtualization is employed. The information exposure could lead to leakage of sensitive data across virtual machine boundaries, potentially compromising confidentiality of proprietary or personal information. This is critical in industries such as manufacturing, energy, healthcare, and telecommunications, where IoT devices are increasingly used for operational technology and critical infrastructure. Mobile devices used by employees could also be at risk, potentially exposing corporate data. Although the vulnerability does not affect integrity or availability, the confidentiality breach could facilitate further attacks or espionage. Given the requirement for local access with low privileges, attackers would need some foothold on the device, which could be achieved via other vulnerabilities or insider threats. The absence of known exploits in the wild reduces immediate risk but does not eliminate it, especially as threat actors may develop exploits over time. The broad range of affected chipsets means that many devices in use across European enterprises and critical infrastructure could be vulnerable, necessitating proactive risk management.

Mitigation Recommendations

Mitigation should focus on applying vendor-provided patches or firmware updates as soon as they become available from Qualcomm or device manufacturers. In the absence of patches, organizations should implement strict access controls to limit local access to devices running affected Snapdragon chipsets, including restricting physical and remote access to trusted personnel only. Network segmentation can reduce the risk of lateral movement to vulnerable devices. Monitoring and logging of device access and virtualization environments should be enhanced to detect suspicious activities indicative of exploitation attempts. For IoT and industrial environments, deploying endpoint detection and response (EDR) solutions tailored for embedded devices can help identify anomalous behavior. Additionally, organizations should review and harden virtualization configurations to ensure resource allocation policies do not expose sensitive information. Where possible, disabling unnecessary virtualization features or isolating virtual machines more strictly can reduce attack surface. Finally, raising awareness among operational technology and IT teams about this vulnerability will help in timely detection and response.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2020-12-08T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f725b0acd01a2492647a5

Added to database: 5/22/2025, 6:52:11 PM

Last enriched: 7/8/2025, 6:27:39 AM

Last updated: 2/7/2026, 4:49:32 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats