Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2021-30337: Use After Free in DSP Services in Qualcomm, Inc. Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

0
High
VulnerabilityCVE-2021-30337cvecve-2021-30337
Published: Mon Jan 03 2022 (01/03/2022, 07:26:10 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Description

Possible use after free when process shell memory is freed using IOCTL call and process initialization is in progress in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

AI-Powered Analysis

AILast updated: 07/08/2025, 09:55:33 UTC

Technical Analysis

CVE-2021-30337 is a high-severity use-after-free vulnerability affecting multiple Qualcomm Snapdragon platforms, including Snapdragon Auto, Compute, Connectivity, Consumer IoT, Industrial IoT, Mobile, Voice & Music, Wearables, and Wired Infrastructure and Networking products. The vulnerability arises from improper handling of memory during an IOCTL call when process shell memory is freed while process initialization is still in progress. Specifically, this use-after-free condition occurs in the DSP (Digital Signal Processor) services, which are critical components responsible for offloading certain processing tasks from the main CPU to specialized hardware for efficiency and performance. The affected Snapdragon chipsets span a wide range of Qualcomm’s product portfolio, covering numerous SoCs (System on Chips) such as APQ, IPQ, QCA, MDM, MSM, and QCN series, which are embedded in a variety of devices from automotive systems to mobile phones and IoT devices. The vulnerability is classified under CWE-416 (Use After Free), which can lead to arbitrary code execution, privilege escalation, or denial of service if exploited. The CVSS v3.1 base score is 8.4, indicating a high severity level. The vector string (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) shows that the attack vector requires local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts confidentiality, integrity, and availability to a high degree. Although no known exploits are reported in the wild, the vulnerability’s characteristics suggest it could be leveraged by attackers with local access to execute arbitrary code or disrupt system operations. This is particularly concerning given the broad deployment of affected Snapdragon platforms in critical infrastructure and consumer devices. The lack of publicly available patches at the time of reporting increases the urgency for affected vendors and users to apply mitigations or updates once available.

Potential Impact

For European organizations, the impact of CVE-2021-30337 can be significant due to the widespread use of Qualcomm Snapdragon chipsets in various sectors. Automotive manufacturers and suppliers in Europe extensively use Snapdragon Auto platforms for infotainment, telematics, and advanced driver-assistance systems (ADAS). Exploitation could lead to unauthorized control or disruption of vehicle systems, posing safety risks and potential regulatory compliance issues. In the industrial IoT domain, affected Snapdragon Industrial IoT and Connectivity platforms are embedded in smart manufacturing, energy management, and critical infrastructure monitoring systems. A successful attack could compromise operational technology (OT) environments, leading to production downtime or safety incidents. Consumer devices such as smartphones, wearables, and home IoT products using Snapdragon Mobile, Wearables, and Consumer IoT chipsets are also at risk, potentially exposing sensitive personal data or enabling persistent malware infections. The high confidentiality, integrity, and availability impact means that data breaches, system manipulation, and service outages are plausible outcomes. European organizations must consider the regulatory implications under GDPR and NIS Directive, as exploitation could lead to data loss or service disruption affecting critical services. The local attack vector requirement limits remote exploitation but does not eliminate risk, especially in environments where insider threats or physical access are possible.

Mitigation Recommendations

To mitigate CVE-2021-30337, European organizations should implement a multi-layered approach: 1) Inventory and identify all devices and systems using affected Qualcomm Snapdragon chipsets, prioritizing automotive, industrial IoT, and mobile devices. 2) Engage with device manufacturers and Qualcomm to obtain and deploy firmware or software patches as soon as they become available. 3) Restrict local access to vulnerable devices by enforcing strict physical security controls and limiting administrative access to trusted personnel only. 4) Monitor for unusual system behavior or crashes in DSP services that might indicate exploitation attempts. 5) Employ endpoint detection and response (EDR) solutions capable of detecting anomalous local activity related to memory corruption exploits. 6) For automotive and industrial environments, implement network segmentation to isolate vulnerable devices and reduce lateral movement opportunities. 7) Conduct regular security assessments and penetration tests focusing on local privilege escalation and memory corruption vulnerabilities. 8) Educate staff about the risks of local attacks and enforce policies to prevent unauthorized device access. These targeted measures go beyond generic patching advice by emphasizing asset identification, access control, and proactive monitoring tailored to the unique deployment contexts of Snapdragon platforms in Europe.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2021-04-07T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f3d940acd01a249261dfa

Added to database: 5/22/2025, 3:07:00 PM

Last enriched: 7/8/2025, 9:55:33 AM

Last updated: 2/7/2026, 8:58:49 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats