Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21385: CWE-190 Integer Overflow or Wraparound in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2026-21385cvecve-2026-21385cwe-190
Published: Mon Mar 02 2026 (03/02/2026, 16:53:59 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while using alignments for memory allocation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/10/2026, 17:24:49 UTC

Technical Analysis

CVE-2026-21385 is an integer overflow or wraparound vulnerability classified under CWE-190, discovered in Qualcomm Snapdragon platforms and related products. The vulnerability stems from incorrect handling of memory allocation alignments, which can cause memory corruption. This flaw affects a vast array of Qualcomm products, including numerous Snapdragon mobile platforms (from Snapdragon 4 Gen 1 through Snapdragon 8 Gen 3), modems, IoT platforms, automotive platforms, wearable devices, and wireless connectivity modules. The root cause is an integer overflow during memory allocation calculations, which can lead to buffer overflows or memory corruption, potentially allowing an attacker with local privileges to execute arbitrary code, escalate privileges, or cause denial of service. The CVSS v3.1 score of 7.8 indicates high severity, with attack vector local (AV:L), low complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No public exploits are known at this time, but the widespread deployment of affected hardware increases the risk of future exploitation. The vulnerability was reserved in December 2025 and published in March 2026, with Qualcomm as the assigner. Due to the broad product impact, this vulnerability poses a significant risk to devices relying on Qualcomm Snapdragon chipsets and related components.

Potential Impact

The impact of CVE-2026-21385 is substantial due to the extensive range of affected Qualcomm Snapdragon products deployed globally in smartphones, IoT devices, automotive systems, and wireless infrastructure. Successful exploitation can lead to memory corruption, enabling attackers with local access to execute arbitrary code, escalate privileges, or cause system crashes and denial of service. This compromises device confidentiality, integrity, and availability, potentially exposing sensitive user data, disrupting critical communications, or impairing automotive and industrial control systems. The local attack vector limits remote exploitation but does not eliminate risk, as malware or malicious insiders could leverage this flaw. Given the prevalence of Snapdragon platforms in consumer and enterprise devices, the vulnerability could affect millions of endpoints, increasing the potential for widespread disruption and data breaches. Organizations relying on these platforms for critical operations face heightened risk, especially in sectors like telecommunications, automotive, and IoT deployments.

Mitigation Recommendations

1. Monitor Qualcomm's official security advisories and promptly apply any patches or firmware updates addressing CVE-2026-21385 once released. 2. Implement strict access controls and endpoint protection to limit local user privileges and prevent unauthorized code execution. 3. Employ application whitelisting and behavior monitoring to detect anomalous activities indicative of exploitation attempts. 4. For enterprise environments, conduct thorough inventory and asset management to identify devices using affected Qualcomm platforms and prioritize remediation. 5. In the interim, consider disabling or restricting features that require local access to vulnerable components if feasible. 6. Collaborate with device vendors and OEMs to ensure timely deployment of security updates. 7. Educate users and administrators about the risks of local privilege escalation vulnerabilities and enforce strong physical and logical security controls to minimize local attack surfaces. 8. Utilize virtualization or sandboxing techniques where possible to contain potential exploitation impacts. 9. Regularly audit and update security policies to incorporate emerging threats related to hardware vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-12-17T04:35:45.743Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a5c5c8b6c0d8506faa297e

Added to database: 3/2/2026, 5:15:52 PM

Last enriched: 3/10/2026, 5:24:49 PM

Last updated: 4/16/2026, 5:21:13 PM

Views: 161

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses