Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21385: CWE-190 Integer Overflow or Wraparound in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2026-21385cvecve-2026-21385cwe-190
Published: Mon Mar 02 2026 (03/02/2026, 16:53:59 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while using alignments for memory allocation.

AI-Powered Analysis

AILast updated: 03/02/2026, 17:34:18 UTC

Technical Analysis

CVE-2026-21385 is an integer overflow or wraparound vulnerability classified under CWE-190, discovered in Qualcomm Snapdragon platforms. The vulnerability stems from improper handling of memory allocation alignments, which can cause integer overflow during calculations related to memory size or alignment. This overflow leads to memory corruption, potentially allowing an attacker with local privileges to execute arbitrary code, escalate privileges, or cause denial of service. The vulnerability affects an extensive list of Qualcomm products, including mobile platforms (e.g., Snapdragon 8 Gen series, Snapdragon 7 series, Snapdragon 6 series), automotive platforms, IoT devices, wireless access platforms, and modem-RF systems. The CVSS v3.1 base score is 7.8, with vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating that exploitation requires local access and low complexity, with no user interaction needed, and results in high confidentiality, integrity, and availability impacts. Despite no known public exploits, the broad product impact and severity necessitate urgent attention. The vulnerability was reserved in December 2025 and published in March 2026, with Qualcomm as the assigner. No patches are currently linked, suggesting that mitigation depends on vendor updates and interim protective measures.

Potential Impact

The impact of CVE-2026-21385 is significant due to the wide range of affected Qualcomm Snapdragon platforms embedded in billions of devices worldwide, including smartphones, automotive systems, IoT devices, and wireless infrastructure. Successful exploitation can lead to memory corruption, enabling attackers to execute arbitrary code with elevated privileges, potentially compromising device confidentiality, integrity, and availability. This can result in unauthorized data access, persistent malware installation, device bricking, or disruption of critical services. Given the prevalence of Snapdragon chips in consumer and enterprise environments, the vulnerability poses a substantial risk to personal privacy, corporate data security, and operational continuity. Automotive and IoT devices are particularly sensitive, as exploitation could affect safety-critical systems. The requirement for local access limits remote exploitation but does not eliminate risk in scenarios where attackers gain physical or local network access. The absence of known exploits currently provides a window for mitigation before widespread attacks emerge.

Mitigation Recommendations

1. Monitor Qualcomm advisories closely for official patches addressing CVE-2026-21385 and apply updates promptly across all affected devices and platforms. 2. Restrict local access to devices using Qualcomm Snapdragon platforms by enforcing strong physical security controls and limiting user privileges to the minimum necessary. 3. Employ runtime memory protection mechanisms such as Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP), and stack canaries to reduce the likelihood of successful exploitation of memory corruption. 4. Implement strict application whitelisting and integrity monitoring to detect unauthorized code execution attempts. 5. For enterprise environments, isolate critical devices and networks to minimize the risk of lateral movement by attackers with local access. 6. Conduct regular security audits and vulnerability assessments focusing on devices with Qualcomm hardware to identify potential exploitation attempts. 7. Educate users and administrators about the risks of local privilege escalation vulnerabilities and the importance of maintaining updated firmware and software. 8. Where possible, deploy intrusion detection systems capable of identifying anomalous behavior indicative of exploitation attempts targeting memory corruption vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-12-17T04:35:45.743Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a5c5c8b6c0d8506faa297e

Added to database: 3/2/2026, 5:15:52 PM

Last enriched: 3/2/2026, 5:34:18 PM

Last updated: 3/2/2026, 8:14:07 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses