CVE-2021-1887

CVSS V2 Medium 5 CVSS V3 High 7.5
Description
An assertion can be reached in the WLAN subsystem while using the Wi-Fi Fine Timing Measurement protocol in Snapdragon Wired Infrastructure and Networking
Overview
  • CVE ID
  • CVE-2021-1887
  • Assigner
  • product-security@qualcomm.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2021-07-13T06:15:07
  • Last Modified Date
  • 2021-07-15T20:11:09
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:qualcomm:ar7420_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:ar7420:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:ar9380_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:ar9380:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:csr8811:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:ipq4018_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:ipq4018:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:ipq4019_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:ipq4019:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:ipq4028_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:ipq4028:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:ipq4029_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:ipq4029:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:ipq8064_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:ipq8064:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:ipq8065_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:ipq8065:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:ipq8069_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:ipq8069:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:ipq8074:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca6320:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca6335_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca6335:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca6428_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca6428:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca6438_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca6438:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca7500_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca7500:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca7520_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca7520:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca7550_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca7550:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca9531_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca9531:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca9558_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca9558:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca9561_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca9561:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca9563_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca9563:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca9880_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca9880:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca9882_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca9882:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca9887_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca9887:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca9888_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca9888:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca9889_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca9889:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca9896_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca9896:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca9898_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca9898:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca9980_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca9980:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca9984_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca9984:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca9990_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca9990:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca9992_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca9992:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca9994_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca9994:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qcn5024_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qcn5024:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qcn5054_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qcn5054:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qcn5501_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qcn5501:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qcn5502_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qcn5502:-:*:*:*:*:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:N/I:N/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • PARTIAL
  • Base Score
  • 5
  • Severity
  • MEDIUM
  • Exploitability Score
  • 10
  • Impact Score
  • 2.9
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • NONE
  • Availability Impact
  • HIGH
  • Base Score
  • 7.5
  • Base Severity
  • HIGH
  • Exploitability Score
  • 3.9
  • Impact Score
  • 3.6
References
History
Created Old Value New Value Data Type Notes
2022-05-10 07:06:51 Added to TrackCVE
2022-12-05 05:51:12 security.cna@qualcomm.com product-security@qualcomm.com CVE Assigner updated
2022-12-05 05:51:12 2021-07-13T06:15Z 2021-07-13T06:15:07 CVE Published Date updated
2022-12-05 05:51:12 2021-07-15T20:11:09 CVE Modified Date updated
2022-12-05 05:51:12 Analyzed Vulnerability Status updated