Fixing and finding
Jump to remediation plan
CVE ID

CVE-2026-21385

Published 2026-03-02
Updated 2 months ago
Vendor/s
Qualcomm
Product/s
Multiple Chipsets
Version/s
-
KEV Status
Active Exploitation
Listed in CISA's Known Exploited Vulnerabilities catalogue. Active exploitation observed in the wild.
CVSS Score (v3.1)
7.8
/ 10
High
Severity Details
Base score
7.8 High
Attack vector
Local
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Description

CVE-2026-21385 is a high-severity memory corruption vulnerability in Qualcomm chipsets. Actively exploited; apply firmware patches immediately.

CPE

Qualcomm logo
Qualcomm
Product Version Start Version End (excl.) Status
sm7675p_firmware - - vulnerable
sm7675p - - unaffected
sm8475p_firmware - - vulnerable
sm8475p - - unaffected
sm8550p_firmware - - vulnerable
sm8550p - - unaffected
sm8635_firmware - - vulnerable
sm8635 - - unaffected
sm8635p_firmware - - vulnerable
sm8635p - - unaffected
sm8650q_firmware - - vulnerable
sm8650q - - unaffected
sm8750p_firmware - - vulnerable
sm8750p - - unaffected
smart_audio_400_platform_firmware - - vulnerable
smart_audio_400_platform - - unaffected
smart_display_200_platform_firmware - - vulnerable
smart_display_200_platform - - unaffected
snapdragon_4_gen_1_mobile_platform_firmware - - vulnerable
snapdragon_4_gen_1_mobile_platform - - unaffected
snapdragon_4_gen_2_mobile_platform_firmware - - vulnerable
snapdragon_4_gen_2_mobile_platform - - unaffected
snapdragon_429_mobile_platform_firmware - - vulnerable
snapdragon_429_mobile_platform - - unaffected
snapdragon_460_mobile_platform_firmware - - vulnerable
snapdragon_460_mobile_platform - - unaffected
snapdragon_480\+_5g_mobile_platform_firmware - - vulnerable
snapdragon_480\+_5g_mobile_platform - - unaffected
snapdragon_480_5g_mobile_platform_firmware - - vulnerable
snapdragon_480_5g_mobile_platform - - unaffected
snapdragon_6_gen_1_mobile_platform_firmware - - vulnerable
snapdragon_6_gen_1_mobile_platform - - unaffected
snapdragon_6_gen_3_mobile_platform_firmware - - vulnerable
snapdragon_6_gen_3_mobile_platform - - unaffected
snapdragon_6_gen_4_mobile_platform_firmware - - vulnerable
snapdragon_6_gen_4_mobile_platform - - unaffected
snapdragon_625_mobile_platform_firmware - - vulnerable
snapdragon_625_mobile_platform - - unaffected
snapdragon_626_mobile_platform_firmware - - vulnerable
snapdragon_626_mobile_platform - - unaffected
snapdragon_660_mobile_platform_firmware - - vulnerable
snapdragon_660_mobile_platform - - unaffected
snapdragon_662_mobile_platform_firmware - - vulnerable
snapdragon_662_mobile_platform - - unaffected
snapdragon_680_4g_mobile_platform_firmware - - vulnerable
snapdragon_680_4g_mobile_platform - - unaffected
snapdragon_685_4g_mobile_platform_firmware - - vulnerable
snapdragon_685_4g_mobile_platform - - unaffected
snapdragon_690_5g_mobile_platform_firmware - - vulnerable
snapdragon_690_5g_mobile_platform - - unaffected
snapdragon_695_5g_mobile_platform_firmware - - vulnerable
snapdragon_695_5g_mobile_platform - - unaffected
snapdragon_7\+_gen_2_mobile_platform_firmware - - vulnerable
snapdragon_7\+_gen_2_mobile_platform - - unaffected
snapdragon_7_gen_1_mobile_platform_firmware - - vulnerable
snapdragon_7_gen_1_mobile_platform - - unaffected
snapdragon_778g\+_5g_mobile_platform_firmware - - vulnerable
snapdragon_778g\+_5g_mobile_platform - - unaffected
snapdragon_778g_5g_mobile_platform_firmware - - vulnerable
snapdragon_778g_5g_mobile_platform - - unaffected
snapdragon_782g_mobile_platform_firmware - - vulnerable
snapdragon_782g_mobile_platform - - unaffected
snapdragon_7c\+_gen_3_compute_firmware - - vulnerable
snapdragon_7c\+_gen_3_compute - - unaffected
snapdragon_7s_gen_3_mobile_platform_firmware - - vulnerable
snapdragon_7s_gen_3_mobile_platform - - unaffected
snapdragon_8\+_gen_1_mobile_platform_firmware - - vulnerable
snapdragon_8\+_gen_1_mobile_platform - - unaffected
snapdragon_8\+_gen_2_mobile_platform_firmware - - vulnerable
snapdragon_8\+_gen_2_mobile_platform - - unaffected
snapdragon_8_elite_firmware - - vulnerable
snapdragon_8_elite - - unaffected
snapdragon_8_elite_gen_5_firmware - - vulnerable
snapdragon_8_elite_gen_5 - - unaffected
snapdragon_8_gen_1_mobile_platform_firmware - - vulnerable
snapdragon_8_gen_1_mobile_platform - - unaffected
snapdragon_8_gen_2_mobile_platform_firmware - - vulnerable
snapdragon_8_gen_2_mobile_platform - - unaffected
snapdragon_8_gen_3_mobile_platform_firmware - - vulnerable
snapdragon_8_gen_3_mobile_platform - - unaffected
5g_fixed_wireless_access_platform_firmware - - vulnerable
5g_fixed_wireless_access_platform - - unaffected
apq8098_firmware - - vulnerable
apq8098 - - unaffected
ar8031_firmware - - vulnerable
ar8031 - - unaffected
ar8035_firmware - - vulnerable
ar8035 - - unaffected
c-v2x_9150_firmware - - vulnerable
c-v2x_9150 - - unaffected
csra6620_firmware - - vulnerable
csra6620 - - unaffected
csra6640_firmware - - vulnerable
csra6640 - - unaffected
fastconnect_6200_firmware - - vulnerable
fastconnect_6200 - - unaffected
fastconnect_6700_firmware - - vulnerable
fastconnect_6700 - - unaffected
fastconnect_6800_firmware - - vulnerable
fastconnect_6800 - - unaffected
fastconnect_6900_firmware - - vulnerable
fastconnect_6900 - - unaffected
fastconnect_7800_firmware - - vulnerable
fastconnect_7800 - - unaffected
flight_rb5_5g_platform_firmware - - vulnerable
flight_rb5_5g_platform - - unaffected
fsm100_platform_firmware - - vulnerable
fsm100_platform - - unaffected
g1_gen_1_firmware - - vulnerable
g1_gen_1 - - unaffected
g2_gen_1_firmware - - vulnerable
g2_gen_1 - - unaffected
iq-615_firmware - - vulnerable
iq-615 - - unaffected
iq-8275_firmware - - vulnerable
iq-8275 - - unaffected
iq-8300_firmware - - vulnerable
iq-8300 - - unaffected
iq-9075_firmware - - vulnerable
iq-9075 - - unaffected
iq-9100_firmware - - vulnerable
iq-9100 - - unaffected
lemans_au_lgit_firmware - - vulnerable
lemans_au_lgit - - unaffected
lemansau_firmware - - vulnerable
lemansau - - unaffected
mdm9250_firmware - - vulnerable
mdm9250 - - unaffected
mdm9628_firmware - - vulnerable
mdm9628 - - unaffected
milos_firmware - - vulnerable
milos - - unaffected
monaco_iot_firmware - - vulnerable
monaco_iot - - unaffected
netrani_firmware - - vulnerable
netrani - - unaffected
orne_firmware - - vulnerable
orne - - unaffected
palawan25_firmware - - vulnerable
palawan25 - - unaffected
pandeiro_firmware - - vulnerable
pandeiro - - unaffected
qam8255p_firmware - - vulnerable
qam8255p - - unaffected
qam8295p_firmware - - vulnerable
qam8295p - - unaffected
qamsrv1h_firmware - - vulnerable
qamsrv1h - - unaffected
qamsrv1m_firmware - - vulnerable
qamsrv1m - - unaffected
qca2066_firmware - - vulnerable
qca2066 - - unaffected
qca6174a_firmware - - vulnerable
qca6174a - - unaffected
qca6391_firmware - - vulnerable
qca6391 - - unaffected
qca6564a_firmware - - vulnerable
qca6564a - - unaffected
qca6564au_firmware - - vulnerable
qca6564au - - unaffected
qca6574_firmware - - vulnerable
qca6574 - - unaffected
qca6574a_firmware - - vulnerable
qca6574a - - unaffected
qca6574au_firmware - - vulnerable
qca6574au - - unaffected
qca6584au_firmware - - vulnerable
qca6584au - - unaffected
qca6595_firmware - - vulnerable
qca6595 - - unaffected
snapdragon_820_automotive_platform_firmware - - vulnerable
snapdragon_820_automotive_platform - - unaffected
snapdragon_820am_firmware - - vulnerable
snapdragon_820am - - unaffected
snapdragon_865\+_5g_mobile_platform_firmware - - vulnerable
snapdragon_865\+_5g_mobile_platform - - unaffected
snapdragon_865_5g_mobile_platform_firmware - - vulnerable
snapdragon_865_5g_mobile_platform - - unaffected
snapdragon_870_5g_mobile_platform_firmware - - vulnerable
snapdragon_870_5g_mobile_platform - - unaffected
snapdragon_888\+_5g_mobile_platform_firmware - - vulnerable
snapdragon_888\+_5g_mobile_platform - - unaffected
snapdragon_888_5g_mobile_platform_firmware - - vulnerable
snapdragon_888_5g_mobile_platform - - unaffected
snapdragon_ar1\+_gen_1_platform_firmware - - vulnerable
snapdragon_ar1\+_gen_1_platform - - unaffected
snapdragon_ar1_gen_1_platform_firmware - - vulnerable
snapdragon_ar1_gen_1_platform - - unaffected
snapdragon_auto_5g_modem-rf_firmware - - vulnerable
snapdragon_auto_5g_modem-rf - - unaffected
snapdragon_w5\+_gen_1_wearable_platform_firmware - - vulnerable
snapdragon_w5\+_gen_1_wearable_platform - - unaffected
snapdragon_x12_lte_modem_firmware - - vulnerable
snapdragon_x12_lte_modem - - unaffected
snapdragon_x5_lte_modem_firmware - - vulnerable
snapdragon_x5_lte_modem - - unaffected
snapdragon_x53_5g_modem-rf_system_firmware - - vulnerable
snapdragon_x53_5g_modem-rf_system - - unaffected
snapdragon_x55_5g_modem-rf_system_firmware - - vulnerable
snapdragon_x55_5g_modem-rf_system - - unaffected
snapdragon_x65_5g_modem-rf_system_firmware - - vulnerable
snapdragon_x65_5g_modem-rf_system - - unaffected
snapdragon_xr2\+_gen_1_platform_firmware - - vulnerable
snapdragon_xr2\+_gen_1_platform - - unaffected
snapdragon_xr2_5g_platform_firmware - - vulnerable
snapdragon_xr2_5g_platform - - unaffected
srv1h_firmware - - vulnerable
srv1h - - unaffected
srv1m_firmware - - vulnerable
srv1m - - unaffected
sw5100_firmware - - vulnerable
sw5100 - - unaffected
sw5100p_firmware - - vulnerable
sw5100p - - unaffected
sw6100_firmware - - vulnerable
sw6100 - - unaffected
sw6100p_firmware - - vulnerable
sw6100p - - unaffected
sxr2230p_firmware - - vulnerable
sxr2230p - - unaffected
sxr2250p_firmware - - vulnerable
sxr2250p - - unaffected
sxr2330p_firmware - - vulnerable
sxr2330p - - unaffected
sxr2350p_firmware - - vulnerable
sxr2350p - - unaffected
themisto_firmware - - vulnerable
themisto - - unaffected
video_collaboration_vc1_platform_firmware - - vulnerable
video_collaboration_vc1_platform - - unaffected
video_collaboration_vc3_platform_firmware - - vulnerable
video_collaboration_vc3_platform - - unaffected
video_collaboration_vc5_platform_firmware - - vulnerable
video_collaboration_vc5_platform - - unaffected
vision_intelligence_100_platform_firmware - - vulnerable
vision_intelligence_100_platform - - unaffected
vision_intelligence_200_platform_firmware - - vulnerable
vision_intelligence_200_platform - - unaffected
vision_intelligence_400_platform_firmware - - vulnerable
vision_intelligence_400_platform - - unaffected
wcd9326_firmware - - vulnerable
wcd9326 - - unaffected
wcd9330_firmware - - vulnerable
wcd9330 - - unaffected
wcd9335_firmware - - vulnerable
wcd9335 - - unaffected
wcd9341_firmware - - vulnerable
wcd9341 - - unaffected
wcd9360_firmware - - vulnerable
wcd9360 - - unaffected
qca6595au_firmware - - vulnerable
qca6595au - - unaffected
qca6678aq_firmware - - vulnerable
qca6678aq - - unaffected
qca6688aq_firmware - - vulnerable
qca6688aq - - unaffected
qca6696_firmware - - vulnerable
qca6696 - - unaffected
qca6698aq_firmware - - vulnerable
qca6698aq - - unaffected
qca6698au_firmware - - vulnerable
qca6698au - - unaffected
qca6797aq_firmware - - vulnerable
qca6797aq - - unaffected
qca8081_firmware - - vulnerable
qca8081 - - unaffected
qca8337_firmware - - vulnerable
qca8337 - - unaffected
qca8695au_firmware - - vulnerable
qca8695au - - unaffected
qca9367_firmware - - vulnerable
qca9367 - - unaffected
qca9377_firmware - - vulnerable
qca9377 - - unaffected
qcm2290_firmware - - vulnerable
qcm2290 - - unaffected
qcm4325_firmware - - vulnerable
qcm4325 - - unaffected
qcm4490_firmware - - vulnerable
qcm4490 - - unaffected
qcm5430_firmware - - vulnerable
qcm5430 - - unaffected
qcm6125_firmware - - vulnerable
qcm6125 - - unaffected
qcm6490_firmware - - vulnerable
qcm6490 - - unaffected
qcn6024_firmware - - vulnerable
qcn6024 - - unaffected
qcn9011_firmware - - vulnerable
qcn9011 - - unaffected
qcn9012_firmware - - vulnerable
qcn9012 - - unaffected
qcn9024_firmware - - vulnerable
qcn9024 - - unaffected
qcs2290_firmware - - vulnerable
qcs2290 - - unaffected
qcs4290_firmware - - vulnerable
qcs4290 - - unaffected
qcs4490_firmware - - vulnerable
qcs4490 - - unaffected
qcs8550_firmware - - vulnerable
qcs8550 - - unaffected
qln1083bd_firmware - - vulnerable
qln1083bd - - unaffected
qln1086bd_firmware - - vulnerable
qln1086bd - - unaffected
qmp1000_firmware - - vulnerable
qmp1000 - - unaffected
qpa1083bd_firmware - - vulnerable
qpa1083bd - - unaffected
qpa1086bd_firmware - - vulnerable
qpa1086bd - - unaffected
qrb5165m_firmware - - vulnerable
qrb5165m - - unaffected
qrb5165n_firmware - - vulnerable
qrb5165n - - unaffected
qualcomm_215_mobile_platform_firmware - - vulnerable
qualcomm_215_mobile_platform - - unaffected
qxm1083_firmware - - vulnerable
qxm1083 - - unaffected
qxm1086_firmware - - vulnerable
qxm1086 - - unaffected
qxm1093_firmware - - vulnerable
qxm1093 - - unaffected
qxm1094_firmware - - vulnerable
qxm1094 - - unaffected
qxm1095_firmware - - vulnerable
qxm1095 - - unaffected
qxm1096_firmware - - vulnerable
qxm1096 - - unaffected
wcd9370_firmware - - vulnerable
wcd9370 - - unaffected
wcd9371_firmware - - vulnerable
wcd9371 - - unaffected
wcd9375_firmware - - vulnerable
wcd9375 - - unaffected
wcd9378_firmware - - vulnerable
wcd9378 - - unaffected
wcd9380_firmware - - vulnerable
wcd9380 - - unaffected
wcd9385_firmware - - vulnerable
wcd9385 - - unaffected
wcd9390_firmware - - vulnerable
wcd9390 - - unaffected
wcd9395_firmware - - vulnerable
wcd9395 - - unaffected
wcn3615_firmware - - vulnerable
wcn3615 - - unaffected
wcn3620_firmware - - vulnerable
wcn3620 - - unaffected
wcn3660b_firmware - - vulnerable
wcn3660b - - unaffected
wcn3680b_firmware - - vulnerable
wcn3680b - - unaffected
wcn3910_firmware - - vulnerable
wcn3910 - - unaffected
wcn3950_firmware - - vulnerable
wcn3950 - - unaffected
wcn3980_firmware - - vulnerable
wcn3980 - - unaffected
wcn3988_firmware - - vulnerable
wcn3988 - - unaffected
wcn3990_firmware - - vulnerable
wcn3990 - - unaffected
wcn6450_firmware - - vulnerable
wcn6450 - - unaffected
wcn6650_firmware - - vulnerable
wcn6650 - - unaffected
wcn6755_firmware - - vulnerable
wcn6755 - - unaffected
wcn7860_firmware - - vulnerable
wcn7860 - - unaffected
wcn7861_firmware - - vulnerable
wcn7861 - - unaffected
wcn7880_firmware - - vulnerable
wcn7880 - - unaffected
wcn7881_firmware - - vulnerable
wcn7881 - - unaffected
wsa8810_firmware - - vulnerable
wsa8810 - - unaffected
wsa8815_firmware - - vulnerable
wsa8815 - - unaffected
wsa8830_firmware - - vulnerable
wsa8830 - - unaffected
wsa8832_firmware - - vulnerable
wsa8832 - - unaffected
wsa8835_firmware - - vulnerable
wsa8835 - - unaffected
wsa8840_firmware - - vulnerable
wsa8840 - - unaffected
wsa8845_firmware - - vulnerable
wsa8845 - - unaffected
wsa8845h_firmware - - vulnerable
wsa8845h - - unaffected
robotics_rb2_platform_firmware - - vulnerable
robotics_rb2_platform - - unaffected
robotics_rb5_platform_firmware - - vulnerable
robotics_rb5_platform - - unaffected
sa4150p_firmware - - vulnerable
sa4150p - - unaffected
sa4155p_firmware - - vulnerable
sa4155p - - unaffected
sa6145p_firmware - - vulnerable
sa6145p - - unaffected
sa6150p_firmware - - vulnerable
sa6150p - - unaffected
sa6155_firmware - - vulnerable
sa6155 - - unaffected
sa6155p_firmware - - vulnerable
sa6155p - - unaffected
sa7255p_firmware - - vulnerable
sa7255p - - unaffected
sa7775p_firmware - - vulnerable
sa7775p - - unaffected
sa8145p_firmware - - vulnerable
sa8145p - - unaffected
sa8150p_firmware - - vulnerable
sa8150p - - unaffected
sa8155_firmware - - vulnerable
sa8155 - - unaffected
sa8155p_firmware - - vulnerable
sa8155p - - unaffected
sa8195p_firmware - - vulnerable
sa8195p - - unaffected
sa8255p_firmware - - vulnerable
sa8255p - - unaffected
sa8295p_firmware - - vulnerable
sa8295p - - unaffected
sa8620p_firmware - - vulnerable
sa8620p - - unaffected
sa8770p_firmware - - vulnerable
sa8770p - - unaffected
sa9000p_firmware - - vulnerable
sa9000p - - unaffected
sar1165p_firmware - - vulnerable
sar1165p - - unaffected
sar1250p_firmware - - vulnerable
sar1250p - - unaffected
sar2130p_firmware - - vulnerable
sar2130p - - unaffected
sar2230p_firmware - - vulnerable
sar2230p - - unaffected
sc8380xp_firmware - - vulnerable
sc8380xp - - unaffected
snapdragon_8_gen_1_firmware - - vulnerable
snapdragon_8_gen_1 - - unaffected
sd626_firmware - - vulnerable
sd626 - - unaffected
sd662_firmware - - vulnerable
sd662 - - unaffected
sd865_5g_firmware - - vulnerable
sd865_5g - - unaffected
sda660_firmware - - vulnerable
sda660 - - unaffected
sdm429w_firmware - - vulnerable
sdm429w - - unaffected
sdx61_firmware - - vulnerable
sdx61 - - unaffected
sm6225p_firmware - - vulnerable
sm6225p - - unaffected
sm6650p_firmware - - vulnerable
sm6650p - - unaffected
sm7325p_firmware - - vulnerable
sm7325p - - unaffected
sm7435_firmware - - vulnerable
sm7435 - - unaffected
sm7550_firmware - - vulnerable
sm7550 - - unaffected
sm7550p_firmware - - vulnerable
sm7550p - - unaffected
sm7635p_firmware - - vulnerable
sm7635p - - unaffected
sm7675_firmware - - vulnerable
sm7675 - - unaffected

Related weakness (CWE)

CWE-190

Remediation plan

1

Apply official patches

Install the March 2026 security updates provided by Qualcomm or your device OEM. Refer to the Android Security Bulletin for specific integration details and patch levels required for your hardware.

2

Update affected systems

Ensure firmware is updated for all vulnerable components, specifically targeting Snapdragon 8 Gen series (SM8450, SM8550, SM8650), FastConnect 6700/7800 modules, and Snapdragon X-series lte modems identified in the CPE data.

3

Restrict access

Implement strict application sandboxing and the principle of least privilege to prevent untrusted local users or applications from interacting with vulnerable kernel-level memory allocation functions.

4

Monitor for exploitation

Track system logs for unusual kernel panics, memory allocation errors, or unexpected reboots, which may indicate attempted exploitation of memory corruption vulnerabilities in the chipset firmware.

Detection Guidance

Detection should focus on identifying anomalous local activity. Monitor kernel logs for memory allocation failures or alignment-related errors. Security teams should analyze crash dumps associated with system services or drivers interacting with Qualcomm hardware. Since this is a local attack, use Endpoint Detection and Response (EDR) tools to flag suspicious processes attempting to perform unusual memory operations or privilege escalation patterns on mobile and embedded Linux-based systems.

References

Sources

NIST National Vulnerability Database (NVD)
CISA Known Exploited Vulnerabilities (KEV)

Experience superior visibility and a simpler approach to cyber risk management