INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global phishing Multiple sectors HIGH 1h Global insider Cybersecurity Services CRITICAL 1h Global ransomware Multiple sectors (U.S. companies) CRITICAL 1h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 2h Global general Cybersecurity Operations HIGH 3h Global phishing Technology and Consumer Services HIGH 3h Global data_breach Multiple sectors HIGH 3h Global phishing Multiple sectors HIGH 1h Global insider Cybersecurity Services CRITICAL 1h Global ransomware Multiple sectors (U.S. companies) CRITICAL 1h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 2h Global general Cybersecurity Operations HIGH 3h Global phishing Technology and Consumer Services HIGH 3h Global data_breach Multiple sectors HIGH 3h Global phishing Multiple sectors HIGH 1h Global insider Cybersecurity Services CRITICAL 1h Global ransomware Multiple sectors (U.S. companies) CRITICAL 1h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 2h Global general Cybersecurity Operations HIGH 3h Global phishing Technology and Consumer Services HIGH 3h Global data_breach Multiple sectors HIGH 3h
Vulnerabilities

CVE-2021-1905

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Qualcomm Multiple Chipsets Use-After-Free Vulnerability — Multiple Qualcomm Chipsets contain a use after free vulnerability due to improper handling of memory mapping of multiple processes simultaneou
Published: Nov 3, 2021  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Qualcomm Multiple Chipsets Use-After-Free Vulnerability — Multiple Qualcomm Chipsets contain a use after free vulnerability due to improper handling of memory mapping of multiple processes simultaneously.

🤖 AI Executive Summary

CVE-2021-1905 is a critical use-after-free vulnerability affecting multiple Qualcomm chipsets with a CVSS score of 9.0. The vulnerability allows attackers to execute arbitrary code through improper memory mapping handling when multiple processes run simultaneously. With publicly available exploits and patches available, this poses an immediate threat to all Saudi organizations using Qualcomm-based devices, particularly in mobile, IoT, and embedded systems.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 19, 2026 22:55
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability critically impacts Saudi telecommunications sector (STC, Mobily, Zain) affecting millions of smartphones and IoT devices. Saudi banking sector faces risk through mobile banking applications and card readers using Qualcomm chipsets. Government agencies (NCA, CITC) managing critical infrastructure with Qualcomm-based systems are at high risk. Healthcare sector (MOH) utilizing Qualcomm chipsets in medical devices and hospital networks faces potential data breach and service disruption. ARAMCO and energy sector SCADA systems using Qualcomm processors require immediate assessment. The widespread use of Qualcomm chipsets in Saudi consumer and enterprise devices makes this a national-level threat.
🏢 Affected Saudi Sectors
Telecommunications Banking and Financial Services Government and Public Administration Healthcare Energy and Utilities Retail and E-commerce Education Manufacturing
⚖️ Saudi Risk Score (AI)
9.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all devices using affected Qualcomm chipsets across your organization (smartphones, IoT devices, embedded systems, routers)
2. Isolate critical systems from network if patches cannot be applied immediately
3. Implement network segmentation to limit lateral movement

PATCHING GUIDANCE:
1. Contact device manufacturers (Samsung, Xiaomi, OnePlus, etc.) for security updates
2. Deploy patches to all affected devices prioritizing critical infrastructure and user-facing systems
3. Establish patch management timeline: critical systems within 48 hours, others within 2 weeks
4. Verify patch application through firmware version checks

COMPENSATING CONTROLS (if patches unavailable):
1. Disable simultaneous multi-process execution where possible
2. Implement strict application whitelisting on affected devices
3. Monitor for suspicious memory access patterns and process behavior
4. Restrict user permissions and disable unnecessary services
5. Implement device-level firewalls and VPN for network isolation

DETECTION RULES:
1. Monitor for unexpected process terminations and memory access violations
2. Alert on unusual inter-process communication patterns
3. Track firmware version changes and unauthorized modifications
4. Implement EDR solutions to detect exploitation attempts
5. Monitor system logs for memory mapping errors and kernel panics
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع الأجهزة التي تستخدم معالجات Qualcomm المتأثرة في المنظمة (الهواتف الذكية وأجهزة إنترنت الأشياء والأنظمة المدمجة والموجهات)
2. عزل الأنظمة الحرجة عن الشبكة إذا لم يكن من الممكن تطبيق التصحيحات فوراً
3. تنفيذ تقسيم الشبكة لتحديد الحركة الجانبية

إرشادات التصحيح:
1. التواصل مع مصنعي الأجهزة (Samsung و Xiaomi و OnePlus وغيرها) للحصول على تحديثات الأمان
2. نشر التصحيحات على جميع الأجهزة المتأثرة مع إعطاء الأولوية للبنية التحتية الحرجة
3. إنشاء جدول زمني لإدارة التصحيحات: الأنظمة الحرجة خلال 48 ساعة
4. التحقق من تطبيق التصحيح من خلال فحوصات إصدار البرنامج الثابت

الضوابط البديلة (إذا لم تتوفر التصحيحات):
1. تعطيل تنفيذ العمليات المتعددة المتزامنة حيث أمكن
2. تنفيذ قائمة بيضاء صارمة للتطبيقات على الأجهزة المتأثرة
3. مراقبة أنماط الوصول إلى الذاكرة المريبة وسلوك العملية
4. تقييد أذونات المستخدم وتعطيل الخدمات غير الضرورية
5. تنفيذ جدران حماية على مستوى الجهاز وشبكات VPN

قواعد الكشف:
1. مراقبة إنهاء العمليات غير المتوقعة وانتهاكات الوصول إلى الذاكرة
2. التنبيه على أنماط الاتصال بين العمليات غير العادية
3. تتبع تغييرات إصدار البرنامج الثابت والتعديلات غير المصرح بها
4. تنفيذ حلول EDR للكشف عن محاولات الاستغلال
5. مراقبة سجلات النظام لأخطاء تعيين الذاكرة والأعطال
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
A.5.1.1 - Information Security Policies A.8.1.1 - User Endpoint Devices A.8.2.1 - User Access Management A.12.2.1 - Restrictions on Software Installation A.12.6.1 - Management of Technical Vulnerabilities
🔵 SAMA CSF
ID.RA-1 - Asset Management PR.DS-1 - Data Security PR.PT-2 - Protective Technology DE.CM-1 - Anomalies and Events RS.MI-1 - Incident Response
🟡 ISO 27001:2022
A.5.1 - Management Direction A.8.1 - User Endpoint Devices A.12.2 - Restrictions on Software Installation A.12.6 - Management of Technical Vulnerabilities A.14.2 - Security of Development, Test and Acceptance Environments
🟣 PCI DSS v4.0
Requirement 6.2 - Security Patches Requirement 11.2 - Vulnerability Scanning Requirement 12.2 - Configuration Standards
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Qualcomm:Multiple Chipsets
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS1.06%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-05-03
Published 2021-11-03
Source Feed cisa_kev
Views 3
🇸🇦 Saudi Risk Score
9.2
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.