Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-22077: Use-After-Free in Graphics in Qualcomm, Inc. Snapdragon Mobile

0
High
VulnerabilityCVE-2022-22077cvecve-2022-22077
Published: Wed Oct 12 2022 (10/12/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon Mobile

Description

Memory corruption in graphics due to use-after-free in graphics dispatcher logic in Snapdragon Mobile

AI-Powered Analysis

AILast updated: 07/04/2025, 19:24:41 UTC

Technical Analysis

CVE-2022-22077 is a high-severity use-after-free vulnerability affecting the graphics dispatcher logic in Qualcomm Snapdragon Mobile platforms. Specifically, this vulnerability arises from improper memory management within the graphics subsystem, where a use-after-free condition allows an attacker to access memory that has already been freed. This can lead to memory corruption, which in turn can be exploited to execute arbitrary code with elevated privileges or cause denial of service. The affected Snapdragon Mobile versions include SD 8 Gen1 5G and several wireless connectivity chips such as WCD9380, WCN6855, WCN6856, WCN7850, WCN7851, WSA8830, and WSA8835. The vulnerability is identified as CWE-416 (Use After Free) and carries a CVSS v3.1 base score of 8.4, indicating high severity. The CVSS vector indicates that the attack requires local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N), with impacts rated high on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. However, the vulnerability's nature suggests that an attacker with local access to the device could leverage this flaw to gain control over the graphics subsystem, potentially compromising the entire device. This is particularly critical for mobile devices relying on Snapdragon chipsets, as the graphics component is integral to many system functions and user applications.

Potential Impact

For European organizations, the impact of CVE-2022-22077 can be significant, especially those relying on mobile devices powered by affected Qualcomm Snapdragon chipsets. The vulnerability allows local attackers to execute arbitrary code or cause denial of service, potentially leading to data breaches, disruption of mobile operations, or unauthorized access to sensitive information. Enterprises with Bring Your Own Device (BYOD) policies or mobile workforce using affected devices are at risk of targeted attacks exploiting this flaw. Additionally, industries such as finance, healthcare, and critical infrastructure that depend on secure mobile communications could face increased risk of espionage or operational disruption. The high confidentiality, integrity, and availability impacts mean that exploitation could compromise sensitive corporate data, disrupt business continuity, or facilitate lateral movement within networks. Given the lack of known exploits in the wild, the threat is currently theoretical but should be treated proactively due to the ease of exploitation and potential severity.

Mitigation Recommendations

To mitigate CVE-2022-22077, European organizations should: 1) Monitor Qualcomm and device manufacturers for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 2) Enforce strict device usage policies limiting local access to mobile devices, including physical security controls and restricting installation of untrusted applications that could exploit the vulnerability. 3) Employ mobile device management (MDM) solutions to enforce security configurations, monitor device health, and restrict potentially risky behaviors. 4) Educate users about the risks of installing unauthorized software and the importance of reporting suspicious device behavior. 5) For high-security environments, consider isolating or restricting the use of affected Snapdragon-powered devices until patches are applied. 6) Implement network-level protections to detect anomalous traffic or behavior that might indicate exploitation attempts. 7) Conduct regular security assessments and penetration testing focused on mobile device security to identify and remediate potential exploitation vectors related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2021-12-21T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec447

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 7:24:41 PM

Last updated: 2/7/2026, 11:22:02 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats