CVE-2022-22078: Integer Overflow or Wraparound issues in BOOT in Qualcomm, Inc. Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
Denial of service in BOOT when partition size for a particular partition is requested due to integer overflow when blocks are calculated in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
AI Analysis
Technical Summary
CVE-2022-22078 is a medium-severity vulnerability affecting multiple Qualcomm Snapdragon platforms, including Snapdragon Auto, Compute, Connectivity, Consumer IoT, Industrial IoT, Mobile, and Wearables. The root cause is an integer overflow or wraparound issue in the BOOT component when calculating partition sizes. Specifically, when the system requests the size of a particular partition, the calculation of the number of blocks suffers from an integer overflow, leading to incorrect size computations. This flaw can cause a denial of service (DoS) condition, as the BOOT process may fail or behave unexpectedly due to corrupted partition size information. The vulnerability affects a wide range of Qualcomm chipsets and modules, including but not limited to AQT1000, QCA series (e.g., QCA6174A, QCA6390), Snapdragon Mobile series (e.g., SD835, SD865 5G), and various WCD and WCN wireless components. The CVSS v3.1 base score is 4.6, indicating a medium severity level, with the vector AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. This means the attack requires physical proximity (e.g., local access or physical access), has low attack complexity, no privileges or user interaction required, and impacts availability only. No known exploits are reported in the wild, and no patches were linked in the provided data, suggesting that mitigation may rely on vendor updates or workarounds. The underlying weakness is classified under CWE-190 (Integer Overflow or Wraparound).
Potential Impact
For European organizations, the impact of this vulnerability primarily concerns devices and systems using affected Qualcomm Snapdragon chipsets, especially in automotive, industrial IoT, consumer IoT, and mobile environments. The denial of service could disrupt critical operations in connected vehicles, industrial control systems, and IoT deployments, potentially leading to system downtime, loss of availability, and operational interruptions. In automotive contexts, this could affect vehicle boot processes or connectivity modules, impacting safety or telematics services. In industrial or consumer IoT, affected devices might become unresponsive or fail to boot properly, causing service outages. Although the vulnerability does not affect confidentiality or integrity, the availability impact can be significant in safety-critical or business-critical environments. The requirement for physical proximity or local access limits remote exploitation, but insider threats or physical access attacks remain a concern. Given the broad range of affected chipsets, organizations relying on Qualcomm hardware in embedded systems should assess their exposure carefully.
Mitigation Recommendations
1. Inventory and identify all devices and systems using affected Qualcomm Snapdragon chipsets, especially in automotive, industrial IoT, and mobile deployments. 2. Engage with Qualcomm and device vendors to obtain and apply official firmware or software patches addressing CVE-2022-22078 as they become available. 3. Where patches are not yet available, implement physical security controls to restrict unauthorized physical access to devices, reducing the risk of local exploitation. 4. Monitor device behavior for signs of boot failures or unexpected reboots that could indicate exploitation attempts. 5. For automotive and industrial environments, incorporate redundancy and failover mechanisms to mitigate potential availability disruptions. 6. Collaborate with supply chain partners to ensure updated hardware or firmware is deployed in new device procurements. 7. Consider network segmentation and access controls to limit exposure of vulnerable devices to untrusted users, even locally. 8. Maintain up-to-date asset management and vulnerability scanning to track affected devices and remediation status.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Finland
CVE-2022-22078: Integer Overflow or Wraparound issues in BOOT in Qualcomm, Inc. Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
Description
Denial of service in BOOT when partition size for a particular partition is requested due to integer overflow when blocks are calculated in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
AI-Powered Analysis
Technical Analysis
CVE-2022-22078 is a medium-severity vulnerability affecting multiple Qualcomm Snapdragon platforms, including Snapdragon Auto, Compute, Connectivity, Consumer IoT, Industrial IoT, Mobile, and Wearables. The root cause is an integer overflow or wraparound issue in the BOOT component when calculating partition sizes. Specifically, when the system requests the size of a particular partition, the calculation of the number of blocks suffers from an integer overflow, leading to incorrect size computations. This flaw can cause a denial of service (DoS) condition, as the BOOT process may fail or behave unexpectedly due to corrupted partition size information. The vulnerability affects a wide range of Qualcomm chipsets and modules, including but not limited to AQT1000, QCA series (e.g., QCA6174A, QCA6390), Snapdragon Mobile series (e.g., SD835, SD865 5G), and various WCD and WCN wireless components. The CVSS v3.1 base score is 4.6, indicating a medium severity level, with the vector AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. This means the attack requires physical proximity (e.g., local access or physical access), has low attack complexity, no privileges or user interaction required, and impacts availability only. No known exploits are reported in the wild, and no patches were linked in the provided data, suggesting that mitigation may rely on vendor updates or workarounds. The underlying weakness is classified under CWE-190 (Integer Overflow or Wraparound).
Potential Impact
For European organizations, the impact of this vulnerability primarily concerns devices and systems using affected Qualcomm Snapdragon chipsets, especially in automotive, industrial IoT, consumer IoT, and mobile environments. The denial of service could disrupt critical operations in connected vehicles, industrial control systems, and IoT deployments, potentially leading to system downtime, loss of availability, and operational interruptions. In automotive contexts, this could affect vehicle boot processes or connectivity modules, impacting safety or telematics services. In industrial or consumer IoT, affected devices might become unresponsive or fail to boot properly, causing service outages. Although the vulnerability does not affect confidentiality or integrity, the availability impact can be significant in safety-critical or business-critical environments. The requirement for physical proximity or local access limits remote exploitation, but insider threats or physical access attacks remain a concern. Given the broad range of affected chipsets, organizations relying on Qualcomm hardware in embedded systems should assess their exposure carefully.
Mitigation Recommendations
1. Inventory and identify all devices and systems using affected Qualcomm Snapdragon chipsets, especially in automotive, industrial IoT, and mobile deployments. 2. Engage with Qualcomm and device vendors to obtain and apply official firmware or software patches addressing CVE-2022-22078 as they become available. 3. Where patches are not yet available, implement physical security controls to restrict unauthorized physical access to devices, reducing the risk of local exploitation. 4. Monitor device behavior for signs of boot failures or unexpected reboots that could indicate exploitation attempts. 5. For automotive and industrial environments, incorporate redundancy and failover mechanisms to mitigate potential availability disruptions. 6. Collaborate with supply chain partners to ensure updated hardware or firmware is deployed in new device procurements. 7. Consider network segmentation and access controls to limit exposure of vulnerable devices to untrusted users, even locally. 8. Maintain up-to-date asset management and vulnerability scanning to track affected devices and remediation status.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- qualcomm
- Date Reserved
- 2021-12-21T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aec5a0
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 9:56:36 AM
Last updated: 7/30/2025, 2:35:00 PM
Views: 13
Related Threats
CVE-2025-55286: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in vancluever z2d
HighCVE-2025-52621: CWE-346 Origin Validation Error in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52620: CWE-20 Improper Input Validation in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52619: CWE-209 Generation of Error Message Containing Sensitive Information in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52618: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in HCL Software BigFix SaaS Remediate
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.