Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-25663: Buffer Over-read in WLAN in Qualcomm, Inc. Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity

0
Medium
VulnerabilityCVE-2022-25663cvecve-2022-25663
Published: Wed Oct 12 2022 (10/12/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity

Description

Possible buffer overflow due to lack of buffer length check during management frame Rx handling lead to denial of service in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity

AI-Powered Analysis

AILast updated: 07/04/2025, 19:25:20 UTC

Technical Analysis

CVE-2022-25663 is a medium-severity vulnerability identified in various Qualcomm Snapdragon platforms, including Snapdragon Compute, Snapdragon Connectivity, and Snapdragon Consumer Electronics Connectivity products. The root cause is a buffer over-read condition stemming from inadequate buffer length validation during the processing of management frames received over WLAN. Specifically, when the affected Qualcomm WLAN components handle incoming management frames, they fail to properly check the length of the buffer before accessing it, leading to a potential buffer over-read. This vulnerability is classified under CWE-125 (Out-of-bounds Read). The consequence of this flaw is a denial of service (DoS) condition, where the affected device or component could crash or become unresponsive due to the improper memory access. The CVSS v3.1 base score is 5.5, indicating a medium severity level. The attack vector is local (AV:L), requiring low attack complexity (AC:L) and low privileges (PR:L), but no user interaction (UI:N). The impact affects availability only (A:H), with no confidentiality or integrity impact. No known exploits are currently reported in the wild, and no patches were linked in the provided data, suggesting that remediation may require vendor updates or firmware patches. The affected versions include a broad range of Qualcomm chipsets and connectivity modules such as AQT1000, QCA1062, QCA1064, QCA2062, QCA2064, QCA2065, QCA2066, QCA6390, QCA6391, QCA6420, QCA6430, SD 8cx Gen2/Gen3, SD778G, SD7c, SD850, SM6250, and multiple WCD and WCN series components. This vulnerability primarily impacts devices using these Qualcomm components for WLAN connectivity, including laptops, mobile devices, and consumer electronics relying on Snapdragon platforms.

Potential Impact

For European organizations, the primary impact of CVE-2022-25663 is the potential for denial of service on devices employing affected Qualcomm Snapdragon WLAN components. This could manifest as unexpected device crashes, network connectivity interruptions, or degraded performance in critical wireless communications. Organizations relying on Snapdragon-based devices for business operations, remote work, or IoT deployments may experience operational disruptions. Although the vulnerability does not directly compromise confidentiality or integrity, availability impacts can affect productivity and service continuity. In sectors such as finance, healthcare, and critical infrastructure, even temporary WLAN outages can have significant operational consequences. Additionally, the requirement for local access and low privileges means that attackers would need some level of access to the device or network segment, which could be feasible in shared or public environments. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time. European organizations should be aware of this vulnerability when deploying or managing devices with Qualcomm Snapdragon WLAN components, particularly in environments where wireless availability is critical.

Mitigation Recommendations

1. Inventory and Identification: Conduct a thorough inventory of all devices using Qualcomm Snapdragon WLAN components listed as affected. This includes laptops, mobile devices, IoT devices, and embedded systems. 2. Firmware and Driver Updates: Monitor Qualcomm and device vendor advisories for patches or firmware updates addressing CVE-2022-25663. Apply updates promptly once available. 3. Network Segmentation: Limit local access to critical devices by segmenting networks and restricting access to trusted users and devices only, reducing the risk of local exploitation. 4. Access Controls: Enforce strict access controls and endpoint security policies to prevent unauthorized local access or privilege escalation that could be leveraged to exploit this vulnerability. 5. Monitoring and Detection: Implement monitoring for unusual WLAN device behavior, crashes, or connectivity issues that may indicate exploitation attempts. 6. User Awareness: Educate users about the risks of connecting to untrusted wireless networks or devices, as local access is required for exploitation. 7. Vendor Coordination: Engage with device manufacturers and Qualcomm for timely information on patches and mitigation strategies. 8. Temporary Workarounds: If patches are unavailable, consider disabling WLAN management frame processing features or using alternative network interfaces where feasible to reduce exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2022-02-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec44d

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 7:25:20 PM

Last updated: 2/7/2026, 11:41:45 AM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats