Skip to main content

CVE-2022-25665: Buffer Over-read in Kernel in Qualcomm, Inc. Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Mobile

Medium
VulnerabilityCVE-2022-25665cvecve-2022-25665
Published: Wed Oct 12 2022 (10/12/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Mobile

Description

Information disclosure due to buffer over read in kernel in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Mobile

AI-Powered Analysis

AILast updated: 07/04/2025, 19:25:48 UTC

Technical Analysis

CVE-2022-25665 is a medium-severity vulnerability identified in the kernel components of multiple Qualcomm Snapdragon platforms, including Snapdragon Auto, Compute, Consumer IoT, and Mobile product lines. The vulnerability arises from a buffer over-read condition (CWE-125), where the kernel improperly reads data beyond the allocated buffer boundaries. This flaw can lead to information disclosure, as sensitive kernel memory contents may be exposed to unauthorized processes or users. The affected Snapdragon variants are extensive, covering a wide range of chipsets used in automotive systems, IoT devices, mobile phones, and compute platforms. The CVSS 3.1 base score is 6.8, reflecting a medium severity level with a vector indicating local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity impact (I:N), and low availability impact (A:L). Exploitation does not require authentication or user interaction but must be performed locally, which limits remote exploitation. No known exploits are currently reported in the wild, and no official patches are linked in the provided data, indicating that mitigation may rely on vendor updates or kernel patches yet to be broadly deployed. The vulnerability is significant because kernel-level information disclosure can facilitate further privilege escalation or targeted attacks by revealing sensitive kernel data structures or memory contents. Qualcomm Snapdragon chipsets are widely deployed in European consumer mobile devices, automotive infotainment and telematics systems, and IoT devices, making this vulnerability relevant across multiple sectors. The broad range of affected chipsets, including recent Snapdragon 8 Gen1 and various automotive and IoT models, underscores the widespread potential impact. The vulnerability's exploitation requires local access, which may be achieved through compromised applications or physical access, emphasizing the importance of device security and access controls.

Potential Impact

For European organizations, the impact of CVE-2022-25665 can be multifaceted. In the automotive sector, where Snapdragon Auto platforms are used in infotainment and telematics systems, information disclosure could expose sensitive vehicle data or system internals, potentially aiding attackers in crafting further attacks or compromising vehicle safety features. In consumer mobile devices, information leakage at the kernel level could facilitate privilege escalation or bypass of security controls, threatening user data confidentiality and device integrity. IoT deployments in smart homes, industrial environments, or critical infrastructure that rely on affected Snapdragon Compute or Consumer IoT platforms could see increased risk of targeted attacks exploiting this vulnerability to gain sensitive information or footholds within networks. The medium severity and local attack vector imply that attackers need some form of local access, which may be possible through malicious apps, insider threats, or physical device access. This elevates the importance of endpoint security, application vetting, and physical device protection. Given the widespread use of Qualcomm Snapdragon chipsets in Europe, especially in mobile and automotive sectors, the vulnerability could impact a large number of devices and systems, potentially leading to data breaches, privacy violations, and increased attack surface for follow-on exploits.

Mitigation Recommendations

To mitigate CVE-2022-25665, European organizations should prioritize the following actions: 1) Monitor for and apply official Qualcomm or device vendor security patches as they become available, ensuring that affected devices receive kernel updates addressing the buffer over-read. 2) Implement strict access controls and endpoint security measures to prevent unauthorized local access to devices, including enforcing strong authentication, device encryption, and application whitelisting to reduce the risk of malicious local code execution. 3) For automotive systems, ensure secure boot and firmware integrity verification mechanisms are in place to prevent unauthorized firmware modifications that could exploit this vulnerability. 4) Conduct regular security audits and vulnerability assessments on IoT and compute devices using affected Snapdragon chipsets to identify and remediate potential attack vectors. 5) Employ network segmentation and monitoring to detect anomalous local activity that could indicate exploitation attempts. 6) Educate users and administrators about the risks of installing untrusted applications or connecting unknown peripherals that could provide local attack vectors. 7) Collaborate with device manufacturers and vendors to confirm patch availability and deployment status, especially for embedded and automotive systems where update cycles may be slower.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2022-02-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec46e

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 7:25:48 PM

Last updated: 8/12/2025, 4:58:52 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats