Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-25666: Use After Free in DSP Services in Qualcomm, Inc. Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

0
Medium
VulnerabilityCVE-2022-25666cvecve-2022-25666
Published: Wed Oct 19 2022 (10/19/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Description

Memory corruption due to use after free in service while trying to access maps by different threads in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

AI-Powered Analysis

AILast updated: 07/05/2025, 02:24:34 UTC

Technical Analysis

CVE-2022-25666 is a use-after-free vulnerability identified in the DSP (Digital Signal Processor) services of a broad range of Qualcomm Snapdragon platforms, including Snapdragon Auto, Compute, Consumer IoT, Industrial IoT, Mobile, Wearables, and Wired Infrastructure and Networking products. The vulnerability arises from improper memory management when multiple threads attempt to access shared map data structures concurrently, leading to a use-after-free condition. This memory corruption flaw can be exploited to cause arbitrary code execution, privilege escalation, or denial of service by corrupting memory regions that the DSP services rely upon. The affected Qualcomm chipsets and platforms are widely deployed across numerous device categories, including automotive systems, mobile phones, IoT devices, and networking equipment. The CVSS v3.1 base score is 6.7 (medium severity), with vector AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H, indicating that local access with high privileges is required, no user interaction is needed, and the impact on confidentiality, integrity, and availability is high. No known exploits are currently reported in the wild, and no patches are linked in the provided data, suggesting that mitigation may rely on vendor firmware or software updates. The root cause is classified under CWE-416 (Use After Free), a common and dangerous memory corruption vulnerability type. Given the extensive list of affected Qualcomm chipsets, the vulnerability has a broad potential attack surface across multiple device types and industries.

Potential Impact

For European organizations, the impact of CVE-2022-25666 can be significant due to the widespread use of Qualcomm Snapdragon chipsets in critical infrastructure and consumer devices. Automotive manufacturers and suppliers using Snapdragon Auto platforms could face risks of remote or local compromise of vehicle systems, potentially affecting safety-critical functions. Enterprises deploying IoT devices based on Snapdragon Industrial or Consumer IoT platforms may experience breaches leading to data leakage or device malfunction. Mobile devices and wearables prevalent among employees and consumers in Europe could be targeted for privilege escalation or persistent malware installation. Networking equipment using Snapdragon Wired Infrastructure and Networking chipsets may be vulnerable to attacks that disrupt network availability or compromise data confidentiality. Although exploitation requires local access with high privileges, attackers who gain footholds through other means (e.g., phishing, physical access, or supply chain compromise) could leverage this vulnerability to escalate privileges and move laterally within networks. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits post-disclosure. The potential for high confidentiality, integrity, and availability impact underscores the importance of addressing this vulnerability promptly.

Mitigation Recommendations

1. Immediate identification and inventory of all devices and systems within the organization that utilize affected Qualcomm Snapdragon chipsets, including automotive systems, IoT devices, mobile phones, wearables, and networking hardware. 2. Engage with device and equipment vendors to obtain and apply official firmware or software patches addressing CVE-2022-25666 as soon as they become available. 3. Implement strict access controls and monitoring on devices with Snapdragon chipsets to limit local privileged access, including enforcing least privilege principles and multi-factor authentication for administrative accounts. 4. Employ network segmentation to isolate critical systems using affected hardware, reducing the risk of lateral movement by attackers exploiting this vulnerability. 5. Monitor security advisories from Qualcomm and related vendors for updates or exploit reports and maintain readiness to deploy emergency patches. 6. Conduct regular security assessments and penetration testing focusing on devices with affected chipsets to detect potential exploitation attempts. 7. For automotive and industrial IoT deployments, coordinate with manufacturers to ensure secure update mechanisms are in place and that devices can be patched without disrupting critical operations. 8. Educate IT and security teams about the nature of use-after-free vulnerabilities and the importance of timely patch management in embedded systems.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2022-02-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd7930

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/5/2025, 2:24:34 AM

Last updated: 2/4/2026, 1:54:40 PM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats