CVE-2022-25671: Reachable Assertion in MODEM in Qualcomm, Inc. Snapdragon Mobile
Denial of service in MODEM due to reachable assertion in Snapdragon Mobile
AI Analysis
Technical Summary
CVE-2022-25671 is a medium-severity vulnerability identified in the modem components of Qualcomm Snapdragon Mobile platforms. The issue is classified as a reachable assertion failure (CWE-617) within the modem firmware or software stack. An assertion is a sanity check used by developers to verify assumptions in code; if an assertion is reachable and can be triggered by external input, it may cause the system to halt or crash, leading to a denial of service (DoS) condition. This vulnerability affects a broad range of Qualcomm products including various wireless connectivity chips (e.g., AR8035, QCA8081, QCA8337), Snapdragon 8 Gen1 5G SoC, and multiple WCN and WSA series components. The flaw allows an attacker to induce a reachable assertion failure in the modem, which can disrupt normal modem operations and potentially cause the device to lose network connectivity or become unresponsive. The vulnerability does not require authentication or user interaction, and no known exploits have been reported in the wild as of the published date. The absence of a patch link suggests that remediation may require firmware or software updates from device manufacturers or Qualcomm itself. The vulnerability's impact is primarily on availability, as it leads to denial of service, but it does not directly compromise confidentiality or integrity. The technical details indicate that the vulnerability was reserved early in 2022 and has been enriched by CISA, highlighting its recognition by cybersecurity authorities.
Potential Impact
For European organizations, the impact of CVE-2022-25671 can be significant, especially for enterprises and service providers relying on mobile devices and IoT equipment powered by affected Qualcomm Snapdragon modems. The denial of service could disrupt critical communications, impair mobile network connectivity, and affect operational continuity in sectors such as telecommunications, logistics, healthcare, and public safety. Devices experiencing modem crashes may lose cellular connectivity, impacting remote monitoring, mobile workforce operations, and emergency response capabilities. Although the vulnerability does not enable data theft or code execution, the loss of availability in mobile communications can degrade service quality and lead to operational downtime. In environments with high dependency on mobile broadband or 5G connectivity, such as smart factories or connected vehicles, this could translate into financial losses and safety risks. The lack of known exploits reduces immediate threat but does not eliminate the risk of future attacks leveraging this vulnerability. Organizations with large deployments of affected devices should consider this a medium risk that requires proactive mitigation to maintain service reliability.
Mitigation Recommendations
To mitigate CVE-2022-25671, European organizations should: 1) Identify all devices and equipment using affected Qualcomm Snapdragon modem components by inventorying hardware and firmware versions. 2) Engage with device manufacturers and Qualcomm to obtain firmware or software updates that address the reachable assertion vulnerability. 3) Apply updates promptly once available, prioritizing critical communication infrastructure and mobile endpoints. 4) Implement network-level monitoring to detect unusual modem resets or connectivity disruptions that may indicate exploitation attempts. 5) Employ redundancy in mobile communication paths where feasible to maintain connectivity during potential modem failures. 6) For IoT deployments, consider segmenting affected devices to limit impact on broader networks. 7) Collaborate with mobile network operators to understand any network-side mitigations or alerts related to this vulnerability. 8) Maintain awareness of Qualcomm and security advisories for any emerging exploits or patches. These steps go beyond generic advice by focusing on inventory management, vendor coordination, and operational continuity planning specific to modem-related denial of service.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland, Belgium
CVE-2022-25671: Reachable Assertion in MODEM in Qualcomm, Inc. Snapdragon Mobile
Description
Denial of service in MODEM due to reachable assertion in Snapdragon Mobile
AI-Powered Analysis
Technical Analysis
CVE-2022-25671 is a medium-severity vulnerability identified in the modem components of Qualcomm Snapdragon Mobile platforms. The issue is classified as a reachable assertion failure (CWE-617) within the modem firmware or software stack. An assertion is a sanity check used by developers to verify assumptions in code; if an assertion is reachable and can be triggered by external input, it may cause the system to halt or crash, leading to a denial of service (DoS) condition. This vulnerability affects a broad range of Qualcomm products including various wireless connectivity chips (e.g., AR8035, QCA8081, QCA8337), Snapdragon 8 Gen1 5G SoC, and multiple WCN and WSA series components. The flaw allows an attacker to induce a reachable assertion failure in the modem, which can disrupt normal modem operations and potentially cause the device to lose network connectivity or become unresponsive. The vulnerability does not require authentication or user interaction, and no known exploits have been reported in the wild as of the published date. The absence of a patch link suggests that remediation may require firmware or software updates from device manufacturers or Qualcomm itself. The vulnerability's impact is primarily on availability, as it leads to denial of service, but it does not directly compromise confidentiality or integrity. The technical details indicate that the vulnerability was reserved early in 2022 and has been enriched by CISA, highlighting its recognition by cybersecurity authorities.
Potential Impact
For European organizations, the impact of CVE-2022-25671 can be significant, especially for enterprises and service providers relying on mobile devices and IoT equipment powered by affected Qualcomm Snapdragon modems. The denial of service could disrupt critical communications, impair mobile network connectivity, and affect operational continuity in sectors such as telecommunications, logistics, healthcare, and public safety. Devices experiencing modem crashes may lose cellular connectivity, impacting remote monitoring, mobile workforce operations, and emergency response capabilities. Although the vulnerability does not enable data theft or code execution, the loss of availability in mobile communications can degrade service quality and lead to operational downtime. In environments with high dependency on mobile broadband or 5G connectivity, such as smart factories or connected vehicles, this could translate into financial losses and safety risks. The lack of known exploits reduces immediate threat but does not eliminate the risk of future attacks leveraging this vulnerability. Organizations with large deployments of affected devices should consider this a medium risk that requires proactive mitigation to maintain service reliability.
Mitigation Recommendations
To mitigate CVE-2022-25671, European organizations should: 1) Identify all devices and equipment using affected Qualcomm Snapdragon modem components by inventorying hardware and firmware versions. 2) Engage with device manufacturers and Qualcomm to obtain firmware or software updates that address the reachable assertion vulnerability. 3) Apply updates promptly once available, prioritizing critical communication infrastructure and mobile endpoints. 4) Implement network-level monitoring to detect unusual modem resets or connectivity disruptions that may indicate exploitation attempts. 5) Employ redundancy in mobile communication paths where feasible to maintain connectivity during potential modem failures. 6) For IoT deployments, consider segmenting affected devices to limit impact on broader networks. 7) Collaborate with mobile network operators to understand any network-side mitigations or alerts related to this vulnerability. 8) Maintain awareness of Qualcomm and security advisories for any emerging exploits or patches. These steps go beyond generic advice by focusing on inventory management, vendor coordination, and operational continuity planning specific to modem-related denial of service.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- qualcomm
- Date Reserved
- 2022-02-22T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf6f8f
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/21/2025, 7:52:02 PM
Last updated: 8/13/2025, 7:05:16 AM
Views: 17
Related Threats
CVE-2025-50610: n/a
HighCVE-2025-50609: n/a
HighCVE-2025-50608: n/a
HighCVE-2025-55194: CWE-248: Uncaught Exception in Part-DB Part-DB-server
MediumCVE-2025-55197: CWE-400: Uncontrolled Resource Consumption in py-pdf pypdf
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.