Skip to main content

CVE-2022-25675: Reachable Assertion in Data Modem in Qualcomm, Inc. Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile

Medium
Published: Tue Dec 13 2022 (12/13/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile

Description

Denial of service due to reachable assertion in modem while processing filter rule from application client in Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile

AI-Powered Analysis

AILast updated: 06/21/2025, 21:39:29 UTC

Technical Analysis

CVE-2022-25675 is a medium-severity vulnerability affecting multiple Qualcomm Snapdragon platforms, including Snapdragon Compute, Snapdragon Industrial IoT, and Snapdragon Mobile chipsets. The issue arises from a reachable assertion failure within the data modem component when processing filter rules sent by an application client. Specifically, the vulnerability is classified under CWE-617 (Reachable Assertion), indicating that an assertion statement in the modem firmware can be triggered by crafted input, leading to an unexpected termination of the modem process. This results in a denial of service (DoS) condition, where the modem becomes unresponsive or resets, disrupting normal device communication. The affected products span a wide range of Qualcomm chipsets, including popular mobile SoCs such as SD690 5G, SD765G, SD888 5G, and industrial IoT-focused chips like QCA6310 and QCS6490. The vulnerability does not require user interaction or authentication, as it can be triggered by sending malicious filter rules from an application client to the modem. No known exploits have been reported in the wild, and no patches have been linked in the provided data, indicating that mitigation may require vendor firmware updates. The vulnerability impacts the availability of the modem subsystem, potentially causing network outages or degraded connectivity on affected devices. Given the broad range of affected chipsets used in smartphones, IoT devices, and compute platforms, this vulnerability has a wide attack surface, especially in environments relying heavily on Qualcomm modems for network connectivity.

Potential Impact

For European organizations, the impact of CVE-2022-25675 can be significant, particularly for sectors relying on Qualcomm Snapdragon-based devices for critical communications. Telecommunications providers, industrial IoT deployments, and enterprises using mobile compute devices could experience service disruptions due to modem failures. In industrial settings, loss of connectivity could halt automation processes or sensor data transmission, leading to operational downtime and safety risks. For mobile users, denial of service in the modem could result in dropped calls, loss of mobile data, and inability to access emergency services. The vulnerability could also affect supply chains and logistics operations that depend on connected devices. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact can indirectly affect business continuity and operational reliability. Given the lack of known exploits, the immediate risk is moderate, but the potential for targeted attacks or accidental triggering remains a concern, especially in critical infrastructure and IoT environments prevalent in Europe.

Mitigation Recommendations

To mitigate CVE-2022-25675, European organizations should: 1) Inventory and identify all devices using affected Qualcomm Snapdragon chipsets, including mobile devices, IoT endpoints, and compute platforms. 2) Engage with device manufacturers and Qualcomm to obtain firmware updates or patches addressing this vulnerability as they become available. 3) Implement network-level monitoring to detect unusual or malformed filter rule traffic directed at modems, potentially blocking suspicious application client requests. 4) For industrial IoT deployments, segment networks to isolate vulnerable devices and restrict access to modem configuration interfaces. 5) Employ redundancy and failover mechanisms in critical communication paths to minimize downtime caused by modem failures. 6) Educate IT and security teams about the vulnerability to recognize symptoms of modem denial of service and respond promptly. 7) Where possible, apply application whitelisting or strict access controls to prevent unauthorized applications from sending filter rules to the modem. These steps go beyond generic patching advice by emphasizing proactive device management, network segmentation, and traffic filtering tailored to the vulnerability's exploitation vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2022-02-22T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9849c4522896dcbf6c16

Added to database: 5/21/2025, 9:09:29 AM

Last enriched: 6/21/2025, 9:39:29 PM

Last updated: 8/12/2025, 2:18:54 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats