CVE-2022-25675: Reachable Assertion in Data Modem in Qualcomm, Inc. Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile
Denial of service due to reachable assertion in modem while processing filter rule from application client in Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile
AI Analysis
Technical Summary
CVE-2022-25675 is a medium-severity vulnerability affecting multiple Qualcomm Snapdragon platforms, including Snapdragon Compute, Snapdragon Industrial IoT, and Snapdragon Mobile chipsets. The issue arises from a reachable assertion failure within the data modem component when processing filter rules sent by an application client. Specifically, the vulnerability is classified under CWE-617 (Reachable Assertion), indicating that an assertion statement in the modem firmware can be triggered by crafted input, leading to an unexpected termination of the modem process. This results in a denial of service (DoS) condition, where the modem becomes unresponsive or resets, disrupting normal device communication. The affected products span a wide range of Qualcomm chipsets, including popular mobile SoCs such as SD690 5G, SD765G, SD888 5G, and industrial IoT-focused chips like QCA6310 and QCS6490. The vulnerability does not require user interaction or authentication, as it can be triggered by sending malicious filter rules from an application client to the modem. No known exploits have been reported in the wild, and no patches have been linked in the provided data, indicating that mitigation may require vendor firmware updates. The vulnerability impacts the availability of the modem subsystem, potentially causing network outages or degraded connectivity on affected devices. Given the broad range of affected chipsets used in smartphones, IoT devices, and compute platforms, this vulnerability has a wide attack surface, especially in environments relying heavily on Qualcomm modems for network connectivity.
Potential Impact
For European organizations, the impact of CVE-2022-25675 can be significant, particularly for sectors relying on Qualcomm Snapdragon-based devices for critical communications. Telecommunications providers, industrial IoT deployments, and enterprises using mobile compute devices could experience service disruptions due to modem failures. In industrial settings, loss of connectivity could halt automation processes or sensor data transmission, leading to operational downtime and safety risks. For mobile users, denial of service in the modem could result in dropped calls, loss of mobile data, and inability to access emergency services. The vulnerability could also affect supply chains and logistics operations that depend on connected devices. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact can indirectly affect business continuity and operational reliability. Given the lack of known exploits, the immediate risk is moderate, but the potential for targeted attacks or accidental triggering remains a concern, especially in critical infrastructure and IoT environments prevalent in Europe.
Mitigation Recommendations
To mitigate CVE-2022-25675, European organizations should: 1) Inventory and identify all devices using affected Qualcomm Snapdragon chipsets, including mobile devices, IoT endpoints, and compute platforms. 2) Engage with device manufacturers and Qualcomm to obtain firmware updates or patches addressing this vulnerability as they become available. 3) Implement network-level monitoring to detect unusual or malformed filter rule traffic directed at modems, potentially blocking suspicious application client requests. 4) For industrial IoT deployments, segment networks to isolate vulnerable devices and restrict access to modem configuration interfaces. 5) Employ redundancy and failover mechanisms in critical communication paths to minimize downtime caused by modem failures. 6) Educate IT and security teams about the vulnerability to recognize symptoms of modem denial of service and respond promptly. 7) Where possible, apply application whitelisting or strict access controls to prevent unauthorized applications from sending filter rules to the modem. These steps go beyond generic patching advice by emphasizing proactive device management, network segmentation, and traffic filtering tailored to the vulnerability's exploitation vector.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland, Belgium
CVE-2022-25675: Reachable Assertion in Data Modem in Qualcomm, Inc. Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile
Description
Denial of service due to reachable assertion in modem while processing filter rule from application client in Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile
AI-Powered Analysis
Technical Analysis
CVE-2022-25675 is a medium-severity vulnerability affecting multiple Qualcomm Snapdragon platforms, including Snapdragon Compute, Snapdragon Industrial IoT, and Snapdragon Mobile chipsets. The issue arises from a reachable assertion failure within the data modem component when processing filter rules sent by an application client. Specifically, the vulnerability is classified under CWE-617 (Reachable Assertion), indicating that an assertion statement in the modem firmware can be triggered by crafted input, leading to an unexpected termination of the modem process. This results in a denial of service (DoS) condition, where the modem becomes unresponsive or resets, disrupting normal device communication. The affected products span a wide range of Qualcomm chipsets, including popular mobile SoCs such as SD690 5G, SD765G, SD888 5G, and industrial IoT-focused chips like QCA6310 and QCS6490. The vulnerability does not require user interaction or authentication, as it can be triggered by sending malicious filter rules from an application client to the modem. No known exploits have been reported in the wild, and no patches have been linked in the provided data, indicating that mitigation may require vendor firmware updates. The vulnerability impacts the availability of the modem subsystem, potentially causing network outages or degraded connectivity on affected devices. Given the broad range of affected chipsets used in smartphones, IoT devices, and compute platforms, this vulnerability has a wide attack surface, especially in environments relying heavily on Qualcomm modems for network connectivity.
Potential Impact
For European organizations, the impact of CVE-2022-25675 can be significant, particularly for sectors relying on Qualcomm Snapdragon-based devices for critical communications. Telecommunications providers, industrial IoT deployments, and enterprises using mobile compute devices could experience service disruptions due to modem failures. In industrial settings, loss of connectivity could halt automation processes or sensor data transmission, leading to operational downtime and safety risks. For mobile users, denial of service in the modem could result in dropped calls, loss of mobile data, and inability to access emergency services. The vulnerability could also affect supply chains and logistics operations that depend on connected devices. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact can indirectly affect business continuity and operational reliability. Given the lack of known exploits, the immediate risk is moderate, but the potential for targeted attacks or accidental triggering remains a concern, especially in critical infrastructure and IoT environments prevalent in Europe.
Mitigation Recommendations
To mitigate CVE-2022-25675, European organizations should: 1) Inventory and identify all devices using affected Qualcomm Snapdragon chipsets, including mobile devices, IoT endpoints, and compute platforms. 2) Engage with device manufacturers and Qualcomm to obtain firmware updates or patches addressing this vulnerability as they become available. 3) Implement network-level monitoring to detect unusual or malformed filter rule traffic directed at modems, potentially blocking suspicious application client requests. 4) For industrial IoT deployments, segment networks to isolate vulnerable devices and restrict access to modem configuration interfaces. 5) Employ redundancy and failover mechanisms in critical communication paths to minimize downtime caused by modem failures. 6) Educate IT and security teams about the vulnerability to recognize symptoms of modem denial of service and respond promptly. 7) Where possible, apply application whitelisting or strict access controls to prevent unauthorized applications from sending filter rules to the modem. These steps go beyond generic patching advice by emphasizing proactive device management, network segmentation, and traffic filtering tailored to the vulnerability's exploitation vector.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- qualcomm
- Date Reserved
- 2022-02-22T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf6c16
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/21/2025, 9:39:29 PM
Last updated: 8/12/2025, 2:18:54 PM
Views: 13
Related Threats
CVE-2025-6184: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in themeum Tutor LMS Pro
HighCVE-2025-8762: Improper Physical Access Control in INSTAR 2K+
HighCVE-2025-8761: Denial of Service in INSTAR 2K+
HighCVE-2025-8760: Buffer Overflow in INSTAR 2K+
CriticalCVE-2025-6715: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in LatePoint
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.