Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-25682: Use of Out-of-range Pointer Offset in MODEM in Qualcomm, Inc. Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

0
Medium
Published: Tue Dec 13 2022 (12/13/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Description

Memory corruption in MODEM UIM due to usage of out of range pointer offset while decoding command from card in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

AI-Powered Analysis

AILast updated: 06/21/2025, 19:38:38 UTC

Technical Analysis

CVE-2022-25682 is a medium-severity memory corruption vulnerability identified in the MODEM UIM (User Identity Module) component of Qualcomm Snapdragon platforms. The flaw arises from the use of an out-of-range pointer offset during the decoding of commands received from the SIM or other card interfaces. This improper pointer arithmetic can lead to memory corruption, which may be exploited to cause unexpected behavior such as crashes, denial of service, or potentially arbitrary code execution within the modem subsystem. The vulnerability affects a broad range of Qualcomm Snapdragon products spanning multiple categories, including Snapdragon Auto, Compute, Connectivity, Consumer IoT, Industrial IoT, Mobile, Voice & Music, and Wearables. The affected chipsets cover a wide spectrum of Qualcomm’s portfolio, from older MSM and MDM series to the latest Snapdragon 8 Gen1 and Snapdragon X series modems. The root cause is classified under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), indicating a classic buffer over-read or out-of-bounds pointer usage. No public exploits are known to be in the wild as of the published date (December 2022), and Qualcomm has not released official patches linked in the provided data. The vulnerability requires processing of specially crafted commands from the card interface, which may limit remote exploitation but still poses a risk if an attacker can influence the card commands or the modem’s interaction with the SIM or embedded UIM. Given the critical role of the modem in cellular communications and device operation, exploitation could impact device availability and integrity of communications.

Potential Impact

For European organizations, the impact of CVE-2022-25682 could be significant due to the widespread use of Qualcomm Snapdragon chipsets in mobile devices, IoT endpoints, automotive systems, and industrial equipment. Disruption or compromise of modem functionality can lead to loss of cellular connectivity, affecting critical communications and operational continuity. In sectors such as automotive (connected cars), industrial IoT, and consumer electronics, this could translate into safety risks, operational downtime, or data integrity issues. Enterprises relying on mobile workforce devices or IoT sensors using affected Snapdragon platforms may face increased risk of service interruptions or targeted attacks exploiting this vulnerability. Although no known exploits exist publicly, the broad affected product range and the critical nature of modem subsystems mean that attackers with access to the SIM interface or supply chain could leverage this flaw. The vulnerability could also undermine trust in device security, especially in regulated sectors like finance or healthcare where secure communications are mandatory. Additionally, the potential for denial of service or code execution within the modem could be leveraged for espionage or sabotage, particularly in strategic industries or government agencies.

Mitigation Recommendations

1. Immediate mitigation requires coordination with device manufacturers and Qualcomm to obtain and deploy firmware or software updates that address the out-of-range pointer usage in the modem UIM component. Organizations should prioritize patching devices with affected Snapdragon chipsets, especially those used in critical infrastructure or sensitive environments. 2. Implement strict supply chain security controls to ensure that SIM cards and embedded UIMs are sourced from trusted providers to reduce the risk of maliciously crafted card commands. 3. Employ network-level monitoring to detect anomalous modem behavior or unexpected resets that could indicate exploitation attempts. 4. For automotive and industrial IoT deployments, isolate modem interfaces where possible and enforce strict access controls to prevent unauthorized command injection. 5. Engage with mobile device management (MDM) solutions to inventory affected devices and enforce update policies. 6. Collaborate with telecom providers to monitor for unusual signaling or command patterns that could exploit this vulnerability. 7. Where patching is delayed, consider disabling or restricting modem features that process external card commands if operationally feasible. 8. Conduct penetration testing and security assessments focused on modem interfaces and SIM command processing to identify potential exploitation vectors within the organization’s environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2022-02-22T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9849c4522896dcbf6fbe

Added to database: 5/21/2025, 9:09:29 AM

Last enriched: 6/21/2025, 7:38:38 PM

Last updated: 12/12/2025, 5:44:26 AM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats