Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-25687: Buffer Copy Without Checking Size of Input in Video in Qualcomm, Inc. Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

0
High
VulnerabilityCVE-2022-25687cvecve-2022-25687
Published: Wed Oct 19 2022 (10/19/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Description

memory corruption in video due to buffer overflow while parsing asf clips in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

AI-Powered Analysis

AILast updated: 07/05/2025, 02:24:48 UTC

Technical Analysis

CVE-2022-25687 is a high-severity vulnerability identified in multiple Qualcomm Snapdragon platforms, including Snapdragon Auto, Compute, Connectivity, Consumer IoT, Industrial IoT, Mobile, Voice & Music, and Wearables. The root cause is a buffer overflow due to improper handling of buffer sizes when parsing ASF (Advanced Systems Format) video clips. Specifically, the vulnerability arises from a 'buffer copy without checking size of input' condition, classified under CWE-120 (Classic Buffer Overflow). This memory corruption flaw can be triggered remotely without requiring any privileges or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Exploiting this vulnerability could allow an attacker to execute arbitrary code, cause denial of service, or corrupt memory, impacting confidentiality, integrity, and availability of affected devices. The vulnerability affects a broad range of Qualcomm chipsets and modules, spanning many Snapdragon SoCs and wireless connectivity components, which are widely used in smartphones, automotive systems, IoT devices, and wearables. Although no known exploits have been reported in the wild, the ease of exploitation and the extensive deployment of affected hardware make this a significant security concern. The vulnerability was publicly disclosed on October 19, 2022, and no official patches or mitigations were linked in the provided data, indicating that affected organizations must proactively seek firmware or software updates from device manufacturers or Qualcomm. The flaw's presence in automotive and industrial IoT platforms raises additional safety and operational risks beyond typical consumer device impacts.

Potential Impact

For European organizations, the impact of CVE-2022-25687 is multifaceted. Many enterprises and consumers in Europe rely on devices powered by Qualcomm Snapdragon chipsets, including smartphones, connected vehicles, industrial IoT sensors, and wearable health devices. Exploitation could lead to unauthorized code execution, potentially allowing attackers to gain control over critical systems or exfiltrate sensitive data. In automotive contexts, compromised Snapdragon Auto platforms could affect vehicle infotainment or telematics systems, posing safety risks or enabling further lateral attacks on vehicle networks. Industrial IoT devices running affected chipsets might be disrupted or manipulated, impacting manufacturing, energy, or logistics operations. The vulnerability's ability to be triggered remotely without user interaction increases the risk of widespread automated attacks, especially in environments with exposed network interfaces or insufficient segmentation. Confidentiality breaches could expose personal or corporate data, while integrity and availability impacts could disrupt business continuity and safety-critical functions. Given Europe's strong regulatory environment around data protection (e.g., GDPR) and critical infrastructure security, exploitation could also lead to compliance violations and reputational damage.

Mitigation Recommendations

Mitigation requires a coordinated approach: 1) Immediate identification of devices and systems using affected Qualcomm Snapdragon chipsets across all organizational assets, including mobile devices, automotive systems, IoT endpoints, and wearables. 2) Prompt application of firmware and software updates from device manufacturers or Qualcomm once available; organizations should maintain close communication with vendors for patch release schedules. 3) Where patches are not yet available, implement network-level protections such as blocking or filtering ASF video streams from untrusted sources to reduce exposure. 4) Employ strict network segmentation and access controls to isolate vulnerable devices, especially in industrial and automotive environments. 5) Monitor network traffic and device behavior for anomalies indicative of exploitation attempts, including unexpected crashes or memory corruption symptoms. 6) Incorporate this vulnerability into vulnerability management and incident response plans, ensuring readiness to respond to potential exploitation. 7) For organizations deploying custom or embedded systems with Qualcomm chipsets, conduct code audits and testing to identify and remediate similar buffer overflow issues proactively. 8) Educate relevant personnel about the risks and signs of exploitation to enhance detection and response capabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2022-02-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd7954

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/5/2025, 2:24:48 AM

Last updated: 2/7/2026, 2:09:17 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats