Skip to main content

CVE-2022-25691: Reachable Assertion in MODEM in Qualcomm, Inc. Snapdragon Mobile

Medium
Published: Tue Dec 13 2022 (12/13/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon Mobile

Description

Denial of service in Modem due to reachable assertion while processing SIB1 with invalid SCS and bandwidth settings in Snapdragon Mobile

AI-Powered Analysis

AILast updated: 06/21/2025, 19:38:00 UTC

Technical Analysis

CVE-2022-25691 is a vulnerability identified in the modem components of Qualcomm Snapdragon Mobile chipsets. The issue arises from a reachable assertion failure triggered during the processing of System Information Block Type 1 (SIB1) messages when these messages contain invalid Subcarrier Spacing (SCS) and bandwidth settings. Specifically, the modem firmware or software expects certain valid parameters for SIB1, which is critical for network configuration and operation. When invalid parameters are received, the assertion designed to validate these parameters is reached and fails, causing the modem to enter an error state. This results in a denial of service (DoS) condition, where the modem may crash, reset, or become unresponsive, disrupting cellular connectivity. The affected products include a broad range of Qualcomm chipsets and associated components such as AR8035, QCA8081, QCA8337, QCN6024, QCN9024, and several Snapdragon SoCs including SD 8 Gen1 5G, SD480, SD695, SDX65, and others. These components are widely used in mobile devices, IoT devices, and embedded systems that rely on Qualcomm’s modem technology for cellular communication. The vulnerability is categorized under CWE-617 (Reachable Assertion), indicating that the assertion failure is reachable through crafted input, in this case, malformed SIB1 messages. No known exploits have been reported in the wild, and no patches have been linked or published at the time of this analysis. The vulnerability was reserved in February 2022 and published in December 2022, indicating a moderate timeline for disclosure and remediation efforts. The technical impact is primarily on availability, as the modem’s denial of service disrupts cellular network access, which can affect voice, data, and emergency services on affected devices.

Potential Impact

For European organizations, the impact of CVE-2022-25691 can be significant, especially for sectors relying heavily on mobile connectivity such as telecommunications providers, critical infrastructure operators, transportation, and emergency services. The denial of service in modems can lead to loss of cellular connectivity, impacting communication reliability and operational continuity. Enterprises using devices with affected Qualcomm chipsets may experience service interruptions, degraded user experience, and potential operational downtime. In critical infrastructure contexts, loss of connectivity could impede monitoring and control systems, raising safety and security concerns. Additionally, IoT deployments in smart cities, manufacturing, and logistics that use Qualcomm modems could face disruptions, affecting automation and data collection. Although no known exploits are currently active, the vulnerability’s presence in widely deployed hardware means that targeted attacks or accidental triggering could cause localized or widespread outages. The impact on confidentiality and integrity is minimal, as the vulnerability does not enable data leakage or unauthorized modification, but the availability impact alone can have cascading effects on business operations and public safety.

Mitigation Recommendations

Given the absence of published patches, European organizations should adopt a multi-layered mitigation approach: 1) Inventory and identify all devices using affected Qualcomm chipsets to understand exposure. 2) Engage with device manufacturers and Qualcomm for firmware updates or patches addressing this vulnerability and prioritize deployment once available. 3) Implement network-level protections to detect and filter malformed SIB1 messages or anomalous cellular signaling traffic, potentially using advanced mobile network security solutions or base station controls. 4) For critical systems, consider fallback communication methods or redundancy to maintain connectivity if cellular modems become unresponsive. 5) Monitor device logs and network behavior for signs of modem resets or connectivity loss that could indicate triggering of this vulnerability. 6) Educate IT and security teams about this specific threat to ensure rapid response and incident handling. 7) Collaborate with mobile network operators to understand if network-side mitigations or filtering can be applied to reduce exposure to malformed signaling messages. These steps go beyond generic advice by focusing on proactive identification, network-level filtering, and operational continuity planning tailored to this modem-specific vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2022-02-22T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9849c4522896dcbf6fe6

Added to database: 5/21/2025, 9:09:29 AM

Last enriched: 6/21/2025, 7:38:00 PM

Last updated: 8/11/2025, 6:53:49 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats