CVE-2022-25691: Reachable Assertion in MODEM in Qualcomm, Inc. Snapdragon Mobile
Denial of service in Modem due to reachable assertion while processing SIB1 with invalid SCS and bandwidth settings in Snapdragon Mobile
AI Analysis
Technical Summary
CVE-2022-25691 is a vulnerability identified in the modem components of Qualcomm Snapdragon Mobile chipsets. The issue arises from a reachable assertion failure triggered during the processing of System Information Block Type 1 (SIB1) messages when these messages contain invalid Subcarrier Spacing (SCS) and bandwidth settings. Specifically, the modem firmware or software expects certain valid parameters for SIB1, which is critical for network configuration and operation. When invalid parameters are received, the assertion designed to validate these parameters is reached and fails, causing the modem to enter an error state. This results in a denial of service (DoS) condition, where the modem may crash, reset, or become unresponsive, disrupting cellular connectivity. The affected products include a broad range of Qualcomm chipsets and associated components such as AR8035, QCA8081, QCA8337, QCN6024, QCN9024, and several Snapdragon SoCs including SD 8 Gen1 5G, SD480, SD695, SDX65, and others. These components are widely used in mobile devices, IoT devices, and embedded systems that rely on Qualcomm’s modem technology for cellular communication. The vulnerability is categorized under CWE-617 (Reachable Assertion), indicating that the assertion failure is reachable through crafted input, in this case, malformed SIB1 messages. No known exploits have been reported in the wild, and no patches have been linked or published at the time of this analysis. The vulnerability was reserved in February 2022 and published in December 2022, indicating a moderate timeline for disclosure and remediation efforts. The technical impact is primarily on availability, as the modem’s denial of service disrupts cellular network access, which can affect voice, data, and emergency services on affected devices.
Potential Impact
For European organizations, the impact of CVE-2022-25691 can be significant, especially for sectors relying heavily on mobile connectivity such as telecommunications providers, critical infrastructure operators, transportation, and emergency services. The denial of service in modems can lead to loss of cellular connectivity, impacting communication reliability and operational continuity. Enterprises using devices with affected Qualcomm chipsets may experience service interruptions, degraded user experience, and potential operational downtime. In critical infrastructure contexts, loss of connectivity could impede monitoring and control systems, raising safety and security concerns. Additionally, IoT deployments in smart cities, manufacturing, and logistics that use Qualcomm modems could face disruptions, affecting automation and data collection. Although no known exploits are currently active, the vulnerability’s presence in widely deployed hardware means that targeted attacks or accidental triggering could cause localized or widespread outages. The impact on confidentiality and integrity is minimal, as the vulnerability does not enable data leakage or unauthorized modification, but the availability impact alone can have cascading effects on business operations and public safety.
Mitigation Recommendations
Given the absence of published patches, European organizations should adopt a multi-layered mitigation approach: 1) Inventory and identify all devices using affected Qualcomm chipsets to understand exposure. 2) Engage with device manufacturers and Qualcomm for firmware updates or patches addressing this vulnerability and prioritize deployment once available. 3) Implement network-level protections to detect and filter malformed SIB1 messages or anomalous cellular signaling traffic, potentially using advanced mobile network security solutions or base station controls. 4) For critical systems, consider fallback communication methods or redundancy to maintain connectivity if cellular modems become unresponsive. 5) Monitor device logs and network behavior for signs of modem resets or connectivity loss that could indicate triggering of this vulnerability. 6) Educate IT and security teams about this specific threat to ensure rapid response and incident handling. 7) Collaborate with mobile network operators to understand if network-side mitigations or filtering can be applied to reduce exposure to malformed signaling messages. These steps go beyond generic advice by focusing on proactive identification, network-level filtering, and operational continuity planning tailored to this modem-specific vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland, Belgium
CVE-2022-25691: Reachable Assertion in MODEM in Qualcomm, Inc. Snapdragon Mobile
Description
Denial of service in Modem due to reachable assertion while processing SIB1 with invalid SCS and bandwidth settings in Snapdragon Mobile
AI-Powered Analysis
Technical Analysis
CVE-2022-25691 is a vulnerability identified in the modem components of Qualcomm Snapdragon Mobile chipsets. The issue arises from a reachable assertion failure triggered during the processing of System Information Block Type 1 (SIB1) messages when these messages contain invalid Subcarrier Spacing (SCS) and bandwidth settings. Specifically, the modem firmware or software expects certain valid parameters for SIB1, which is critical for network configuration and operation. When invalid parameters are received, the assertion designed to validate these parameters is reached and fails, causing the modem to enter an error state. This results in a denial of service (DoS) condition, where the modem may crash, reset, or become unresponsive, disrupting cellular connectivity. The affected products include a broad range of Qualcomm chipsets and associated components such as AR8035, QCA8081, QCA8337, QCN6024, QCN9024, and several Snapdragon SoCs including SD 8 Gen1 5G, SD480, SD695, SDX65, and others. These components are widely used in mobile devices, IoT devices, and embedded systems that rely on Qualcomm’s modem technology for cellular communication. The vulnerability is categorized under CWE-617 (Reachable Assertion), indicating that the assertion failure is reachable through crafted input, in this case, malformed SIB1 messages. No known exploits have been reported in the wild, and no patches have been linked or published at the time of this analysis. The vulnerability was reserved in February 2022 and published in December 2022, indicating a moderate timeline for disclosure and remediation efforts. The technical impact is primarily on availability, as the modem’s denial of service disrupts cellular network access, which can affect voice, data, and emergency services on affected devices.
Potential Impact
For European organizations, the impact of CVE-2022-25691 can be significant, especially for sectors relying heavily on mobile connectivity such as telecommunications providers, critical infrastructure operators, transportation, and emergency services. The denial of service in modems can lead to loss of cellular connectivity, impacting communication reliability and operational continuity. Enterprises using devices with affected Qualcomm chipsets may experience service interruptions, degraded user experience, and potential operational downtime. In critical infrastructure contexts, loss of connectivity could impede monitoring and control systems, raising safety and security concerns. Additionally, IoT deployments in smart cities, manufacturing, and logistics that use Qualcomm modems could face disruptions, affecting automation and data collection. Although no known exploits are currently active, the vulnerability’s presence in widely deployed hardware means that targeted attacks or accidental triggering could cause localized or widespread outages. The impact on confidentiality and integrity is minimal, as the vulnerability does not enable data leakage or unauthorized modification, but the availability impact alone can have cascading effects on business operations and public safety.
Mitigation Recommendations
Given the absence of published patches, European organizations should adopt a multi-layered mitigation approach: 1) Inventory and identify all devices using affected Qualcomm chipsets to understand exposure. 2) Engage with device manufacturers and Qualcomm for firmware updates or patches addressing this vulnerability and prioritize deployment once available. 3) Implement network-level protections to detect and filter malformed SIB1 messages or anomalous cellular signaling traffic, potentially using advanced mobile network security solutions or base station controls. 4) For critical systems, consider fallback communication methods or redundancy to maintain connectivity if cellular modems become unresponsive. 5) Monitor device logs and network behavior for signs of modem resets or connectivity loss that could indicate triggering of this vulnerability. 6) Educate IT and security teams about this specific threat to ensure rapid response and incident handling. 7) Collaborate with mobile network operators to understand if network-side mitigations or filtering can be applied to reduce exposure to malformed signaling messages. These steps go beyond generic advice by focusing on proactive identification, network-level filtering, and operational continuity planning tailored to this modem-specific vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- qualcomm
- Date Reserved
- 2022-02-22T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf6fe6
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/21/2025, 7:38:00 PM
Last updated: 8/11/2025, 6:53:49 PM
Views: 12
Related Threats
CVE-2025-55345: CWE-61 UNIX Symbolic Link (Symlink) Following
HighCVE-2025-6184: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in themeum Tutor LMS Pro
HighCVE-2025-8762: Improper Physical Access Control in INSTAR 2K+
HighCVE-2025-8761: Denial of Service in INSTAR 2K+
HighCVE-2025-8760: Buffer Overflow in INSTAR 2K+
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.