Skip to main content

CVE-2022-25695: Improper Validation of Array Index in MODEM in Qualcomm, Inc. Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Medium
Published: Tue Dec 13 2022 (12/13/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Description

Memory corruption in MODEM due to Improper Validation of Array Index while processing GSTK Proactive commands in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

AI-Powered Analysis

AILast updated: 06/21/2025, 19:08:01 UTC

Technical Analysis

CVE-2022-25695 is a medium-severity vulnerability affecting a broad range of Qualcomm Snapdragon platforms, including Snapdragon Auto, Compute, Connectivity, Consumer IoT, Industrial IoT, Mobile, Voice & Music, and Wearables. The root cause is improper validation of array indices within the MODEM component while processing GSTK (Generic SIM Toolkit) proactive commands. This improper validation can lead to memory corruption, which may be exploited to cause unexpected behavior such as crashes, data corruption, or potentially arbitrary code execution within the modem subsystem. The vulnerability stems from CWE-129, which relates to improper validation of array indices, a common programming error that can lead to buffer overflows or out-of-bounds memory access. Affected devices span a wide range of Qualcomm chipsets, including many popular Snapdragon SoCs used in mobile phones, automotive systems, IoT devices, and wearables. The vulnerability is triggered during the processing of GSTK proactive commands, which are SIM card-initiated commands used for managing SIM applications and network services. Exploitation would likely require sending specially crafted commands to the modem, potentially via the cellular network or through local access to the device's SIM interface. No known exploits are currently reported in the wild, and Qualcomm has not published patches at the time of this report. The broad range of affected chipsets and device categories indicates a wide attack surface, especially in devices relying on Qualcomm modems for cellular connectivity. The vulnerability could be leveraged to disrupt device operation or escalate privileges within the modem firmware, impacting confidentiality, integrity, and availability of affected systems.

Potential Impact

For European organizations, the impact of CVE-2022-25695 could be significant due to the widespread use of Qualcomm Snapdragon chipsets in smartphones, automotive telematics, industrial IoT, and consumer IoT devices. Disruption or compromise of modem functionality could lead to loss of cellular connectivity, impacting critical communications and operational continuity. In automotive contexts, compromised modems could affect vehicle telematics, navigation, or emergency communication systems, posing safety risks. Industrial IoT deployments relying on Snapdragon-based connectivity modules could experience operational downtime or data integrity issues. Consumer devices such as wearables and mobile phones could be destabilized or exploited to leak sensitive user data. Since the vulnerability involves memory corruption, attackers might achieve remote code execution within the modem environment, potentially bypassing OS-level security controls. This could enable persistent attacks or surveillance. The absence of known exploits reduces immediate risk, but the broad device footprint and critical nature of affected systems warrant proactive mitigation. European organizations with large mobile workforces, automotive fleets, or IoT deployments should consider this vulnerability in their risk assessments, especially given the strategic importance of telecommunications infrastructure and connected devices in Europe.

Mitigation Recommendations

1. Monitor Qualcomm and device OEM advisories for official patches or firmware updates addressing CVE-2022-25695 and apply them promptly. 2. For organizations managing fleets of devices (mobile, automotive, IoT), implement centralized update management to ensure timely deployment of security patches. 3. Employ network-level protections such as filtering or anomaly detection to identify and block suspicious GSTK proactive commands or malformed SIM toolkit traffic that could exploit this vulnerability. 4. Limit physical and logical access to SIM interfaces and cellular modems, especially in IoT and automotive devices, to reduce the risk of local exploitation. 5. Use device management solutions to monitor modem behavior for signs of memory corruption or instability that could indicate exploitation attempts. 6. For critical systems, consider network segmentation and isolation of vulnerable devices to contain potential impacts. 7. Engage with device vendors to confirm vulnerability status and remediation timelines, especially for embedded or industrial devices where patching may be slower. 8. Incorporate this vulnerability into incident response playbooks to quickly identify and respond to potential exploitation attempts. These recommendations go beyond generic advice by emphasizing proactive monitoring of GSTK command traffic, access control to SIM interfaces, and coordinated patch management across diverse device categories.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2022-02-22T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d984ac4522896dcbf70d1

Added to database: 5/21/2025, 9:09:30 AM

Last enriched: 6/21/2025, 7:08:01 PM

Last updated: 8/15/2025, 7:36:18 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats