Skip to main content

CVE-2022-25708: Buffer Copy Without Checking Size of Input in WLAN in Qualcomm, Inc. Snapdragon Connectivity, Snapdragon Mobile

Critical
VulnerabilityCVE-2022-25708cvecve-2022-25708
Published: Fri Sep 16 2022 (09/16/2022, 05:26:01 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon Connectivity, Snapdragon Mobile

Description

Memory corruption in WLAN due to buffer copy without checking size of input while parsing keys in Snapdragon Connectivity, Snapdragon Mobile

AI-Powered Analysis

AILast updated: 07/06/2025, 05:11:10 UTC

Technical Analysis

CVE-2022-25708 is a critical memory corruption vulnerability identified in the WLAN component of Qualcomm Snapdragon Connectivity and Snapdragon Mobile platforms. The flaw arises from a buffer copy operation that does not verify the size of the input data when parsing keys, leading to a classic buffer overflow scenario (CWE-120). This vulnerability affects a wide range of Qualcomm chipsets, including SD 8 Gen1 5G, SD888 5G, and various WCD and WCN series connectivity chips widely deployed in mobile devices. Because the vulnerability is in the WLAN subsystem, it can be triggered remotely over the network without requiring any privileges or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Successful exploitation can result in arbitrary code execution, complete compromise of confidentiality, integrity, and availability of the affected device. The attacker could potentially execute malicious code at the kernel or firmware level, leading to device takeover, data theft, or denial of service. Although no known exploits have been reported in the wild as of the publication date, the high CVSS score of 9.8 reflects the critical nature and ease of exploitation of this vulnerability. The lack of patch links suggests that remediation may require firmware or driver updates from device manufacturers or Qualcomm itself. This vulnerability is particularly concerning given the widespread use of Qualcomm Snapdragon chipsets in smartphones, tablets, and IoT devices globally, making it a significant threat vector for wireless network-based attacks.

Potential Impact

For European organizations, the impact of CVE-2022-25708 is substantial due to the pervasive use of Qualcomm Snapdragon-based devices in corporate environments, including employee smartphones, tablets, and IoT devices connected to enterprise networks. Exploitation could allow attackers to remotely compromise devices without user interaction, potentially gaining unauthorized access to sensitive corporate data, intercepting communications, or disrupting critical services. This could lead to data breaches, intellectual property theft, and operational downtime. Furthermore, compromised devices could serve as footholds for lateral movement within enterprise networks or be used to launch further attacks on critical infrastructure. Given the reliance on mobile connectivity and wireless networks in European businesses, especially in sectors like finance, healthcare, and manufacturing, this vulnerability poses a significant risk to confidentiality, integrity, and availability of organizational assets.

Mitigation Recommendations

Mitigation requires a multi-layered approach beyond generic advice. Organizations should: 1) Identify and inventory all devices using affected Qualcomm Snapdragon chipsets within their environment. 2) Work closely with device vendors and mobile carriers to obtain and deploy firmware or software updates that address this vulnerability as soon as they become available. 3) Implement network segmentation and restrict WLAN access to trusted devices only, reducing the attack surface. 4) Employ advanced network monitoring and intrusion detection systems capable of identifying anomalous WLAN traffic patterns that may indicate exploitation attempts. 5) Enforce strict mobile device management (MDM) policies to control device configurations and ensure timely patching. 6) Educate users on the risks of connecting to untrusted wireless networks and encourage the use of VPNs for secure communications. 7) Consider deploying endpoint detection and response (EDR) solutions that can detect suspicious behavior on mobile devices. These steps collectively reduce the likelihood of successful exploitation and limit potential damage.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2022-02-22T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68405817182aa0cae2b17f59

Added to database: 6/4/2025, 2:28:39 PM

Last enriched: 7/6/2025, 5:11:10 AM

Last updated: 7/28/2025, 4:50:09 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats