Skip to main content

CVE-2022-25720: Improper Validation of Array Index in WLAN in Qualcomm, Inc. Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Critical
VulnerabilityCVE-2022-25720cvecve-2022-25720
Published: Wed Oct 19 2022 (10/19/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Description

Memory corruption in WLAN due to out of bound array access during connect/roaming in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

AI-Powered Analysis

AILast updated: 07/05/2025, 02:27:43 UTC

Technical Analysis

CVE-2022-25720 is a critical vulnerability identified in the WLAN components of a broad range of Qualcomm Snapdragon platforms, including Snapdragon Auto, Compute, Connectivity, Consumer Electronics Connectivity, Consumer IoT, Industrial IoT, Mobile, Voice & Music, and Wearables. The root cause is an improper validation of array indices (CWE-129) leading to out-of-bounds array access during WLAN connect or roaming operations. This flaw results in memory corruption, which can be exploited remotely without any authentication or user interaction. The vulnerability affects a very extensive list of Qualcomm chipsets and modules, spanning from older models like APQ8009 to newer Snapdragon 8 Gen1 5G and various specialized SoCs such as QCA series and WCD series components. The CVSS v3.1 base score is 9.8, indicating critical severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. Successful exploitation could allow an attacker to execute arbitrary code, cause denial of service, or compromise confidentiality and integrity of the affected device’s WLAN subsystem. Given the widespread use of Qualcomm Snapdragon chipsets in mobile phones, IoT devices, automotive systems, and wearables, this vulnerability poses a significant risk across multiple device categories. No public exploits are known at this time, but the critical nature and ease of exploitation make it a high priority for patching and mitigation. Qualcomm has published the vulnerability but no direct patch links are provided in the data, indicating that affected vendors and OEMs need to issue firmware updates promptly to remediate the issue.

Potential Impact

For European organizations, the impact of CVE-2022-25720 is substantial due to the widespread deployment of Qualcomm Snapdragon-based devices across consumer, industrial, automotive, and IoT sectors. Mobile devices running Snapdragon chipsets are ubiquitous among employees and consumers, making personal and corporate data vulnerable to compromise. Industrial IoT and automotive systems using affected chipsets could face safety risks, operational disruption, or data breaches if exploited. The vulnerability’s ability to be triggered remotely without authentication increases the attack surface, especially in environments with wireless connectivity. Confidentiality, integrity, and availability of critical systems could be compromised, leading to potential data leaks, unauthorized control, or denial of service. European organizations in sectors such as automotive manufacturing, telecommunications, healthcare, and critical infrastructure that rely on Snapdragon-powered devices must consider this vulnerability a serious threat. The lack of known exploits currently provides a small window for proactive mitigation, but the critical CVSS score and broad chipset impact necessitate urgent attention to firmware updates and network security controls.

Mitigation Recommendations

1. Immediate coordination with device manufacturers and OEMs to obtain and deploy firmware updates or patches addressing CVE-2022-25720 is essential. Since Qualcomm chipsets are integrated into many devices, organizations should inventory affected hardware and prioritize patching. 2. Where firmware updates are not yet available, implement network-level mitigations such as isolating vulnerable devices on segmented networks, restricting WLAN access, and monitoring for anomalous WLAN connection or roaming behavior. 3. Employ advanced endpoint detection and response (EDR) solutions capable of detecting memory corruption or exploitation attempts targeting WLAN components. 4. Enforce strict wireless network security policies, including the use of strong encryption (WPA3), network access control, and regular auditing of connected devices to reduce exposure. 5. For industrial and automotive environments, apply defense-in-depth strategies including network segmentation, intrusion detection systems tailored for IoT/embedded devices, and secure update mechanisms to minimize risk. 6. Maintain up-to-date threat intelligence feeds and monitor for any emerging exploit code or attack campaigns targeting this vulnerability to enable rapid incident response. 7. Educate IT and security teams about the specific risks of WLAN subsystem vulnerabilities and the importance of timely patch management in embedded systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2022-02-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd79ce

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/5/2025, 2:27:43 AM

Last updated: 8/15/2025, 10:09:49 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats