CVE-2022-25720: Improper Validation of Array Index in WLAN in Qualcomm, Inc. Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
Memory corruption in WLAN due to out of bound array access during connect/roaming in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
AI Analysis
Technical Summary
CVE-2022-25720 is a critical vulnerability identified in the WLAN components of a broad range of Qualcomm Snapdragon platforms, including Snapdragon Auto, Compute, Connectivity, Consumer Electronics Connectivity, Consumer IoT, Industrial IoT, Mobile, Voice & Music, and Wearables. The root cause is an improper validation of array indices (CWE-129) leading to out-of-bounds array access during WLAN connect or roaming operations. This flaw results in memory corruption, which can be exploited remotely without any authentication or user interaction. The vulnerability affects a very extensive list of Qualcomm chipsets and modules, spanning from older models like APQ8009 to newer Snapdragon 8 Gen1 5G and various specialized SoCs such as QCA series and WCD series components. The CVSS v3.1 base score is 9.8, indicating critical severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. Successful exploitation could allow an attacker to execute arbitrary code, cause denial of service, or compromise confidentiality and integrity of the affected device’s WLAN subsystem. Given the widespread use of Qualcomm Snapdragon chipsets in mobile phones, IoT devices, automotive systems, and wearables, this vulnerability poses a significant risk across multiple device categories. No public exploits are known at this time, but the critical nature and ease of exploitation make it a high priority for patching and mitigation. Qualcomm has published the vulnerability but no direct patch links are provided in the data, indicating that affected vendors and OEMs need to issue firmware updates promptly to remediate the issue.
Potential Impact
For European organizations, the impact of CVE-2022-25720 is substantial due to the widespread deployment of Qualcomm Snapdragon-based devices across consumer, industrial, automotive, and IoT sectors. Mobile devices running Snapdragon chipsets are ubiquitous among employees and consumers, making personal and corporate data vulnerable to compromise. Industrial IoT and automotive systems using affected chipsets could face safety risks, operational disruption, or data breaches if exploited. The vulnerability’s ability to be triggered remotely without authentication increases the attack surface, especially in environments with wireless connectivity. Confidentiality, integrity, and availability of critical systems could be compromised, leading to potential data leaks, unauthorized control, or denial of service. European organizations in sectors such as automotive manufacturing, telecommunications, healthcare, and critical infrastructure that rely on Snapdragon-powered devices must consider this vulnerability a serious threat. The lack of known exploits currently provides a small window for proactive mitigation, but the critical CVSS score and broad chipset impact necessitate urgent attention to firmware updates and network security controls.
Mitigation Recommendations
1. Immediate coordination with device manufacturers and OEMs to obtain and deploy firmware updates or patches addressing CVE-2022-25720 is essential. Since Qualcomm chipsets are integrated into many devices, organizations should inventory affected hardware and prioritize patching. 2. Where firmware updates are not yet available, implement network-level mitigations such as isolating vulnerable devices on segmented networks, restricting WLAN access, and monitoring for anomalous WLAN connection or roaming behavior. 3. Employ advanced endpoint detection and response (EDR) solutions capable of detecting memory corruption or exploitation attempts targeting WLAN components. 4. Enforce strict wireless network security policies, including the use of strong encryption (WPA3), network access control, and regular auditing of connected devices to reduce exposure. 5. For industrial and automotive environments, apply defense-in-depth strategies including network segmentation, intrusion detection systems tailored for IoT/embedded devices, and secure update mechanisms to minimize risk. 6. Maintain up-to-date threat intelligence feeds and monitor for any emerging exploit code or attack campaigns targeting this vulnerability to enable rapid incident response. 7. Educate IT and security teams about the specific risks of WLAN subsystem vulnerabilities and the importance of timely patch management in embedded systems.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Finland
CVE-2022-25720: Improper Validation of Array Index in WLAN in Qualcomm, Inc. Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
Description
Memory corruption in WLAN due to out of bound array access during connect/roaming in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
AI-Powered Analysis
Technical Analysis
CVE-2022-25720 is a critical vulnerability identified in the WLAN components of a broad range of Qualcomm Snapdragon platforms, including Snapdragon Auto, Compute, Connectivity, Consumer Electronics Connectivity, Consumer IoT, Industrial IoT, Mobile, Voice & Music, and Wearables. The root cause is an improper validation of array indices (CWE-129) leading to out-of-bounds array access during WLAN connect or roaming operations. This flaw results in memory corruption, which can be exploited remotely without any authentication or user interaction. The vulnerability affects a very extensive list of Qualcomm chipsets and modules, spanning from older models like APQ8009 to newer Snapdragon 8 Gen1 5G and various specialized SoCs such as QCA series and WCD series components. The CVSS v3.1 base score is 9.8, indicating critical severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. Successful exploitation could allow an attacker to execute arbitrary code, cause denial of service, or compromise confidentiality and integrity of the affected device’s WLAN subsystem. Given the widespread use of Qualcomm Snapdragon chipsets in mobile phones, IoT devices, automotive systems, and wearables, this vulnerability poses a significant risk across multiple device categories. No public exploits are known at this time, but the critical nature and ease of exploitation make it a high priority for patching and mitigation. Qualcomm has published the vulnerability but no direct patch links are provided in the data, indicating that affected vendors and OEMs need to issue firmware updates promptly to remediate the issue.
Potential Impact
For European organizations, the impact of CVE-2022-25720 is substantial due to the widespread deployment of Qualcomm Snapdragon-based devices across consumer, industrial, automotive, and IoT sectors. Mobile devices running Snapdragon chipsets are ubiquitous among employees and consumers, making personal and corporate data vulnerable to compromise. Industrial IoT and automotive systems using affected chipsets could face safety risks, operational disruption, or data breaches if exploited. The vulnerability’s ability to be triggered remotely without authentication increases the attack surface, especially in environments with wireless connectivity. Confidentiality, integrity, and availability of critical systems could be compromised, leading to potential data leaks, unauthorized control, or denial of service. European organizations in sectors such as automotive manufacturing, telecommunications, healthcare, and critical infrastructure that rely on Snapdragon-powered devices must consider this vulnerability a serious threat. The lack of known exploits currently provides a small window for proactive mitigation, but the critical CVSS score and broad chipset impact necessitate urgent attention to firmware updates and network security controls.
Mitigation Recommendations
1. Immediate coordination with device manufacturers and OEMs to obtain and deploy firmware updates or patches addressing CVE-2022-25720 is essential. Since Qualcomm chipsets are integrated into many devices, organizations should inventory affected hardware and prioritize patching. 2. Where firmware updates are not yet available, implement network-level mitigations such as isolating vulnerable devices on segmented networks, restricting WLAN access, and monitoring for anomalous WLAN connection or roaming behavior. 3. Employ advanced endpoint detection and response (EDR) solutions capable of detecting memory corruption or exploitation attempts targeting WLAN components. 4. Enforce strict wireless network security policies, including the use of strong encryption (WPA3), network access control, and regular auditing of connected devices to reduce exposure. 5. For industrial and automotive environments, apply defense-in-depth strategies including network segmentation, intrusion detection systems tailored for IoT/embedded devices, and secure update mechanisms to minimize risk. 6. Maintain up-to-date threat intelligence feeds and monitor for any emerging exploit code or attack campaigns targeting this vulnerability to enable rapid incident response. 7. Educate IT and security teams about the specific risks of WLAN subsystem vulnerabilities and the importance of timely patch management in embedded systems.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- qualcomm
- Date Reserved
- 2022-02-22T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9817c4522896dcbd79ce
Added to database: 5/21/2025, 9:08:39 AM
Last enriched: 7/5/2025, 2:27:43 AM
Last updated: 2/7/2026, 8:21:44 PM
Views: 32
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2110: Improper Restriction of Excessive Authentication Attempts in Tasin1025 SwiftBuy
MediumCVE-2026-2109: Improper Authorization in jsbroks COCO Annotator
MediumCVE-2026-2108: Denial of Service in jsbroks COCO Annotator
MediumCVE-2026-2107: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2106: Improper Authorization in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.