Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-25720: Improper Validation of Array Index in WLAN in Qualcomm, Inc. Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

0
Critical
VulnerabilityCVE-2022-25720cvecve-2022-25720
Published: Wed Oct 19 2022 (10/19/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Description

Memory corruption in WLAN due to out of bound array access during connect/roaming in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

AI-Powered Analysis

AILast updated: 07/05/2025, 02:27:43 UTC

Technical Analysis

CVE-2022-25720 is a critical vulnerability identified in the WLAN components of a broad range of Qualcomm Snapdragon platforms, including Snapdragon Auto, Compute, Connectivity, Consumer Electronics Connectivity, Consumer IoT, Industrial IoT, Mobile, Voice & Music, and Wearables. The root cause is an improper validation of array indices (CWE-129) leading to out-of-bounds array access during WLAN connect or roaming operations. This flaw results in memory corruption, which can be exploited remotely without any authentication or user interaction. The vulnerability affects a very extensive list of Qualcomm chipsets and modules, spanning from older models like APQ8009 to newer Snapdragon 8 Gen1 5G and various specialized SoCs such as QCA series and WCD series components. The CVSS v3.1 base score is 9.8, indicating critical severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. Successful exploitation could allow an attacker to execute arbitrary code, cause denial of service, or compromise confidentiality and integrity of the affected device’s WLAN subsystem. Given the widespread use of Qualcomm Snapdragon chipsets in mobile phones, IoT devices, automotive systems, and wearables, this vulnerability poses a significant risk across multiple device categories. No public exploits are known at this time, but the critical nature and ease of exploitation make it a high priority for patching and mitigation. Qualcomm has published the vulnerability but no direct patch links are provided in the data, indicating that affected vendors and OEMs need to issue firmware updates promptly to remediate the issue.

Potential Impact

For European organizations, the impact of CVE-2022-25720 is substantial due to the widespread deployment of Qualcomm Snapdragon-based devices across consumer, industrial, automotive, and IoT sectors. Mobile devices running Snapdragon chipsets are ubiquitous among employees and consumers, making personal and corporate data vulnerable to compromise. Industrial IoT and automotive systems using affected chipsets could face safety risks, operational disruption, or data breaches if exploited. The vulnerability’s ability to be triggered remotely without authentication increases the attack surface, especially in environments with wireless connectivity. Confidentiality, integrity, and availability of critical systems could be compromised, leading to potential data leaks, unauthorized control, or denial of service. European organizations in sectors such as automotive manufacturing, telecommunications, healthcare, and critical infrastructure that rely on Snapdragon-powered devices must consider this vulnerability a serious threat. The lack of known exploits currently provides a small window for proactive mitigation, but the critical CVSS score and broad chipset impact necessitate urgent attention to firmware updates and network security controls.

Mitigation Recommendations

1. Immediate coordination with device manufacturers and OEMs to obtain and deploy firmware updates or patches addressing CVE-2022-25720 is essential. Since Qualcomm chipsets are integrated into many devices, organizations should inventory affected hardware and prioritize patching. 2. Where firmware updates are not yet available, implement network-level mitigations such as isolating vulnerable devices on segmented networks, restricting WLAN access, and monitoring for anomalous WLAN connection or roaming behavior. 3. Employ advanced endpoint detection and response (EDR) solutions capable of detecting memory corruption or exploitation attempts targeting WLAN components. 4. Enforce strict wireless network security policies, including the use of strong encryption (WPA3), network access control, and regular auditing of connected devices to reduce exposure. 5. For industrial and automotive environments, apply defense-in-depth strategies including network segmentation, intrusion detection systems tailored for IoT/embedded devices, and secure update mechanisms to minimize risk. 6. Maintain up-to-date threat intelligence feeds and monitor for any emerging exploit code or attack campaigns targeting this vulnerability to enable rapid incident response. 7. Educate IT and security teams about the specific risks of WLAN subsystem vulnerabilities and the importance of timely patch management in embedded systems.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2022-02-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd79ce

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/5/2025, 2:27:43 AM

Last updated: 2/7/2026, 8:21:44 PM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats