Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-25723: Use-After-Free in Multimedia Frameworks in Qualcomm, Inc. Snapdragon Mobile

0
High
VulnerabilityCVE-2022-25723cvecve-2022-25723
Published: Mon Oct 17 2022 (10/17/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon Mobile

Description

Memory corruption in multimedia due to use after free during callback registration failure in Snapdragon Mobile

AI-Powered Analysis

AILast updated: 07/06/2025, 17:39:36 UTC

Technical Analysis

CVE-2022-25723 is a high-severity use-after-free vulnerability identified in the multimedia frameworks of Qualcomm Snapdragon Mobile platforms. The flaw arises from improper memory management during callback registration failure in the multimedia components, leading to a use-after-free condition. Specifically, when a callback registration fails, the system erroneously accesses memory that has already been freed, causing memory corruption. This vulnerability affects several Qualcomm Snapdragon Mobile chipsets, including SD 8 Gen1 5G and various wireless connectivity modules such as WCD9380, WCN6855, WCN6856, WCN7850, WCN7851, WSA8830, and WSA8835. The vulnerability is classified under CWE-416 (Use After Free), which typically allows attackers to execute arbitrary code, cause denial of service, or escalate privileges by exploiting the corrupted memory state. The CVSS v3.1 base score is 8.4, indicating a high severity level. The vector string (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) shows that the attack requires local access (AV:L), but no privileges or user interaction are needed, and the impact on confidentiality, integrity, and availability is high. Although no known exploits are currently reported in the wild, the potential for exploitation exists due to the critical nature of the vulnerability and the widespread use of affected Snapdragon chipsets in mobile devices. The vulnerability was published on October 17, 2022, and is recognized by CISA as enriched intelligence. No official patches are linked in the provided data, suggesting that affected organizations should monitor vendor advisories closely for updates.

Potential Impact

For European organizations, the impact of CVE-2022-25723 can be significant, especially those relying on mobile devices powered by affected Qualcomm Snapdragon chipsets. The vulnerability can lead to complete compromise of the affected device's multimedia subsystem, potentially allowing attackers to execute arbitrary code with system-level privileges. This could result in unauthorized access to sensitive data, disruption of device functionality, or use of the device as a foothold for lateral movement within corporate networks. Industries with high mobile device usage, such as finance, healthcare, and government, face increased risks of data breaches or operational disruptions. Additionally, the vulnerability's local attack vector implies that attackers would need physical or local access to the device, which could be exploited in scenarios involving lost or stolen devices or insider threats. Given the high confidentiality, integrity, and availability impacts, exploitation could undermine trust in mobile communications and data security within European enterprises and public sector entities.

Mitigation Recommendations

To mitigate CVE-2022-25723 effectively, European organizations should: 1) Inventory and identify all mobile devices using affected Qualcomm Snapdragon chipsets, including SD 8 Gen1 5G and listed wireless modules. 2) Monitor Qualcomm and device manufacturers' security advisories for official patches or firmware updates addressing this vulnerability and apply them promptly. 3) Implement strict device access controls, including strong authentication and encryption, to reduce the risk of local exploitation. 4) Enforce policies for reporting and securing lost or stolen devices to prevent attackers from gaining local access. 5) Employ mobile device management (MDM) solutions to enforce security configurations and remotely wipe compromised devices. 6) Educate users about the risks of physical device access and encourage vigilance against suspicious behavior. 7) Consider network segmentation and endpoint detection capabilities to identify anomalous activities originating from mobile devices. These steps go beyond generic advice by focusing on the specific attack vector (local access) and the affected hardware components.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2022-02-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fc1484d88663aecbec

Added to database: 5/20/2025, 6:59:08 PM

Last enriched: 7/6/2025, 5:39:36 PM

Last updated: 2/7/2026, 10:45:48 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats