Skip to main content

CVE-2022-25750: Double Free in BTHOST in Qualcomm, Inc. Snapdragon Mobile

High
VulnerabilityCVE-2022-25750cvecve-2022-25750
Published: Mon Oct 17 2022 (10/17/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon Mobile

Description

Memory corruption in BTHOST due to double free while music playback and calls over bluetooth headset in Snapdragon Mobile

AI-Powered Analysis

AILast updated: 07/06/2025, 17:39:52 UTC

Technical Analysis

CVE-2022-25750 is a high-severity memory corruption vulnerability identified in the BTHOST component of Qualcomm Snapdragon Mobile platforms. The root cause is a double free condition (CWE-415), which occurs when the system attempts to free the same memory location twice during Bluetooth operations, specifically while music playback and calls are active over a Bluetooth headset. This vulnerability affects multiple Snapdragon Mobile chipsets and associated wireless connectivity components, including Kailua, SG8275, SG8275P, SM8550, and various WCD and WCN series chips. The double free flaw can lead to heap corruption, potentially allowing an attacker to execute arbitrary code, cause denial of service (system crashes), or escalate privileges on the affected device. The CVSS v3.1 base score is 8.4, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity, no privileges required, and no user interaction needed. Exploitation would typically require local access or proximity to the Bluetooth interface, as the attack vector is local (AV:L). Qualcomm has published the vulnerability, but no public patches or known exploits in the wild have been reported as of the publication date. The vulnerability is significant because Snapdragon Mobile chipsets are widely deployed in smartphones, tablets, and IoT devices globally, making the potential attack surface large. The flaw specifically impacts Bluetooth audio and call functionality, which are common use cases, increasing the likelihood of exploitation if an attacker can interact with the Bluetooth stack during these operations.

Potential Impact

For European organizations, the impact of CVE-2022-25750 can be substantial, especially for enterprises relying on mobile devices powered by affected Snapdragon chipsets. Confidentiality risks arise from potential arbitrary code execution, which could lead to data leakage or unauthorized access to sensitive corporate information. Integrity and availability are also at risk, as exploitation could cause device crashes or persistent instability, disrupting business communications and operations reliant on mobile connectivity. Given the prevalence of Bluetooth headsets in corporate environments for calls and media playback, attackers could exploit this vulnerability to target employees' devices, potentially gaining a foothold within corporate networks. This is particularly concerning for sectors with high security requirements such as finance, healthcare, and government agencies. Moreover, the vulnerability's local attack vector means that attackers need to be within Bluetooth range, which could be feasible in public or semi-public spaces like offices, conferences, or transport hubs. The lack of known exploits in the wild reduces immediate risk but does not eliminate it, as the vulnerability is publicly disclosed and could be weaponized by advanced threat actors. The absence of official patches at the time of disclosure necessitates proactive mitigation to reduce exposure.

Mitigation Recommendations

European organizations should implement a multi-layered mitigation strategy beyond generic advice: 1) Inventory and identify all mobile devices using affected Qualcomm Snapdragon chipsets and associated wireless components. 2) Monitor vendor communications closely for official patches or firmware updates from device manufacturers and Qualcomm, and prioritize timely deployment once available. 3) Enforce strict Bluetooth usage policies, including disabling Bluetooth on corporate devices when not in use, and restricting pairing to trusted devices only. 4) Employ mobile device management (MDM) solutions to control Bluetooth settings remotely and enforce security configurations. 5) Educate employees about the risks of connecting to unknown or untrusted Bluetooth devices, especially in public or crowded environments. 6) Implement network segmentation and endpoint detection to limit lateral movement if a device is compromised. 7) Consider additional endpoint protection tools capable of detecting anomalous behavior related to Bluetooth stack exploitation. 8) For high-security environments, evaluate the feasibility of disabling Bluetooth audio and call functionalities temporarily until patches are applied. These targeted actions can reduce the attack surface and mitigate exploitation risk while awaiting official fixes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2022-02-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fc1484d88663aecbee

Added to database: 5/20/2025, 6:59:08 PM

Last enriched: 7/6/2025, 5:39:52 PM

Last updated: 8/7/2025, 2:01:55 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats