CVE-2022-25750: Double Free in BTHOST in Qualcomm, Inc. Snapdragon Mobile
Memory corruption in BTHOST due to double free while music playback and calls over bluetooth headset in Snapdragon Mobile
AI Analysis
Technical Summary
CVE-2022-25750 is a high-severity memory corruption vulnerability identified in the BTHOST component of Qualcomm Snapdragon Mobile platforms. The root cause is a double free condition (CWE-415), which occurs when the system attempts to free the same memory location twice during Bluetooth operations, specifically while music playback and calls are active over a Bluetooth headset. This vulnerability affects multiple Snapdragon Mobile chipsets and associated wireless connectivity components, including Kailua, SG8275, SG8275P, SM8550, and various WCD and WCN series chips. The double free flaw can lead to heap corruption, potentially allowing an attacker to execute arbitrary code, cause denial of service (system crashes), or escalate privileges on the affected device. The CVSS v3.1 base score is 8.4, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity, no privileges required, and no user interaction needed. Exploitation would typically require local access or proximity to the Bluetooth interface, as the attack vector is local (AV:L). Qualcomm has published the vulnerability, but no public patches or known exploits in the wild have been reported as of the publication date. The vulnerability is significant because Snapdragon Mobile chipsets are widely deployed in smartphones, tablets, and IoT devices globally, making the potential attack surface large. The flaw specifically impacts Bluetooth audio and call functionality, which are common use cases, increasing the likelihood of exploitation if an attacker can interact with the Bluetooth stack during these operations.
Potential Impact
For European organizations, the impact of CVE-2022-25750 can be substantial, especially for enterprises relying on mobile devices powered by affected Snapdragon chipsets. Confidentiality risks arise from potential arbitrary code execution, which could lead to data leakage or unauthorized access to sensitive corporate information. Integrity and availability are also at risk, as exploitation could cause device crashes or persistent instability, disrupting business communications and operations reliant on mobile connectivity. Given the prevalence of Bluetooth headsets in corporate environments for calls and media playback, attackers could exploit this vulnerability to target employees' devices, potentially gaining a foothold within corporate networks. This is particularly concerning for sectors with high security requirements such as finance, healthcare, and government agencies. Moreover, the vulnerability's local attack vector means that attackers need to be within Bluetooth range, which could be feasible in public or semi-public spaces like offices, conferences, or transport hubs. The lack of known exploits in the wild reduces immediate risk but does not eliminate it, as the vulnerability is publicly disclosed and could be weaponized by advanced threat actors. The absence of official patches at the time of disclosure necessitates proactive mitigation to reduce exposure.
Mitigation Recommendations
European organizations should implement a multi-layered mitigation strategy beyond generic advice: 1) Inventory and identify all mobile devices using affected Qualcomm Snapdragon chipsets and associated wireless components. 2) Monitor vendor communications closely for official patches or firmware updates from device manufacturers and Qualcomm, and prioritize timely deployment once available. 3) Enforce strict Bluetooth usage policies, including disabling Bluetooth on corporate devices when not in use, and restricting pairing to trusted devices only. 4) Employ mobile device management (MDM) solutions to control Bluetooth settings remotely and enforce security configurations. 5) Educate employees about the risks of connecting to unknown or untrusted Bluetooth devices, especially in public or crowded environments. 6) Implement network segmentation and endpoint detection to limit lateral movement if a device is compromised. 7) Consider additional endpoint protection tools capable of detecting anomalous behavior related to Bluetooth stack exploitation. 8) For high-security environments, evaluate the feasibility of disabling Bluetooth audio and call functionalities temporarily until patches are applied. These targeted actions can reduce the attack surface and mitigate exploitation risk while awaiting official fixes.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Finland
CVE-2022-25750: Double Free in BTHOST in Qualcomm, Inc. Snapdragon Mobile
Description
Memory corruption in BTHOST due to double free while music playback and calls over bluetooth headset in Snapdragon Mobile
AI-Powered Analysis
Technical Analysis
CVE-2022-25750 is a high-severity memory corruption vulnerability identified in the BTHOST component of Qualcomm Snapdragon Mobile platforms. The root cause is a double free condition (CWE-415), which occurs when the system attempts to free the same memory location twice during Bluetooth operations, specifically while music playback and calls are active over a Bluetooth headset. This vulnerability affects multiple Snapdragon Mobile chipsets and associated wireless connectivity components, including Kailua, SG8275, SG8275P, SM8550, and various WCD and WCN series chips. The double free flaw can lead to heap corruption, potentially allowing an attacker to execute arbitrary code, cause denial of service (system crashes), or escalate privileges on the affected device. The CVSS v3.1 base score is 8.4, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity, no privileges required, and no user interaction needed. Exploitation would typically require local access or proximity to the Bluetooth interface, as the attack vector is local (AV:L). Qualcomm has published the vulnerability, but no public patches or known exploits in the wild have been reported as of the publication date. The vulnerability is significant because Snapdragon Mobile chipsets are widely deployed in smartphones, tablets, and IoT devices globally, making the potential attack surface large. The flaw specifically impacts Bluetooth audio and call functionality, which are common use cases, increasing the likelihood of exploitation if an attacker can interact with the Bluetooth stack during these operations.
Potential Impact
For European organizations, the impact of CVE-2022-25750 can be substantial, especially for enterprises relying on mobile devices powered by affected Snapdragon chipsets. Confidentiality risks arise from potential arbitrary code execution, which could lead to data leakage or unauthorized access to sensitive corporate information. Integrity and availability are also at risk, as exploitation could cause device crashes or persistent instability, disrupting business communications and operations reliant on mobile connectivity. Given the prevalence of Bluetooth headsets in corporate environments for calls and media playback, attackers could exploit this vulnerability to target employees' devices, potentially gaining a foothold within corporate networks. This is particularly concerning for sectors with high security requirements such as finance, healthcare, and government agencies. Moreover, the vulnerability's local attack vector means that attackers need to be within Bluetooth range, which could be feasible in public or semi-public spaces like offices, conferences, or transport hubs. The lack of known exploits in the wild reduces immediate risk but does not eliminate it, as the vulnerability is publicly disclosed and could be weaponized by advanced threat actors. The absence of official patches at the time of disclosure necessitates proactive mitigation to reduce exposure.
Mitigation Recommendations
European organizations should implement a multi-layered mitigation strategy beyond generic advice: 1) Inventory and identify all mobile devices using affected Qualcomm Snapdragon chipsets and associated wireless components. 2) Monitor vendor communications closely for official patches or firmware updates from device manufacturers and Qualcomm, and prioritize timely deployment once available. 3) Enforce strict Bluetooth usage policies, including disabling Bluetooth on corporate devices when not in use, and restricting pairing to trusted devices only. 4) Employ mobile device management (MDM) solutions to control Bluetooth settings remotely and enforce security configurations. 5) Educate employees about the risks of connecting to unknown or untrusted Bluetooth devices, especially in public or crowded environments. 6) Implement network segmentation and endpoint detection to limit lateral movement if a device is compromised. 7) Consider additional endpoint protection tools capable of detecting anomalous behavior related to Bluetooth stack exploitation. 8) For high-security environments, evaluate the feasibility of disabling Bluetooth audio and call functionalities temporarily until patches are applied. These targeted actions can reduce the attack surface and mitigate exploitation risk while awaiting official fixes.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- qualcomm
- Date Reserved
- 2022-02-22T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fc1484d88663aecbee
Added to database: 5/20/2025, 6:59:08 PM
Last enriched: 7/6/2025, 5:39:52 PM
Last updated: 8/7/2025, 2:01:55 PM
Views: 12
Related Threats
CVE-2025-8966: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8965: Unrestricted Upload in linlinjava litemall
MediumCVE-2025-36047: CWE-770 Allocation of Resources Without Limits or Throttling in IBM WebSphere Application Server Liberty
MediumCVE-2025-33142: CWE-295 Improper Certificate Validation in IBM WebSphere Application Server
MediumCVE-2025-53631: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in DogukanUrker flaskBlog
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.