CVE-2022-33235: Buffer over-read in WLAN firmware in Qualcomm, Inc. Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
Information disclosure due to buffer over-read in WLAN firmware while parsing security context info attributes. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
AI Analysis
Technical Summary
CVE-2022-33235 is a medium-severity vulnerability identified in the WLAN firmware of a broad range of Qualcomm Snapdragon platforms, including Snapdragon Auto, Compute, Connectivity, Consumer Electronics Connectivity, Consumer IoT, Industrial IoT, Mobile, Voice & Music, Wearables, Wired Infrastructure, and Networking product lines. The vulnerability arises from a buffer over-read condition (CWE-125) during the parsing of security context information attributes within the WLAN firmware. Specifically, when the firmware processes certain security context info attributes, it may read beyond the allocated buffer boundaries, potentially leading to the disclosure of sensitive information stored in adjacent memory regions. This flaw affects an extensive list of Qualcomm chipsets and modules, spanning many generations and device categories, including mobile SoCs (e.g., SD 8 Gen1 5G, SDX55), IoT modules, automotive platforms, and networking chips (e.g., QCA series). The vulnerability was publicly disclosed on December 13, 2022, with no known exploits reported in the wild to date. No official patches or firmware updates have been linked in the provided data, indicating that mitigation may rely on vendor firmware updates or other compensating controls. The vulnerability does not require user interaction or authentication to be triggered, as it occurs during the processing of WLAN frames, which can be sent by an attacker within wireless range. The impact is primarily information disclosure, as the buffer over-read could leak sensitive data from the device's memory, potentially including security credentials or other confidential information. However, it does not appear to allow arbitrary code execution or denial of service directly. Given the wide deployment of Qualcomm Snapdragon chipsets across consumer, industrial, automotive, and networking devices, this vulnerability has a broad potential attack surface.
Potential Impact
For European organizations, the impact of CVE-2022-33235 could be significant due to the widespread use of Qualcomm Snapdragon chipsets in mobile devices, IoT endpoints, automotive systems, and enterprise networking equipment. Information disclosure vulnerabilities in WLAN firmware can undermine confidentiality by leaking sensitive data such as encryption keys, authentication tokens, or proprietary information. In sectors like automotive, industrial IoT, and critical infrastructure—where Snapdragon Auto and Industrial IoT platforms are deployed—such leaks could facilitate further targeted attacks or espionage. Consumer devices used by employees or customers may also be at risk, potentially exposing corporate data or credentials. The vulnerability's presence in networking and connectivity modules could affect enterprise wireless infrastructure, increasing the risk of lateral movement or reconnaissance by attackers. Although no active exploitation has been reported, the ease of triggering the vulnerability via wireless frames without authentication means attackers in proximity could exploit it to gather intelligence. This is particularly concerning for organizations handling sensitive data or operating in regulated industries such as finance, healthcare, or government. The broad range of affected chipsets means that many device types across various sectors could be vulnerable, complicating risk management and remediation efforts.
Mitigation Recommendations
1. Firmware Updates: Organizations should monitor Qualcomm and device vendors for firmware updates addressing this vulnerability and apply them promptly once available. Given the lack of direct patch links, proactive engagement with vendors is recommended. 2. Network Segmentation: Isolate critical IoT, automotive, and networking devices using vulnerable chipsets on separate WLAN segments with strict access controls to limit exposure. 3. Wireless Security Controls: Implement strong wireless security measures such as WPA3, robust authentication, and network monitoring to detect anomalous WLAN frames that could exploit this vulnerability. 4. Physical Security: Restrict physical proximity to sensitive wireless devices to reduce the risk of attackers sending malicious frames. 5. Device Inventory and Assessment: Conduct thorough inventories of devices using Qualcomm Snapdragon chipsets across the organization, including embedded and IoT devices, to assess exposure and prioritize remediation. 6. Intrusion Detection: Deploy wireless intrusion detection systems (WIDS) capable of identifying suspicious WLAN activity indicative of exploitation attempts. 7. Vendor Coordination: Engage with device manufacturers and Qualcomm to obtain status on patches and mitigation guidance, especially for embedded and industrial devices where updates may be less frequent. 8. Incident Response Preparedness: Prepare for potential information disclosure incidents by enhancing monitoring and establishing procedures to respond to suspicious activity related to WLAN communications.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Belgium, Poland
CVE-2022-33235: Buffer over-read in WLAN firmware in Qualcomm, Inc. Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
Description
Information disclosure due to buffer over-read in WLAN firmware while parsing security context info attributes. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
AI-Powered Analysis
Technical Analysis
CVE-2022-33235 is a medium-severity vulnerability identified in the WLAN firmware of a broad range of Qualcomm Snapdragon platforms, including Snapdragon Auto, Compute, Connectivity, Consumer Electronics Connectivity, Consumer IoT, Industrial IoT, Mobile, Voice & Music, Wearables, Wired Infrastructure, and Networking product lines. The vulnerability arises from a buffer over-read condition (CWE-125) during the parsing of security context information attributes within the WLAN firmware. Specifically, when the firmware processes certain security context info attributes, it may read beyond the allocated buffer boundaries, potentially leading to the disclosure of sensitive information stored in adjacent memory regions. This flaw affects an extensive list of Qualcomm chipsets and modules, spanning many generations and device categories, including mobile SoCs (e.g., SD 8 Gen1 5G, SDX55), IoT modules, automotive platforms, and networking chips (e.g., QCA series). The vulnerability was publicly disclosed on December 13, 2022, with no known exploits reported in the wild to date. No official patches or firmware updates have been linked in the provided data, indicating that mitigation may rely on vendor firmware updates or other compensating controls. The vulnerability does not require user interaction or authentication to be triggered, as it occurs during the processing of WLAN frames, which can be sent by an attacker within wireless range. The impact is primarily information disclosure, as the buffer over-read could leak sensitive data from the device's memory, potentially including security credentials or other confidential information. However, it does not appear to allow arbitrary code execution or denial of service directly. Given the wide deployment of Qualcomm Snapdragon chipsets across consumer, industrial, automotive, and networking devices, this vulnerability has a broad potential attack surface.
Potential Impact
For European organizations, the impact of CVE-2022-33235 could be significant due to the widespread use of Qualcomm Snapdragon chipsets in mobile devices, IoT endpoints, automotive systems, and enterprise networking equipment. Information disclosure vulnerabilities in WLAN firmware can undermine confidentiality by leaking sensitive data such as encryption keys, authentication tokens, or proprietary information. In sectors like automotive, industrial IoT, and critical infrastructure—where Snapdragon Auto and Industrial IoT platforms are deployed—such leaks could facilitate further targeted attacks or espionage. Consumer devices used by employees or customers may also be at risk, potentially exposing corporate data or credentials. The vulnerability's presence in networking and connectivity modules could affect enterprise wireless infrastructure, increasing the risk of lateral movement or reconnaissance by attackers. Although no active exploitation has been reported, the ease of triggering the vulnerability via wireless frames without authentication means attackers in proximity could exploit it to gather intelligence. This is particularly concerning for organizations handling sensitive data or operating in regulated industries such as finance, healthcare, or government. The broad range of affected chipsets means that many device types across various sectors could be vulnerable, complicating risk management and remediation efforts.
Mitigation Recommendations
1. Firmware Updates: Organizations should monitor Qualcomm and device vendors for firmware updates addressing this vulnerability and apply them promptly once available. Given the lack of direct patch links, proactive engagement with vendors is recommended. 2. Network Segmentation: Isolate critical IoT, automotive, and networking devices using vulnerable chipsets on separate WLAN segments with strict access controls to limit exposure. 3. Wireless Security Controls: Implement strong wireless security measures such as WPA3, robust authentication, and network monitoring to detect anomalous WLAN frames that could exploit this vulnerability. 4. Physical Security: Restrict physical proximity to sensitive wireless devices to reduce the risk of attackers sending malicious frames. 5. Device Inventory and Assessment: Conduct thorough inventories of devices using Qualcomm Snapdragon chipsets across the organization, including embedded and IoT devices, to assess exposure and prioritize remediation. 6. Intrusion Detection: Deploy wireless intrusion detection systems (WIDS) capable of identifying suspicious WLAN activity indicative of exploitation attempts. 7. Vendor Coordination: Engage with device manufacturers and Qualcomm to obtain status on patches and mitigation guidance, especially for embedded and industrial devices where updates may be less frequent. 8. Incident Response Preparedness: Prepare for potential information disclosure incidents by enhancing monitoring and establishing procedures to respond to suspicious activity related to WLAN communications.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- qualcomm
- Date Reserved
- 2022-06-14T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d984ac4522896dcbf70fb
Added to database: 5/21/2025, 9:09:30 AM
Last enriched: 6/21/2025, 7:07:26 PM
Last updated: 9/27/2025, 4:13:14 PM
Views: 21
Related Threats
CVE-2025-61671
LowCVE-2025-59536: CWE-94: Improper Control of Generation of Code ('Code Injection') in anthropics claude-code
HighCVE-2025-59489: Arbitrary Code Execution in Unity Runtime
MediumCVE-2025-61847
UnknownCVE-2025-59300: CWE-787 Out-Of-Bounds Write in Delta Electronics DIAScreen
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.