#VU64021 Use of Out-of-range Pointer Offset in Qualcomm products - CVE-2022-22085 

 

#VU64021 Use of Out-of-range Pointer Offset in Qualcomm products - CVE-2022-22085

Published: June 7, 2022 / Updated: June 7, 2022


Vulnerability identifier: #VU64021
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2022-22085
CWE-ID: CWE-823
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
APQ8009
APQ8017
APQ8053
APQ8096AU
MDM9206
MDM9607
MDM9650
MSM8909W
MSM8917
MSM8937
MSM8953
MSM8996AU
QCA6174A
QCA6574AU
QCA9377
QCA9379
QCS405
QCS605
SA6155P
SD450
SD670
SD675
SD710
SD730
SD835
SD845
SD855
SD888
SDM429W
SDM630
SDX20
SDX55
SM7450
SM8475
SM8475P
WSA8832
APQ8009W
AQT1000
AR8031
CSRA6620
CSRA6640
MDM9250
MDM9626
MDM9628
PM8937
QCA4020
QCA6310
QCA6320
QCA6335
QCA6390
QCA6391
QCA6420
QCA6426
QCA6430
QCA6436
QCA6564
QCA6564A
QCA6564AU
QCA6574
QCA6574A
QCA6595AU
QCA6696
QCA9367
QCM2290
QCM4290
QCM6125
QCM6490
QCS2290
QCS410
QCS4290
QCS603
QCS610
QCS6125
QCS6490
Qualcomm215
SA6145P
SA6155
SA8155
SA8155P
SA8195P
SD 636
SD 675
SD 8 Gen1 5G
SD429
SD439
SD460
SD480
SD632
SD660
SD662
SD678
SD680
SD690 5G
SD720G
SD750G
SD765
SD765G
SD768G
SD778G
SD780G
SD820
SD865 5G
SD870
SD888 5G
SDW2500
SDX50M
SDX55M
SDX65
SDXR1
SDXR2 5G
SM4125
SM6250
SM6250P
SM7250P
SM7315
SM7325P
SW5100
SW5100P
WCD9326
WCD9330
WCD9335
WCD9340
WCD9341
WCD9370
WCD9371
WCD9375
WCD9380
WCD9385
WCN3610
WCN3615
WCN3620
WCN3660
WCN3660B
WCN3680
WCN3680B
WCN3910
WCN3950
WCN3980
WCN3988
WCN3990
WCN3991
WCN3998
WCN3999
WCN6740
WCN6750
WCN6850
WCN6851
WCN6855
WCN6856
WCN7850
WCN7851
WSA8810
WSA8815
WSA8830
WSA8835
Software vendor:
Qualcomm

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in Video while reading the dts file. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.


Remediation

Install updates from vendor's website.

External links