#VU67092 Buffer overflow in Qualcomm Mobile applications


Published: 2022-09-08

Vulnerability identifier: #VU67092

Vulnerability risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-25654

CWE-ID: CWE-119

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
APQ8096AU
Hardware solutions / Firmware
MDM9650
Hardware solutions / Firmware
QCA6174A
Hardware solutions / Firmware
QCA6574AU
Hardware solutions / Firmware
QCS605
Hardware solutions / Firmware
SDM429W
Hardware solutions / Firmware
QCS603
Mobile applications / Mobile firmware & hardware
Qualcomm215
Mobile applications / Mobile firmware & hardware
SD429
Mobile applications / Mobile firmware & hardware
SD820
Mobile applications / Mobile firmware & hardware
WCD9326
Mobile applications / Mobile firmware & hardware
WCD9335
Mobile applications / Mobile firmware & hardware
WCD9341
Mobile applications / Mobile firmware & hardware
WCN3615
Mobile applications / Mobile firmware & hardware
WCN3620
Mobile applications / Mobile firmware & hardware
WCN3660B
Mobile applications / Mobile firmware & hardware
WCN3680
Mobile applications / Mobile firmware & hardware
WCN3980
Mobile applications / Mobile firmware & hardware
WCN3990
Mobile applications / Mobile firmware & hardware
WSA8810
Mobile applications / Mobile firmware & hardware
WSA8815
Mobile applications / Mobile firmware & hardware

Vendor: Qualcomm

Description

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error when processing ION commands within kernel. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

APQ8096AU: All versions

MDM9650: All versions

QCA6174A: All versions

QCA6574AU: All versions

QCS603: All versions

QCS605: All versions

Qualcomm215: All versions

SD429: All versions

SD820: All versions

SDM429W: All versions

WCD9326: All versions

WCD9335: All versions

WCD9341: All versions

WCN3615: All versions

WCN3620: All versions

WCN3660B: All versions

WCN3680: All versions

WCN3980: All versions

WCN3990: All versions

WSA8810: All versions

WSA8815: All versions


External links
http://docs.qualcomm.com/product/publicresources/securitybulletin/september-2022-bulletin.html
http://source.codeaurora.org/quic/qsdk/oss/kernel/linux-msm/commit/?id=940ac530d84408d1ec308c16ac777334c722fc91


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability