#VU67831 Improper Validation of Array Index in Qualcomm products - CVE-2022-25720
Published: October 3, 2022
Vulnerability identifier: #VU67831
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2022-25720
CWE-ID: CWE-129
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
APQ8009
APQ8017
APQ8053
APQ8096AU
MDM9150
MDM9206
MDM9607
MDM9640
MDM9650
MSM8909W
MSM8917
MSM8953
MSM8996AU
QCA6174A
QCA6574AU
QCA9377
QCA9379
QCN7605
QCS405
QCS605
SA6155P
SD205
SD210
SD450
SD670
SD675
SD710
SD730
SD835
SD845
SD855
SDM429W
SDX20
SDX24
SDX55
APQ8009W
APQ8052
APQ8056
APQ8064AU
APQ8076
AQT1000
AR6003
AR8031
AR8035
CSRA6620
CSRA6640
CSRB31024
MDM8215
MDM8215M
MDM8615M
MDM9215
MDM9230
MDM9250
MDM9310
MDM9330
MDM9615
MDM9615M
MDM9628
MDM9630
MSM8108
MSM8208
MSM8209
MSM8608
MSM8952
MSM8956
MSM8976
MSM8976SG
QAM8295P
QCA4020
QCA6174
QCA6175A
QCA6310
QCA6320
QCA6335
QCA6390
QCA6391
QCA6420
QCA6421
QCA6426
QCA6430
QCA6431
QCA6436
QCA6554A
QCA6564
QCA6564A
QCA6564AU
QCA6574
QCA6574A
QCA6584
QCA6584AU
QCA6595
QCA6595AU
QCA6696
QCA8081
QCA8337
QCA9367
QCC5100
QCM6125
QCN6024
QCN7606
QCN9024
QCS410
QCS610
QCS6125
QCX315
QET4101
QRB5165
QRB5165M
QRB5165N
QSW8573
Qualcomm215
SA4150P
SA4155P
SA415M
SA515M
SA6145P
SA6150P
SA8145P
SA8150P
SA8155
SA8155P
SA8195P
SA8295P
SD 675
SD 8 Gen1 5G
SD429
SD439
SD460
SD632
SD660
SD662
SD678
SD820
SD821
SD865 5G
SD870
SDA429W
SDW2500
SDX12
SDX20M
SDX50M
SDX55M
SDX65
SDXR1
SDXR2 5G
SM4125
SW5100
SW5100P
WCD9306
WCD9326
WCD9330
WCD9335
WCD9340
WCD9341
WCD9360
WCD9370
WCD9371
WCD9375
WCD9380
WCD9385
WCN3610
WCN3615
WCN3620
WCN3660
WCN3660B
WCN3680
WCN3680B
WCN3910
WCN3950
WCN3980
WCN3988
WCN3990
WCN3998
WCN3999
WCN6740
WCN6850
WCN6851
WCN6855
WCN6856
WCN7850
WCN7851
WSA8810
WSA8815
WSA8830
WSA8835
APQ8009
APQ8017
APQ8053
APQ8096AU
MDM9150
MDM9206
MDM9607
MDM9640
MDM9650
MSM8909W
MSM8917
MSM8953
MSM8996AU
QCA6174A
QCA6574AU
QCA9377
QCA9379
QCN7605
QCS405
QCS605
SA6155P
SD205
SD210
SD450
SD670
SD675
SD710
SD730
SD835
SD845
SD855
SDM429W
SDX20
SDX24
SDX55
APQ8009W
APQ8052
APQ8056
APQ8064AU
APQ8076
AQT1000
AR6003
AR8031
AR8035
CSRA6620
CSRA6640
CSRB31024
MDM8215
MDM8215M
MDM8615M
MDM9215
MDM9230
MDM9250
MDM9310
MDM9330
MDM9615
MDM9615M
MDM9628
MDM9630
MSM8108
MSM8208
MSM8209
MSM8608
MSM8952
MSM8956
MSM8976
MSM8976SG
QAM8295P
QCA4020
QCA6174
QCA6175A
QCA6310
QCA6320
QCA6335
QCA6390
QCA6391
QCA6420
QCA6421
QCA6426
QCA6430
QCA6431
QCA6436
QCA6554A
QCA6564
QCA6564A
QCA6564AU
QCA6574
QCA6574A
QCA6584
QCA6584AU
QCA6595
QCA6595AU
QCA6696
QCA8081
QCA8337
QCA9367
QCC5100
QCM6125
QCN6024
QCN7606
QCN9024
QCS410
QCS610
QCS6125
QCX315
QET4101
QRB5165
QRB5165M
QRB5165N
QSW8573
Qualcomm215
SA4150P
SA4155P
SA415M
SA515M
SA6145P
SA6150P
SA8145P
SA8150P
SA8155
SA8155P
SA8195P
SA8295P
SD 675
SD 8 Gen1 5G
SD429
SD439
SD460
SD632
SD660
SD662
SD678
SD820
SD821
SD865 5G
SD870
SDA429W
SDW2500
SDX12
SDX20M
SDX50M
SDX55M
SDX65
SDXR1
SDXR2 5G
SM4125
SW5100
SW5100P
WCD9306
WCD9326
WCD9330
WCD9335
WCD9340
WCD9341
WCD9360
WCD9370
WCD9371
WCD9375
WCD9380
WCD9385
WCN3610
WCN3615
WCN3620
WCN3660
WCN3660B
WCN3680
WCN3680B
WCN3910
WCN3950
WCN3980
WCN3988
WCN3990
WCN3998
WCN3999
WCN6740
WCN6850
WCN6851
WCN6855
WCN6856
WCN7850
WCN7851
WSA8810
WSA8815
WSA8830
WSA8835
Software vendor:
Qualcomm
Qualcomm
Description
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to an improper validation of an array index in WLAN HOST during connect/roaming. A remote attacker can send specially crafted traffic to the device and execute arbitrary code.
Remediation
Install updates from vendor's website.
External links
- https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2022-bulletin.html
- https://git.codelinaro.org/clo/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/-/commit/704b9257f192bdaa2150bf0d6c263736d09b8600
- https://git.codelinaro.org/clo/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/-/commit/9fd9f25630708ab50bed37599b8b85906cda4edf
- https://git.codelinaro.org/clo/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/-/commit/1eb39939a50ce944f8bf6b9b33b248753b8f2f87
- https://git.codelinaro.org/clo/la/platform/vendor/qcom-opensource/wlan/prima/-/commit/c9aae70ae84b2e7c2c18c95406f5f5364c6025ff
- https://git.codelinaro.org/clo/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/-/commit/3fb422f1840dc7ff95c72aefc5e461029c99da77
- https://git.codelinaro.org/clo/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/-/commit/b61faa63366b5d869e6aeebef7fb2759480b2cd9
- https://git.codelinaro.org/clo/la/platform/vendor/qcom-opensource/wlan/prima/-/commit/3f82ab6e52dade45289642aec6cf96e6eec056d2