#VU71964 Use After Free in Qualcomm Mobile applications


Published: 2023-02-07

Vulnerability identifier: #VU71964

Vulnerability risk: Low

CVSSv3.1: 5.8 [CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-33225

CWE-ID: CWE-416

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
APQ8096AU
Hardware solutions / Firmware
MSM8996AU
Hardware solutions / Firmware
QCA6574AU
Hardware solutions / Firmware
SD205
Hardware solutions / Firmware
SD210
Hardware solutions / Firmware
SDM429W
Hardware solutions / Firmware
MDM9628
Mobile applications / Mobile firmware & hardware
QCA6390
Mobile applications / Mobile firmware & hardware
QCA6391
Mobile applications / Mobile firmware & hardware
QCA6426
Mobile applications / Mobile firmware & hardware
QCA6436
Mobile applications / Mobile firmware & hardware
QCA6564A
Mobile applications / Mobile firmware & hardware
QCA6564AU
Mobile applications / Mobile firmware & hardware
QCA6574A
Mobile applications / Mobile firmware & hardware
Qualcomm215
Mobile applications / Mobile firmware & hardware
SD429
Mobile applications / Mobile firmware & hardware
SD865 5G
Mobile applications / Mobile firmware & hardware
SD870
Mobile applications / Mobile firmware & hardware
SDX55M
Mobile applications / Mobile firmware & hardware
SDXR2 5G
Mobile applications / Mobile firmware & hardware
WCD9340
Mobile applications / Mobile firmware & hardware
WCD9380
Mobile applications / Mobile firmware & hardware
WCN3610
Mobile applications / Mobile firmware & hardware
WCN3620
Mobile applications / Mobile firmware & hardware
WCN3660B
Mobile applications / Mobile firmware & hardware
WCN6850
Mobile applications / Mobile firmware & hardware
WCN6851
Mobile applications / Mobile firmware & hardware
WSA8810
Mobile applications / Mobile firmware & hardware
WSA8815
Mobile applications / Mobile firmware & hardware

Vendor: Qualcomm

Description

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to improper input validation in Trusted Application Environment. A local privileged application can execute arbitrary code.

Mitigation
Install security update from vendor's website.

Vulnerable software versions

APQ8096AU: All versions

MDM9628: All versions

MSM8996AU: All versions

QCA6390: All versions

QCA6391: All versions

QCA6426: All versions

QCA6436: All versions

QCA6564A: All versions

QCA6564AU: All versions

QCA6574A: All versions

QCA6574AU: All versions

Qualcomm215: All versions

SD205: All versions

SD210: All versions

SD429: All versions

SD865 5G: All versions

SD870: All versions

SDM429W: All versions

SDX55M: All versions

SDXR2 5G: All versions

WCD9340: All versions

WCD9380: All versions

WCN3610: All versions

WCN3620: All versions

WCN3660B: All versions

WCN6850: All versions

WCN6851: All versions

WSA8810: All versions

WSA8815: All versions


External links
http://docs.qualcomm.com/product/publicresources/securitybulletin/february-2023-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability