SB2022100341 - Multiple vulnerabilities in Qualcomm chipsets 



SB2022100341 - Multiple vulnerabilities in Qualcomm chipsets

Published: October 3, 2022 Updated: September 19, 2025

Security Bulletin ID SB2022100341
Severity
High
Patch available
YES
Number of vulnerabilities 21
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 14% Medium 24% Low 62%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 21 secuirty vulnerabilities.


1) Double Free (CVE-ID: CVE-2022-25660)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the kernel component. A local application can trigger a double free error and execute arbitrary code with elevated privileges.


2) Untrusted Pointer Dereference (CVE-ID: CVE-2022-25661)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the kernel component. A local application can trigger an untrusted pointer dereference and execute arbitrary code with elevated privileges.

3) Out-of-bounds read (CVE-ID: CVE-2022-25665)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the kernel component. A local application can trigger an out-of-bounds read error and read contents of memory on the system or crash the kernel.


4) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2022-33214)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a race condition within the Display component. A local application can exploit the race and gain unauthorized access to sensitive information and escalate privileges on the system.


5) Buffer overflow (CVE-ID: CVE-2022-33217)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within Qualcomm IPC. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.



6) Integer overflow (CVE-ID: CVE-2022-22078)

The vulnerability allows an attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to integer overflow within the BOOT subsystem. An attacker with physical access to the affected device can trigger an integer overflow and perform a denial of service (DoS) attack.


7) Untrusted Pointer Dereference (CVE-ID: CVE-2022-25662)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to untrusted pointer dereference when processing multimedia files in Video component. A remote attacker can trick the victim to open a specially crafted file, trigger an untrusted pointer dereference and gain access to sensitive information.


8) Out-of-bounds read (CVE-ID: CVE-2022-25663)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition within the WLAN Windows Host component. A local application can trigger an out-of-bounds read and perform a denial of service (DoS) attack.


9) Information disclosure (CVE-ID: CVE-2022-25664)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to an error within the Graphics component while GPU reads the data. A local application can gain access to sensitive information.


10) Use-after-free (CVE-ID: CVE-2022-25666)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the DSP Service while trying to access maps by different threads. A local application can trigger a use-after-free error and execute arbitrary code with elevated privileges.


11) Cryptographic issues (CVE-ID: CVE-2022-25718)

The vulnerability allows a remote attacker to perform MitM attack.

The vulnerability exists due to improper checking on return value while authentication handshake within the WLAN component. A remote attacker can perform MitM attack.


12) Integer overflow (CVE-ID: CVE-2022-25748)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow within the WLAN component when handling GTK frames. A remote attacker can send specially crafted traffic to the device, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


13) Buffer overflow (CVE-ID: CVE-2022-25687)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when parsing asf clips within the Video component. A remote attacker can create a specially crafted video file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


14) Out-of-bounds read (CVE-ID: CVE-2022-25719)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the WLAN component while processing authentication handshake. A remote attacker can trigger an out-of-bounds read error and read contents of memory on the system.


15) Out-of-bounds read (CVE-ID: CVE-2022-25736)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition within the WLAN Firmware when handling VHT action frames. A remote attacker can send specially crafted traffic to the device, trigger an out-of-bounds read error and perform a denial of service (DoS) attack.


16) Out-of-bounds read (CVE-ID: CVE-2022-25749)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition within the WLAN Firmware when handling MDNS frames. A remote attacker can send specially crafted traffic to the device, trigger an out-of-bounds read error and perform a denial of service (DoS) attack.

17) Use of Out-of-range Pointer Offset (CVE-ID: CVE-2022-33210)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the Automotive Multimedia when processing command request packets with a very large type value. A local application can trigger a boundary error and execute arbitrary code with elevated privileges.


18) Improper Validation of Array Index (CVE-ID: CVE-2022-25720)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to an improper validation of an array index in WLAN HOST during connect/roaming. A remote attacker can send specially crafted traffic to the device and execute arbitrary code.


19) Use-after-free (CVE-ID: CVE-2022-22077)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the Graphics component. A local application can trigger a use-after-free in graphics dispatcher logic and execute arbitrary code with elevated privileges.


20) Use-after-free (CVE-ID: CVE-2022-25723)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the Multimedia Frameworks. A local application can trigger a use-after- free during callback registration failure and execute arbitrary code with elevated privileges.


21) Double Free (CVE-ID: CVE-2022-25750)

The vulnerability allows an attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within Bluetooth HOST while music playback and calls over bluetooth headset. An attacker with physical proximity to device can trigger a double free error and execute arbitrary code on the target system.



Remediation

Install update from vendor's website.

References