#VU63093 Use-after-free in Qualcomm products - CVE-2022-22071
Published: May 12, 2022 / Updated: December 5, 2023
Vulnerability identifier: #VU63093
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Clear
CVE-ID: CVE-2022-22071
CWE-ID: CWE-416
Exploitation vector: Local access
Exploit availability:
The vulnerability is being exploited in the wild
Vulnerable software:
APQ8053
MDM9150
MSM8953
QCA6174A
QCA6574AU
QCA9377
QCS405
SA6155P
SD855
SDX55
AR8031
AR8035
CSRA6620
CSRA6640
QCA6390
QCA6391
QCA6426
QCA6436
QCA6574
QCA6574A
QCA6595AU
QCA6696
QCA8081
QCA8337
QCM2290
QCM4290
QCM6490
QCS2290
QCS410
QCS4290
QCS610
QCS6490
QRB5165
QRB5165M
QRB5165N
Qualcomm215
SA8155P
SA8195P
SD439
SD460
SD480
SD662
SD680
SD690 5G
SD695
SD750G
SD765
SD765G
SD768G
SD778G
SD780G
SD865 5G
SD870
SD888 5G
SDX12
SDX55M
SDX65
SDXR2 5G
SM4125
SM7250P
SM7325P
WCD9326
WCD9335
WCD9341
WCD9370
WCD9375
WCD9380
WCD9385
WCN3615
WCN3660B
WCN3680B
WCN3910
WCN3950
WCN3980
WCN3988
WCN3991
WCN3998
WCN3999
WCN6740
WCN6750
WCN6850
WCN6851
WCN6855
WCN6856
WCN7850
WCN7851
WSA8810
WSA8815
WSA8830
WSA8835
APQ8053
MDM9150
MSM8953
QCA6174A
QCA6574AU
QCA9377
QCS405
SA6155P
SD855
SDX55
AR8031
AR8035
CSRA6620
CSRA6640
QCA6390
QCA6391
QCA6426
QCA6436
QCA6574
QCA6574A
QCA6595AU
QCA6696
QCA8081
QCA8337
QCM2290
QCM4290
QCM6490
QCS2290
QCS410
QCS4290
QCS610
QCS6490
QRB5165
QRB5165M
QRB5165N
Qualcomm215
SA8155P
SA8195P
SD439
SD460
SD480
SD662
SD680
SD690 5G
SD695
SD750G
SD765
SD765G
SD768G
SD778G
SD780G
SD865 5G
SD870
SD888 5G
SDX12
SDX55M
SDX65
SDXR2 5G
SM4125
SM7250P
SM7325P
WCD9326
WCD9335
WCD9341
WCD9370
WCD9375
WCD9380
WCD9385
WCN3615
WCN3660B
WCN3680B
WCN3910
WCN3950
WCN3980
WCN3988
WCN3991
WCN3998
WCN3999
WCN6740
WCN6750
WCN6850
WCN6851
WCN6855
WCN6856
WCN7850
WCN7851
WSA8810
WSA8815
WSA8830
WSA8835
Software vendor:
Qualcomm
Qualcomm
Description
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a use-after-free error in the Automotive Android OS when process shell memory is freed using IOCTL munmap call and process initialization is in progress. A local application can trigger a use-after-free error and execute arbitrary code with elevated privileges.
Remediation
Install updates from vendor's website.