#VU67083 Improper Validation of Array Index in Qualcomm products - CVE-2022-25690 

 

#VU67083 Improper Validation of Array Index in Qualcomm products - CVE-2022-25690

Published: September 8, 2022


Vulnerability identifier: #VU67083
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2022-25690
CWE-ID: CWE-129
Exploitation vector: Adjecent network
Exploit availability: No public exploit available
Vulnerable software:
APQ8096AU
MDM9607
MDM9640
MDM9650
MSM8996AU
QCA6174A
QCA6574AU
QCA9379
QCN7605
QCS405
QCS605
SA6155P
SD665
SD670
SD675
SD710
SD712
SD730
SD835
SD845
SD850
SD855
SD888
SDM630
SDX55
SM7450
WSA8832
AQT1000
AR8031
AR8035
CSRA6620
CSRA6640
CSRB31024
MDM9250
MDM9626
MDM9628
QCA1062
QCA1064
QCA6175A
QCA6310
QCA6320
QCA6335
QCA6390
QCA6391
QCA6420
QCA6421
QCA6426
QCA6430
QCA6431
QCA6436
QCA6564
QCA6564A
QCA6564AU
QCA6574
QCA6574A
QCA6595
QCA6595AU
QCA6694
QCA6696
QCA8081
QCA8337
QCM2290
QCM4290
QCM6125
QCM6490
QCN7606
QCS2290
QCS410
QCS4290
QCS603
QCS610
QCS6125
QCS6490
QRB5165
QRB5165M
QRB5165N
QSM8350
SA415M
SA515M
SA6145P
SA6155
SA8155
SA8155P
SA8195P
SC8180X+SDX55
SD 636
SD 675
SD 8 Gen1 5G
SD 8CX
SD 8cx Gen2
SD 8cx Gen3
SD460
SD480
SD660
SD662
SD678
SD680
SD690 5G
SD695
SD720G
SD750G
SD765
SD765G
SD768G
SD778G
SD780G
SD7c
SD820
SD865 5G
SD870
SD888 5G
SDX50M
SDX55M
SDX65
SDXR1
SDXR2 5G
SM4125
SM6250
SM6250P
SM7250P
SM7315
SM7325P
WCD9326
WCD9335
WCD9340
WCD9341
WCD9360
WCD9370
WCD9371
WCD9375
WCD9380
WCD9385
WCN3910
WCN3950
WCN3980
WCN3988
WCN3990
WCN3991
WCN3998
WCN3999
WCN6740
WCN6750
WCN6850
WCN6851
WCN6855
WCN6856
WCN7850
WCN7851
WSA8810
WSA8815
WSA8830
WSA8835
Software vendor:
Qualcomm

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to a boundary error in WLAN firmware when parsing ANQP action frames. A remote attacker on the local network can send specially crafted packets to the affected device and gain access to sensitive information.


Remediation

Install updates from vendor's website.

External links