Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-22105


Memory corruption in bluetooth due to integer overflow while processing HFP-UNIT profile in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Mobile, Snapdragon Voice & Music


Security Impact Summary

This vulnerability carries a CRITICAL severity rating with a CVSS v3.1 score of 9.4, indicating it can be exploited remotely over the network with relatively low complexity without requiring user interaction and does not require pre-existing privileges . The vulnerability impacts confidentiality (data exposure), integrity (unauthorized modifications), and limited availability for affected systems. Impacting 102 products from qualcomm, from qualcomm, from qualcomm and 99 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

Reported in 2022, this vulnerability emerged during an era marked by increased sophistication in supply chain attacks, cloud infrastructure vulnerabilities, and software-as-a-service (SaaS) security challenges. Security practices during this period emphasized zero-trust architectures, container security, and API protection.


Published

2022-09-16T06:15:10.487

Last Modified

2024-11-21T06:46:11.503

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 9.4 (CRITICAL)

Weaknesses
  • Type: Primary
    CWE-190

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System qualcomm apq8009_firmware - Yes
Hardware qualcomm apq8009 - No
Operating System qualcomm apq8017_firmware - Yes
Hardware qualcomm apq8017 - No
Operating System qualcomm apq8053_firmware - Yes
Hardware qualcomm apq8053 - No
Operating System qualcomm apq8096au_firmware - Yes
Hardware qualcomm apq8096au - No
Operating System qualcomm ar8031_firmware - Yes
Hardware qualcomm ar8031 - No
Operating System qualcomm csra6620_firmware - Yes
Hardware qualcomm csra6620 - No
Operating System qualcomm csra6640_firmware - Yes
Hardware qualcomm csra6640 - No
Operating System qualcomm csrb31024_firmware - Yes
Hardware qualcomm csrb31024 - No
Operating System qualcomm mdm9150_firmware - Yes
Hardware qualcomm mdm9150 - No
Operating System qualcomm mdm9250_firmware - Yes
Hardware qualcomm mdm9250 - No
Operating System qualcomm mdm9607_firmware - Yes
Hardware qualcomm mdm9607 - No
Operating System qualcomm mdm9626_firmware - Yes
Hardware qualcomm mdm9626 - No
Operating System qualcomm mdm9628_firmware - Yes
Hardware qualcomm mdm9628 - No
Operating System qualcomm mdm9640_firmware - Yes
Hardware qualcomm mdm9640 - No
Operating System qualcomm mdm9650_firmware - Yes
Hardware qualcomm mdm9650 - No
Operating System qualcomm qca4020_firmware - Yes
Hardware qualcomm qca4020 - No
Operating System qualcomm qca6174a_firmware - Yes
Hardware qualcomm qca6174a - No
Operating System qualcomm qca6564a_firmware - Yes
Hardware qualcomm qca6564a - No
Operating System qualcomm qca6564au_firmware - Yes
Hardware qualcomm qca6564au - No
Operating System qualcomm qca6574_firmware - Yes
Hardware qualcomm qca6574 - No
Operating System qualcomm qca6574a_firmware - Yes
Hardware qualcomm qca6574a - No
Operating System qualcomm qca6574au_firmware - Yes
Hardware qualcomm qca6574au - No
Operating System qualcomm qca6584_firmware - Yes
Hardware qualcomm qca6584 - No
Operating System qualcomm qca6595_firmware - Yes
Hardware qualcomm qca6595 - No
Operating System qualcomm qca6595au_firmware - Yes
Hardware qualcomm qca6595au - No
Operating System qualcomm qca6696_firmware - Yes
Hardware qualcomm qca6696 - No
Operating System qualcomm qca9367_firmware - Yes
Hardware qualcomm qca9367 - No
Operating System qualcomm qca9377_firmware - Yes
Hardware qualcomm qca9377 - No
Operating System qualcomm qca9379_firmware - Yes
Hardware qualcomm qca9379 - No
Operating System qualcomm qcs405_firmware - Yes
Hardware qualcomm qcs405 - No
Operating System qualcomm sa415m_firmware - Yes
Hardware qualcomm sa415m - No
Operating System qualcomm sa515m_firmware - Yes
Hardware qualcomm sa515m - No
Operating System qualcomm sa6155_firmware - Yes
Hardware qualcomm sa6155 - No
Operating System qualcomm sa6155p_firmware - Yes
Hardware qualcomm sa6155p - No
Operating System qualcomm sa8155_firmware - Yes
Hardware qualcomm sa8155 - No
Operating System qualcomm sa8155p_firmware - Yes
Hardware qualcomm sa8155p - No
Operating System qualcomm sa8195p_firmware - Yes
Hardware qualcomm sa8195p - No
Operating System qualcomm sdx20_firmware - Yes
Hardware qualcomm sdx20 - No
Operating System qualcomm sdx55_firmware - Yes
Hardware qualcomm sdx55 - No
Operating System qualcomm wcd9326_firmware - Yes
Hardware qualcomm wcd9326 - No
Operating System qualcomm wcd9335_firmware - Yes
Hardware qualcomm wcd9335 - No
Operating System qualcomm wcd9360_firmware - Yes
Hardware qualcomm wcd9360 - No
Operating System qualcomm wcn3610_firmware - Yes
Hardware qualcomm wcn3610 - No
Operating System qualcomm wcn3615_firmware - Yes
Hardware qualcomm wcn3615 - No
Operating System qualcomm wcn3660b_firmware - Yes
Hardware qualcomm wcn3660b - No
Operating System qualcomm wcn3680b_firmware - Yes
Hardware qualcomm wcn3680b - No
Operating System qualcomm wcn3980_firmware - Yes
Hardware qualcomm wcn3980 - No
Operating System qualcomm wcn3998_firmware - Yes
Hardware qualcomm wcn3998 - No
Operating System qualcomm wcn3999_firmware - Yes
Hardware qualcomm wcn3999 - No
Operating System qualcomm wsa8810_firmware - Yes
Hardware qualcomm wsa8810 - No
Operating System qualcomm wsa8815_firmware - Yes
Hardware qualcomm wsa8815 - No

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For qualcomm's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.