CVE-2022-22065

7.5 HIGH

📋 TL;DR

This vulnerability is an out-of-bounds read in the WLAN HOST component of Qualcomm Snapdragon chipsets due to improper length checking. It affects multiple Qualcomm Snapdragon product lines including Auto, Compute, Mobile, Wearables, and IoT devices. Successful exploitation can lead to denial of service (DoS) conditions.

💻 Affected Systems

Products:
  • Snapdragon Auto
  • Snapdragon Compute
  • Snapdragon Connectivity
  • Snapdragon Consumer Electronics Connectivity
  • Snapdragon Consumer IoT
  • Snapdragon Industrial IoT
  • Snapdragon Mobile
  • Snapdragon Voice & Music
  • Snapdragon Wearables
Versions: Specific chipset versions not detailed in public advisory; refer to Qualcomm's May 2022 security bulletin for exact affected versions.
Operating Systems: Android, Linux-based embedded systems, Other Qualcomm-supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices using vulnerable Qualcomm WLAN firmware/drivers. Exact device models depend on OEM implementation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash or persistent DoS requiring hardware reset, potentially affecting critical systems in automotive or industrial IoT applications.

🟠

Likely Case

Temporary service disruption, device instability, or crashes requiring reboot in affected mobile, IoT, or embedded devices.

🟢

If Mitigated

Minimal impact with proper network segmentation and access controls limiting exposure to malicious traffic.

🌐 Internet-Facing: MEDIUM - Requires proximity or network access to WLAN interface, but many affected devices have wireless connectivity exposed.
🏢 Internal Only: MEDIUM - Internal network access to affected devices could still trigger the vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending specially crafted packets to the WLAN interface. No authentication needed but requires network proximity/access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Qualcomm's May 2022 security bulletin for specific patched firmware versions

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/may-2022-bulletin

Restart Required: Yes

Instructions:

1. Check device manufacturer for firmware updates. 2. Apply Qualcomm-provided firmware patches. 3. Reboot device. 4. Verify patch installation through version checks.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices from untrusted networks to prevent malicious packet injection.

WLAN Access Control

all

Implement strict WLAN authentication and MAC filtering to limit potential attackers.

🧯 If You Can't Patch

  • Segment affected devices on isolated network segments with strict firewall rules
  • Disable WLAN functionality if not required, use wired connectivity instead

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against Qualcomm's advisory. Use 'cat /proc/version' or device-specific firmware version commands on Linux-based systems.

Check Version:

Device-specific; typically 'cat /proc/version' or OEM-provided version checking utilities.

Verify Fix Applied:

Verify firmware version matches patched versions from Qualcomm's bulletin. Test WLAN functionality for stability.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panics
  • WLAN driver crashes
  • System reboots without clear cause
  • High rate of WLAN errors

Network Indicators:

  • Unusual WLAN traffic patterns
  • Malformed 802.11 packets
  • DoS conditions on affected devices

SIEM Query:

Search for: (event_category:"kernel" OR "driver") AND (message:"panic" OR "crash" OR "oops") AND (component:"wlan" OR "wireless")

🔗 References

📤 Share & Export