CVE-2022-25740

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code or cause denial of service on affected Qualcomm modem chipsets by exploiting a buffer overflow during IPv6 multicast address construction. It affects devices using vulnerable Qualcomm modem firmware, primarily mobile devices and IoT equipment.

💻 Affected Systems

Products:
  • Qualcomm modem chipsets
  • Devices with Qualcomm modems (smartphones, tablets, IoT devices)
Versions: Specific vulnerable firmware versions not publicly detailed in the bulletin
Operating Systems: Android and other OS using Qualcomm modem firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with IPv6 enabled on modem interfaces. The exact chipset models are detailed in Qualcomm's security bulletin.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, modem takeover, and potential lateral movement to other system components.

🟠

Likely Case

Denial of service causing modem crashes, loss of cellular connectivity, and device instability requiring reboots.

🟢

If Mitigated

Limited impact with proper network segmentation and modem isolation, potentially only causing temporary connectivity issues.

🌐 Internet-Facing: HIGH - Attackers can exploit this remotely via cellular networks without user interaction.
🏢 Internal Only: MEDIUM - Exploitation requires network access to the modem interface, which may be more restricted internally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting specific IPv6 multicast packets but doesn't require authentication. No public exploit code is known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Qualcomm's April 2023 security bulletin for specific patched firmware versions

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/april-2023-bulletin

Restart Required: Yes

Instructions:

1. Check device manufacturer for security updates. 2. Apply Qualcomm modem firmware updates from device OEM. 3. Reboot device after update installation.

🔧 Temporary Workarounds

Disable IPv6 on modem interfaces

all

Prevents exploitation by disabling the vulnerable IPv6 multicast address construction feature

Device-specific commands vary by platform and manufacturer

Network segmentation

all

Isolate modem interfaces from untrusted networks to limit attack surface

🧯 If You Can't Patch

  • Segment modem network interfaces from production networks
  • Implement strict firewall rules to limit access to modem management interfaces

🔍 How to Verify

Check if Vulnerable:

Check device modem firmware version against Qualcomm's security bulletin. Contact device manufacturer for vulnerability status.

Check Version:

Device-specific commands vary. Typically: Android: 'getprop | grep version.baseband' or manufacturer-specific diagnostic tools

Verify Fix Applied:

Verify modem firmware has been updated to a version after Qualcomm's April 2023 security patches

📡 Detection & Monitoring

Log Indicators:

  • Modem crash logs
  • Unexpected modem resets
  • IPv6 multicast address construction errors in modem logs

Network Indicators:

  • Malformed IPv6 multicast packets targeting modem interfaces
  • Unusual traffic patterns to modem management ports

SIEM Query:

Search for modem crash events, unexpected modem resets, or IPv6 protocol anomalies in network traffic logs

🔗 References

📤 Share & Export