September 2022 Security Bulletin
Published: 09/06/2022
This security bulletin is intended to help Qualcomm Technologies, Inc. (QTI) customers incorporate security updates in launched or upcoming devices. This document includes (i) a description of security issues that have been addressed in QTI’s proprietary code and (ii) links to publicly available code where security issues have been addressed.
Please reach out to securitybulletin@qti.qualcomm.com for any questions related to this bulletin.
Table of Contents
Announcements |
Acknowledgements |
Proprietary Software Issues |
Open Source Software Issues |
Industry Coordination |
Announcements
None
Acknowledgements
We would like to thank these researchers for their contributions in reporting these issues to us.
CVE-2022-22091 | Syed Rafiul Hussain, Abdullah Al Ishtiaq, Penn State; Imtiaz Karim, Elisa Bertino, Purdue; Omar Chowdhury, University of Iowa |
CVE-2022-22092,CVE-2022-22093 | PengfeiDing |
CVE-2022-22094 | derrek |
CVE-2022-22095 | Seonung Jang(@IFdLRx4At1WFm74) of STEALIEN |
CVE-2022-25686,CVE-2022-25688,CVE-2022-25653 | Le Wu of Baidu Security |
CVE-2022-25696 | lovepink |
CVE-2022-25706 | Lei Ai(艾磊) and Xianfeng Lu(卢先锋) of OPPO Amber Security Lab |
CVE-2022-25654 | Le Wu(吴乐) of Baidu Security |
Proprietary Software Issues
The tables below summarize security vulnerabilities that were addressed through proprietary software
This table lists high impact security vulnerabilities. Patches have been released for affected products.OEMs have been notified and strongly recommended to release patches on end devices.
Public ID | Security Rating | CVSS Rating | Technology Area | Date Reported |
---|---|---|---|---|
CVE-2022-22105 | Critical | Critical | Automotive Connectivity | Internal |
CVE-2022-25652 | Critical | Critical | WIN CoreBSP | Internal |
CVE-2022-25708 | Critical | Critical | WLAN Firmware | Internal |
CVE-2022-22066 | High | High | Content Protection | Internal |
CVE-2022-22074 | High | High | Audio | Internal |
CVE-2022-22081 | High | High | Audio | Internal |
CVE-2022-22089 | High | High | Audio | Internal |
CVE-2022-22091 | High | High | LTE | 06/15/2021 |
CVE-2022-22092 | High | High | KERNEL | 11/16/2021 |
CVE-2022-22093 | High | High | KERNEL | 11/17/2021 |
CVE-2022-22094 | High | High | KERNEL | 11/23/2021 |
CVE-2022-25669 | High | High | Video | Internal |
CVE-2022-25686 | High | High | Video | 07/15/2021 |
CVE-2022-25688 | High | High | Video | 07/26/2021 |
CVE-2022-25690 | High | High | WLAN Firmware | Internal |
CVE-2022-25696 | High | High | Display | 03/02/2022 |
This table lists moderate security vulnerabilities. OEMs have been notified and encouraged to patch these issues.
Public ID | Security Rating | CVSS Rating | Technology Area | Date Reported |
---|---|---|---|---|
CVE-2022-25653 | Medium | Medium | Video | 07/14/2021 |
CVE-2022-22105
CVE ID | CVE-2022-22105 |
Title | Integer Overflow or Wraparound in Automotive Connectivity |
Description | Memory corruption in bluetooth due to integer overflow while processing HFP-UNIT profile |
Technology Area | Automotive Connectivity |
Vulnerability Type | CWE-190 Integer Overflow or Wraparound |
Access Vector | Remote |
Security Rating | Critical |
CVSS Rating | Critical |
CVSS Score | 9.4 |
CVSS String | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L |
Date Reported | Internal |
Customer Notified Date | 2022/04/04 |
Affected Chipsets* | APQ8009, APQ8017, APQ8053, APQ8096AU, AR8031, CSRA6620, CSRA6640, CSRB31024, MDM9150, MDM9250, MDM9607, MDM9626, MDM9628, MDM9640, MDM9650, QCA4020, QCA6174A, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584, QCA6595, QCA6595AU, QCA6696, QCA9367, QCA9377, QCA9379, QCS405, SA415M, SA515M, SA6155, SA6155P, SA8155, SA8155P, SA8195P, SDX20, SDX55, WCD9326, WCD9335, WCD9360, WCN3610, WCN3615, WCN3660B, WCN3680B, WCN3980, WCN3998, WCN3999, WSA8810, WSA8815 |
CVE-2022-25652
CVE ID | CVE-2022-25652 |
Title | Cryptographic Issues in BSP |
Description | Cryptographic issues in BSP due to improper hash verification |
Technology Area | WIN CoreBSP |
Vulnerability Type | CWE-287 Improper Authentication |
Access Vector | Local |
Security Rating | Critical |
CVSS Rating | Critical |
CVSS Score | 9.0 |
CVSS String | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N |
Date Reported | Internal |
Customer Notified Date | 2022/03/07 |
Affected Chipsets* | CSR8811, IPQ5010, IPQ5018, IPQ5028, IPQ6000, IPQ6005, IPQ6010, IPQ6018, IPQ6028, IPQ8070, IPQ8070A, IPQ8071, IPQ8071A, IPQ8072, IPQ8072A, IPQ8074, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078, IPQ8078A, IPQ8173, IPQ8174, PMP8074, QCA4024, QCA6428, QCA6438, QCA8072, QCA8075, QCA8081, QCA9888, QCA9889, QCN5021, QCN5022, QCN5024, QCN5052, QCN5054, QCN5064, QCN5121, QCN5122, QCN5124, QCN5152, QCN5154, QCN5164, QCN5550, QCN6023, QCN6024, QCN6100, QCN6102, QCN6112, QCN6122, QCN6132, QCN9000, QCN9012, QCN9022, QCN9024, QCN9070, QCN9072, QCN9074, QCN9100 |
CVE-2022-25708
CVE ID | CVE-2022-25708 |
Title | Buffer Copy Without Checking Size of Input in WLAN |
Description | Memory corruption in WLAN due to buffer copy without checking size of input while parsing keys |
Technology Area | WLAN Firmware |
Vulnerability Type | CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') |
Access Vector | Remote |
Security Rating | Critical |
CVSS Rating | Critical |
CVSS Score | 9.8 |
CVSS String | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Date Reported | Internal |
Customer Notified Date | 2022/06/06 |
Affected Chipsets* | SD 8 Gen1 5G, SD888 5G, SM7450, WCD9370, WCD9375, WCD9380, WCD9385, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WCN7850, WCN7851, WSA8830, WSA8832, WSA8835 |
CVE-2022-22066
CVE ID | CVE-2022-22066 |
Title | Buffer Over-read in content Protection |
Description | Memory corruption occurs while processing command received from HLOS due to improper length check |
Technology Area | Content Protection |
Vulnerability Type | CWE-126 Buffer Over-read |
Access Vector | Local |
Security Rating | High |
CVSS Rating | High |
CVSS Score | 8.4 |
CVSS String | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Date Reported | Internal |
Customer Notified Date | 2022/03/07 |
Affected Chipsets* | AQT1000, AR8031, AR8035, CSRA6620, CSRA6640, CSRB31024, MDM9150, QCA6174A, QCA6175A, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6595, QCA6595AU, QCA6696, QCA8081, QCA8337, QCA9377, QCM2290, QCM4290, QCM6125, QCM6490, QCS2290, QCS405, QCS410, QCS4290, QCS610, QCS6125, QCS6490, QRB5165, QRB5165M, QRB5165N, QSM8350, SA415M, SA515M, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SA8195P, SC8180X+SDX55, SD 675, SD 8 Gen1 5G, SD 8cx Gen2, SD 8cx Gen3, SD460, SD480, SD662, SD665, SD675, SD678, SD680, SD690 5G, SD695, SD710, SD720G, SD730, SD750G, SD765, SD765G, SD768G, SD778G, SD780G, SD7c, SD855, SD865 5G, SD870, SD888, SD888 5G, SDX24, SDX50M, SDX55, SDX55M, SDX65, SDXR2 5G, SM4125, SM6250, SM6250P, SM7250P, SM7315, SM7325P, SM7450, SM8475, SM8475P, SW5100, SW5100P, WCD9326, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN3999, WCN6740, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WCN7850, WCN7851, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835 |
CVE-2022-22074
CVE ID | CVE-2022-22074 |
Title | Integer Overflow to Buffer Overflow in Audio |
Description | Memory Corruption during wma file playback due to integer overflow |
Technology Area | Audio |
Vulnerability Type | CWE-680 Integer Overflow to Buffer Overflow |
Access Vector | Local |
Security Rating | High |
CVSS Rating | High |
CVSS Score | 8.4 |
CVSS String | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Date Reported | Internal |
Customer Notified Date | 2022/06/06 |
Affected Chipsets* | APQ8009, APQ8009W, APQ8017, APQ8053, APQ8096AU, AQT1000, AR8031, AR8035, CSRA6620, CSRA6640, CSRB31024, MDM9150, MDM9206, MDM9250, MDM9607, MDM9626, MDM9628, MDM9640, MDM9650, MSM8909W, MSM8917, MSM8937, MSM8953, MSM8996AU, PM8937, QCA4020, QCA6174A, QCA6310, QCA6320, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584, QCA6595AU, QCA6696, QCA8081, QCA8337, QCA9367, QCA9377, QCA9379, QCM2290, QCM4290, QCM6125, QCS2290, QCS405, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QRB5165, QRB5165M, QRB5165N, Qualcomm215, SA415M, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SA8195P, SD 636, SD 675, SD 8 Gen1 5G, SD 8cx Gen2, SD429, SD439, SD450, SD460, SD480, SD632, SD660, SD662, SD665, SD675, SD678, SD680, SD690 5G, SD730, SD750G, SD765, SD765G, SD768G, SD780G, SD835, SD855, SD865 5G, SD870, SD888 5G, SDM429W, SDM630, SDW2500, SDX20, SDX24, SDX55, SDX55M, SDX65, SDXR1, SDXR2 5G, SM7250P, SM7450, SM8475, SM8475P, SW5100, SW5100P, WCD9326, WCD9330, WCD9335, WCD9340, WCD9341, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3610, WCN3615, WCN3620, WCN3660, WCN3660B, WCN3680, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN3999, WCN6740, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WCN7850, WCN7851, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835 |
CVE-2022-22081
CVE ID | CVE-2022-22081 |
Title | Buffer Over-read in Audio |
Description | Memory corruption in audio module due to integer overflow |
Technology Area | Audio |
Vulnerability Type | CWE-126 Buffer Over-read |
Access Vector | Local |
Security Rating | High |
CVSS Rating | High |
CVSS Score | 8.4 |
CVSS String | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Date Reported | Internal |
Customer Notified Date | 2022/06/06 |
Affected Chipsets* | AR8035, QCA6595AU, QCA8081, QCA8337, SA6155P, SA8155P, SA8195P, SD 8 Gen1 5G, SD888 5G, SDX65, SM7450, SM8475, SM8475P, SW5100, SW5100P, WCD9370, WCD9375, WCD9380, WCD9385, WCN3980, WCN3988, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WCN7851, WSA8830, WSA8832, WSA8835 |
CVE-2022-22089
CVE ID | CVE-2022-22089 |
Title | Integer Overflow or Wraparound in Audio |
Description | Memory corruption in audio while playing record due to improper list handling in two threads |
Technology Area | Audio |
Vulnerability Type | CWE-190 Integer Overflow or Wraparound |
Access Vector | Local |
Security Rating | High |
CVSS Rating | High |
CVSS Score | 8.4 |
CVSS String | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Date Reported | Internal |
Customer Notified Date | 2022/06/06 |
Affected Chipsets* | AR8035, QCA8081, QCA8337, SD 8 Gen1 5G, SDX65, SM7450, SM8475, SM8475P, SW5100, SW5100P, WCD9370, WCD9375, WCD9380, WCD9385, WCN3980, WCN3988, WCN6750, WCN6855, WCN6856, WCN7851, WSA8830, WSA8832, WSA8835 |
CVE-2022-22091
CVE ID | CVE-2022-22091 |
Title | Improper Authorization in LTE |
Description | Improper authorization of a replayed LTE security mode command can lead to a denial of service |
Technology Area | LTE |
Vulnerability Type | CWE-285 Improper Authorization |
Access Vector | Remote |
Security Rating | High |
CVSS Rating | High |
CVSS Score | 7.5 |
CVSS String | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Date Reported | 2021/06/15 |
Customer Notified Date | 2022/03/07 |
Affected Chipsets* | APQ8017, APQ8053, AQT1000, AR8035, CSRB31024, MSM8917, MSM8920, MSM8940, MSM8953, QCA6174A, QCA6310, QCA6335, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564AU, QCA6574A, QCA6574AU, QCA6595AU, QCA6696, QCA8081, QCA8337, QCA9377, QCM2290, QCM4290, QCM6125, QCS2290, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, Qualcomm215, SA415M, SA515M, SC8180X+SDX55, SD 636, SD 675, SD 8 Gen1 5G, SD 8cx Gen2, SD429, SD439, SD450, SD460, SD480, SD632, SD660, SD662, SD665, SD670, SD675, SD678, SD680, SD690 5G, SD695, SD710, SD712, SD720G, SD730, SD750G, SD765, SD765G, SD768G, SD778G, SD780G, SD7c, SD845, SD850, SD855, SD865 5G, SD870, SD888, SD888 5G, SDM630, SDX20, SDX24, SDX55, SDX55M, SDX65, SDXR1, SDXR2 5G, SM4125, SM6250, SM6250P, SM7250P, SM7315, SM7450, SM8475, SM8475P, SW5100, SW5100P, WCD9326, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3615, WCN3660, WCN3660B, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN6740, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WCN7851, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835 |
CVE-2022-22092
CVE ID | CVE-2022-22092 |
Title | Use After Free in Kernel |
Description | Memory corruption in kernel due to use after free issue |
Technology Area | KERNEL |
Vulnerability Type | CWE-416 Use After Free |
Access Vector | Local |
Security Rating | High |
CVSS Rating | High |
CVSS Score | 7.8 |
CVSS String | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Date Reported | 2021/11/16 |
Customer Notified Date | 2022/03/07 |
Affected Chipsets* | AR8035, QCA6390, QCA6391, QCA6421, QCA6426, QCA6431, QCA6436, QCA8081, QCA8337, QCM6490, QCS6490, QRB5165, QRB5165M, QRB5165N, QSM8350, SD 8 Gen1 5G, SD765, SD765G, SD768G, SD778G, SD780G, SD865 5G, SD870, SD888, SD888 5G, SDX55M, SDX65, SDXR2 5G, SM7250P, SM7315, SM7325P, SM7450, SM8475, SM8475P, WCD9370, WCD9375, WCD9380, WCD9385, WCN3991, WCN3998, WCN6740, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WCN7850, WCN7851, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835 |
CVE-2022-22093
CVE ID | CVE-2022-22093 |
Title | Time-of-check Time-of-use (TOCTOU) Race Condition in Kernel |
Description | Memory corruption or temporary denial of service due to improper handling of concurrent hypervisor operations to attach or detach IRQs from virtual interrupt sources |
Technology Area | KERNEL |
Vulnerability Type | CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition |
Access Vector | Local |
Security Rating | High |
CVSS Rating | High |
CVSS Score | 7.8 |
CVSS String | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Date Reported | 2021/11/17 |
Customer Notified Date | 2022/03/07 |
Affected Chipsets* | AQT1000, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCM6490, QCS6490, QRB5165, QRB5165M, QRB5165N, QSM8350, SD 8 Gen1 5G, SD 8CX, SD 8cx Gen2, SD765, SD765G, SD768G, SD778G, SD780G, SD865 5G, SD870, SD888, SD888 5G, SDX55M, SDXR2 5G, SM7250P, SM7315, SM7325P, SM7450, SM8475, SM8475P, WCD9340, WCD9341, WCD9370, WCD9375, WCD9380, WCD9385, WCN3991, WCN3998, WCN6740, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WCN7850, WCN7851, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835 |
CVE-2022-22094
CVE ID | CVE-2022-22094 |
Title | Time-of-check Time-of-use (TOCTOU) Race Condition in Kernel |
Description | memory corruption in Kernel due to race condition while getting mapping reference |
Technology Area | KERNEL |
Vulnerability Type | CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition |
Access Vector | Local |
Security Rating | High |
CVSS Rating | High |
CVSS Score | 7.8 |
CVSS String | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Date Reported | 2021/11/23 |
Customer Notified Date | 2022/03/07 |
Affected Chipsets* | AQT1000, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCM6490, QCS6490, QRB5165, QRB5165M, QRB5165N, QSM8350, SD 8 Gen1 5G, SD 8CX, SD 8cx Gen2, SD765, SD765G, SD768G, SD778G, SD780G, SD865 5G, SD870, SD888, SD888 5G, SDX55M, SDXR2 5G, SM7250P, SM7315, SM7325P, SM7450, SM8475, SM8475P, WCD9340, WCD9341, WCD9370, WCD9375, WCD9380, WCD9385, WCN3991, WCN3998, WCN6740, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WCN7850, WCN7851, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835 |
CVE-2022-25669
CVE ID | CVE-2022-25669 |
Title | Buffer Over-read in Video |
Description | Denial of service in video due to buffer over read while parsing MP4 clip |
Technology Area | Video |
Vulnerability Type | CWE-126 Buffer Over-read |
Access Vector | Remote |
Security Rating | High |
CVSS Rating | High |
CVSS Score | 7.5 |
CVSS String | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Date Reported | Internal |
Customer Notified Date | 2022/06/06 |
Affected Chipsets* | APQ8009, APQ8009W, APQ8053, APQ8096AU, AQT1000, AR8031, CSRA6620, CSRA6640, MDM9206, MDM9250, MDM9607, MDM9626, MDM9628, MDM9650, MSM8909W, MSM8953, MSM8996AU, QCA4020, QCA6174A, QCA6310, QCA6320, QCA6335, QCA6390, QCA6391, QCA6420, QCA6426, QCA6430, QCA6436, QCA6564, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6595AU, QCA6696, QCA9367, QCA9377, QCA9379, QCM4290, QCM6490, QCS405, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6490, Qualcomm215, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SA8195P, SD 636, SD 675, SD 8 Gen1 5G, SD429, SD439, SD460, SD480, SD660, SD662, SD670, SD675, SD678, SD680, SD690 5G, SD710, SD720G, SD730, SD750G, SD765, SD765G, SD768G, SD778G, SD780G, SD835, SD845, SD855, SD865 5G, SD870, SD888, SD888 5G, SDM429W, SDW2500, SDX20, SDX50M, SDX55, SDX55M, SDXR1, SDXR2 5G, SM4125, SM6250, SM6250P, SM7250P, SM7315, SM7325P, SM7450, SM8475, SM8475P, SW5100, SW5100P, WCD9326, WCD9330, WCD9335, WCD9340, WCD9341, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3610, WCN3615, WCN3620, WCN3660B, WCN3680, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN3999, WCN6740, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WCN7850, WCN7851, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835 |
CVE-2022-25686
CVE ID | CVE-2022-25686 |
Title | Buffer Copy Without Checking Size of Input in Video |
Description | Memory corruption in video module due to buffer overflow while processing WAV file |
Technology Area | Video |
Vulnerability Type | CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') |
Access Vector | Remote |
Security Rating | High |
CVSS Rating | High |
CVSS Score | 7.3 |
CVSS String | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
Date Reported | 2021/07/15 |
Customer Notified Date | 2022/06/06 |
Affected Chipsets* | APQ8017, APQ8053, AQT1000, MSM8917, MSM8953, QCA6390, QCA6391, QCA6420, QCA6426, QCA6430, QCA6436, QCA6574, QCA6574A, QCA6574AU, QCA6595AU, QCA6696, QCM2290, QCM4290, QCM6490, QCS2290, QCS4290, QCS6490, Qualcomm215, SA6155, SA6155P, SA8155, SA8155P, SA8195P, SD 636, SD 675, SD 8 Gen1 5G, SD429, SD439, SD460, SD480, SD632, SD660, SD662, SD665, SD670, SD675, SD678, SD680, SD690 5G, SD695, SD710, SD720G, SD730, SD750G, SD765, SD765G, SD768G, SD778G, SD780G, SD835, SD855, SD865 5G, SD870, SD888, SD888 5G, SDM630, SDX50M, SDX55, SDX55M, SDXR2 5G, SM4125, SM6250, SM7250P, SM7315, SM7325P, SM7450, SM8475, SM8475P, SW5100, SW5100P, WCD9326, WCD9335, WCD9340, WCD9341, WCD9370, WCD9375, WCD9380, WCD9385, WCN3615, WCN3660B, WCN3680, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN6740, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WCN7850, WCN7851, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835 |
CVE-2022-25688
CVE ID | CVE-2022-25688 |
Title | Buffer Copy Without Checking Size of Input in Video |
Description | Memory corruption in video due to buffer overflow while parsing ps video clips |
Technology Area | Video |
Vulnerability Type | CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') |
Access Vector | Remote |
Security Rating | High |
CVSS Rating | High |
CVSS Score | 7.3 |
CVSS String | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
Date Reported | 2021/07/26 |
Customer Notified Date | 2022/06/06 |
Affected Chipsets* | APQ8009, APQ8009W, APQ8017, APQ8053, APQ8096AU, AQT1000, AR8031, CSRA6620, CSRA6640, MDM9206, MDM9250, MDM9607, MDM9626, MDM9628, MDM9650, MSM8909W, MSM8917, MSM8953, MSM8996AU, QCA4020, QCA6174A, QCA6310, QCA6320, QCA6335, QCA6390, QCA6391, QCA6420, QCA6426, QCA6430, QCA6436, QCA6564, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6595AU, QCA6696, QCA9367, QCA9377, QCA9379, QCM2290, QCM4290, QCM6490, QCS2290, QCS405, QCS410, QCS4290, QCS605, QCS610, QCS6490, Qualcomm215, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SA8195P, SD 636, SD 675, SD 8 Gen1 5G, SD429, SD439, SD450, SD460, SD480, SD632, SD660, SD662, SD665, SD670, SD675, SD678, SD680, SD690 5G, SD695, SD710, SD720G, SD730, SD750G, SD765, SD765G, SD768G, SD778G, SD780G, SD835, SD845, SD855, SD865 5G, SD870, SD888, SD888 5G, SDM429W, SDM630, SDW2500, SDX20, SDX50M, SDX55, SDX55M, SDXR1, SDXR2 5G, SM4125, SM6250, SM6250P, SM7250P, SM7315, SM7325P, SM7450, SM8475, SM8475P, SW5100, SW5100P, WCD9326, WCD9330, WCD9335, WCD9340, WCD9341, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3610, WCN3615, WCN3620, WCN3660, WCN3660B, WCN3680, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN3999, WCN6740, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WCN7850, WCN7851, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835 |
CVE-2022-25690
CVE ID | CVE-2022-25690 |
Title | Improper Validation of Array Index in WLAN |
Description | Information disclosure in WLAN due to improper validation of array index while parsing crafted ANQP action frames |
Technology Area | WLAN Firmware |
Vulnerability Type | CWE-129 Improper Validation of Array Index |
Access Vector | Remote |
Security Rating | High |
CVSS Rating | High |
CVSS Score | 7.5 |
CVSS String | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
Date Reported | Internal |
Customer Notified Date | 2022/06/06 |
Affected Chipsets* | APQ8096AU, AQT1000, AR8031, AR8035, CSRA6620, CSRA6640, CSRB31024, MDM9250, MDM9607, MDM9626, MDM9628, MDM9640, MDM9650, MSM8996AU, QCA1062, QCA1064, QCA6174A, QCA6175A, QCA6310, QCA6320, QCA6335, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6595, QCA6595AU, QCA6694, QCA6696, QCA8081, QCA8337, QCA9379, QCM2290, QCM4290, QCM6125, QCM6490, QCN7605, QCN7606, QCS2290, QCS405, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QCS6490, QRB5165, QRB5165M, QRB5165N, QSM8350, SA415M, SA515M, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SA8195P, SC8180X+SDX55, SD 636, SD 675, SD 8 Gen1 5G, SD 8CX, SD 8cx Gen2, SD 8cx Gen3, SD460, SD480, SD660, SD662, SD665, SD670, SD675, SD678, SD680, SD690 5G, SD695, SD710, SD712, SD720G, SD730, SD750G, SD765, SD765G, SD768G, SD778G, SD780G, SD7c, SD820, SD835, SD845, SD850, SD855, SD865 5G, SD870, SD888, SD888 5G, SDM630, SDX50M, SDX55, SDX55M, SDX65, SDXR1, SDXR2 5G, SM4125, SM6250, SM6250P, SM7250P, SM7315, SM7325P, SM7450, WCD9326, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN3999, WCN6740, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WCN7850, WCN7851, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835 |
CVE-2022-25696
CVE ID | CVE-2022-25696 |
Title | Time-of-check Time-of-use Race Condition in Display |
Description | Memory corruption in display due to time-of-check time-of-use race condition during map or unmap |
Technology Area | Display |
Vulnerability Type | CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition |
Access Vector | Local |
Security Rating | High |
CVSS Rating | High |
CVSS Score | 8.4 |
CVSS String | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Date Reported | 2022/03/02 |
Customer Notified Date | 2022/06/06 |
Affected Chipsets* | APQ8053, AQT1000, MSM8953, QCA6390, QCA6391, QCA6420, QCA6430, QCA6574, QCA6574A, QCA6574AU, QCA6595AU, QCA6696, QCM2290, QCM4290, QCM6490, QCS2290, QCS4290, QCS6490, Qualcomm215, SA6155P, SA8155P, SA8195P, SD 675, SD 8 Gen1 5G, SD439, SD460, SD480, SD662, SD665, SD670, SD675, SD678, SD680, SD690 5G, SD695, SD710, SD720G, SD730, SD750G, SD765, SD765G, SD768G, SD778G, SD780G, SD855, SD865 5G, SD870, SD888, SD888 5G, SDX50M, SDX55, SDX55M, SM4125, SM6250, SM7250P, SM7315, SM7325P, SM7450, SM8475, SM8475P, SW5100, SW5100P, WCD9326, WCD9335, WCD9341, WCD9370, WCD9375, WCD9380, WCD9385, WCN3615, WCN3660B, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN6740, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WCN7850, WCN7851, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835 |
CVE-2022-25653
CVE ID | CVE-2022-25653 |
Title | Buffer Over-read in Video |
Description | Information disclosure in video due to buffer over-read while processing avi file |
Technology Area | Video |
Vulnerability Type | CWE-126 Buffer Over-read |
Access Vector | Local |
Security Rating | Medium |
CVSS Rating | Medium |
CVSS Score | 6.8 |
CVSS String | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L |
Date Reported | 2021/07/14 |
Customer Notified Date | 2022/03/07 |
Affected Chipsets* | APQ8053, AQT1000, MSM8953, QCA6390, QCA6391, QCA6420, QCA6426, QCA6430, QCA6436, QCM4290, QCM6490, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6490, Qualcomm215, SD 675, SD 8 Gen1 5G, SD429, SD460, SD480, SD662, SD665, SD675, SD678, SD680, SD690 5G, SD695, SD720G, SD730, SD750G, SD765, SD765G, SD768G, SD778G, SD780G, SD855, SD865 5G, SD870, SD888, SD888 5G, SDM429W, SDX50M, SDX55, SDX55M, SDXR2 5G, SM4125, SM6250, SM7250P, SM7315, SM7325P, SM7450, SM8475, SM8475P, SW5100, SW5100P, WCD9326, WCD9335, WCD9341, WCD9370, WCD9375, WCD9380, WCD9385, WCN3615, WCN3620, WCN3660B, WCN3680, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN6740, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WCN7850, WCN7851, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835 |
*The list of affected chipsets may not be complete. For latest information, device OEMs can contact QTI directly at www.qualcomm.com/support.
Open Source Software Issues
The tables below summarize security vulnerabilities that were addressed through open source software
This table lists high impact security vulnerabilities. Patches have been released for affected products. OEMs have been notified and strongly recommended to release patches on end devices.
Public ID | Security Rating | CVSS Rating | Technology Area | Date Reported |
---|---|---|---|---|
CVE-2022-22095 | High | High | Multimedia Frameworks | 11/29/2021 |
CVE-2022-25656 | High | High | Kernel | Internal |
CVE-2022-25670 | High | High | WLAN HOST | Internal |
CVE-2022-25693 | High | High | Graphics | Internal |
CVE-2022-25706 | High | High | Bluetooth HOST | 03/17/2022 |
This table lists moderate security vulnerabilities. OEMs have been notified and encouraged to patch these issues.
Public ID | Security Rating | CVSS Rating | Technology Area | Date Reported |
---|---|---|---|---|
CVE-2022-25654 | Medium | Medium | Kernel | 11/02/2021 |
CVE-2022-22095
CVE ID | CVE-2022-22095 |
Title | Use After Free in Synx Driver |
Description | Memory corruption in synx driver due to use-after-free condition in the synx driver due to accessing object handles without acquiring lock |
Technology Area | Multimedia Frameworks |
Vulnerability Type | CWE-416 Use After Free |
Access Vector | Local |
Security Rating | High |
CVSS Rating | High |
CVSS Score | 8.4 |
CVSS String | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Date Reported | 2021/11/29 |
Customer Notified Date | 2022/03/07 |
Affected Chipsets* | APQ8053, MSM8953, QCA6390, QCA6391, QCA6426, QCA6436, QCM2290, QCM4290, QCS2290, QCS4290, QRB5165, QRB5165M, QRB5165N, SD439, SD460, SD662, SD680, SD690 5G, SD750G, SD765, SD765G, SD768G, SD855, SD865 5G, SD870, SDX55, SDX55M, SDXR2 5G, SM4125, SM7250P, WCD9326, WCD9341, WCD9370, WCD9375, WCD9380, WCD9385, WCN3615, WCN3680B, WCN3910, WCN3950, WCN3988, WCN3991, WCN3998, WCN6850, WCN6851, WSA8810, WSA8815, WSA8830, WSA8835 |
Patch** |
CVE-2022-25656
CVE ID | CVE-2022-25656 |
Title | Integer Overflow or Wraparound in Kernel |
Description | Possible integer overflow and memory corruption due to improper validation of buffer size sent to write to console when computing the payload size |
Technology Area | Kernel |
Vulnerability Type | CWE-190 Integer Overflow or Wraparound |
Access Vector | Local |
Security Rating | High |
CVSS Rating | High |
CVSS Score | 8.4 |
CVSS String | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Date Reported | Internal |
Customer Notified Date | 2022/07/04 |
Affected Chipsets* | AR8035, QCA6174A, QCA6390, QCA6391, QCA6426, QCA6436, QCA6574, QCA6574A, QCA6574AU, QCA6595AU, QCA6696, QCA8081, QCA8337, QCA9377, QCM6490, QCS6490, SA6155P, SA8155P, SA8195P, SD 8 Gen1 5G, SD460, SD480, SD695, SD778G, SD780G, SD865 5G, SD870, SD888, SD888 5G, SDX12, SDX55M, SDX65, SDXR2 5G, SM7315, SM7325P, SM7450, SM8475, SM8475P, SW5100, SW5100P, WCD9326, WCD9335, WCD9341, WCD9370, WCD9375, WCD9380, WCD9385, WCN3950, WCN3980, WCN3988, WCN3991, WCN3998, WCN6740, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WCN7850, WCN7851, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835 |
Patch** |
|
CVE-2022-25670
CVE ID | CVE-2022-25670 |
Title | Buffer Over-read in WLAN HOST |
Description | Denial of service in WLAN HOST due to buffer over read while unpacking frames |
Technology Area | WLAN HOST |
Vulnerability Type | CWE-126 Buffer Over-read |
Access Vector | Remote |
Security Rating | High |
CVSS Rating | High |
CVSS Score | 7.5 |
CVSS String | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Date Reported | Internal |
Customer Notified Date | 2022/06/06 |
Affected Chipsets* | APQ8009, APQ8009W, APQ8017, APQ8053, APQ8096AU, AQT1000, AR8031, AR8035, CSRA6620, CSRA6640, MDM9607, MDM9626, MDM9628, MDM9640, MDM9650, MSM8909W, MSM8917, MSM8937, MSM8953, PM8937, QCA4020, QCA6174A, QCA6175A, QCA6390, QCA6391, QCA6420, QCA6426, QCA6430, QCA6436, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584, QCA6595AU, QCA6696, QCA8081, QCA8337, QCA9367, QCA9377, QCA9379, QCM2290, QCM4290, QCS2290, QCS405, QCS4290, QCS605, QRB5165, QRB5165M, QRB5165N, Qualcomm215, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SA8195P, SD 675, SD 8 Gen1 5G, SD429, SD439, SD450, SD460, SD632, SD662, SD675, SD678, SD690 5G, SD720G, SD730, SD750G, SD765, SD765G, SD768G, SD855, SD865 5G, SD870, SD888 5G, SDW2500, SDX12, SDX20, SDX55, SDX55M, SDX65, SDXR2 5G, SM4125, SM6250, SM6250P, SM7250P, SM7450, SM8475, SM8475P, WCD9326, WCD9335, WCD9341, WCD9370, WCD9375, WCD9380, WCD9385, WCN3610, WCN3615, WCN3620, WCN3660, WCN3660B, WCN3680, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN3999, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WCN7851, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835 |
Patch** |
CVE-2022-25693
CVE ID | CVE-2022-25693 |
Title | Use After Free in Graphics |
Description | Memory corruption in graphics due to use-after-free while graphics profiling |
Technology Area | Graphics |
Vulnerability Type | CWE-416 Use After Free |
Access Vector | Local |
Security Rating | High |
CVSS Rating | High |
CVSS Score | 8.4 |
CVSS String | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Date Reported | Internal |
Customer Notified Date | 2022/06/06 |
Affected Chipsets* | SD 8 Gen1 5G, SM7450, SM8475, SM8475P, WCD9370, WCD9375, WCD9380, WCD9385, WCN6750, WCN6855, WCN6856, WCN7851, WSA8830, WSA8832, WSA8835 |
Patch** |
CVE-2022-25706
CVE ID | CVE-2022-25706 |
Title | Buffer Over-read in Bluetooth |
Description | Information disclosure in Bluetooth driver due to buffer over-read while reading l2cap length |
Technology Area | Bluetooth HOST |
Vulnerability Type | CWE-126 Buffer Over-read |
Access Vector | Remote |
Security Rating | High |
CVSS Rating | High |
CVSS Score | 8.2 |
CVSS String | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L |
Date Reported | 2022/03/17 |
Customer Notified Date | 2022/06/06 |
Affected Chipsets* | APQ8009W, APQ8017, APQ8053, APQ8096AU, AQT1000, MSM8909W, MSM8917, MSM8953, MSM8996AU, QCA6310, QCA6320, QCA6335, QCA6390, QCA6391, QCA6420, QCA6426, QCA6430, QCA6436, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6595AU, QCA6696, QCM2290, QCM4290, QCM6490, QCS2290, QCS4290, QCS603, QCS605, QCS610, QCS6490, Qualcomm215, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SA8195P, SD 636, SD 675, SD 8 Gen1 5G, SD429, SD439, SD450, SD460, SD480, SD632, SD660, SD662, SD665, SD670, SD675, SD678, SD680, SD690 5G, SD695, SD710, SD720G, SD730, SD750G, SD765, SD765G, SD768G, SD778G, SD780G, SD835, SD845, SD855, SD865 5G, SD870, SD888, SD888 5G, SDM429W, SDM630, SDW2500, SDX50M, SDX55, SDX55M, SDXR1, SDXR2 5G, SM4125, SM6250, SM6250P, SM7250P, SM7315, SM7325P, SM7450, SM8475, SM8475P, SW5100, SW5100P, WCD9326, WCD9335, WCD9340, WCD9341, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3615, WCN3620, WCN3660, WCN3660B, WCN3680, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN6740, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WCN7850, WCN7851, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835 |
Patch** |
CVE-2022-25654
CVE ID | CVE-2022-25654 |
Title | Improper Input Validation in Kernel |
Description | Memory corruption in kernel due to improper input validation while processing ION commands |
Technology Area | Kernel |
Vulnerability Type | CWE-20 Improper Input Validation |
Access Vector | Local |
Security Rating | Medium |
CVSS Rating | Medium |
CVSS Score | 6.7 |
CVSS String | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
Date Reported | 2021/11/02 |
Customer Notified Date | 2022/03/07 |
Affected Chipsets* | APQ8096AU, MDM9650, QCA6174A, QCA6574AU, QCS603, QCS605, Qualcomm215, SD429, SD820, SDM429W, WCD9326, WCD9335, WCD9341, WCN3615, WCN3620, WCN3660B, WCN3680, WCN3980, WCN3990, WSA8810, WSA8815 |
Patch** |
* The list of affected chipsets may not be complete. For latest information, device OEMs can contact QTI directly at www.qualcomm.com/support.
** Data is generated only at the time of bulletin creation
Industry Coordination
Security ratings of issues included in Android security bulletins and these bulletins match in the most common scenarios but may differ in some cases due to one of the following reasons:
- Consideration of security protections such as SELinux not enforced on some platforms
- Differences in assessment of some specific scenarios that involves local denial of service or privilege escalation vulnerabilities in the high level OS kernel
All Qualcomm products mentioned herein are products of Qualcomm Technologies, Inc. and/or its subsidiaries.
Qualcomm is a trademark of Qualcomm Incorporated, registered in the United States and other countries. Other product and brand names may be trademarks or registered trademarks of their respective owners.
This technical data may be subject to U.S. and international export, re-export, or transfer (“export”) laws. Diversion contrary to U.S. and international law is strictly prohibited.
Qualcomm Technologies, Inc.
San Diego, CA 92121
U.S.A.
© 2022 Qualcomm Technologies, Inc. and/or its subsidiaries. All rights reserved.
- September 2022 Security Bulletin
- Table of Contents
- Announcements
- Acknowledgements
- Proprietary Software Issues
- CVE-2022-22105
- CVE-2022-25652
- CVE-2022-25708
- CVE-2022-22066
- CVE-2022-22074
- CVE-2022-22081
- CVE-2022-22089
- CVE-2022-22091
- CVE-2022-22092
- CVE-2022-22093
- CVE-2022-22094
- CVE-2022-25669
- CVE-2022-25686
- CVE-2022-25688
- CVE-2022-25690
- CVE-2022-25696
- CVE-2022-25653
- Open Source Software Issues
- CVE-2022-22095
- CVE-2022-25656
- CVE-2022-25670
- CVE-2022-25693
- CVE-2022-25706
- CVE-2022-25654
- Industry Coordination