Lucene search

K
cve[email protected]CVE-2022-22072
HistoryJun 14, 2022 - 10:15 a.m.

CVE-2022-22072

2022-06-1410:15:19
CWE-1284
web.nvd.nist.gov
105
5
cve-2022-22072
buffer overflow
snapdragon
auto
compute
consumer electronics
consumer iot
industrial iot
mobile
voice
music
ndp
validation

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.7%

Buffer overflow can occur due to improper validation of NDP application information length in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music

Affected configurations

NVD
Node
qualcommapq8009_firmwareMatch-
AND
qualcommapq8009Match-
Node
qualcommapq8017_firmwareMatch-
AND
qualcommapq8017Match-
Node
qualcommapq8053_firmwareMatch-
AND
qualcommapq8053Match-
Node
qualcommapq8096au_firmwareMatch-
AND
qualcommapq8096auMatch-
Node
qualcommar8031_firmwareMatch-
AND
qualcommar8031Match-
Node
qualcommcsra6620_firmwareMatch-
AND
qualcommcsra6620Match-
Node
qualcommcsra6640_firmwareMatch-
AND
qualcommcsra6640Match-
Node
qualcommmdm9150_firmwareMatch-
AND
qualcommmdm9150Match-
Node
qualcommmdm9206_firmwareMatch-
AND
qualcommmdm9206Match-
Node
qualcommmdm9250_firmwareMatch-
AND
qualcommmdm9250Match-
Node
qualcommmdm9607_firmwareMatch-
AND
qualcommmdm9607Match-
Node
qualcommmdm9626_firmwareMatch-
AND
qualcommmdm9626Match-
Node
qualcommmdm9628_firmwareMatch-
AND
qualcommmdm9628Match-
Node
qualcommmdm9650_firmwareMatch-
AND
qualcommmdm9650Match-
Node
qualcommmsm8937_firmwareMatch-
AND
qualcommmsm8937Match-
Node
qualcommpm8937_firmwareMatch-
AND
qualcommpm8937Match-
Node
qualcommqca4020_firmwareMatch-
AND
qualcommqca4020Match-
Node
qualcommqca6174a_firmwareMatch-
AND
qualcommqca6174aMatch-
Node
qualcommqca6175a_firmwareMatch-
AND
qualcommqca6175aMatch-
Node
qualcommqca6310_firmwareMatch-
AND
qualcommqca6310Match-
Node
qualcommqca6320_firmwareMatch-
AND
qualcommqca6320Match-
Node
qualcommqca6335_firmwareMatch-
AND
qualcommqca6335Match-
Node
qualcommqca6564a_firmwareMatch-
AND
qualcommqca6564aMatch-
Node
qualcommqca6564au_firmwareMatch-
AND
qualcommqca6564auMatch-
Node
qualcommqca6574_firmwareMatch-
AND
qualcommqca6574Match-
Node
qualcommqca6574a_firmwareMatch-
AND
qualcommqca6574aMatch-
Node
qualcommqca6574au_firmwareMatch-
AND
qualcommqca6574auMatch-
Node
qualcommqca9367_firmwareMatch-
AND
qualcommqca9367Match-
Node
qualcommqca9377_firmwareMatch-
AND
qualcommqca9377Match-
Node
qualcommqca9379_firmwareMatch-
AND
qualcommqca9379Match-
Node
qualcommqcs405_firmwareMatch-
AND
qualcommqcs405Match-
Node
qualcommqcs603_firmwareMatch-
AND
qualcommqcs603Match-
Node
qualcommqcs605_firmwareMatch-
AND
qualcommqcs605Match-
Node
qualcommsa515m_firmwareMatch-
AND
qualcommsa515mMatch-
Node
qualcommsd670_firmwareMatch-
AND
qualcommsd670Match-
Node
qualcommsd710_firmwareMatch-
AND
qualcommsd710Match-
Node
qualcommsd820_firmwareMatch-
AND
qualcommsd820Match-
Node
qualcommsd835_firmwareMatch-
AND
qualcommsd835Match-
Node
qualcommsd845_firmwareMatch-
AND
qualcommsd845Match-
Node
qualcommsdx12_firmwareMatch-
AND
qualcommsdx12Match-
Node
qualcommsdx20_firmwareMatch-
AND
qualcommsdx20Match-
Node
qualcommsdx24_firmwareMatch-
AND
qualcommsdx24Match-
Node
qualcommsdxr1_firmwareMatch-
AND
qualcommsdxr1Match-
Node
qualcommwcd9326_firmwareMatch-
AND
qualcommwcd9326Match-
Node
qualcommwcd9330_firmwareMatch-
AND
qualcommwcd9330Match-
Node
qualcommwcd9335_firmwareMatch-
AND
qualcommwcd9335Match-
Node
qualcommwcd9340_firmwareMatch-
AND
qualcommwcd9340Match-
Node
qualcommwcd9341_firmwareMatch-
AND
qualcommwcd9341Match-
Node
qualcommwcn3610_firmwareMatch-
AND
qualcommwcn3610Match-
Node
qualcommwcn3615_firmwareMatch-
AND
qualcommwcn3615Match-
Node
qualcommwcn3660b_firmwareMatch-
AND
qualcommwcn3660bMatch-
Node
qualcommwcn3680b_firmwareMatch-
AND
qualcommwcn3680bMatch-
Node
qualcommwcn3980_firmwareMatch-
AND
qualcommwcn3980Match-
Node
qualcommwcn3990_firmwareMatch-
AND
qualcommwcn3990Match-
Node
qualcommwcn3998_firmwareMatch-
AND
qualcommwcn3998Match-
Node
qualcommwcn3999_firmwareMatch-
AND
qualcommwcn3999Match-
Node
qualcommwsa8810_firmwareMatch-
AND
qualcommwsa8810Match-
Node
qualcommwsa8815_firmwareMatch-
AND
qualcommwsa8815Match-

CNA Affected

[
  {
    "product": "Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music",
    "vendor": "Qualcomm, Inc.",
    "versions": [
      {
        "status": "affected",
        "version": "APQ8009, APQ8017, APQ8053, APQ8096AU, AR8031, CSRA6620, CSRA6640, MDM9150, MDM9206, MDM9250, MDM9607, MDM9626, MDM9628, MDM9650, MSM8937, PM8937, QCA4020, QCA6174A, QCA6175A, QCA6310, QCA6320, QCA6335, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA9367, QCA9377, QCA9379, QCS405, QCS603, QCS605, SA515M, SD670, SD710, SD820, SD835, SD845, SDX12, SDX20, SDX24, SDXR1, WCD9326, WCD9330, WCD9335, WCD9340, WCD9341, WCN3610, WCN3615, WCN3660B, WCN3680B, WCN3980, WCN3990, WCN3998, WCN3999, WSA8810, WSA8815"
      }
    ]
  }
]

Social References

More

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.7%

Related for CVE-2022-22072