Loading HuntDB...

CVE-2022-25724

HIGH
Published 2022-11-15T00:00:00.000Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2022-25724. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
8.4
/10
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score Metrics
Exploitability: N/A Impact: N/A

EPSS Score

v2025.03.14
0.001
probability
of exploitation in the wild

There is a 0.1% chance that this vulnerability will be exploited in the wild within the next 30 days.

Updated: 2025-06-25
Exploit Probability
Percentile: 0.232
Higher than 23.2% of all CVEs

Attack Vector Metrics

Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED

Impact Metrics

Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Description

Memory corruption in graphics due to buffer overflow while validating the user address in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

Affected Versions:

APQ8009 APQ8009W APQ8017 APQ8052 APQ8056 APQ8064AU APQ8076 APQ8096AU AQT1000 AR8031 AR8035 CSRA6620 CSRA6640 CSRB31024 MDM9150 MDM9206 MDM9250 MDM9607 MDM9628 MDM9650 MSM8108 MSM8208 MSM8209 MSM8608 MSM8909W MSM8917 MSM8952 MSM8956 MSM8976 MSM8976SG MSM8996AU QAM8295P QCA4020 QCA6174 QCA6174A QCA6310 QCA6320 QCA6335 QCA6390 QCA6391 QCA6420 QCA6421 QCA6426 QCA6430 QCA6431 QCA6436 QCA6564 QCA6564A QCA6564AU QCA6574 QCA6574A QCA6574AU QCA6584 QCA6584AU QCA6595 QCA6595AU QCA6696 QCA8081 QCA8337 QCA9367 QCA9377 QCA9379 QCC5100 QCM2290 QCM4290 QCM6125 QCM6490 QCN6024 QCN9011 QCN9012 QCN9024 QCS2290 QCS405 QCS410 QCS4290 QCS605 QCS610 QCS6125 QCS6490 QCS8155 QCX315 QRB5165 QRB5165M QRB5165N QSM8250 Qualcomm215 SA4150P SA4155P SA415M SA515M SA6145P SA6150P SA6155 SA6155P SA8145P SA8150P SA8155 SA8155P SA8195P SA8295P SD 636 SD 675 SD 8 Gen1 5G SD205 SD210 SD429 SD439 SD450 SD460 SD480 SD625 SD626 SD632 SD660 SD662 SD670 SD675 SD678 SD680 SD690 5G SD695 SD710 SD720G SD730 SD750G SD765 SD765G SD768G SD778G SD780G SD820 SD821 SD835 SD845 SD855 SD865 5G SD870 SD888 SD888 5G SDA429W SDM429W SDM630 SDW2500 SDX12 SDX20 SDX20M SDX24 SDX50M SDX55 SDX55M SDX65 SDXR1 SDXR2 5G SM4125 SM4375 SM6250 SM6250P SM7250P SM7315 SM7325P SW5100 SW5100P SXR2150P WCD9326 WCD9330 WCD9335 WCD9340 WCD9341 WCD9360 WCD9370 WCD9371 WCD9375 WCD9380 WCD9385 WCN3610 WCN3615 WCN3620 WCN3660 WCN3660B WCN3680 WCN3680B WCN3910 WCN3950 WCN3980 WCN3988 WCN3990 WCN3991 WCN3998 WCN3999 WCN6740 WCN6750 WCN6850 WCN6851 WCN6855 WCN6856 WCN7850 WCN7851 WSA8810 WSA8815 WSA8830 WSA8835

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed HIGH

GHSA-84x9-4jmj-pp9x

Advisory Details

Memory corruption in graphics due to buffer overflow while validating the user address in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

CVSS Scoring

CVSS Score

7.5

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: November 15, 2022, Modified: November 18, 2022

References

Published: 2022-11-15T00:00:00.000Z
Last Modified: 2025-04-22T15:50:12.191Z
Copied to clipboard!