First published: Mon Aug 01 2022(Updated: )
Potential memory leak in modem during the processing of NSA RRC Reconfiguration with invalid Radio Bearer Config in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Mobile
Credit: product-security@qualcomm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Qualcomm ar8035 firmware | ||
Qualcomm ar8035 | ||
Qualcomm qca6390 firmware | ||
Qualcomm qca6390 | ||
qualcomm qca6391 firmware | ||
qualcomm qca6391 | ||
qualcomm qca6421 firmware | ||
qualcomm qca6421 | ||
qualcomm qca6426 firmware | ||
qualcomm qca6426 | ||
qualcomm qca6431 firmware | ||
qualcomm qca6431 | ||
qualcomm qca6436 firmware | ||
qualcomm qca6436 | ||
qualcomm qca6574a firmware | ||
qualcomm qca6574a | ||
qualcomm qca6574au firmware | ||
qualcomm qca6574au | ||
qualcomm qca6595au firmware | ||
qualcomm qca6595au | ||
qualcomm qca6696 firmware | ||
qualcomm qca6696 | ||
qualcomm QCA8081 firmware | ||
qualcomm QCA8081 | ||
qualcomm qca8337 firmware | ||
qualcomm qca8337 | ||
Qualcomm sa515m firmware | ||
Qualcomm sa515m | ||
qualcomm sd 8 gen1 5g firmware | ||
qualcomm sm8475 | ||
Qualcomm SD 480 Firmware | ||
Qualcomm Snapdragon 480 | ||
qualcomm sd690 5g firmware | ||
qualcomm sd690 5g | ||
Qualcomm SD695 Firmware | ||
Qualcomm Snapdragon 695 | ||
Qualcomm sd750g firmware | ||
Qualcomm sd750g | ||
Qualcomm sd765 firmware | ||
Qualcomm sd765 | ||
Qualcomm sd765g firmware | ||
Qualcomm sd765g | ||
Qualcomm sd768g firmware | ||
Qualcomm sd768g | ||
qualcomm sd778g firmware | ||
qualcomm sd778g | ||
qualcomm sd780g firmware | ||
qualcomm sd780g | ||
qualcomm sd855 firmware | ||
qualcomm sd855 | ||
qualcomm sd865 5g firmware | ||
qualcomm sd865 5g | ||
Qualcomm sd870 firmware | ||
Qualcomm sd870 | ||
Qualcomm sd888 firmware | ||
Qualcomm sd888 | ||
qualcomm sd888 5g firmware | ||
qualcomm sd888 5g | ||
Qualcomm sdx55 firmware | ||
Qualcomm sdx55 | ||
Qualcomm sdx55m firmware | ||
Qualcomm sdx55m | ||
qualcomm sdx65 firmware | ||
qualcomm sdx65 | ||
qualcomm sdxr2 5g firmware | ||
qualcomm sdxr2 5g | ||
qualcomm sm7250p firmware | ||
qualcomm sm7250p | ||
qualcomm sm7315 firmware | ||
qualcomm sm7315 | ||
qualcomm sm7450 firmware | ||
qualcomm sm7450 | ||
qualcomm sm8475 firmware | ||
qualcomm sm8475p firmware | ||
qualcomm sm8475p | ||
qualcomm wcd9341 firmware | ||
qualcomm wcd9341 | ||
Qualcomm wcd9360 firmware | ||
Qualcomm wcd9360 | ||
Qualcomm wcd9370 firmware | ||
Qualcomm wcd9370 | ||
Qualcomm wcd9375 firmware | ||
Qualcomm wcd9375 | ||
qualcomm wcd9380 firmware | ||
qualcomm wcd9380 | ||
qualcomm wcd9385 firmware | ||
qualcomm wcd9385 | ||
qualcomm wcn3988 firmware | ||
Qualcomm WCN3988 | ||
Qualcomm WCN3991 Firmware | ||
Qualcomm WCN3991 Firmware | ||
Qualcomm wcn3998 firmware | ||
Qualcomm wcn3998 | ||
Qualcomm wcn6740 firmware | ||
qualcomm wcn6740 | ||
qualcomm wcn6750 firmware | ||
qualcomm wcn6750 | ||
Qualcomm WCN6850 Firmware | ||
Qualcomm WCN6850 Firmware | ||
Qualcomm WCN6851 Firmware | ||
Qualcomm WCN6851 Firmware | ||
Qualcomm wcn6855 firmware | ||
qualcomm wcn6855 | ||
Qualcomm wcn6856 firmware | ||
qualcomm wcn6856 | ||
qualcomm wcn7851 firmware | ||
qualcomm wcn7851 | ||
qualcomm wsa8810 firmware | ||
qualcomm wsa8810 | ||
qualcomm wsa8815 firmware | ||
qualcomm wsa8815 | ||
qualcomm wsa8830 firmware | ||
qualcomm wsa8830 | ||
qualcomm wsa8832 firmware | ||
qualcomm wsa8832 | ||
qualcomm wsa8835 firmware | ||
qualcomm wsa8835 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-22067 is classified as a medium severity vulnerability due to the potential for a memory leak.
To fix CVE-2022-22067, you should apply the relevant security patches provided by Qualcomm or update your Android device to the latest version.
CVE-2022-22067 affects a range of devices running Qualcomm Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, and Snapdragon Mobile.
CVE-2022-22067 could potentially allow attackers to exploit the memory leak during NFC RRC Reconfiguration processes.
Disabling specific networking features may help reduce exposure to CVE-2022-22067, but applying the official patches is the best mitigation strategy.