CWE
119 787
Advisory Published
CVE Published
Updated

CVE-2022-22096: Buffer Overflow

First published: Wed Jul 06 2022(Updated: )

Memory corruption in Bluetooth HOST due to stack-based buffer overflow when when extracting data using command length parameter in Snapdragon Connectivity, Snapdragon Mobile

Credit: product-security@qualcomm.com

Affected SoftwareAffected VersionHow to fix
Qualcomm aqt1000 firmware
Qualcomm aqt1000
Qualcomm qca6390 firmware
Qualcomm qca6390
qualcomm qca6391 firmware
qualcomm qca6391
qualcomm SD 675 firmware
qualcomm SD 675
qualcomm sd 8 gen1 5g firmware
qualcomm sm8475
Qualcomm sd460 firmware
Qualcomm sd460
Qualcomm SD 480 Firmware
Qualcomm Snapdragon 480
Qualcomm sd662 firmware
Qualcomm sd662
Qualcomm sd665 firmware
Qualcomm sd665
qualcomm sd675 firmware
qualcomm sd675
Qualcomm sd678 firmware
Qualcomm sd678
qualcomm sd680 firmware
qualcomm sd680
qualcomm sd690 5g firmware
qualcomm sd690 5g
Qualcomm SD695 Firmware
Qualcomm Snapdragon 695
Qualcomm sd720g firmware
Qualcomm sd720g
Qualcomm sd730 firmware
Qualcomm Sd730
Qualcomm sd765 firmware
Qualcomm sd765
Qualcomm sd765g firmware
Qualcomm sd765g
Qualcomm sd768g firmware
Qualcomm sd768g
qualcomm sd778g firmware
qualcomm sd778g
qualcomm sd780g firmware
qualcomm sd780g
qualcomm sd855 firmware
qualcomm sd855
qualcomm sd865 5g firmware
qualcomm sd865 5g
Qualcomm sd870 firmware
Qualcomm sd870
Qualcomm sd888 firmware
Qualcomm sd888
qualcomm sd888 5g firmware
qualcomm sd888 5g
Qualcomm sdx55m firmware
Qualcomm sdx55m
Qualcomm sm6250 firmware
Qualcomm sm6250
qualcomm sm7250p firmware
qualcomm sm7250p
qualcomm sm7315 firmware
qualcomm sm7315
qualcomm sm7325p firmware
qualcomm sm7325p
qualcomm sm7450 firmware
qualcomm sm7450
qualcomm sm8475 firmware
qualcomm sm8475p firmware
qualcomm sm8475p
qualcomm wcd9341 firmware
qualcomm wcd9341
Qualcomm wcd9370 firmware
Qualcomm wcd9370
Qualcomm wcd9375 firmware
Qualcomm wcd9375
qualcomm wcd9380 firmware
qualcomm wcd9380
qualcomm wcd9385 firmware
qualcomm wcd9385
Qualcomm WCN3950 Firmware
qualcomm wcn3950
qualcomm wcn3980 firmware
Qualcomm Wcn3980
qualcomm wcn3988 firmware
Qualcomm WCN3988
Qualcomm WCN3991 Firmware
Qualcomm WCN3991 Firmware
Qualcomm wcn3998 firmware
Qualcomm wcn3998
Qualcomm wcn6740 firmware
qualcomm wcn6740
qualcomm wcn6750 firmware
qualcomm wcn6750
Qualcomm WCN6850 Firmware
Qualcomm WCN6850 Firmware
Qualcomm WCN6851 Firmware
Qualcomm WCN6851 Firmware
Qualcomm wcn6855 firmware
qualcomm wcn6855
Qualcomm wcn6856 firmware
qualcomm wcn6856
qualcomm wcn7850 firmware
Qualcomm WCN7850
qualcomm wcn7851 firmware
qualcomm wcn7851
qualcomm wsa8810 firmware
qualcomm wsa8810
qualcomm wsa8815 firmware
qualcomm wsa8815
qualcomm wsa8830 firmware
qualcomm wsa8830
qualcomm wsa8832 firmware
qualcomm wsa8832
qualcomm wsa8835 firmware
qualcomm wsa8835
Android

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2022-22096?

    CVE-2022-22096 is classified as a high severity vulnerability due to potential memory corruption leading to a stack-based buffer overflow.

  • How do I fix CVE-2022-22096?

    To fix CVE-2022-22096, users should update affected Qualcomm firmware and software to the latest versions provided by their device vendors.

  • What devices are affected by CVE-2022-22096?

    CVE-2022-22096 affects various Qualcomm firmware versions, particularly those in devices utilizing Snapdragon Connectivity and Snapdragon Mobile configurations.

  • What is the impact of CVE-2022-22096?

    The impact of CVE-2022-22096 includes potential unauthorized access to system memory and the execution of malicious code due to a buffer overflow.

  • Is CVE-2022-22096 exploitable remotely?

    CVE-2022-22096 may be exploitable remotely through Bluetooth connections, making it a significant risk for users with enabled Bluetooth features.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203