First published: Mon Dec 05 2022(Updated: )
Memory corruption in i2c buses due to improper input validation while reading address configuration from i2c driver in Snapdragon Mobile, Snapdragon Wearables
Credit: product-security@qualcomm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Qualcomm Sm8475 | ||
Google Android | ||
Google Android | ||
Qualcomm Sda429w Firmware | ||
Google Android | ||
Qualcomm Sdm429w Firmware | ||
Qualcomm Sdm429w | ||
Google Android | ||
Google Android | ||
Qualcomm Wcn3610 Firmware | ||
Google Android | ||
Google Android | ||
Qualcomm Wcn3620 | ||
Google Android | ||
Google Android | ||
Google Android | ||
Google Android | ||
Google Android | ||
Google Android | ||
Qualcomm Wcn6855 Firmware | ||
Google Android | ||
Google Android | ||
Google Android | ||
Qualcomm Wcn7850 Firmware | ||
Google Android | ||
Google Android | ||
Qualcomm Wcn7851 | ||
Google Android | ||
Google Android | ||
Google Android | ||
Google Android | ||
Google Android |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25697 is a memory corruption vulnerability in i2c buses due to improper input validation while reading address configuration from the i2c driver in Snapdragon Mobile and Snapdragon Wearables.
Android devices with Qualcomm Snapdragon Mobile and Snapdragon Wearables are affected by CVE-2022-25697.
CVE-2022-25697 has a severity rating of 7.8 (High).
To fix the CVE-2022-25697 vulnerability, it is recommended to apply the security patches provided by Qualcomm and follow the instructions provided by the device manufacturer.
You can find more information about CVE-2022-25697 on the Qualcomm Product Security Bulletins page and the Android Security Bulletin for December 2022.