First published: Mon Dec 05 2022(Updated: )
Memory corruption in SPI buses due to improper input validation while reading address configuration from spi buses in Snapdragon Mobile, Snapdragon Wearables
Credit: product-security@qualcomm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Qualcomm Sm8475 | ||
Google Android | ||
Google Android | ||
Qualcomm Sda429w Firmware | ||
Google Android | ||
Qualcomm Sdm429w Firmware | ||
Qualcomm Sdm429w | ||
Google Android | ||
Google Android | ||
Qualcomm Wcn3610 Firmware | ||
Google Android | ||
Google Android | ||
Qualcomm Wcn3620 | ||
Google Android | ||
Google Android | ||
Google Android | ||
Google Android | ||
Google Android | ||
Google Android | ||
Qualcomm Wcn6855 Firmware | ||
Google Android | ||
Google Android | ||
Google Android | ||
Qualcomm Wcn7850 Firmware | ||
Google Android | ||
Google Android | ||
Qualcomm Wcn7851 | ||
Google Android | ||
Google Android | ||
Google Android | ||
Google Android | ||
Google Android |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-25698 is high with a CVSS score of 7.8.
Devices running Snapdragon Mobile or Snapdragon Wearables with specific firmware versions are affected.
CVE-2022-25698 can lead to memory corruption in SPI buses, potentially resulting in security vulnerabilities or system instability.
To fix CVE-2022-25698, it is recommended to apply the security updates provided by Qualcomm or Google and follow the guidelines given in the referenced bulletins.
You can find more information about CVE-2022-25698 in the December 2022 bulletin from Qualcomm and the associated Android Security Bulletin for December 2022.