ID

VAR-202207-0210


CVE

CVE-2022-22096


TITLE

Out-of-bounds write vulnerability in multiple Qualcomm products

Trust: 0.8

sources: JVNDB: JVNDB-2022-016376

DESCRIPTION

Memory corruption in Bluetooth HOST due to stack-based buffer overflow when when extracting data using command length parameter in Snapdragon Connectivity, Snapdragon Mobile. AQT1000 firmware, QCA6390 firmware, QCA6391 Several Qualcomm products, such as firmware, contain an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.71

sources: NVD: CVE-2022-22096 // JVNDB: JVNDB-2022-016376 // VULMON: CVE-2022-22096

IOT TAXONOMY

category:['other device', 'embedded device']sub_category:SoC

Trust: 0.1

category:['other device', 'embedded device']sub_category:general

Trust: 0.1

sources: OTHER: None

AFFECTED PRODUCTS

vendor:qualcommmodel:wcn7851scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:wcd9370scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:wcn6850scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd695scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd675scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd765gscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd780gscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:wcn7850scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qca6391scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd662scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd678scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd855scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd680scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:wcn3998scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sm7450scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:wcn6855scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:wsa8835scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:wsa8810scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:wcd9385scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sm6250scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:wcd9375scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sm7250pscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sm7325pscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:wcd9380scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:wcn6856scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sm7315scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd480scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:wcn3950scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:wcn6851scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sm8475pscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd665scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd765scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd888scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd460scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd865 5gscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdx55mscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:wsa8815scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd690 5gscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:aqt1000scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:wcn3991scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:wcn3988scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd730scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd888 5gscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 8 gen1 5gscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd778gscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:wcn6750scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:wcn6740scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd720gscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:wsa8832scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qca6390scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd870scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:wcd9341scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sm8475scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 675scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:wsa8830scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd768gscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:wcn3980scope:eqversion: -

Trust: 1.0

vendor:クアルコムmodel:sd 8 gen1 5gscope: - version: -

Trust: 0.8

vendor:クアルコムmodel:sd765gscope: - version: -

Trust: 0.8

vendor:クアルコムmodel:qca6391scope: - version: -

Trust: 0.8

vendor:クアルコムmodel:qca6390scope: - version: -

Trust: 0.8

vendor:クアルコムmodel:sd690 5gscope: - version: -

Trust: 0.8

vendor:クアルコムmodel:sd720gscope: - version: -

Trust: 0.8

vendor:クアルコムmodel:sd665scope: - version: -

Trust: 0.8

vendor:クアルコムmodel:sd730scope: - version: -

Trust: 0.8

vendor:クアルコムmodel:sd768gscope: - version: -

Trust: 0.8

vendor:クアルコムmodel:sd680scope: - version: -

Trust: 0.8

vendor:クアルコムmodel:sd480scope: - version: -

Trust: 0.8

vendor:クアルコムmodel:aqt1000scope: - version: -

Trust: 0.8

vendor:クアルコムmodel:sd460scope: - version: -

Trust: 0.8

vendor:クアルコムmodel:sd678scope: - version: -

Trust: 0.8

vendor:クアルコムmodel:sd765scope: - version: -

Trust: 0.8

vendor:クアルコムmodel:sd695scope: - version: -

Trust: 0.8

vendor:クアルコムmodel:sd 675scope: - version: -

Trust: 0.8

vendor:クアルコムmodel:sd778gscope: - version: -

Trust: 0.8

vendor:クアルコムmodel:sd675scope: - version: -

Trust: 0.8

vendor:クアルコムmodel:sd662scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-016376 // NVD: CVE-2022-22096

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-22096
value: CRITICAL

Trust: 1.0

product-security@qualcomm.com: CVE-2022-22096
value: CRITICAL

Trust: 1.0

NVD: CVE-2022-22096
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202207-497
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2022-22096
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: CVE-2022-22096
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-016376 // CNNVD: CNNVD-202207-497 // NVD: CVE-2022-22096 // NVD: CVE-2022-22096

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

problemtype:Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-016376 // NVD: CVE-2022-22096

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202207-497

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202207-497

PATCH

title:Qualcomm Repair measures for chip buffer error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=206920

Trust: 0.6

sources: CNNVD: CNNVD-202207-497

EXTERNAL IDS

db:NVDid:CVE-2022-22096

Trust: 3.4

db:JVNDBid:JVNDB-2022-016376

Trust: 0.8

db:AUSCERTid:ESB-2022.3342

Trust: 0.6

db:CS-HELPid:SB2022070720

Trust: 0.6

db:CS-HELPid:SB2022070825

Trust: 0.6

db:CNNVDid:CNNVD-202207-497

Trust: 0.6

db:OTHERid:NONE

Trust: 0.1

db:VULMONid:CVE-2022-22096

Trust: 0.1

sources: OTHER: None // VULMON: CVE-2022-22096 // JVNDB: JVNDB-2022-016376 // CNNVD: CNNVD-202207-497 // NVD: CVE-2022-22096

REFERENCES

url:https://www.qualcomm.com/company/product-security/bulletins/july-2022-bulletin

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2022-22096

Trust: 0.8

url:https://vigilance.fr/vulnerability/google-android-pixel-multiple-vulnerabilities-of-july-2022-38750

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-22096/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3342

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022070825

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022070720

Trust: 0.6

url:https://source.android.com/security/bulletin/2022-07-01

Trust: 0.6

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: OTHER: None // VULMON: CVE-2022-22096 // JVNDB: JVNDB-2022-016376 // CNNVD: CNNVD-202207-497 // NVD: CVE-2022-22096

SOURCES

db:OTHERid: -
db:VULMONid:CVE-2022-22096
db:JVNDBid:JVNDB-2022-016376
db:CNNVDid:CNNVD-202207-497
db:NVDid:CVE-2022-22096

LAST UPDATE DATE

2025-01-30T22:19:13.463000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2022-22096date:2022-09-02T00:00:00
db:JVNDBid:JVNDB-2022-016376date:2023-10-03T08:10:00
db:CNNVDid:CNNVD-202207-497date:2022-09-09T00:00:00
db:NVDid:CVE-2022-22096date:2023-04-19T17:10:55.030

SOURCES RELEASE DATE

db:VULMONid:CVE-2022-22096date:2022-09-02T00:00:00
db:JVNDBid:JVNDB-2022-016376date:2023-10-03T00:00:00
db:CNNVDid:CNNVD-202207-497date:2022-07-06T00:00:00
db:NVDid:CVE-2022-22096date:2022-09-02T12:15:09.770