Lucene search

K
cveQualcommCVE-2022-22078
HistoryOct 19, 2022 - 11:15 a.m.

CVE-2022-22078

2022-10-1911:15:10
CWE-190
qualcomm
web.nvd.nist.gov
19
6
cve-2022-22078
denial of service
boot
integer overflow
snapdragon auto
snapdragon compute
snapdragon connectivity
snapdragon consumer iot
snapdragon industrial iot
snapdragon mobile
snapdragon wearables
nvd

CVSS3

4.6

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

5.1

Confidence

High

EPSS

0.001

Percentile

19.8%

Denial of service in BOOT when partition size for a particular partition is requested due to integer overflow when blocks are calculated in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables

Affected configurations

Nvd
Node
qualcommaqt1000_firmwareMatch-
AND
qualcommaqt1000Match-
Node
qualcommar8035_firmwareMatch-
AND
qualcommar8035Match-
Node
qualcommcsrb31024_firmwareMatch-
AND
qualcommcsrb31024Match-
Node
qualcommfsm10056_firmwareMatch-
AND
qualcommfsm10056Match-
Node
qualcommmdm9150_firmwareMatch-
AND
qualcommmdm9150Match-
Node
qualcommqca6174a_firmwareMatch-
AND
qualcommqca6174aMatch-
Node
qualcommqca6310_firmwareMatch-
AND
qualcommqca6310Match-
Node
qualcommqca6320_firmwareMatch-
AND
qualcommqca6320Match-
Node
qualcommqca6335_firmwareMatch-
AND
qualcommqca6335Match-
Node
qualcommqca6390_firmwareMatch-
AND
qualcommqca6390Match-
Node
qualcommqca6391_firmwareMatch-
AND
qualcommqca6391Match-
Node
qualcommqca6420_firmwareMatch-
AND
qualcommqca6420Match-
Node
qualcommqca6421_firmwareMatch-
AND
qualcommqca6421Match-
Node
qualcommqca6426_firmwareMatch-
AND
qualcommqca6426Match-
Node
qualcommqca6430_firmwareMatch-
AND
qualcommqca6430Match-
Node
qualcommqca6431_firmwareMatch-
AND
qualcommqca6431Match-
Node
qualcommqca6436_firmwareMatch-
AND
qualcommqca6436Match-
Node
qualcommqca6564_firmwareMatch-
AND
qualcommqca6564Match-
Node
qualcommqca6564au_firmwareMatch-
AND
qualcommqca6564auMatch-
Node
qualcommqca6574_firmwareMatch-
AND
qualcommqca6574Match-
Node
qualcommqca6574a_firmwareMatch-
AND
qualcommqca6574aMatch-
Node
qualcommqca6574au_firmwareMatch-
AND
qualcommqca6574auMatch-
Node
qualcommqca6595au_firmwareMatch-
AND
qualcommqca6595auMatch-
Node
qualcommqca6696_firmwareMatch-
AND
qualcommqca6696Match-
Node
qualcommqca8337_firmwareMatch-
AND
qualcommqca8337Match-
Node
qualcommqca9377_firmwareMatch-
AND
qualcommqca9377Match-
Node
qualcommqcs603_firmwareMatch-
AND
qualcommqcs603Match-
Node
qualcommqcs605_firmwareMatch-
AND
qualcommqcs605Match-
Node
qualcommqcs8155_firmwareMatch-
AND
qualcommqcs8155Match-
Node
qualcommsa415m_firmwareMatch-
AND
qualcommsa415mMatch-
Node
qualcommsa515m_firmwareMatch-
AND
qualcommsa515mMatch-
Node
qualcommsa6145p_firmwareMatch-
AND
qualcommsa6145pMatch-
Node
qualcommsa6150p_firmwareMatch-
AND
qualcommsa6150pMatch-
Node
qualcommsa6155_firmwareMatch-
AND
qualcommsa6155Match-
Node
qualcommsa6155p_firmwareMatch-
AND
qualcommsa6155pMatch-
Node
qualcommsa8145p_firmwareMatch-
AND
qualcommsa8145pMatch-
Node
qualcommsa8150p_firmwareMatch-
AND
qualcommsa8150pMatch-
Node
qualcommsa8155_firmwareMatch-
AND
qualcommsa8155Match-
Node
qualcommsa8155p_firmwareMatch-
AND
qualcommsa8155pMatch-
Node
qualcommsa8195p_firmwareMatch-
AND
qualcommsa8195pMatch-
Node
qualcommsd835_firmwareMatch-
AND
qualcommsd835Match-
Node
qualcommsd845_firmwareMatch-
AND
qualcommsd845Match-
Node
qualcommsd855_firmwareMatch-
AND
qualcommsd855Match-
Node
qualcommsd865_5g_firmwareMatch-
AND
qualcommsd865_5gMatch-
Node
qualcommsd870_firmwareMatch-
AND
qualcommsd870Match-
Node
qualcommsdx24_firmwareMatch-
AND
qualcommsdx24Match-
Node
qualcommsdx55_firmwareMatch-
AND
qualcommsdx55Match-
Node
qualcommsdx55m_firmwareMatch-
AND
qualcommsdx55mMatch-
Node
qualcommsdxr2_5g_firmwareMatch-
AND
qualcommsdxr2_5gMatch-
Node
qualcommsw5100_firmwareMatch-
AND
qualcommsw5100Match-
Node
qualcommsw5100p_firmwareMatch-
AND
qualcommsw5100pMatch-
Node
qualcommwcd9335_firmwareMatch-
AND
qualcommwcd9335Match-
Node
qualcommwcd9340_firmwareMatch-
AND
qualcommwcd9340Match-
Node
qualcommwcd9341_firmwareMatch-
AND
qualcommwcd9341Match-
Node
qualcommwcd9360_firmwareMatch-
AND
qualcommwcd9360Match-
Node
qualcommwcd9380_firmwareMatch-
AND
qualcommwcd9380Match-
Node
qualcommwcd9385_firmwareMatch-
AND
qualcommwcd9385Match-
Node
qualcommwcn3980_firmwareMatch-
AND
qualcommwcn3980Match-
Node
qualcommwcn3988_firmwareMatch-
AND
qualcommwcn3988Match-
Node
qualcommwcn3990_firmwareMatch-
AND
qualcommwcn3990Match-
Node
qualcommwcn3998_firmwareMatch-
AND
qualcommwcn3998Match-
Node
qualcommwcn6850_firmwareMatch-
AND
qualcommwcn6850Match-
Node
qualcommwcn6851_firmwareMatch-
AND
qualcommwcn6851Match-
Node
qualcommwsa8810_firmwareMatch-
AND
qualcommwsa8810Match-
Node
qualcommwsa8815_firmwareMatch-
AND
qualcommwsa8815Match-
Node
qualcommwsa8830_firmwareMatch-
AND
qualcommwsa8830Match-
Node
qualcommwsa8835_firmwareMatch-
AND
qualcommwsa8835Match-
VendorProductVersionCPE
qualcommaqt1000_firmware-cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*
qualcommaqt1000-cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*
qualcommar8035_firmware-cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*
qualcommar8035-cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*
qualcommcsrb31024_firmware-cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:*
qualcommcsrb31024-cpe:2.3:h:qualcomm:csrb31024:-:*:*:*:*:*:*:*
qualcommfsm10056_firmware-cpe:2.3:o:qualcomm:fsm10056_firmware:-:*:*:*:*:*:*:*
qualcommfsm10056-cpe:2.3:h:qualcomm:fsm10056:-:*:*:*:*:*:*:*
qualcommmdm9150_firmware-cpe:2.3:o:qualcomm:mdm9150_firmware:-:*:*:*:*:*:*:*
qualcommmdm9150-cpe:2.3:h:qualcomm:mdm9150:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 1341

CNA Affected

[
  {
    "vendor": "Qualcomm, Inc.",
    "product": "Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables",
    "versions": [
      {
        "version": "AQT1000, AR8035, CSRB31024, FSM10056, MDM9150, QCA6174A, QCA6310, QCA6320, QCA6335, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6595AU, QCA6696, QCA8337, QCA9377, QCS603, QCS605, QCS8155, SA415M, SA515M, SA6145P, SA6150P, SA6155, SA6155P, SA8145P, SA8150P, SA8155, SA8155P, SA8195P, SD835, SD845, SD855, SD865 5G, SD870, SDX24, SDX55, SDX55M, SDXR2 5G, SW5100, SW5100P, WCD9335, WCD9340, WCD9341, WCD9360, WCD9380, WCD9385, WCN3980, WCN3988, WCN3990, WCN3998, WCN6850, WCN6851, WSA8810, WSA8815, WSA8830, WSA8835",
        "status": "affected"
      }
    ]
  }
]

Social References

More

CVSS3

4.6

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

5.1

Confidence

High

EPSS

0.001

Percentile

19.8%

Related for CVE-2022-22078