CVE-2022-25725

CVSS V2 None CVSS V3 None
Description
Denial of service in MODEM due to improper pointer handling
Overview
  • CVE ID
  • CVE-2022-25725
  • Assigner
  • product-security@qualcomm.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2023-01-09T08:15:11
  • Last Modified Date
  • 2023-04-19T17:10:55
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:csrb31024:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:qcx315_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:qcx315:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sa415m_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sa415m:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sa515m_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sa515m:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd_8_gen1_5g:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd480_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd480:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd690_5g_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd690_5g:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd695_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd695:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd750g_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd750g:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd765_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd765g_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd768g_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd778g_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd778g:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd780g_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd780g:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sdx57m_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sdx57m:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sdx65_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sdx65:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sm4375_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sm4375:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wcd9360:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wcn7850_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wcn7850:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wcn7851_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wcn7851:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:* 0 OR
History
Created Old Value New Value Data Type Notes
2023-01-09 08:20:26 Added to TrackCVE
2023-01-09 13:18:10 2023-01-09T12:40:16 CVE Modified Date updated
2023-01-09 13:18:10 Received Awaiting Analysis Vulnerability Status updated
2023-01-12 05:16:32 Awaiting Analysis Undergoing Analysis Vulnerability Status updated
2023-01-13 02:14:08 2023-01-13T01:42:10 CVE Modified Date updated
2023-01-13 02:14:08 Undergoing Analysis Analyzed Vulnerability Status updated
2023-01-13 02:14:09 Weakness Enumeration new
2023-01-13 02:14:13 CPE Information updated
2023-04-19 18:02:34 2023-04-19T17:10:55 CVE Modified Date updated