6.0
MEDIUM
CVE-2022-25722
Apache Spark Information Exposure Vulnerability
Description

Information exposure in DSP services due to improper handling of freeing memory

INFO

Published Date :

Jan. 9, 2023, 8:15 a.m.

Last Modified :

Nov. 21, 2024, 6:52 a.m.

Remotely Exploitable :

No

Impact Score :

5.2

Exploitability Score :

0.8
Affected Products

The following products are affected by CVE-2022-25722 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Qualcomm qca6574au_firmware
2 Qualcomm wcd9341_firmware
3 Qualcomm wsa8810_firmware
4 Qualcomm wsa8815_firmware
5 Qualcomm ar9380_firmware
6 Qualcomm csr8811_firmware
7 Qualcomm ipq4018_firmware
8 Qualcomm ipq4028_firmware
9 Qualcomm ipq4029_firmware
10 Qualcomm ipq5010_firmware
11 Qualcomm ipq5028_firmware
12 Qualcomm ipq6010_firmware
13 Qualcomm ipq6018_firmware
14 Qualcomm ipq6028_firmware
15 Qualcomm ipq8064_firmware
16 Qualcomm ipq8065_firmware
17 Qualcomm ipq8068_firmware
18 Qualcomm ipq8070_firmware
19 Qualcomm ipq8070a_firmware
20 Qualcomm ipq8071a_firmware
21 Qualcomm ipq8072a_firmware
22 Qualcomm ipq8074a_firmware
23 Qualcomm ipq8076_firmware
24 Qualcomm ipq8076a_firmware
25 Qualcomm ipq8078_firmware
26 Qualcomm ipq8078a_firmware
27 Qualcomm ipq8173_firmware
28 Qualcomm ipq8174_firmware
29 Qualcomm qca4024_firmware
30 Qualcomm qca6310_firmware
31 Qualcomm qca8075_firmware
32 Qualcomm qca8081_firmware
33 Qualcomm qca9886_firmware
34 Qualcomm qca9888_firmware
35 Qualcomm qca9889_firmware
36 Qualcomm qca9898_firmware
37 Qualcomm qca9980_firmware
38 Qualcomm qca9984_firmware
39 Qualcomm qca9985_firmware
40 Qualcomm qca9986_firmware
41 Qualcomm qca9990_firmware
42 Qualcomm qca9992_firmware
43 Qualcomm qca9994_firmware
44 Qualcomm qcn5022_firmware
45 Qualcomm qcn5024_firmware
46 Qualcomm qcn5052_firmware
47 Qualcomm qcn5122_firmware
48 Qualcomm qcn5124_firmware
49 Qualcomm qcn5152_firmware
50 Qualcomm qcn5154_firmware
51 Qualcomm qcn5164_firmware
52 Qualcomm qcn6023_firmware
53 Qualcomm qcn6024_firmware
54 Qualcomm qcn6122_firmware
55 Qualcomm qcn6132_firmware
56 Qualcomm qcn9000_firmware
57 Qualcomm qcn9012_firmware
58 Qualcomm qcn9022_firmware
59 Qualcomm qcn9024_firmware
60 Qualcomm qcn9070_firmware
61 Qualcomm qcn9072_firmware
62 Qualcomm qcn9074_firmware
63 Qualcomm qcn9100_firmware
64 Qualcomm wcd9335_firmware
65 Qualcomm wcd9340_firmware
66 Qualcomm wcn3990_firmware
67 Qualcomm wcn3610_firmware
68 Qualcomm apq8096au_firmware
69 Qualcomm ipq5018_firmware
70 Qualcomm mdm9650_firmware
71 Qualcomm qualcomm215_firmware
72 Qualcomm sd210_firmware
73 Qualcomm sd835_firmware
74 Qualcomm qca6320_firmware
75 Qualcomm sd205_firmware
76 Qualcomm ipq4019_firmware
77 Qualcomm qca7500_firmware
78 Qualcomm qca9880_firmware
79 Qualcomm apq8096au
80 Qualcomm mdm9650
81 Qualcomm qca6310
82 Qualcomm qca6320
83 Qualcomm qca6574au
84 Qualcomm qca9984
85 Qualcomm qualcomm215
86 Qualcomm sd205
87 Qualcomm sd210
88 Qualcomm sd835
89 Qualcomm wcd9335
90 Qualcomm wcd9340
91 Qualcomm wcd9341
92 Qualcomm wcn3610
93 Qualcomm wcn3990
94 Qualcomm wsa8810
95 Qualcomm wsa8815
96 Qualcomm ar9380
97 Qualcomm csr8811
98 Qualcomm ipq4018
99 Qualcomm ipq4019
100 Qualcomm ipq4028
101 Qualcomm ipq4029
102 Qualcomm ipq6010
103 Qualcomm ipq6018
104 Qualcomm ipq6028
105 Qualcomm ipq8064
106 Qualcomm ipq8065
107 Qualcomm ipq8068
108 Qualcomm ipq8070
109 Qualcomm ipq8070a
110 Qualcomm ipq8071a
111 Qualcomm ipq8072a
112 Qualcomm ipq8074a
113 Qualcomm ipq8076
114 Qualcomm ipq8076a
115 Qualcomm ipq8078
116 Qualcomm ipq8078a
117 Qualcomm ipq8173
118 Qualcomm ipq8174
119 Qualcomm qca4024
120 Qualcomm qca7500
121 Qualcomm qca8075
122 Qualcomm qca8081
123 Qualcomm qca9880
124 Qualcomm qca9886
125 Qualcomm qca9888
126 Qualcomm qca9889
127 Qualcomm qca9898
128 Qualcomm qca9980
129 Qualcomm qca9985
130 Qualcomm qca9990
131 Qualcomm qca9992
132 Qualcomm qca9994
133 Qualcomm qcn5022
134 Qualcomm qcn5024
135 Qualcomm qcn5052
136 Qualcomm qcn5122
137 Qualcomm qcn5124
138 Qualcomm qcn5152
139 Qualcomm qcn5154
140 Qualcomm qcn5164
141 Qualcomm qcn9000
142 Qualcomm qcn9074
143 Qualcomm ipq5010
144 Qualcomm ipq5018
145 Qualcomm qcn6023
146 Qualcomm qcn6024
147 Qualcomm qcn9012
148 Qualcomm qcn9022
149 Qualcomm qcn9024
150 Qualcomm qcn9070
151 Qualcomm qcn9072
152 Qualcomm qcn9100
153 Qualcomm ipq5028
154 Qualcomm qcn6122
155 Qualcomm qcn6132
156 Qualcomm qca9986
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2022-25722.

URL Resource
https://www.qualcomm.com/company/product-security/bulletins/january-2023-bulletin Patch Vendor Advisory
https://www.qualcomm.com/company/product-security/bulletins/january-2023-bulletin Patch Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2022-25722 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2022-25722 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://www.qualcomm.com/company/product-security/bulletins/january-2023-bulletin
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Initial Analysis by [email protected]

    Jan. 13, 2023

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
    Changed Reference Type https://www.qualcomm.com/company/product-security/bulletins/january-2023-bulletin No Types Assigned https://www.qualcomm.com/company/product-security/bulletins/january-2023-bulletin Patch, Vendor Advisory
    Added CWE NIST CWE-416
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ar9380_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ar9380:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:csr8811:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq4018_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq4018:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq4019_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq4019:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq4028_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq4028:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq4029_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq4029:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq5010_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq5010:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq5018_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq5018:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq5028_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq5028:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq6010_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq6010:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq6028_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq6028:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8064_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8064:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8065_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8065:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8068_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8068:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8070_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8070:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8070a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8070a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8071a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8071a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8072a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8072a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8074a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8074a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8076_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8076:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8076a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8076a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8078_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8078:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8078a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8078a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8173_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8173:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq8174_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq8174:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca4024_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca4024:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6320:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca7500_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca7500:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8075_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8075:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9880_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9880:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9886_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9886:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9888_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9888:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9889_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9889:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9898_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9898:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9980_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9980:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9984_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9984:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9985_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9985:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9986_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9986:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9990_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9990:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9992_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9992:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9994_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9994:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5022_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5022:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5024_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5024:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5052_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5052:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5122_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5122:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5124_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5124:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5152_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5152:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5154_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5154:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5164_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5164:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6023_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6023:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6122_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6122:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6132_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6132:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9012:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9022_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9022:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9070_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9070:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9072_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9072:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9100_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qualcomm215_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qualcomm215:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd205_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd205:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd210_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2022-25722 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2022-25722 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.04 }} 0.00%

score

0.13004

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability