The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2022-25748

CVE-2022-25748: Qualcomm WLAN Buffer Overflow Vulnerability

CVE-2022-25748 is a buffer overflow flaw in Qualcomm Apq8009 WLAN firmware caused by integer overflow when parsing GTK frames. This vulnerability enables memory corruption attacks across Snapdragon platforms.

Published: February 17, 2026

CVE-2022-25748 Overview

CVE-2022-25748 is a critical memory corruption vulnerability affecting the WLAN (Wireless Local Area Network) subsystem in a wide range of Qualcomm chipsets. The flaw stems from an integer overflow condition that occurs during the parsing of GTK (Group Temporal Key) frames, which are essential components of the WPA/WPA2 four-way handshake used for wireless network authentication and key management.

When a malicious actor sends specially crafted GTK frames to a vulnerable device, the integer overflow leads to a buffer overflow condition, enabling potential arbitrary code execution or denial of service. This vulnerability is particularly dangerous because it can be exploited remotely over a network without requiring any user interaction or prior authentication, making it an attractive target for wireless-based attacks.

Critical Impact

Remote attackers can exploit this vulnerability over Wi-Fi networks to execute arbitrary code with elevated privileges, potentially gaining complete control over affected devices including smartphones, automotive systems, IoT devices, and networking infrastructure.

Affected Products

  • Qualcomm Snapdragon Mobile Platforms (SD660, SD835, SD845, SD855, SD865, SD888, and related series)
  • Qualcomm Snapdragon Auto Platforms (SA6155P, SA8155P, SA8195P, SA8295P)
  • Qualcomm WLAN Connectivity Chipsets (QCA6174, QCA6390, WCN3990, WCN6750, WCN6850, WCN7850)
  • Qualcomm IPQ Networking Processors (IPQ4018, IPQ6018, IPQ8074, IPQ9008)
  • Qualcomm MDM/SDX Modem Platforms (MDM9206, SDX55, SDX65)

Discovery Timeline

  • October 19, 2022 - CVE CVE-2022-25748 published to NVD
  • April 22, 2025 - Last updated in NVD database

Technical Details for CVE-2022-25748

Vulnerability Analysis

This vulnerability is classified as CWE-190 (Integer Overflow or Wraparound). The WLAN driver in affected Qualcomm chipsets fails to properly validate size parameters when processing GTK frames received during the wireless handshake process. When parsing these frames, an attacker-controlled length field can cause an integer overflow during memory allocation or buffer size calculations.

The integer overflow results in the allocation of a smaller-than-expected buffer, while subsequent data copy operations use the original (larger) size value. This classic integer-overflow-to-buffer-overflow primitive allows an attacker to write data beyond the allocated buffer boundaries, corrupting adjacent memory structures.

Given the network-accessible attack vector and lack of required authentication, this vulnerability poses significant risk across diverse deployment scenarios—from consumer mobile devices to critical automotive and industrial IoT systems.

Root Cause

The root cause lies in insufficient integer bounds checking within the WLAN firmware's GTK frame parsing routines. When the driver receives a GTK frame, it extracts length fields from the frame structure to determine how much memory to allocate for processing. Without proper validation, a maliciously crafted frame with extreme or calculated length values can trigger arithmetic overflow when these values are used in size calculations.

This results in a small memory buffer being allocated while the actual data copy operation writes the full attacker-controlled payload, leading to heap corruption in the WLAN driver context.

Attack Vector

The attack can be executed wirelessly by an attacker within radio range of the vulnerable device. The exploitation flow involves:

  1. An attacker positions themselves within Wi-Fi range of a target device with vulnerable Qualcomm WLAN chipset
  2. The attacker initiates or intercepts a wireless handshake session
  3. Maliciously crafted GTK frames with manipulated length fields are transmitted to the target
  4. The vulnerable WLAN driver parses the frame, triggering the integer overflow
  5. The resulting buffer overflow corrupts heap memory, potentially achieving arbitrary code execution within the WLAN subsystem context

This attack requires no user interaction and bypasses authentication mechanisms, as the vulnerability exists in the pre-authentication handshake processing code.

Detection Methods for CVE-2022-25748

Indicators of Compromise

  • Unexpected WLAN driver crashes or device reboots during wireless connectivity operations
  • Anomalous wireless traffic patterns with malformed or oversized GTK frames in packet captures
  • System logs showing memory corruption errors or kernel panics originating from WLAN driver modules
  • Unusual wireless deauthentication sequences followed by connection attempts with abnormal frame sizes

Detection Strategies

  • Deploy wireless intrusion detection systems (WIDS) capable of analyzing 802.11 frame structures for anomalous GTK frame parameters
  • Monitor device firmware versions and cross-reference against Qualcomm's October 2022 security bulletin for vulnerable chipsets
  • Implement network segmentation to isolate critical devices using affected Qualcomm wireless chipsets
  • Review system crash logs and memory dump analysis for patterns consistent with heap overflow exploitation

Monitoring Recommendations

  • Enable verbose WLAN driver logging where available to capture frame parsing events and memory operations
  • Deploy endpoint detection solutions that can identify abnormal memory access patterns in wireless subsystems
  • Establish baseline wireless traffic analysis to detect deviation in handshake frame characteristics
  • Monitor Qualcomm security advisories and device manufacturer update channels for patch availability

How to Mitigate CVE-2022-25748

Immediate Actions Required

  • Identify all devices in your environment containing affected Qualcomm chipsets by cross-referencing hardware inventories
  • Apply firmware updates from device manufacturers that incorporate Qualcomm's security patches from the October 2022 bulletin
  • Prioritize patching for internet-facing and publicly accessible wireless devices
  • Consider network isolation for unpatched critical devices until patches can be applied

Patch Information

Qualcomm has addressed this vulnerability in their October 2022 Security Bulletin. Device manufacturers receive patches from Qualcomm and are responsible for distributing updates to end users. Users should check with their device manufacturers (smartphone OEMs, automotive suppliers, IoT vendors, networking equipment manufacturers) for specific firmware updates addressing CVE-2022-25748.

For detailed patch information, refer to the Qualcomm Security Bulletin - October 2022.

Workarounds

  • Disable Wi-Fi connectivity on affected devices when not actively required, particularly in high-risk environments
  • Use wired network connections where feasible for devices that support Ethernet as an alternative to vulnerable wireless interfaces
  • Implement MAC address filtering and robust WPA3 security configurations to limit exposure, though these do not fully mitigate the vulnerability
  • Deploy network access control (NAC) solutions to restrict wireless network access to known and trusted devices
bash
# Example: Disable wireless interface on Linux-based IoT device as temporary mitigation
# This prevents exploitation but removes wireless connectivity
ip link set wlan0 down
# Alternatively, blacklist the wireless driver module
echo "blacklist qcacld" >> /etc/modprobe.d/blacklist.conf

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeBuffer Overflow

  • Vendor/TechQualcomm

  • SeverityCRITICAL

  • CVSS Score9.8

  • EPSS Probability0.40%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-190
  • Vendor Resources
  • Qualcomm Security Bulletin - October 2022
  • Related CVEs
  • CVE-2025-47391: Qualcomm Wcn3988 Buffer Overflow Flaw

  • CVE-2025-47390: Qualcomm Qcm5430 Buffer Overflow Flaw

  • CVE-2025-47389: Qualcomm AR8035 Buffer Overflow Flaw

  • CVE-2026-21374: Qualcomm Aqt1000 Buffer Overflow Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English