← Back
CVE-2022-22064
CVE-2022-22064
AI summary snake-internal / snake-template-v1
A weakness called CVE-2022-22064 was discovered in the affected product.
Severity is Info. Low severity or not yet rated.
What you should do: update the affected software to the latest version. If unsure, ask your IT team or search the vendor's site for "the product CVE-2022-22064".
CVE-2022-22064 (the affected product). Severity: Info.
Response plan:
1. Check the vendor advisory for affected versions and the patched release.
2. If a vulnerable version is running in production, schedule maintenance (urgency from KEV/CVSS).
3. If no patch yet, mitigate via WAF rule, disabling the affected feature, etc.
4. Monitor logs / SIEM for known IOC and PoC signatures of this CVE.
PoCs and fix commits: see the 'References' section, MITRE, and NVD.
❓ What is the problem
A weakness (CVE-2022-22064) in the affected product. A serious software flaw has been identified.
📍 Affected scope
Target versions of the affected product (see vendor advisory). If running in production, identify exposure immediately.
🔥 Severity
Severity: Info. Low severity or not yet rated.
🔧 How to fix
Update to the patched release as listed in the vendor advisory.
🛡️ Workaround
If a patch is not yet available, consider disabling the affected feature, applying WAF rules, blocking via network ACLs, or isolating the vulnerable version.
🔍 Detection
Check version information, scan dependencies via SBOM, and monitor SIEM for IOC and PoC signatures related to this CVE.
Affected packages
Android
platform/vendor/qcom-opensource/wlan/prima
[{"type":"ECOSYSTEM","events":[{"introduced":"SoCVersion:0"},{"fixed":"SoCVersion:2022-05-05"}]}]
Android
platform/vendor/qcom-opensource/wlan/qcacld-2.0
[{"type":"ECOSYSTEM","events":[{"introduced":"SoCVersion:0"},{"fixed":"SoCVersion:2022-05-05"}]}]
Android
platform/vendor/qcom-opensource/wlan/qcacld-3.0
[{"type":"ECOSYSTEM","events":[{"introduced":"SoCVersion:0"},{"fixed":"SoCVersion:2022-05-05"}]}]
References
- advisory https://source.android.com/security/bulletin/2022-05-01
- patch https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=9e8dbd5b761e9a152cb77562ec20124b5b69c7cf
- patch https://source.codeaurora.org/quic/le/platform/vendor/qcom-opensource/wlan/prima/commit/?id=b84f0da6a06d2f4c6f497b1bf3c291e71fb37838
- patch https://source.codeaurora.org/quic/le/platform/vendor/qcom-opensource/wlan/prima/commit/?id=d2a6e223866ca0de9af3fad7a2ad7a44658f479d
- patch https://source.codeaurora.org/quic/le/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=6fba8935de694cc61a13bba40fd1251097cdc014
- patch https://source.codeaurora.org/quic/le/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=ba9e94231a2b072f44ba702682bd0dc23cb37edc