Impact
The vulnerability is a buffer over‑read that occurs while the JPEG driver processes an IOCTL request. This results in memory corruption, which might expose unintended memory contents or trigger a crash. The weakness corresponds to CWE‑126 and could allow an attacker to read sensitive data or cause denial of service.
Affected Systems
Qualcomm Snapdragon devices are impacted, including Snapdragon 7c+ Gen 3 compute, Snapdragon 8cx Gen 3 compute, FastConnect 6700/6900/7800, Cologne, and related firmware modules. The vulnerability also affects various Wi‑Fi and Bluetooth firmware such as WCD9370, WCD9375, WCD9378c, WCD9380, WCD9385, WSA8830/8835/8840/8845/8845h, and many XG or X200 series chips. All these components contain the camera JPEG driver that processes IOCTL traffic.
Risk and Exploitability
The CVSS score of 7.8 indicates high severity, but the EPSS score of less than 1% suggests a low likelihood of exploitation at this time. The vulnerability is not listed in the CISA KEV catalog, meaning no known widespread exploits are documented. Likely attack scenarios involve a local privileged process that can send malicious IOCTL commands to the JPEG driver, potentially permitting information disclosure or service disruption. Because the vector is local, mitigation by patching and limiting driver access is effective.
OpenCVE Enrichment