Impact
Memory corruption occurs when an external driver invokes an IOCTL operation with invalid input or output buffers. The untrusted pointer dereference can overwrite kernel memory, potentially allowing an attacker to execute arbitrary code or gain elevated privileges. The weakness corresponds to CWE-822. The description indicates direct memory corruption rather than an informational disclosure, so the primary security impact is modification of system state by a privileged entity.
Affected Systems
The vulnerability affects Qualcomm, Inc. Snapdragon firmware, specifically the power optimization component. No version details are provided; all Snapdragon devices that incorporate the vulnerable power optimization firmware are potentially impacted.
Risk and Exploitability
The CVSS score of 7.8 classifies this issue as a high severity vulnerability. The associated EPSS score is not available, so the current exploitation probability cannot be quantified. The vulnerability is not yet listed in the CISA KEV catalog, indicating no confirmed active exploitation at this time. Based on the description, the attack vector is inferred to be a local driver‑level request; an attacker could trigger the exploit by loading a malicious driver that performs the offending IOCTL or by compromising a legitimate driver that is allowed to call it. If the attacker can run code with driver privileges, the corruption could lead to remote code execution or privilege escalation across the kernel space.
OpenCVE Enrichment