Impact
This vulnerability is a classic buffer over-read caused by inadequate size validation when handling auxiliary sensor input/output control commands within the camera firmware. The memory corruption can allow an attacker to read out unintended data or potentially trigger execution of code if the control flow is redirected. The weakness is identified as a Buffer Over-read (CWE‑126). The impact includes potential disclosure of sensitive information, instability that may lead to denial of service, or, in the worst case, arbitrary code execution if exploitation succeeds.
Affected Systems
The affected devices are Qualcomm Snapdragon platforms, including the Snapdragon 460 and 662 mobile platforms, various 7c+, 7c, 8c, 8cx, and ar1 compute platforms, and associated firmware for these chips. Additionally, the vulnerability spans a wide range of Snapdragon driver firmware such as fastconnect and wcd series, as well as audio and video collaboration components. All Qualcomm Snapdragon hardware listed in the CPE strings, plus their respective firmware packages, are impacted.
Risk and Exploitability
The CVSS score of 7.8 indicates high severity, but the EPSS score is below 1%, suggesting low current exploit activity. The vulnerability is not documented in the CISA KEV catalog. Attack vectors are likely local or by privileged users who can send malformed commands to the camera driver via ioctl or similar interfaces. The level of skill required for exploitation is moderate; a successful exploit could compromise the device's integrity or confidentiality.
OpenCVE Enrichment