Impact
This vulnerability arises in the camera sensor driver when an IOCTL call accesses an output buffer without first validating its size. The flaw allows the caller to read memory beyond the intended buffer boundaries, potentially exposing sensitive data or causing system instability. The weakness corresponds to CWE‑126: Buffer Overread.
Affected Systems
Qualcomm Inc. Snapdragon platforms, including a wide range of mobile, compute, and networking devices such as the Snapdragon 8cx, 7c, 7c+, 8c, 662, 460, and other listed firmware and hardware packages. No specific firmware revisions are enumerated, implying that multiple product variants are affected. Users running these Qualcomm chipsets should verify with their device vendor for the affected firmware version.
Risk and Exploitability
The CVSS Base Score of 7.8 marks this as high severity, and the EPSS score of under 1% suggests limited exploitation likelihood at present. Because the flaw is triggered via IOCTL handling, the attack requires local access to the camera driver, and possibly elevated privileges to manipulate the buffer. While the vulnerability does not offer remote code execution, it can lead to disclosure of memory contents, which may contain confidential information or code. The flaw is not yet listed in CISA’s KEV catalog. Users should treat it as a serious risk if the device exposes the vulnerable camera driver to untrusted code.
OpenCVE Enrichment