Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21422: CWE-310 Cryptographic Issues in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-21422cvecve-2025-21422cwe-310
Published: Tue Jul 08 2025 (07/08/2025, 12:48:46 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Cryptographic issue while processing crypto API calls, missing checks may lead to corrupted key usage or IV reuses.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:48:47 UTC

Technical Analysis

CVE-2025-21422 is a cryptographic vulnerability classified under CWE-310, indicating issues related to improper cryptographic implementation. The vulnerability stems from missing validation checks during the processing of cryptographic API calls within Qualcomm Snapdragon platforms. Specifically, this flaw can cause corrupted key usage or reuse of initialization vectors (IVs), which are critical for ensuring cryptographic security properties such as uniqueness and randomness. The affected products span an extensive list of Snapdragon SoCs, modems, connectivity modules, and specialized platforms used in mobile phones, compute devices, automotive systems, and IoT hardware. The vulnerability requires local privileges to exploit but does not require user interaction, making it a concern for attackers who have gained some level of access. The CVSS v3.1 score of 7.1 (high) reflects the vulnerability's potential to compromise confidentiality and integrity of data processed or protected by the cryptographic functions, without impacting availability. The absence of known exploits in the wild suggests that exploitation is non-trivial but possible. The flaw undermines the cryptographic assurances that protect sensitive communications and stored data, potentially allowing attackers to decrypt data, forge cryptographic signatures, or bypass security controls relying on proper key and IV management. Given the ubiquity of Snapdragon platforms in consumer and enterprise devices worldwide, this vulnerability represents a significant security risk that requires prompt remediation.

Potential Impact

The impact of CVE-2025-21422 is substantial due to the critical role of cryptographic functions in protecting data confidentiality and integrity across a broad spectrum of devices. Exploiting this vulnerability could allow attackers with local access to cause cryptographic key corruption or IV reuse, which can lead to cryptographic failures such as predictable encryption outputs or key leakage. This compromises the confidentiality of sensitive user data, including communications, stored credentials, and cryptographic keys. Integrity may also be affected, enabling attackers to forge or tamper with data or authentication tokens. Although availability is not directly impacted, the breach of confidentiality and integrity can lead to broader system compromise or data breaches. Organizations using affected Snapdragon platforms in smartphones, tablets, automotive systems, and IoT devices face risks of data exposure, unauthorized access, and potential downstream attacks leveraging weakened cryptographic protections. The wide range of affected products increases the attack surface, making this vulnerability a critical concern for device manufacturers, service providers, and end-users globally.

Mitigation Recommendations

1. Monitor Qualcomm advisories and apply official patches or firmware updates as soon as they are released to address this vulnerability. 2. Until patches are available, restrict local access to affected devices by enforcing strict access controls and minimizing privileged user accounts. 3. Implement additional cryptographic hygiene by ensuring that cryptographic keys and IVs are managed and generated securely at the application level where possible, including using hardware-backed key stores and avoiding reuse of cryptographic parameters. 4. Conduct thorough security audits of cryptographic implementations in software running on affected platforms to detect potential misuse or weaknesses. 5. Employ runtime integrity monitoring and anomaly detection to identify suspicious cryptographic operations that may indicate exploitation attempts. 6. For enterprise deployments, consider network segmentation and device isolation to limit the impact of a compromised device. 7. Educate users and administrators about the risks of local privilege escalation and the importance of timely updates. 8. Collaborate with vendors and security teams to develop incident response plans specific to cryptographic vulnerabilities on Snapdragon devices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-12-18T09:50:08.918Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d15066f40f0eb72f50f74

Added to database: 7/8/2025, 12:54:30 PM

Last enriched: 2/26/2026, 8:48:47 PM

Last updated: 3/23/2026, 12:00:26 PM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses