Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21428: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-21428cvecve-2025-21428cwe-126
Published: Mon Apr 07 2025 (04/07/2025, 10:15:55 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption occurs while connecting a STA to an AP and initiating an ADD TS request from the AP to establish a TSpec session.

AI-Powered Analysis

AILast updated: 02/26/2026, 19:49:25 UTC

Technical Analysis

CVE-2025-21428 is a buffer over-read vulnerability classified under CWE-126 found in Qualcomm Snapdragon chipsets. The vulnerability arises during the wireless connection process when a station (STA) connects to an access point (AP) and the AP initiates an ADD TS (Traffic Specification) request to establish a TSpec session, which is part of the Wi-Fi Multimedia (WMM) protocol for quality of service. This process involves handling specific data structures that, due to improper bounds checking, can lead to reading beyond allocated memory buffers, causing memory corruption. The affected Snapdragon variants span a broad spectrum of Qualcomm products, including LTE modems, mobile platforms, automotive platforms, wearable platforms, and wireless connectivity modules. The CVSS v3.1 score is 7.5 (high), reflecting the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality or integrity impact (C:N/I:N), but high impact on availability (A:H). This means an attacker can remotely trigger a denial of service condition without authentication or user action. While no public exploits are known, the vulnerability's nature and affected product range make it a critical concern for device manufacturers, network operators, and end users. The lack of available patches at the time of publication necessitates urgent attention to vendor advisories and interim mitigations.

Potential Impact

The primary impact of CVE-2025-21428 is denial of service (DoS) caused by memory corruption leading to device crashes or reboots. This can disrupt mobile communications, IoT device functionality, automotive systems relying on Snapdragon platforms, and wireless connectivity in consumer electronics. For organizations, this can translate into operational downtime, loss of productivity, and potential safety risks in automotive or industrial environments. The vulnerability's exploitation requires no privileges or user interaction, increasing the risk of widespread automated attacks once exploit code becomes available. Given the extensive deployment of affected Snapdragon chipsets globally, the threat surface is vast, encompassing smartphones, tablets, automotive infotainment and telematics systems, smart audio devices, and wearable technology. This can affect both consumer privacy and enterprise network stability. Additionally, attackers could leverage this DoS condition as part of a larger attack chain to disrupt critical infrastructure or degrade service availability.

Mitigation Recommendations

1. Apply official firmware and software updates from Qualcomm and device manufacturers as soon as they become available to patch the vulnerability. 2. Network operators should monitor Wi-Fi management frames, specifically ADD TS requests, for anomalous or malformed packets that could indicate exploitation attempts. 3. Implement network segmentation to isolate vulnerable wireless devices from critical infrastructure to limit potential impact. 4. Disable or restrict WMM features on access points and devices where QoS is not essential, reducing the attack surface related to TSpec session establishment. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting malformed ADD TS requests. 6. For automotive and IoT deployments, coordinate with vendors to ensure timely updates and consider fallback operational modes that reduce reliance on vulnerable wireless features. 7. Educate security teams and end users about the risk and signs of device instability that may indicate exploitation attempts. 8. Maintain an inventory of affected devices to prioritize patching and monitoring efforts effectively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2024-12-18T09:50:08.919Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0a1bb85912abc71d0a159

Added to database: 2/26/2026, 7:40:43 PM

Last enriched: 2/26/2026, 7:49:25 PM

Last updated: 2/26/2026, 11:14:54 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses