CVE-2025-21429: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon
Memory corruption occurs while connecting a STA to an AP and initiating an ADD TS request.
AI Analysis
Technical Summary
CVE-2025-21429 is a buffer over-read vulnerability classified under CWE-126, discovered in numerous Qualcomm Snapdragon platforms and wireless connectivity modules. The vulnerability manifests during the process of connecting a wireless station (STA) to an access point (AP) when the device initiates an ADD TS (Traffic Stream) request, a step in the Wi-Fi Quality of Service (QoS) negotiation. Improper handling of this request leads to memory corruption due to reading beyond allocated buffer boundaries. This flaw can be triggered remotely over the network without requiring authentication or user interaction, making it highly exploitable. The affected products span a vast array of Qualcomm chipsets, including LTE modems, 5G modems, automotive platforms, wearable platforms, and various FastConnect wireless modules, covering many Snapdragon mobile platforms from older generations to the latest Snapdragon 8 Gen 3. The vulnerability can cause denial of service (DoS) conditions by crashing the wireless subsystem or the entire device, impacting availability. The CVSS v3.1 score of 7.5 reflects the network attack vector, low attack complexity, no privileges required, no user interaction, and a high impact on availability, though confidentiality and integrity are not affected. No public exploits have been reported yet, but the extensive product footprint and ease of exploitation make this a significant threat. Qualcomm has not yet published patches, so mitigation currently relies on network-level controls and monitoring. The vulnerability was reserved in December 2024 and published in April 2025, indicating recent discovery and disclosure.
Potential Impact
This vulnerability poses a significant risk to organizations and end-users relying on Qualcomm Snapdragon-based devices, which include a large portion of smartphones, automotive infotainment systems, IoT devices, and wearable technology worldwide. The primary impact is denial of service, where an attacker can remotely trigger memory corruption leading to device crashes or wireless subsystem failures, resulting in loss of connectivity or device unavailability. This can disrupt critical communications, especially in automotive or industrial IoT contexts where Snapdragon platforms are embedded. The broad range of affected products means that many device types and manufacturers are potentially vulnerable, increasing the attack surface. Enterprises with mobile fleets, telecommunication providers, and automotive manufacturers could face operational disruptions. Although confidentiality and integrity are not directly compromised, the availability impact alone can cause significant business interruptions, safety risks in automotive scenarios, and degraded user experience. The lack of required privileges or user interaction lowers the barrier for attackers to exploit this flaw remotely, increasing the likelihood of attacks once exploit code becomes available.
Mitigation Recommendations
1. Monitor Qualcomm's official security advisories and promptly apply firmware and software updates once patches are released for affected Snapdragon platforms and wireless modules. 2. Implement network-level protections such as Wi-Fi intrusion detection/prevention systems (IDS/IPS) to detect and block malformed or suspicious ADD TS requests that could trigger the vulnerability. 3. For enterprise environments, segment wireless networks and restrict access to critical systems to minimize exposure. 4. Collaborate with device manufacturers and vendors to ensure timely patch deployment across all affected devices in the organization’s inventory. 5. Employ anomaly detection tools to monitor for unusual wireless connection behaviors indicative of exploitation attempts. 6. In automotive and IoT deployments, consider fallback communication methods or redundancy to maintain availability if devices become unresponsive. 7. Educate security teams about this vulnerability to prepare for incident response related to potential denial of service events. 8. Where possible, disable or restrict QoS features related to ADD TS requests temporarily until patches are applied, balancing functionality and security. 9. Engage with Qualcomm support channels for guidance on interim mitigations specific to device models in use.
Affected Countries
United States, China, India, South Korea, Japan, Germany, United Kingdom, France, Brazil, Canada, Australia, Russia, Italy, Spain, Mexico
CVE-2025-21429: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon
Description
Memory corruption occurs while connecting a STA to an AP and initiating an ADD TS request.
AI-Powered Analysis
Technical Analysis
CVE-2025-21429 is a buffer over-read vulnerability classified under CWE-126, discovered in numerous Qualcomm Snapdragon platforms and wireless connectivity modules. The vulnerability manifests during the process of connecting a wireless station (STA) to an access point (AP) when the device initiates an ADD TS (Traffic Stream) request, a step in the Wi-Fi Quality of Service (QoS) negotiation. Improper handling of this request leads to memory corruption due to reading beyond allocated buffer boundaries. This flaw can be triggered remotely over the network without requiring authentication or user interaction, making it highly exploitable. The affected products span a vast array of Qualcomm chipsets, including LTE modems, 5G modems, automotive platforms, wearable platforms, and various FastConnect wireless modules, covering many Snapdragon mobile platforms from older generations to the latest Snapdragon 8 Gen 3. The vulnerability can cause denial of service (DoS) conditions by crashing the wireless subsystem or the entire device, impacting availability. The CVSS v3.1 score of 7.5 reflects the network attack vector, low attack complexity, no privileges required, no user interaction, and a high impact on availability, though confidentiality and integrity are not affected. No public exploits have been reported yet, but the extensive product footprint and ease of exploitation make this a significant threat. Qualcomm has not yet published patches, so mitigation currently relies on network-level controls and monitoring. The vulnerability was reserved in December 2024 and published in April 2025, indicating recent discovery and disclosure.
Potential Impact
This vulnerability poses a significant risk to organizations and end-users relying on Qualcomm Snapdragon-based devices, which include a large portion of smartphones, automotive infotainment systems, IoT devices, and wearable technology worldwide. The primary impact is denial of service, where an attacker can remotely trigger memory corruption leading to device crashes or wireless subsystem failures, resulting in loss of connectivity or device unavailability. This can disrupt critical communications, especially in automotive or industrial IoT contexts where Snapdragon platforms are embedded. The broad range of affected products means that many device types and manufacturers are potentially vulnerable, increasing the attack surface. Enterprises with mobile fleets, telecommunication providers, and automotive manufacturers could face operational disruptions. Although confidentiality and integrity are not directly compromised, the availability impact alone can cause significant business interruptions, safety risks in automotive scenarios, and degraded user experience. The lack of required privileges or user interaction lowers the barrier for attackers to exploit this flaw remotely, increasing the likelihood of attacks once exploit code becomes available.
Mitigation Recommendations
1. Monitor Qualcomm's official security advisories and promptly apply firmware and software updates once patches are released for affected Snapdragon platforms and wireless modules. 2. Implement network-level protections such as Wi-Fi intrusion detection/prevention systems (IDS/IPS) to detect and block malformed or suspicious ADD TS requests that could trigger the vulnerability. 3. For enterprise environments, segment wireless networks and restrict access to critical systems to minimize exposure. 4. Collaborate with device manufacturers and vendors to ensure timely patch deployment across all affected devices in the organization’s inventory. 5. Employ anomaly detection tools to monitor for unusual wireless connection behaviors indicative of exploitation attempts. 6. In automotive and IoT deployments, consider fallback communication methods or redundancy to maintain availability if devices become unresponsive. 7. Educate security teams about this vulnerability to prepare for incident response related to potential denial of service events. 8. Where possible, disable or restrict QoS features related to ADD TS requests temporarily until patches are applied, balancing functionality and security. 9. Engage with Qualcomm support channels for guidance on interim mitigations specific to device models in use.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- qualcomm
- Date Reserved
- 2024-12-18T09:50:08.919Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a0a1bd85912abc71d0a190
Added to database: 2/26/2026, 7:40:45 PM
Last enriched: 2/26/2026, 7:49:50 PM
Last updated: 2/26/2026, 11:07:23 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28211: CWE-943: Improper Neutralization of Special Elements in Data Query Logic in CyrilleB79 NVDA-Dev-Test-Toolbox
HighCVE-2026-28207: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in z-libs Zen-C
MediumCVE-2026-3265: Improper Authorization in go2ismail Free-CRM
MediumCVE-2026-28225: CWE-639: Authorization Bypass Through User-Controlled Key in manyfold3d manyfold
MediumCVE-2026-28213: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in evershopcommerce evershop
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.