Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21429: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-21429cvecve-2025-21429cwe-126
Published: Mon Apr 07 2025 (04/07/2025, 10:15:56 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption occurs while connecting a STA to an AP and initiating an ADD TS request.

AI-Powered Analysis

AILast updated: 02/26/2026, 19:49:50 UTC

Technical Analysis

CVE-2025-21429 is a buffer over-read vulnerability classified under CWE-126, discovered in numerous Qualcomm Snapdragon platforms and wireless connectivity modules. The vulnerability manifests during the process of connecting a wireless station (STA) to an access point (AP) when the device initiates an ADD TS (Traffic Stream) request, a step in the Wi-Fi Quality of Service (QoS) negotiation. Improper handling of this request leads to memory corruption due to reading beyond allocated buffer boundaries. This flaw can be triggered remotely over the network without requiring authentication or user interaction, making it highly exploitable. The affected products span a vast array of Qualcomm chipsets, including LTE modems, 5G modems, automotive platforms, wearable platforms, and various FastConnect wireless modules, covering many Snapdragon mobile platforms from older generations to the latest Snapdragon 8 Gen 3. The vulnerability can cause denial of service (DoS) conditions by crashing the wireless subsystem or the entire device, impacting availability. The CVSS v3.1 score of 7.5 reflects the network attack vector, low attack complexity, no privileges required, no user interaction, and a high impact on availability, though confidentiality and integrity are not affected. No public exploits have been reported yet, but the extensive product footprint and ease of exploitation make this a significant threat. Qualcomm has not yet published patches, so mitigation currently relies on network-level controls and monitoring. The vulnerability was reserved in December 2024 and published in April 2025, indicating recent discovery and disclosure.

Potential Impact

This vulnerability poses a significant risk to organizations and end-users relying on Qualcomm Snapdragon-based devices, which include a large portion of smartphones, automotive infotainment systems, IoT devices, and wearable technology worldwide. The primary impact is denial of service, where an attacker can remotely trigger memory corruption leading to device crashes or wireless subsystem failures, resulting in loss of connectivity or device unavailability. This can disrupt critical communications, especially in automotive or industrial IoT contexts where Snapdragon platforms are embedded. The broad range of affected products means that many device types and manufacturers are potentially vulnerable, increasing the attack surface. Enterprises with mobile fleets, telecommunication providers, and automotive manufacturers could face operational disruptions. Although confidentiality and integrity are not directly compromised, the availability impact alone can cause significant business interruptions, safety risks in automotive scenarios, and degraded user experience. The lack of required privileges or user interaction lowers the barrier for attackers to exploit this flaw remotely, increasing the likelihood of attacks once exploit code becomes available.

Mitigation Recommendations

1. Monitor Qualcomm's official security advisories and promptly apply firmware and software updates once patches are released for affected Snapdragon platforms and wireless modules. 2. Implement network-level protections such as Wi-Fi intrusion detection/prevention systems (IDS/IPS) to detect and block malformed or suspicious ADD TS requests that could trigger the vulnerability. 3. For enterprise environments, segment wireless networks and restrict access to critical systems to minimize exposure. 4. Collaborate with device manufacturers and vendors to ensure timely patch deployment across all affected devices in the organization’s inventory. 5. Employ anomaly detection tools to monitor for unusual wireless connection behaviors indicative of exploitation attempts. 6. In automotive and IoT deployments, consider fallback communication methods or redundancy to maintain availability if devices become unresponsive. 7. Educate security teams about this vulnerability to prepare for incident response related to potential denial of service events. 8. Where possible, disable or restrict QoS features related to ADD TS requests temporarily until patches are applied, balancing functionality and security. 9. Engage with Qualcomm support channels for guidance on interim mitigations specific to device models in use.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2024-12-18T09:50:08.919Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0a1bd85912abc71d0a190

Added to database: 2/26/2026, 7:40:45 PM

Last enriched: 2/26/2026, 7:49:50 PM

Last updated: 2/26/2026, 11:07:23 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses