Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21432: CWE-415 Double Free in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-21432cvecve-2025-21432cwe-415
Published: Tue Jul 08 2025 (07/08/2025, 12:48:50 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while retrieving the CBOR data from TA.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:49:04 UTC

Technical Analysis

CVE-2025-21432 is a memory corruption vulnerability classified as a double free (CWE-415) in Qualcomm Snapdragon platforms. The flaw occurs during the retrieval of CBOR (Concise Binary Object Representation) data from a Trusted Application (TA), where improper handling leads to freeing the same memory region twice. This double free can corrupt the heap, potentially allowing attackers to manipulate memory structures to execute arbitrary code, escalate privileges, or cause system crashes (denial of service). The vulnerability affects an extensive list of Qualcomm products, including numerous Snapdragon mobile platforms (from Snapdragon 4 Gen 1 to Snapdragon 8+ Gen 2), FastConnect wireless subsystems, automotive platforms, XR platforms, and various connectivity chips. The CVSS 3.1 base score is 7.8, reflecting high severity due to the impact on confidentiality, integrity, and availability. The attack vector is local (AV:L), requiring low privileges (PR:L) but no user interaction (UI:N), making exploitation feasible for local attackers or malicious apps with limited permissions. No public exploits are known yet, but the vulnerability's presence in widely deployed hardware components embedded in billions of devices worldwide underscores the criticality of timely mitigation.

Potential Impact

The vulnerability can lead to arbitrary code execution, privilege escalation, or denial of service on affected devices. Given the broad range of impacted Snapdragon platforms, this could affect smartphones, tablets, automotive systems, XR devices, and IoT endpoints. Exploitation could allow attackers to bypass security boundaries, access sensitive data, or disrupt device functionality. For enterprises, this could mean compromise of corporate mobile devices, disruption of connected automotive systems, or breaches in critical infrastructure relying on Qualcomm hardware. The local attack vector implies that attackers need some level of access, but many mobile devices run untrusted apps that could leverage this flaw. The widespread deployment of affected Snapdragon platforms globally increases the potential attack surface, making this a significant risk for both consumer and enterprise environments.

Mitigation Recommendations

1. Monitor Qualcomm and device vendors for official patches and apply them promptly once available. 2. Restrict local access to devices by enforcing strong device authentication and limiting installation of untrusted or unnecessary applications. 3. Employ mobile device management (MDM) solutions to control app permissions and detect anomalous behavior indicative of exploitation attempts. 4. For enterprises, isolate critical devices and networks to reduce the risk of lateral movement from compromised endpoints. 5. Utilize runtime protections such as memory corruption mitigations (e.g., heap canaries, address space layout randomization) where supported. 6. Conduct regular security audits and penetration testing focusing on local privilege escalation vectors. 7. Educate users on the risks of installing apps from untrusted sources to minimize local attack opportunities. 8. For automotive and IoT deployments, ensure secure update mechanisms are in place to rapidly deploy patches and monitor device integrity continuously.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-12-18T09:50:08.920Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d15066f40f0eb72f50f7d

Added to database: 7/8/2025, 12:54:30 PM

Last enriched: 2/26/2026, 8:49:04 PM

Last updated: 3/24/2026, 11:57:53 PM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses