Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21438: CWE-125: Out-of-bounds Read in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-21438cvecve-2025-21438cwe-125
Published: Mon Apr 07 2025 (04/07/2025, 10:16:06 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while IOCTL call is invoked from user-space to read board data.

AI-Powered Analysis

AILast updated: 02/26/2026, 19:50:43 UTC

Technical Analysis

CVE-2025-21438 is an out-of-bounds read vulnerability classified under CWE-125, discovered in multiple Qualcomm Snapdragon platforms and related hardware components. The vulnerability occurs during an IOCTL (Input/Output Control) call invoked from user-space to read board data, which leads to memory corruption. Specifically, the flaw allows a process with limited privileges (PR:L) to perform a read operation beyond the intended memory bounds, potentially exposing sensitive information or causing system instability. The vulnerability affects a broad range of Qualcomm products, including FastConnect wireless modules (6200, 6700, 6900, 7800), various QCA and QCM chipsets, Snapdragon compute platforms (7c, 8c, 8cx series), and audio components (WCD and WSA series). The CVSS v3.1 base score is 7.8, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability does not require user interaction but does require some level of privilege, typically a local user or process with access to the IOCTL interface. No public exploits or active exploitation have been reported yet. The root cause is improper bounds checking in the IOCTL handler, leading to out-of-bounds memory reads that can leak sensitive data or destabilize the system. This flaw could be leveraged by attackers to escalate privileges, extract confidential information, or cause denial of service on affected devices. Qualcomm and device manufacturers are expected to release patches to address this issue, though no patch links are currently available. Given the wide deployment of affected Qualcomm components in smartphones, laptops, IoT devices, and embedded systems, this vulnerability poses a significant risk to device security and user privacy worldwide.

Potential Impact

The impact of CVE-2025-21438 is substantial due to the broad range of affected Qualcomm Snapdragon platforms and components embedded in millions of devices globally. Successful exploitation can lead to unauthorized disclosure of sensitive memory contents, compromising confidentiality. The memory corruption can also be exploited to alter system behavior, affecting integrity, or cause crashes and denial of service, impacting availability. Since the vulnerability requires local privileges, attackers who gain limited access to a device—such as through a compromised app or local user account—could leverage this flaw to escalate privileges or extract sensitive data. This is particularly critical for mobile devices, laptops, and IoT systems that rely on Qualcomm hardware for wireless connectivity and processing. The vulnerability threatens user privacy, corporate data security, and the stability of critical communication and computing devices. Organizations deploying these platforms in enterprise, government, or industrial environments face risks of data breaches, operational disruptions, and potential lateral movement by attackers. The absence of known exploits in the wild currently reduces immediate risk, but the high severity score and widespread deployment necessitate urgent mitigation efforts to prevent future exploitation.

Mitigation Recommendations

To mitigate CVE-2025-21438, organizations and device manufacturers should: 1) Monitor Qualcomm and OEM advisories closely for official patches and firmware updates addressing this vulnerability and apply them promptly once available. 2) Restrict access to IOCTL interfaces and device drivers to trusted and authenticated processes only, minimizing the risk of local privilege abuse. 3) Employ application whitelisting and sandboxing to limit the ability of untrusted applications to invoke low-level IOCTL calls. 4) Implement strict privilege separation on devices to prevent unprivileged users or apps from accessing vulnerable interfaces. 5) Use runtime protections such as memory protection mechanisms (e.g., DEP, ASLR) to reduce the impact of memory corruption vulnerabilities. 6) Conduct thorough security testing and code audits on custom firmware or drivers that interact with Qualcomm components. 7) For enterprise environments, enforce endpoint detection and response (EDR) solutions to detect anomalous local activity indicative of exploitation attempts. 8) Educate users about the risks of installing untrusted applications that could exploit local vulnerabilities. These steps, combined with timely patching, will significantly reduce the risk posed by this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2024-12-18T09:50:08.921Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0a1bd85912abc71d0a199

Added to database: 2/26/2026, 7:40:45 PM

Last enriched: 2/26/2026, 7:50:43 PM

Last updated: 2/26/2026, 11:05:05 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses