Skip to main content

CVE-2025-21446: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon

High
VulnerabilityCVE-2025-21446cvecve-2025-21446cwe-126
Published: Tue Jul 08 2025 (07/08/2025, 12:48:57 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Transient DOS may occur when processing vendor-specific information elements while parsing a WLAN frame for BTM requests.

AI-Powered Analysis

AILast updated: 07/08/2025, 13:14:24 UTC

Technical Analysis

CVE-2025-21446 is a high-severity vulnerability identified in a wide range of Qualcomm Snapdragon platforms and related wireless connectivity chipsets. The vulnerability is classified as a CWE-126: Buffer Over-read, which occurs when the software reads data beyond the intended buffer boundaries. Specifically, this issue arises during the processing of vendor-specific information elements while parsing WLAN frames related to BSS Transition Management (BTM) requests. BTM is a feature used in Wi-Fi networks to manage client device transitions between access points to optimize connectivity. The buffer over-read can lead to a transient Denial of Service (DoS) condition, causing affected devices to crash or become unresponsive temporarily. The vulnerability affects an extensive list of Qualcomm products, including numerous Snapdragon mobile platforms (e.g., Snapdragon 8 Gen 1, 8 Gen 2, 865, 888 series), FastConnect wireless subsystems, Immersive Home platforms, IPQ series, QCA and QCN chipsets, and various modem-RF systems. These components are widely integrated into smartphones, IoT devices, automotive systems, and enterprise networking equipment. The CVSS v3.1 score of 7.5 reflects a high severity with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:H) without affecting confidentiality or integrity. No known exploits are reported in the wild yet, and no patches are currently linked, indicating the need for proactive mitigation. The vulnerability's root cause is improper bounds checking when parsing WLAN frames, which can be triggered remotely by sending crafted BTM requests containing malicious vendor-specific elements. This can cause the affected device's wireless subsystem to crash or reboot, disrupting network connectivity and potentially impacting dependent services or applications.

Potential Impact

For European organizations, the impact of CVE-2025-21446 can be significant due to the widespread use of Qualcomm Snapdragon chipsets in mobile devices, enterprise Wi-Fi access points, and IoT infrastructure. A transient DoS in wireless connectivity can disrupt critical communication channels, affecting mobile workforce productivity, real-time data transmission, and operational technology systems relying on wireless networks. Enterprises using Qualcomm-based networking equipment may experience network outages or degraded service quality, impacting business continuity. In sectors such as finance, healthcare, manufacturing, and public services, where reliable wireless connectivity is essential, this vulnerability could lead to operational delays or safety risks. Additionally, the vulnerability could be exploited in targeted attacks to cause denial of service in specific environments, such as corporate campuses or public Wi-Fi hotspots, potentially facilitating further intrusion attempts during downtime. Although the vulnerability does not compromise confidentiality or integrity, the availability impact alone can have cascading effects on dependent applications and services. The lack of required privileges or user interaction for exploitation increases the risk, as attackers can remotely trigger the DoS condition without authentication, making it easier to weaponize in automated attacks or botnets.

Mitigation Recommendations

Given the broad range of affected Qualcomm products and the absence of official patches at this time, European organizations should implement a multi-layered mitigation strategy: 1) Network Segmentation: Isolate critical wireless infrastructure and sensitive devices from general user networks to limit exposure. 2) Wireless Frame Filtering: Deploy advanced wireless intrusion prevention systems (WIPS) or access point firmware capable of filtering or blocking malformed BTM requests and suspicious vendor-specific information elements. 3) Firmware Updates: Monitor Qualcomm advisories and vendor-specific firmware updates closely, and apply patches promptly once available. 4) Device Inventory and Risk Assessment: Identify all devices using affected Qualcomm chipsets, including embedded IoT and automotive systems, to prioritize remediation efforts. 5) Network Monitoring: Implement enhanced monitoring for unusual WLAN frame patterns or repeated BTM requests that could indicate exploitation attempts. 6) Incident Response Preparedness: Develop and test response plans for transient wireless outages to minimize operational disruption. 7) Vendor Coordination: Engage with device and network equipment vendors to obtain timely updates and guidance tailored to specific hardware models. 8) Temporary Workarounds: Where possible, disable BTM features or restrict wireless management frame handling to trusted devices until patches are deployed. These targeted measures go beyond generic advice by focusing on the specific attack vector and affected components.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-12-18T09:50:08.922Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d15066f40f0eb72f50f89

Added to database: 7/8/2025, 12:54:30 PM

Last enriched: 7/8/2025, 1:14:24 PM

Last updated: 8/15/2025, 5:38:14 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats