Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21455: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-21455cvecve-2025-21455cwe-367
Published: Wed Aug 06 2025 (08/06/2025, 07:25:48 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while submitting blob data to kernel space though IOCTL.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 00:45:46 UTC

Technical Analysis

CVE-2025-21455 is a time-of-check to time-of-use (TOCTOU) race condition vulnerability categorized under CWE-367, affecting Qualcomm Snapdragon platforms and related FastConnect components. The vulnerability arises from improper synchronization when handling blob data submitted to kernel space through IOCTL calls. Specifically, the kernel performs a check on the data before use, but due to a race condition, the data can be altered between the check and its actual use, leading to memory corruption. This flaw affects a wide range of Qualcomm products including Snapdragon 865, 870, 8 Gen 1 Mobile Platforms, FastConnect 6800/6900/7800, and various modem and wireless components such as QCA6391 and WCN3980. The vulnerability has a CVSS 3.1 base score of 7.8, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). Exploiting this vulnerability could allow an attacker to execute arbitrary code in kernel context, escalate privileges, or cause denial of service by corrupting kernel memory. Although no exploits are currently known in the wild, the broad range of affected devices and the critical nature of the flaw make it a significant security concern. The vulnerability was publicly disclosed in August 2025, with no patches currently linked, emphasizing the need for rapid mitigation efforts.

Potential Impact

The impact of CVE-2025-21455 on organizations worldwide is substantial due to the widespread deployment of Qualcomm Snapdragon SoCs in smartphones, IoT devices, automotive systems, and other embedded platforms. Successful exploitation can lead to full system compromise, allowing attackers to bypass security controls, access sensitive data, and disrupt device functionality. This threatens confidentiality by exposing private user data, integrity by enabling unauthorized code execution or modification of system processes, and availability by potentially causing system crashes or denial of service. Enterprises relying on mobile devices for secure communications, financial transactions, or critical operations face elevated risks. Additionally, the vulnerability could be leveraged in targeted attacks against high-value individuals or infrastructure, especially in sectors like telecommunications, defense, and critical infrastructure. The requirement for local access limits remote exploitation but does not eliminate risk, as malware or malicious insiders could exploit the flaw. The absence of known exploits currently provides a window for mitigation, but the high severity score and broad device impact necessitate urgent action.

Mitigation Recommendations

To mitigate CVE-2025-21455 effectively, organizations and device manufacturers should: 1) Monitor Qualcomm and OEM advisories closely for official patches and firmware updates addressing this vulnerability and apply them promptly. 2) Restrict access to IOCTL interfaces and kernel-level communication channels to trusted processes and users only, minimizing the attack surface. 3) Employ runtime protections such as kernel address space layout randomization (KASLR) and memory protection mechanisms to reduce exploitation success. 4) Implement strict privilege separation and minimize the use of privileged accounts on affected devices. 5) Conduct thorough security audits and testing on custom firmware or software interacting with Qualcomm components to detect similar race conditions. 6) For organizations deploying large fleets of devices, consider network segmentation and endpoint detection solutions to identify anomalous behavior indicative of exploitation attempts. 7) Educate users and administrators about the risks of local privilege escalation vulnerabilities and enforce policies to prevent unauthorized physical or local access. These steps go beyond generic patching advice by focusing on access control, runtime defenses, and proactive detection to reduce exploitation likelihood before patches are available or fully deployed.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-12-18T09:50:08.924Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689308a3ad5a09ad00ef01b7

Added to database: 8/6/2025, 7:47:47 AM

Last enriched: 2/27/2026, 12:45:46 AM

Last updated: 3/25/2026, 1:41:54 AM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses