CVE-2025-21463: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon
Transient DOS while processing the EHT operation IE in the received beacon frame.
AI Analysis
Technical Summary
CVE-2025-21463 is a high-severity buffer over-read vulnerability (CWE-126) affecting a wide range of Qualcomm Snapdragon platforms and associated wireless connectivity chipsets. The vulnerability arises during the processing of the Extremely High Throughput (EHT) operation Information Element (IE) within received beacon frames in Wi-Fi communications. Specifically, a crafted beacon frame containing a malicious EHT operation IE can trigger a transient Denial of Service (DoS) condition by causing the affected device's firmware or driver to read beyond the allocated buffer boundaries. This buffer over-read does not directly compromise confidentiality or integrity but leads to a disruption in service availability. The vulnerability is notable for its broad impact across numerous Qualcomm products, including mobile platforms (e.g., Snapdragon 8 Gen 2/3, Snapdragon AR platforms), modem-RF systems, IoT and embedded platforms (e.g., Immersive Home series, IPQ series), automotive platforms, and various wireless connectivity modules (e.g., FastConnect, QCA, QCN, WCN series). The CVSS v3.1 base score is 7.5, reflecting network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in December 2024 and published in June 2025, indicating recent discovery and disclosure. Exploitation involves sending specially crafted Wi-Fi beacon frames to vulnerable devices, which can cause temporary service disruption, potentially affecting wireless connectivity and dependent applications.
Potential Impact
For European organizations, the impact of CVE-2025-21463 can be significant due to the widespread use of Qualcomm Snapdragon chipsets in mobile devices, IoT equipment, automotive systems, and enterprise wireless infrastructure. A successful exploitation could lead to transient denial of service conditions, disrupting wireless network availability. This can affect critical business operations relying on Wi-Fi connectivity, including remote work, cloud access, and IoT device communications. In sectors such as manufacturing, healthcare, automotive, and telecommunications, where Qualcomm platforms are embedded in operational technology and communication devices, service interruptions could lead to operational delays, safety risks, or degraded user experience. Although the vulnerability does not allow data leakage or code execution, repeated or targeted DoS attacks could be leveraged as part of broader multi-vector attacks, increasing the risk profile. The lack of required privileges or user interaction lowers the barrier for attackers, potentially enabling remote exploitation from within Wi-Fi range. Given the increasing reliance on wireless connectivity in European smart cities, industrial automation, and connected vehicles, this vulnerability poses a tangible risk to availability and operational continuity.
Mitigation Recommendations
Mitigation should focus on a multi-layered approach: 1) Immediate network-level controls: Deploy wireless intrusion detection/prevention systems (WIDS/WIPS) capable of detecting and blocking malformed beacon frames or anomalous EHT IE patterns to prevent exploitation attempts. 2) Firmware and driver updates: Monitor Qualcomm and device vendor advisories closely and apply patches promptly once available. Given the broad product range affected, prioritize critical infrastructure and high-risk devices. 3) Network segmentation: Isolate vulnerable wireless devices and critical systems on segmented networks to limit the blast radius of potential DoS attacks. 4) Device hardening: Disable or restrict Wi-Fi features that are not in use, particularly those related to EHT operations, if configurable. 5) Incident response readiness: Prepare for potential transient connectivity disruptions by implementing failover mechanisms and maintaining communication alternatives. 6) Vendor engagement: Engage with device manufacturers and service providers to confirm patch availability and deployment timelines. 7) Awareness and training: Educate IT and security teams about the nature of this vulnerability and signs of exploitation attempts to enable rapid detection and response.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland, Belgium
CVE-2025-21463: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon
Description
Transient DOS while processing the EHT operation IE in the received beacon frame.
AI-Powered Analysis
Technical Analysis
CVE-2025-21463 is a high-severity buffer over-read vulnerability (CWE-126) affecting a wide range of Qualcomm Snapdragon platforms and associated wireless connectivity chipsets. The vulnerability arises during the processing of the Extremely High Throughput (EHT) operation Information Element (IE) within received beacon frames in Wi-Fi communications. Specifically, a crafted beacon frame containing a malicious EHT operation IE can trigger a transient Denial of Service (DoS) condition by causing the affected device's firmware or driver to read beyond the allocated buffer boundaries. This buffer over-read does not directly compromise confidentiality or integrity but leads to a disruption in service availability. The vulnerability is notable for its broad impact across numerous Qualcomm products, including mobile platforms (e.g., Snapdragon 8 Gen 2/3, Snapdragon AR platforms), modem-RF systems, IoT and embedded platforms (e.g., Immersive Home series, IPQ series), automotive platforms, and various wireless connectivity modules (e.g., FastConnect, QCA, QCN, WCN series). The CVSS v3.1 base score is 7.5, reflecting network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in December 2024 and published in June 2025, indicating recent discovery and disclosure. Exploitation involves sending specially crafted Wi-Fi beacon frames to vulnerable devices, which can cause temporary service disruption, potentially affecting wireless connectivity and dependent applications.
Potential Impact
For European organizations, the impact of CVE-2025-21463 can be significant due to the widespread use of Qualcomm Snapdragon chipsets in mobile devices, IoT equipment, automotive systems, and enterprise wireless infrastructure. A successful exploitation could lead to transient denial of service conditions, disrupting wireless network availability. This can affect critical business operations relying on Wi-Fi connectivity, including remote work, cloud access, and IoT device communications. In sectors such as manufacturing, healthcare, automotive, and telecommunications, where Qualcomm platforms are embedded in operational technology and communication devices, service interruptions could lead to operational delays, safety risks, or degraded user experience. Although the vulnerability does not allow data leakage or code execution, repeated or targeted DoS attacks could be leveraged as part of broader multi-vector attacks, increasing the risk profile. The lack of required privileges or user interaction lowers the barrier for attackers, potentially enabling remote exploitation from within Wi-Fi range. Given the increasing reliance on wireless connectivity in European smart cities, industrial automation, and connected vehicles, this vulnerability poses a tangible risk to availability and operational continuity.
Mitigation Recommendations
Mitigation should focus on a multi-layered approach: 1) Immediate network-level controls: Deploy wireless intrusion detection/prevention systems (WIDS/WIPS) capable of detecting and blocking malformed beacon frames or anomalous EHT IE patterns to prevent exploitation attempts. 2) Firmware and driver updates: Monitor Qualcomm and device vendor advisories closely and apply patches promptly once available. Given the broad product range affected, prioritize critical infrastructure and high-risk devices. 3) Network segmentation: Isolate vulnerable wireless devices and critical systems on segmented networks to limit the blast radius of potential DoS attacks. 4) Device hardening: Disable or restrict Wi-Fi features that are not in use, particularly those related to EHT operations, if configurable. 5) Incident response readiness: Prepare for potential transient connectivity disruptions by implementing failover mechanisms and maintaining communication alternatives. 6) Vendor engagement: Engage with device manufacturers and service providers to confirm patch availability and deployment timelines. 7) Awareness and training: Educate IT and security teams about the nature of this vulnerability and signs of exploitation attempts to enable rapid detection and response.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- qualcomm
- Date Reserved
- 2024-12-18T09:50:08.926Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683e92b3182aa0cae267ecaf
Added to database: 6/3/2025, 6:14:11 AM
Last enriched: 7/11/2025, 6:49:23 AM
Last updated: 7/30/2025, 4:12:08 PM
Views: 13
Related Threats
CVE-2025-8927: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumCVE-2025-43988: n/a
CriticalCVE-2025-8926: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-43986: n/a
CriticalCVE-2025-43982: n/a
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.