Skip to main content

CVE-2025-21467: CWE-787: Out-of-bounds Write in Qualcomm, Inc. Snapdragon

High
VulnerabilityCVE-2025-21467cvecve-2025-21467cwe-787
Published: Tue May 06 2025 (05/06/2025, 08:32:31 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while reading the FW response from the shared queue.

AI-Powered Analysis

AILast updated: 07/05/2025, 15:43:33 UTC

Technical Analysis

CVE-2025-21467 is a high-severity vulnerability classified under CWE-787 (Out-of-bounds Write) affecting a broad range of Qualcomm Snapdragon platforms and associated wireless connectivity modules. The vulnerability arises from memory corruption caused by an out-of-bounds write operation when reading firmware (FW) responses from a shared queue. This flaw impacts numerous Snapdragon mobile platforms, modems, wearable platforms, automotive platforms, and wireless connectivity chips, including but not limited to Snapdragon 8 Gen 1, 8 Gen 3, 865, 888 series, FastConnect series (6200 through 7800), and various QCA and WCD series chips. The vulnerability allows an attacker with local privileges (low complexity and low attack complexity) and limited privileges (PR:L) to execute code or cause denial of service without requiring user interaction (UI:N). The CVSS v3.1 base score is 7.8, indicating a high severity with impacts on confidentiality, integrity, and availability (all rated high). The flaw can lead to arbitrary code execution or system crashes by corrupting memory during firmware communication, potentially compromising the underlying device's security and stability. No known exploits are currently reported in the wild, and no patches have been linked yet, but the extensive list of affected products suggests a wide attack surface across many consumer and industrial devices using Qualcomm Snapdragon chipsets.

Potential Impact

For European organizations, this vulnerability poses significant risks due to the widespread use of Qualcomm Snapdragon chipsets in mobile devices, IoT devices, automotive systems, and wearable technology prevalent in the region. Confidentiality breaches could expose sensitive corporate and personal data, while integrity and availability impacts could disrupt critical communications and operations, especially in sectors relying on mobile connectivity and embedded systems such as telecommunications, automotive, healthcare, and manufacturing. The vulnerability's ability to be exploited locally with low privileges means that compromised or malicious insiders, or malware that gains limited access, could leverage this flaw to escalate privileges or disrupt device functionality. This is particularly concerning for organizations with Bring Your Own Device (BYOD) policies or those deploying Snapdragon-based IoT and embedded devices in operational technology environments. The lack of user interaction requirement increases the risk of automated exploitation once local access is obtained. The broad range of affected platforms also means that many devices in use across European enterprises and consumers could be vulnerable, potentially leading to widespread impact if exploited.

Mitigation Recommendations

Given the absence of publicly available patches, European organizations should implement a layered defense approach. First, restrict local access to devices running affected Snapdragon platforms by enforcing strict access controls and endpoint security measures to prevent unauthorized or malicious local code execution. Deploy mobile device management (MDM) solutions to monitor and control device configurations and software updates. Organizations should prioritize updating device firmware and operating systems as soon as Qualcomm or device manufacturers release security patches addressing CVE-2025-21467. Network segmentation can limit the spread and impact of compromised devices, especially in IoT and industrial environments. Additionally, implement anomaly detection systems to identify unusual device behavior indicative of exploitation attempts. For critical infrastructure and automotive systems using affected platforms, conduct thorough security assessments and consider temporary operational mitigations such as disabling non-essential wireless interfaces or isolating vulnerable devices until patches are applied. Finally, maintain awareness through threat intelligence sharing and coordinate with vendors for timely vulnerability disclosures and remediation guidance.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-12-18T09:50:08.927Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9cfa

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 7/5/2025, 3:43:33 PM

Last updated: 8/4/2025, 3:07:57 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats