CVE-2025-21467: CWE-787: Out-of-bounds Write in Qualcomm, Inc. Snapdragon
Memory corruption while reading the FW response from the shared queue.
AI Analysis
Technical Summary
CVE-2025-21467 is a high-severity vulnerability classified under CWE-787 (Out-of-bounds Write) affecting a broad range of Qualcomm Snapdragon platforms and associated wireless connectivity modules. The vulnerability arises from memory corruption caused by an out-of-bounds write operation when reading firmware (FW) responses from a shared queue. This flaw impacts numerous Snapdragon mobile platforms, modems, wearable platforms, automotive platforms, and wireless connectivity chips, including but not limited to Snapdragon 8 Gen 1, 8 Gen 3, 865, 888 series, FastConnect series (6200 through 7800), and various QCA and WCD series chips. The vulnerability allows an attacker with local privileges (low complexity and low attack complexity) and limited privileges (PR:L) to execute code or cause denial of service without requiring user interaction (UI:N). The CVSS v3.1 base score is 7.8, indicating a high severity with impacts on confidentiality, integrity, and availability (all rated high). The flaw can lead to arbitrary code execution or system crashes by corrupting memory during firmware communication, potentially compromising the underlying device's security and stability. No known exploits are currently reported in the wild, and no patches have been linked yet, but the extensive list of affected products suggests a wide attack surface across many consumer and industrial devices using Qualcomm Snapdragon chipsets.
Potential Impact
For European organizations, this vulnerability poses significant risks due to the widespread use of Qualcomm Snapdragon chipsets in mobile devices, IoT devices, automotive systems, and wearable technology prevalent in the region. Confidentiality breaches could expose sensitive corporate and personal data, while integrity and availability impacts could disrupt critical communications and operations, especially in sectors relying on mobile connectivity and embedded systems such as telecommunications, automotive, healthcare, and manufacturing. The vulnerability's ability to be exploited locally with low privileges means that compromised or malicious insiders, or malware that gains limited access, could leverage this flaw to escalate privileges or disrupt device functionality. This is particularly concerning for organizations with Bring Your Own Device (BYOD) policies or those deploying Snapdragon-based IoT and embedded devices in operational technology environments. The lack of user interaction requirement increases the risk of automated exploitation once local access is obtained. The broad range of affected platforms also means that many devices in use across European enterprises and consumers could be vulnerable, potentially leading to widespread impact if exploited.
Mitigation Recommendations
Given the absence of publicly available patches, European organizations should implement a layered defense approach. First, restrict local access to devices running affected Snapdragon platforms by enforcing strict access controls and endpoint security measures to prevent unauthorized or malicious local code execution. Deploy mobile device management (MDM) solutions to monitor and control device configurations and software updates. Organizations should prioritize updating device firmware and operating systems as soon as Qualcomm or device manufacturers release security patches addressing CVE-2025-21467. Network segmentation can limit the spread and impact of compromised devices, especially in IoT and industrial environments. Additionally, implement anomaly detection systems to identify unusual device behavior indicative of exploitation attempts. For critical infrastructure and automotive systems using affected platforms, conduct thorough security assessments and consider temporary operational mitigations such as disabling non-essential wireless interfaces or isolating vulnerable devices until patches are applied. Finally, maintain awareness through threat intelligence sharing and coordinate with vendors for timely vulnerability disclosures and remediation guidance.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland, Belgium
CVE-2025-21467: CWE-787: Out-of-bounds Write in Qualcomm, Inc. Snapdragon
Description
Memory corruption while reading the FW response from the shared queue.
AI-Powered Analysis
Technical Analysis
CVE-2025-21467 is a high-severity vulnerability classified under CWE-787 (Out-of-bounds Write) affecting a broad range of Qualcomm Snapdragon platforms and associated wireless connectivity modules. The vulnerability arises from memory corruption caused by an out-of-bounds write operation when reading firmware (FW) responses from a shared queue. This flaw impacts numerous Snapdragon mobile platforms, modems, wearable platforms, automotive platforms, and wireless connectivity chips, including but not limited to Snapdragon 8 Gen 1, 8 Gen 3, 865, 888 series, FastConnect series (6200 through 7800), and various QCA and WCD series chips. The vulnerability allows an attacker with local privileges (low complexity and low attack complexity) and limited privileges (PR:L) to execute code or cause denial of service without requiring user interaction (UI:N). The CVSS v3.1 base score is 7.8, indicating a high severity with impacts on confidentiality, integrity, and availability (all rated high). The flaw can lead to arbitrary code execution or system crashes by corrupting memory during firmware communication, potentially compromising the underlying device's security and stability. No known exploits are currently reported in the wild, and no patches have been linked yet, but the extensive list of affected products suggests a wide attack surface across many consumer and industrial devices using Qualcomm Snapdragon chipsets.
Potential Impact
For European organizations, this vulnerability poses significant risks due to the widespread use of Qualcomm Snapdragon chipsets in mobile devices, IoT devices, automotive systems, and wearable technology prevalent in the region. Confidentiality breaches could expose sensitive corporate and personal data, while integrity and availability impacts could disrupt critical communications and operations, especially in sectors relying on mobile connectivity and embedded systems such as telecommunications, automotive, healthcare, and manufacturing. The vulnerability's ability to be exploited locally with low privileges means that compromised or malicious insiders, or malware that gains limited access, could leverage this flaw to escalate privileges or disrupt device functionality. This is particularly concerning for organizations with Bring Your Own Device (BYOD) policies or those deploying Snapdragon-based IoT and embedded devices in operational technology environments. The lack of user interaction requirement increases the risk of automated exploitation once local access is obtained. The broad range of affected platforms also means that many devices in use across European enterprises and consumers could be vulnerable, potentially leading to widespread impact if exploited.
Mitigation Recommendations
Given the absence of publicly available patches, European organizations should implement a layered defense approach. First, restrict local access to devices running affected Snapdragon platforms by enforcing strict access controls and endpoint security measures to prevent unauthorized or malicious local code execution. Deploy mobile device management (MDM) solutions to monitor and control device configurations and software updates. Organizations should prioritize updating device firmware and operating systems as soon as Qualcomm or device manufacturers release security patches addressing CVE-2025-21467. Network segmentation can limit the spread and impact of compromised devices, especially in IoT and industrial environments. Additionally, implement anomaly detection systems to identify unusual device behavior indicative of exploitation attempts. For critical infrastructure and automotive systems using affected platforms, conduct thorough security assessments and consider temporary operational mitigations such as disabling non-essential wireless interfaces or isolating vulnerable devices until patches are applied. Finally, maintain awareness through threat intelligence sharing and coordinate with vendors for timely vulnerability disclosures and remediation guidance.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- qualcomm
- Date Reserved
- 2024-12-18T09:50:08.927Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981bc4522896dcbd9cfa
Added to database: 5/21/2025, 9:08:43 AM
Last enriched: 7/5/2025, 3:43:33 PM
Last updated: 8/4/2025, 3:07:57 AM
Views: 13
Related Threats
CVE-2025-9053: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-9052: SQL Injection in projectworlds Travel Management System
MediumPlex warns users to patch security vulnerability immediately
HighCVE-2025-9019: Heap-based Buffer Overflow in tcpreplay
LowCVE-2025-9017: Cross Site Scripting in PHPGurukul Zoo Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.