Skip to main content

CVE-2025-21473: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in Qualcomm, Inc. Snapdragon

High
VulnerabilityCVE-2025-21473cvecve-2025-21473cwe-367
Published: Wed Aug 06 2025 (08/06/2025, 07:25:57 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption when using Virtual cdm (Camera Data Mover) to write registers.

AI-Powered Analysis

AILast updated: 08/14/2025, 01:06:37 UTC

Technical Analysis

CVE-2025-21473 is a high-severity vulnerability identified in Qualcomm Snapdragon platforms, specifically affecting several FastConnect modules (6900, 7800), Snapdragon 8 Gen 1 Mobile Platform, and wireless audio chips WCD9380, WSA8830, and WSA8835. The vulnerability is classified as a CWE-367 Time-of-check Time-of-use (TOCTOU) race condition, which occurs when a system's state changes between the time it is checked and the time it is used, leading to inconsistent or unsafe operations. In this case, the issue arises during the use of the Virtual Camera Data Mover (cdm) component responsible for writing to hardware registers. The race condition can cause memory corruption, potentially allowing an attacker with limited privileges (local access with low privileges) to escalate their privileges or execute arbitrary code by exploiting the timing window between register validation and usage. The CVSS 3.1 base score of 7.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, with low attack complexity, requiring no user interaction but limited to local access with privileges. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation may rely on vendor updates once available. The affected components are widely used in mobile and wireless communication devices, making this a significant concern for devices relying on Qualcomm Snapdragon chipsets and associated wireless modules.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially those relying on mobile devices, IoT devices, or wireless peripherals powered by Qualcomm Snapdragon platforms. The memory corruption caused by the TOCTOU race condition could allow attackers to gain unauthorized access, escalate privileges, or disrupt device functionality, potentially leading to data breaches, espionage, or denial of service. Enterprises with Bring Your Own Device (BYOD) policies or those deploying Qualcomm-based embedded systems in critical infrastructure could face increased exposure. The impact extends to sectors such as telecommunications, finance, healthcare, and government, where mobile security is paramount. Given the vulnerability requires local access with privileges, insider threats or malware already present on devices could exploit this flaw to deepen compromise. The absence of known exploits currently provides a window for proactive mitigation, but the high severity score underscores the urgency for European organizations to assess their device inventories and prepare for patch deployment.

Mitigation Recommendations

European organizations should immediately identify and inventory all devices using the affected Qualcomm Snapdragon platforms and associated wireless modules. Until official patches are released, organizations should enforce strict access controls to limit local privileged access on devices, including robust endpoint protection and monitoring for suspicious activities indicative of exploitation attempts. Employing application whitelisting and restricting installation of unauthorized software can reduce the risk of local attackers gaining the necessary privileges. Network segmentation and use of Mobile Device Management (MDM) solutions can help isolate vulnerable devices and enforce security policies. Organizations should maintain close communication with Qualcomm and device vendors to obtain and deploy security updates promptly once available. Additionally, security teams should monitor threat intelligence feeds for any emerging exploit attempts targeting this vulnerability to enable rapid incident response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-12-18T09:50:08.928Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689308a3ad5a09ad00ef01cf

Added to database: 8/6/2025, 7:47:47 AM

Last enriched: 8/14/2025, 1:06:37 AM

Last updated: 8/18/2025, 1:22:21 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats