Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21475: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-21475cvecve-2025-21475cwe-126
Published: Tue May 06 2025 (05/06/2025, 08:32:36 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while processing escape code, when DisplayId is passed with large unsigned value.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:51:31 UTC

Technical Analysis

CVE-2025-21475 is a buffer over-read vulnerability classified under CWE-126 affecting multiple Qualcomm Snapdragon platforms and related hardware components. The flaw arises from improper memory handling when processing escape codes that include a DisplayId parameter passed as a large unsigned integer. This leads to memory corruption, potentially allowing attackers with low privileges to read beyond intended memory boundaries, causing confidentiality breaches, integrity violations, and availability disruptions. The vulnerability affects a broad range of Qualcomm products, including FastConnect modules (6200 through 7800 series), various Snapdragon compute platforms (7c, 8c, 8cx series), and audio components (WCD and WSA series). The CVSS 3.1 base score of 7.8 reflects high severity with attack vector local, low attack complexity, low privileges required, no user interaction, and high impacts on confidentiality, integrity, and availability. No public exploits are known yet, but the widespread use of affected hardware in smartphones, laptops, IoT devices, and embedded systems makes this a critical issue. The vulnerability was reserved in December 2024 and published in May 2025, with no patches currently linked, indicating an urgent need for vendor remediation. The flaw could be exploited by malicious local applications or compromised processes to cause memory disclosure or denial of service, potentially enabling further privilege escalation or system compromise.

Potential Impact

The impact of CVE-2025-21475 is significant for organizations globally that rely on Qualcomm Snapdragon-based hardware. Confidentiality is at risk due to potential memory disclosure beyond intended buffers, allowing attackers to access sensitive data. Integrity can be compromised if memory corruption enables modification of critical data structures. Availability is threatened as exploitation may cause crashes or system instability, leading to denial of service. The vulnerability requires only low privileges and no user interaction, increasing the risk of exploitation by local attackers or malicious applications. Given the extensive deployment of affected Snapdragon chipsets in mobile devices, laptops, IoT devices, and embedded systems, the scope is broad. Exploitation could facilitate lateral movement within networks, data exfiltration, or disruption of critical services. Enterprises in telecommunications, consumer electronics, automotive, and industrial sectors using these platforms face elevated risks. The absence of known exploits currently provides a window for proactive mitigation, but the high severity score demands urgent attention to prevent future attacks.

Mitigation Recommendations

To mitigate CVE-2025-21475, organizations should: 1) Monitor Qualcomm and device vendors for official patches and apply them promptly once available. 2) Implement strict input validation and sanitization on interfaces handling DisplayId or escape code parameters to prevent malformed inputs. 3) Restrict local access to vulnerable components by enforcing least privilege principles and application sandboxing to limit potential exploit vectors. 4) Employ runtime memory protection techniques such as Address Space Layout Randomization (ASLR) and Control Flow Integrity (CFI) where supported by the platform. 5) Use endpoint detection and response (EDR) tools to monitor for anomalous behavior indicative of exploitation attempts, such as unusual memory access patterns or crashes. 6) Conduct regular security assessments and penetration testing focusing on local privilege escalation and memory corruption vectors. 7) Educate developers and system administrators about the risks of buffer over-read vulnerabilities and secure coding practices. 8) For critical environments, consider network segmentation to isolate devices with vulnerable hardware until patches are applied. These targeted steps go beyond generic advice by focusing on the specific nature of the vulnerability and the affected hardware ecosystem.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-12-18T09:50:08.928Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9d16

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 2/26/2026, 8:51:31 PM

Last updated: 3/21/2026, 12:15:53 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses