Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21476: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-21476cvecve-2025-21476cwe-120
Published: Wed Sep 24 2025 (09/24/2025, 15:33:26 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption when passing parameters to the Trusted Virtual Machine during the handshake.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 00:47:59 UTC

Technical Analysis

CVE-2025-21476 is a classic buffer overflow vulnerability (CWE-120) identified in Qualcomm Snapdragon chipsets, specifically during the handshake process with the Trusted Virtual Machine (TVM). The flaw occurs because the software fails to properly check the size of input parameters before copying them into memory buffers, leading to memory corruption. This vulnerability affects a broad range of Snapdragon models including QCM, QCS, SG, SM, SXR, QCA, QCN, and WCN series chips, which are widely used in smartphones, IoT devices, and embedded systems. The vulnerability requires local access with low privileges (AV:L, PR:L) but does not require user interaction (UI:N). The attacker can exploit this flaw to execute arbitrary code, escalate privileges, or cause denial of service by corrupting memory during the TVM handshake. The Trusted Virtual Machine is a critical component that handles secure operations, so compromising it can lead to severe breaches of confidentiality, integrity, and availability. The CVSS v3.1 score of 7.8 reflects high severity due to the potential for complete system compromise. Although no exploits have been reported in the wild yet, the vulnerability’s presence in widely deployed chipsets makes it a significant concern. Qualcomm has not yet released patches, so mitigation currently relies on defense-in-depth strategies. The vulnerability was reserved in December 2024 and published in September 2025, indicating recent discovery and disclosure.

Potential Impact

The impact of CVE-2025-21476 is substantial for organizations globally that rely on devices powered by affected Qualcomm Snapdragon chipsets. Exploitation can lead to full compromise of the Trusted Virtual Machine, undermining the security foundations of the device. This can result in unauthorized access to sensitive data, execution of malicious code with elevated privileges, and disruption of device functionality. Mobile devices, IoT endpoints, and embedded systems in critical sectors such as telecommunications, healthcare, finance, and government are particularly vulnerable. The widespread use of Snapdragon processors in consumer and enterprise devices means that a large attack surface exists. Attackers with local access—such as through compromised apps or insider threats—could leverage this vulnerability to pivot deeper into networks or exfiltrate data. The lack of current exploits in the wild provides a window for remediation, but the high severity score and broad affected product list necessitate urgent attention to prevent potential future attacks.

Mitigation Recommendations

Organizations should prioritize the deployment of official patches from Qualcomm as soon as they become available. Until patches are released, implement strict application whitelisting and sandboxing to limit local code execution capabilities. Employ runtime memory protection technologies such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) where supported by the device. Conduct thorough security audits of applications that interact with the Trusted Virtual Machine to detect and prevent injection of malformed parameters. Limit local access to devices by enforcing strong physical security controls and restricting installation of untrusted applications. Monitor device behavior for signs of memory corruption or abnormal crashes that could indicate exploitation attempts. Collaborate with device manufacturers and mobile operators to ensure timely firmware updates. Finally, educate users about the risks of installing unverified software that could facilitate local exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-12-18T09:50:08.928Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d41180d0cbc63b6d41b245

Added to database: 9/24/2025, 3:42:56 PM

Last enriched: 2/27/2026, 12:47:59 AM

Last updated: 3/25/2026, 4:13:27 AM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses