CVE-2025-21481: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qualcomm, Inc. Snapdragon
Memory corruption while performing private key encryption in trusted application.
AI Analysis
Technical Summary
CVE-2025-21481 is a classic buffer overflow vulnerability categorized under CWE-120, discovered in Qualcomm Snapdragon products. The vulnerability occurs due to a failure to properly check the size of input data during private key encryption operations within a trusted application, resulting in memory corruption. This flaw can be exploited by an attacker with local privileges to execute arbitrary code, escalate privileges, or cause denial of service by corrupting memory. The vulnerability affects an extensive list of Qualcomm Snapdragon platforms, including various 5G modems, mobile platforms (from Snapdragon 4 series up to Snapdragon 8 Gen 3), compute platforms, automotive modems, wearable platforms, and wireless connectivity chips. The CVSS v3.1 score is 7.8 (high), reflecting the local attack vector with low complexity, requiring privileges but no user interaction, and impacting confidentiality, integrity, and availability. The vulnerability is particularly critical because it targets cryptographic operations, potentially exposing sensitive key material or enabling unauthorized cryptographic operations. Despite no known exploits in the wild at the time of publication, the wide deployment of affected Snapdragon products in consumer electronics, automotive systems, and IoT devices worldwide elevates the risk profile. Qualcomm has not yet published patches, emphasizing the need for vigilance and mitigation until updates are available.
Potential Impact
The impact of CVE-2025-21481 is significant due to the vulnerability's presence in a broad spectrum of Snapdragon platforms that power billions of devices globally. Successful exploitation can lead to full compromise of device security, including unauthorized access to cryptographic keys, privilege escalation, arbitrary code execution, and denial of service. This threatens the confidentiality of sensitive data, the integrity of device operations, and the availability of critical services. For mobile devices, this could mean compromise of user data and secure communications. In automotive and IoT contexts, exploitation could disrupt safety-critical functions or enable persistent device control by attackers. The vulnerability's local attack vector means attackers must have some level of access, but this is feasible through malicious apps, insider threats, or other local attack methods. The widespread use of affected Snapdragon platforms in key markets and sectors amplifies the potential for large-scale impact, including espionage, data theft, and disruption of critical infrastructure reliant on these devices.
Mitigation Recommendations
1. Immediate mitigation involves restricting local access to devices running affected Snapdragon platforms to trusted users and applications only, minimizing the risk of local exploitation. 2. Employ application sandboxing and privilege separation to limit the ability of potentially malicious local code to reach the vulnerable trusted application. 3. Monitor devices for unusual local activity or privilege escalation attempts that could indicate exploitation attempts. 4. Qualcomm should prioritize releasing patches or firmware updates addressing the buffer overflow, and organizations must deploy these updates promptly once available. 5. For OEMs and integrators, implement secure boot and runtime integrity checks to detect unauthorized modifications or exploitation attempts. 6. In environments where patching is delayed, consider disabling or restricting cryptographic functions related to the vulnerable component if feasible without impacting critical operations. 7. Conduct thorough security audits of local privilege escalation vectors and enforce strict access controls on devices using affected Snapdragon products. 8. Educate users and administrators about the risks of installing untrusted local applications that could exploit this vulnerability.
Affected Countries
United States, China, India, South Korea, Japan, Germany, United Kingdom, France, Brazil, Russia, Canada, Australia, Taiwan, Singapore, Mexico
CVE-2025-21481: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qualcomm, Inc. Snapdragon
Description
Memory corruption while performing private key encryption in trusted application.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-21481 is a classic buffer overflow vulnerability categorized under CWE-120, discovered in Qualcomm Snapdragon products. The vulnerability occurs due to a failure to properly check the size of input data during private key encryption operations within a trusted application, resulting in memory corruption. This flaw can be exploited by an attacker with local privileges to execute arbitrary code, escalate privileges, or cause denial of service by corrupting memory. The vulnerability affects an extensive list of Qualcomm Snapdragon platforms, including various 5G modems, mobile platforms (from Snapdragon 4 series up to Snapdragon 8 Gen 3), compute platforms, automotive modems, wearable platforms, and wireless connectivity chips. The CVSS v3.1 score is 7.8 (high), reflecting the local attack vector with low complexity, requiring privileges but no user interaction, and impacting confidentiality, integrity, and availability. The vulnerability is particularly critical because it targets cryptographic operations, potentially exposing sensitive key material or enabling unauthorized cryptographic operations. Despite no known exploits in the wild at the time of publication, the wide deployment of affected Snapdragon products in consumer electronics, automotive systems, and IoT devices worldwide elevates the risk profile. Qualcomm has not yet published patches, emphasizing the need for vigilance and mitigation until updates are available.
Potential Impact
The impact of CVE-2025-21481 is significant due to the vulnerability's presence in a broad spectrum of Snapdragon platforms that power billions of devices globally. Successful exploitation can lead to full compromise of device security, including unauthorized access to cryptographic keys, privilege escalation, arbitrary code execution, and denial of service. This threatens the confidentiality of sensitive data, the integrity of device operations, and the availability of critical services. For mobile devices, this could mean compromise of user data and secure communications. In automotive and IoT contexts, exploitation could disrupt safety-critical functions or enable persistent device control by attackers. The vulnerability's local attack vector means attackers must have some level of access, but this is feasible through malicious apps, insider threats, or other local attack methods. The widespread use of affected Snapdragon platforms in key markets and sectors amplifies the potential for large-scale impact, including espionage, data theft, and disruption of critical infrastructure reliant on these devices.
Mitigation Recommendations
1. Immediate mitigation involves restricting local access to devices running affected Snapdragon platforms to trusted users and applications only, minimizing the risk of local exploitation. 2. Employ application sandboxing and privilege separation to limit the ability of potentially malicious local code to reach the vulnerable trusted application. 3. Monitor devices for unusual local activity or privilege escalation attempts that could indicate exploitation attempts. 4. Qualcomm should prioritize releasing patches or firmware updates addressing the buffer overflow, and organizations must deploy these updates promptly once available. 5. For OEMs and integrators, implement secure boot and runtime integrity checks to detect unauthorized modifications or exploitation attempts. 6. In environments where patching is delayed, consider disabling or restricting cryptographic functions related to the vulnerable component if feasible without impacting critical operations. 7. Conduct thorough security audits of local privilege escalation vectors and enforce strict access controls on devices using affected Snapdragon products. 8. Educate users and administrators about the risks of installing untrusted local applications that could exploit this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- qualcomm
- Date Reserved
- 2024-12-18T09:50:08.929Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d41180d0cbc63b6d41b248
Added to database: 9/24/2025, 3:42:56 PM
Last enriched: 2/27/2026, 12:48:21 AM
Last updated: 3/25/2026, 4:21:37 AM
Views: 66
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.