Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21482: CWE-310 Cryptographic Issues in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-21482cvecve-2025-21482cwe-310
Published: Wed Sep 24 2025 (09/24/2025, 15:33:29 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Cryptographic issue while performing RSA PKCS padding decoding.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 00:48:43 UTC

Technical Analysis

CVE-2025-21482 is a cryptographic vulnerability identified in Qualcomm Snapdragon platforms, specifically related to the RSA PKCS padding decoding process. The weakness is categorized under CWE-310, indicating improper cryptographic implementation. RSA PKCS padding is a critical step in RSA encryption and signature verification, and flaws in its decoding can lead to cryptographic attacks such as padding oracle attacks or leakage of private key material. This vulnerability affects a vast array of Qualcomm products, including multiple generations of Snapdragon mobile platforms, modems (LTE and 5G), IoT devices, automotive platforms, wearable devices, and connectivity modules. The vulnerability requires local access with low privileges and does not require user interaction, suggesting that an attacker with limited system access could exploit this flaw to compromise cryptographic operations. The CVSS v3.1 base score of 7.1 reflects a high severity due to the potential for significant confidentiality and integrity breaches, although availability is not impacted. The vulnerability was reserved in December 2024 and published in September 2025, with no known exploits in the wild at the time of reporting. The lack of patch links indicates that fixes may still be pending or in development. Given the widespread deployment of affected Snapdragon chipsets in smartphones, IoT devices, automotive systems, and other embedded platforms, this vulnerability poses a substantial risk to data security and device trustworthiness.

Potential Impact

The impact of CVE-2025-21482 is considerable due to the extensive deployment of affected Qualcomm Snapdragon platforms globally. Exploiting this vulnerability could allow attackers with local access to bypass cryptographic protections, potentially exposing sensitive data such as encryption keys, authentication tokens, or confidential communications. This could lead to unauthorized data disclosure, manipulation of cryptographic operations, and undermining of device security features. The integrity of cryptographic processes is critical for secure boot, secure communications, and trusted execution environments; thus, exploitation could facilitate further attacks including privilege escalation, firmware tampering, or interception of secure communications. The broad range of affected devices—from mobile phones to automotive and IoT platforms—means that both consumer privacy and critical infrastructure security could be compromised. Organizations relying on Snapdragon-based devices for sensitive operations, including telecommunications providers, automotive manufacturers, and IoT service providers, face increased risk of data breaches and operational disruptions. The requirement for local privileges limits remote exploitation but does not eliminate risk, especially in scenarios where attackers gain physical access or leverage other vulnerabilities to achieve local code execution.

Mitigation Recommendations

To mitigate CVE-2025-21482, organizations and device manufacturers should prioritize the following actions: 1) Monitor Qualcomm advisories closely and apply official patches or firmware updates as soon as they become available to address the RSA PKCS padding decoding flaw. 2) Implement strict access controls and privilege separation on affected devices to minimize the risk of local attackers gaining the necessary privileges to exploit the vulnerability. 3) Employ hardware-based security features such as Trusted Execution Environments (TEE) and secure boot mechanisms to protect cryptographic keys and sensitive operations from tampering. 4) Conduct thorough security audits and penetration testing focused on cryptographic implementations and local privilege escalation vectors within Snapdragon-based platforms. 5) For organizations deploying IoT or automotive devices, ensure physical security controls are robust to prevent unauthorized local access. 6) Where possible, use additional layers of encryption or cryptographic validation at the application level to reduce reliance on vulnerable hardware cryptographic functions. 7) Educate security teams about the nature of cryptographic padding vulnerabilities and the importance of layered defenses to detect and respond to potential exploitation attempts. These measures combined will reduce the attack surface and limit the potential damage from this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-12-18T09:50:08.929Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d41180d0cbc63b6d41b24b

Added to database: 9/24/2025, 3:42:56 PM

Last enriched: 2/27/2026, 12:48:43 AM

Last updated: 3/25/2026, 7:14:58 AM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses