Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21483: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in Qualcomm, Inc. Snapdragon

0
Critical
VulnerabilityCVE-2025-21483cvecve-2025-21483cwe-119
Published: Wed Sep 24 2025 (09/24/2025, 15:33:31 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption when the UE receives an RTP packet from the network, during the reassembly of NALUs.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 00:48:58 UTC

Technical Analysis

CVE-2025-21483 is a critical vulnerability identified in Qualcomm Snapdragon platforms, stemming from improper restriction of operations within the bounds of a memory buffer (CWE-119). The flaw occurs during the processing of RTP (Real-time Transport Protocol) packets, specifically in the reassembly of Network Abstraction Layer Units (NALUs), which are components of video streams such as H.264 or H.265. When a specially crafted RTP packet is received, it can trigger memory corruption due to buffer overflows or out-of-bounds writes. This memory corruption can lead to arbitrary code execution, privilege escalation, or denial of service on the affected device. The vulnerability affects a vast array of Snapdragon chipsets and wireless connectivity modules, including mobile platforms, automotive platforms, wearable platforms, and video collaboration platforms, among others. The CVSS v3.1 score of 9.8 indicates a critical severity with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. The vulnerability was reserved in December 2024 and published in September 2025, with no known exploits in the wild to date. Due to the extensive list of affected products, this vulnerability poses a significant risk to a wide range of devices globally, especially smartphones and IoT devices using Qualcomm hardware. The lack of available patches at the time of publication further increases the urgency for mitigation and monitoring.

Potential Impact

The impact of CVE-2025-21483 is severe for organizations and individuals relying on affected Qualcomm Snapdragon platforms. Successful exploitation can lead to remote code execution, allowing attackers to gain control over the device without any user interaction or prior authentication. This can compromise sensitive data confidentiality, device integrity, and availability, potentially leading to data breaches, espionage, or disruption of critical services. Mobile devices, automotive systems, IoT devices, and enterprise hardware using these chipsets could be compromised, affecting personal privacy, corporate security, and operational continuity. The broad range of affected platforms means that many industries, including telecommunications, automotive, healthcare, and consumer electronics, are at risk. The vulnerability's network-based attack vector increases the likelihood of widespread exploitation, especially in environments where RTP traffic is common, such as VoIP, video conferencing, and streaming services. Without timely patches, organizations face increased exposure to targeted attacks and potential large-scale campaigns exploiting this flaw.

Mitigation Recommendations

1. Monitor Qualcomm's official security advisories and apply firmware or software patches promptly once released for affected Snapdragon platforms. 2. Implement network-level filtering to detect and block malformed or suspicious RTP packets, using intrusion detection/prevention systems (IDS/IPS) with updated signatures. 3. Employ network segmentation to isolate critical devices and reduce exposure to untrusted RTP traffic sources. 4. Use endpoint protection solutions capable of detecting anomalous behavior indicative of memory corruption or exploitation attempts. 5. For enterprises deploying devices with affected chipsets, enforce strict access controls and limit exposure of RTP services to trusted networks only. 6. Collaborate with device manufacturers and service providers to ensure timely updates and mitigations are deployed across the device ecosystem. 7. Conduct regular security assessments and penetration testing focusing on multimedia and network protocol handling components. 8. Educate users and administrators about the risks associated with untrusted multimedia streams and encourage cautious use of network services involving RTP traffic.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-12-18T09:50:08.929Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d41180d0cbc63b6d41b24e

Added to database: 9/24/2025, 3:42:56 PM

Last enriched: 2/27/2026, 12:48:58 AM

Last updated: 3/24/2026, 1:53:02 PM

Views: 312

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses