Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27033: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon

0
Medium
VulnerabilityCVE-2025-27033cvecve-2025-27033cwe-126
Published: Wed Sep 24 2025 (09/24/2025, 15:33:39 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Information disclosure while running video usecase having rogue firmware.

AI-Powered Analysis

AILast updated: 10/02/2025, 01:07:59 UTC

Technical Analysis

CVE-2025-27033 is a medium severity vulnerability identified in multiple Qualcomm Snapdragon chipsets, including models such as QCM5430, QCS6490, SM8650, and several others widely used in mobile and embedded devices. The vulnerability is classified as CWE-126, indicating a buffer over-read condition. Specifically, this flaw occurs during video use cases when rogue firmware is present, leading to information disclosure. A buffer over-read happens when a program reads more data than the buffer it has allocated, potentially leaking sensitive information from adjacent memory. In this context, the vulnerability allows an attacker with limited privileges (local access with low complexity) to cause the Snapdragon chipset to leak confidential data without requiring user interaction. The CVSS 3.1 score of 6.1 reflects a medium severity, primarily due to the local attack vector and the need for some privileges, but with a high impact on confidentiality. The vulnerability does not affect integrity or availability significantly. No known exploits are currently reported in the wild, and no patches have been linked yet. The affected Snapdragon versions span a broad range of Qualcomm’s product portfolio, including both mobile SoCs and connectivity modules, indicating a wide potential impact across devices using these chipsets. The flaw’s exploitation requires the presence of rogue firmware, implying that attackers must first compromise the device’s firmware environment to trigger the vulnerability during video processing operations.

Potential Impact

For European organizations, the impact of CVE-2025-27033 could be significant, especially for sectors relying heavily on mobile communications, IoT devices, and embedded systems powered by Qualcomm Snapdragon chipsets. Information disclosure could lead to leakage of sensitive corporate or personal data processed or stored on affected devices. This is particularly concerning for industries such as telecommunications, finance, healthcare, and government agencies where confidentiality is paramount. The requirement for local access and rogue firmware presence limits remote exploitation but raises concerns about insider threats or supply chain compromises where malicious firmware could be introduced. Additionally, devices used in critical infrastructure or secure communications that incorporate these chipsets might be at risk of data leakage, undermining trust and compliance with data protection regulations like GDPR. The broad range of affected chipsets means that many consumer and enterprise devices in Europe could be vulnerable, potentially impacting mobile workforce devices, embedded systems in industrial environments, and connected consumer electronics.

Mitigation Recommendations

Mitigation should focus on a multi-layered approach: 1) Firmware Integrity: Implement strict firmware validation and signing mechanisms to prevent rogue firmware installation. Organizations should ensure that devices only run authenticated and vendor-approved firmware versions. 2) Device Management: Maintain an inventory of devices using affected Snapdragon chipsets and monitor for firmware updates from Qualcomm or device manufacturers. 3) Access Controls: Restrict local access to devices, especially in sensitive environments, to reduce the risk of privilege escalation and rogue firmware deployment. 4) Patch Management: Although no patches are currently linked, organizations should prioritize applying any forthcoming security updates from Qualcomm or OEMs as soon as they become available. 5) Network Segmentation: Isolate critical devices to limit the impact of potential local exploits and reduce the attack surface. 6) Monitoring and Detection: Deploy anomaly detection systems to identify unusual firmware behavior or unauthorized firmware changes. 7) Supply Chain Security: Verify the integrity of devices and firmware during procurement to prevent introduction of compromised hardware or software. These targeted measures go beyond generic advice by emphasizing firmware integrity and local access restrictions, which are critical given the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2025-02-18T09:19:46.882Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d41180d0cbc63b6d41b260

Added to database: 9/24/2025, 3:42:56 PM

Last enriched: 10/2/2025, 1:07:59 AM

Last updated: 10/7/2025, 1:50:46 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats