Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27036: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon

0
Medium
VulnerabilityCVE-2025-27036cvecve-2025-27036cwe-126
Published: Wed Sep 24 2025 (09/24/2025, 15:33:42 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Information disclosure when Video engine escape input data is less than expected minimum size.

AI-Powered Analysis

AILast updated: 10/02/2025, 01:08:12 UTC

Technical Analysis

CVE-2025-27036 is a medium-severity vulnerability classified as CWE-126 (Buffer Over-read) affecting multiple Qualcomm Snapdragon platforms and associated components, including FastConnect modules (6700, 6900, 7800), QCM and QCS series chips, Snapdragon Compute platforms (7c+ Gen 3, 8cx Gen 3), WCD and WSA audio components, and the Qualcomm Video Collaboration VC3 Platform. The vulnerability arises when the video engine processes escape input data that is smaller than the expected minimum size, leading to a buffer over-read condition. This means that the system reads beyond the allocated buffer boundaries, potentially disclosing sensitive information from adjacent memory regions. The CVSS v3.1 base score is 6.1, indicating a medium severity level. The vector string (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L) reveals that the attack requires local access with low complexity and low privileges, no user interaction, and results in high confidentiality impact, no integrity impact, and low availability impact. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects a broad range of Qualcomm hardware widely used in mobile devices, IoT, and compute platforms, especially those leveraging Snapdragon chipsets and FastConnect wireless modules. The root cause is insufficient validation of input data size before processing in the video engine, leading to information disclosure risks.

Potential Impact

For European organizations, this vulnerability poses a significant risk to confidentiality, particularly in environments where devices with affected Qualcomm Snapdragon components are used. Since the vulnerability allows local attackers with low privileges to read sensitive memory contents, it could lead to leakage of cryptographic keys, user data, or other confidential information stored in memory. This is especially critical for sectors handling sensitive personal data, such as finance, healthcare, and government agencies, which are subject to strict data protection regulations like GDPR. The low availability impact means service disruption is unlikely, but the confidentiality breach could result in compliance violations, reputational damage, and potential financial penalties. The requirement for local access limits remote exploitation, but insider threats or compromised devices could leverage this vulnerability. Additionally, the affected platforms are common in mobile and edge computing devices, which are prevalent in European enterprises and consumer markets, increasing the potential attack surface.

Mitigation Recommendations

To mitigate CVE-2025-27036, European organizations should: 1) Monitor Qualcomm and device vendors for official patches or firmware updates addressing this vulnerability and prioritize timely deployment once available. 2) Implement strict access controls and endpoint security measures to prevent unauthorized local access to devices with affected Snapdragon components. This includes enforcing least privilege principles, device hardening, and restricting physical access. 3) Employ runtime protection mechanisms such as memory protection and anomaly detection on devices where feasible to detect abnormal memory access patterns. 4) Conduct regular security audits and vulnerability assessments focusing on devices using Qualcomm hardware to identify potential exploitation attempts. 5) Educate users and administrators about the risks of local privilege escalation and information disclosure vulnerabilities to reduce insider threat risks. 6) For organizations deploying custom firmware or software on affected platforms, review and harden input validation routines in the video engine processing pipeline to prevent buffer over-read conditions. 7) Consider network segmentation and isolation of critical systems using affected hardware to limit lateral movement in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2025-02-18T09:19:46.883Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d41181d0cbc63b6d41b27c

Added to database: 9/24/2025, 3:42:57 PM

Last enriched: 10/2/2025, 1:08:12 AM

Last updated: 10/7/2025, 1:12:59 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats