Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27041: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon

0
Medium
VulnerabilityCVE-2025-27041cvecve-2025-27041cwe-126
Published: Thu Oct 09 2025 (10/09/2025, 03:17:55 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Transient DOS while processing video packets received from video firmware.

AI-Powered Analysis

AILast updated: 10/09/2025, 03:43:52 UTC

Technical Analysis

CVE-2025-27041 is a buffer over-read vulnerability classified under CWE-126 found in Qualcomm Snapdragon platforms and associated chipsets. The vulnerability arises during the processing of video packets received from video firmware, leading to a transient denial of service (DoS) condition. Specifically, the flaw allows an attacker with local privileges to cause the system to read beyond the intended buffer boundaries, which can disrupt normal processing and cause temporary unavailability of affected components. The affected products include a broad range of Qualcomm Snapdragon mobile platforms (e.g., Snapdragon 660, 680, 888 series), automotive modems, FastConnect wireless subsystems, and various Qualcomm connectivity chipsets. The CVSS v3.1 base score is 5.5 (medium severity), with attack vector local (AV:L), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). No public exploits are known at this time, and Qualcomm has not yet published patches. The vulnerability's root cause is a buffer over-read during video packet processing, which can cause transient system instability or crashes affecting availability but not data confidentiality or integrity. This vulnerability primarily threatens devices that rely on Qualcomm Snapdragon chipsets for video processing, including smartphones, automotive infotainment systems, and IoT devices.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to availability of devices utilizing affected Qualcomm Snapdragon platforms. Mobile devices, automotive systems, and IoT infrastructure relying on these chipsets could experience transient denial of service conditions, potentially disrupting business operations, communications, or critical automotive functions. Enterprises with large fleets of mobile devices or automotive manufacturers integrating Snapdragon-based modems and video processing units may face operational interruptions. Although the vulnerability does not compromise data confidentiality or integrity, availability impacts can degrade user experience and operational reliability. Given the widespread use of Qualcomm Snapdragon in European consumer electronics and automotive sectors, the disruption could affect end-users and industrial applications. The requirement for local privileges limits remote exploitation, but insider threats or compromised devices could trigger the DoS. The lack of known exploits reduces immediate risk, but organizations should prepare for potential future exploitation attempts.

Mitigation Recommendations

Organizations should monitor Qualcomm’s security advisories for patches addressing CVE-2025-27041 and apply them promptly once available. Until patches are released, restrict access to video firmware interfaces and limit local user privileges to trusted personnel only. Employ device hardening practices to reduce the attack surface, including disabling unnecessary video processing features if feasible. Implement monitoring to detect abnormal device behavior or crashes indicative of exploitation attempts. For automotive and IoT deployments, ensure secure firmware update mechanisms to facilitate timely patching. Network segmentation can help isolate affected devices to contain potential disruptions. Additionally, conduct security awareness training to mitigate insider threats that could exploit local privilege requirements. Collaborate with device vendors to confirm affected hardware and firmware versions and validate remediation status. Finally, consider deploying endpoint detection and response (EDR) solutions capable of identifying anomalous local activities related to video firmware processing.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2025-02-18T09:19:46.883Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e72afb32de7eb26af88b75

Added to database: 10/9/2025, 3:24:43 AM

Last enriched: 10/9/2025, 3:43:52 AM

Last updated: 10/9/2025, 4:15:00 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats