Skip to main content

CVE-2025-27044: CWE-787: Out-of-bounds Write in Qualcomm, Inc. Snapdragon

High
VulnerabilityCVE-2025-27044cvecve-2025-27044cwe-787
Published: Tue Jul 08 2025 (07/08/2025, 12:49:08 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while executing timestamp video decode command with large input values.

AI-Powered Analysis

AILast updated: 07/08/2025, 13:12:25 UTC

Technical Analysis

CVE-2025-27044 is a high-severity vulnerability classified under CWE-787 (Out-of-bounds Write) affecting multiple Qualcomm Snapdragon components, specifically FastConnect 6900, FastConnect 7800, SC8380XP, WCD9380, WCD9385, WSA8840, WSA8845, and WSA8845H. The vulnerability arises from memory corruption triggered during the execution of a timestamp video decode command when processing large input values. This out-of-bounds write can lead to corruption of adjacent memory regions, potentially allowing an attacker with limited privileges (PR:L) and local access (AV:L) to escalate privileges or execute arbitrary code. The vulnerability does not require user interaction (UI:N) and impacts confidentiality, integrity, and availability (C:H/I:H/A:H). The CVSS 3.1 base score is 7.8, reflecting a high severity level. Exploitation requires local access and low complexity, but no user interaction, making it a significant risk especially on devices using affected Snapdragon components. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability's root cause is improper bounds checking in the video decode command processing, which can be triggered by supplying large input values, leading to memory corruption and potential system compromise.

Potential Impact

For European organizations, the impact of CVE-2025-27044 is considerable, particularly for enterprises and service providers relying on mobile devices, embedded systems, or IoT infrastructure powered by affected Qualcomm Snapdragon components. The vulnerability could allow attackers with local access—such as malicious insiders, compromised apps, or attackers gaining physical access—to execute arbitrary code or escalate privileges, potentially leading to data breaches, disruption of services, or unauthorized control over devices. This is especially critical for sectors handling sensitive data, including finance, healthcare, and government, where confidentiality and integrity are paramount. Additionally, the vulnerability could be leveraged to undermine device security, affecting mobile workforce productivity and trust in mobile communications. Given the widespread use of Snapdragon chips in smartphones and connected devices, the risk extends to supply chain security and endpoint protection strategies across European enterprises.

Mitigation Recommendations

To mitigate CVE-2025-27044, European organizations should prioritize the following actions: 1) Monitor Qualcomm and device manufacturers for official patches or firmware updates addressing this vulnerability and apply them promptly. 2) Implement strict device usage policies limiting local access to trusted personnel and restrict installation of unverified applications that could exploit local vulnerabilities. 3) Employ mobile device management (MDM) solutions to enforce security configurations and detect anomalous behavior indicative of exploitation attempts. 4) Conduct regular security assessments and penetration testing focusing on local privilege escalation vectors on devices using affected Snapdragon components. 5) Where possible, disable or restrict the use of timestamp video decode features or related functionalities until patches are available. 6) Educate users and administrators about the risks of local exploitation and the importance of physical device security. These targeted measures go beyond generic advice by focusing on controlling local access, monitoring device-specific features, and preparing for timely patch deployment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2025-02-18T09:19:46.884Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d15066f40f0eb72f50fa8

Added to database: 7/8/2025, 12:54:30 PM

Last enriched: 7/8/2025, 1:12:25 PM

Last updated: 8/11/2025, 2:18:07 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats