Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27045: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon

0
Medium
VulnerabilityCVE-2025-27045cvecve-2025-27045cwe-126
Published: Thu Oct 09 2025 (10/09/2025, 03:17:56 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Information disclosure while processing batch command execution in Video driver.

AI-Powered Analysis

AILast updated: 10/09/2025, 03:43:37 UTC

Technical Analysis

CVE-2025-27045 is a buffer over-read vulnerability classified under CWE-126, discovered in the video driver component of Qualcomm Snapdragon chipsets. The vulnerability arises during the processing of batch command execution, where improper bounds checking leads to reading beyond the intended buffer limits. This flaw can cause sensitive information from adjacent memory regions to be disclosed to an attacker. The affected products include a wide range of Qualcomm components such as FastConnect 6900 and 7800, QCC2072, SC8380XP, WCD9378C, WCD9380, WCD9385, WSA8840, WSA8845, WSA8845H, and several X-series and XG-series chips. The CVSS v3.1 score is 6.1 (medium severity), with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity impact (I:N), and low availability impact (A:L). The vulnerability allows an attacker with local access and limited privileges to read sensitive data from memory, potentially exposing confidential information. No public exploits are currently known, and Qualcomm has not yet published patches. The flaw's exploitation does not require user interaction, increasing the risk if local access is obtained. This vulnerability primarily affects devices using the impacted Snapdragon chipsets, including smartphones, IoT devices, and embedded systems that incorporate these components.

Potential Impact

For European organizations, the primary impact of CVE-2025-27045 is the potential unauthorized disclosure of sensitive information from devices running affected Qualcomm Snapdragon chipsets. This could include corporate mobile devices, embedded systems in industrial or telecommunications infrastructure, and IoT devices. Confidentiality breaches may lead to exposure of proprietary data, credentials, or other sensitive information, which could facilitate further attacks or espionage. The requirement for local access and limited privileges reduces the likelihood of remote exploitation but does not eliminate risks from insider threats or compromised devices. The vulnerability could affect sectors with high reliance on mobile and embedded Qualcomm hardware, such as telecommunications providers, critical infrastructure operators, and enterprises with mobile workforces. Although no integrity or availability impacts are noted, the confidentiality breach alone can have significant regulatory and reputational consequences under European data protection laws like GDPR.

Mitigation Recommendations

To mitigate CVE-2025-27045, European organizations should: 1) Monitor Qualcomm's advisories closely and apply security patches promptly once released. 2) Restrict physical and local access to devices containing affected Snapdragon components to trusted personnel only. 3) Implement device hardening measures such as disabling unnecessary services and enforcing strong authentication to limit local privilege escalation. 4) Employ endpoint detection and response (EDR) solutions to monitor for suspicious local activity that could indicate exploitation attempts. 5) Conduct regular security audits and vulnerability assessments on mobile and embedded devices to identify and remediate exposure. 6) Use network segmentation to isolate critical systems from devices running vulnerable hardware. 7) Educate users and administrators about the risks of local attacks and the importance of device security hygiene. 8) Consider deploying mobile device management (MDM) solutions to enforce security policies and remotely manage device configurations. These steps go beyond generic advice by focusing on controlling local access and monitoring device behavior, which are critical given the attack vector and privilege requirements.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2025-02-18T09:19:46.884Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e72afb32de7eb26af88b78

Added to database: 10/9/2025, 3:24:43 AM

Last enriched: 10/9/2025, 3:43:37 AM

Last updated: 10/9/2025, 4:23:12 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats