Skip to main content

CVE-2025-27051: CWE-415 Double Free in Qualcomm, Inc. Snapdragon

High
VulnerabilityCVE-2025-27051cvecve-2025-27051cwe-415
Published: Tue Jul 08 2025 (07/08/2025, 12:49:13 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while processing command message in WLAN Host.

AI-Powered Analysis

AILast updated: 07/08/2025, 13:11:11 UTC

Technical Analysis

CVE-2025-27051 is a high-severity vulnerability identified as a double free (CWE-415) in Qualcomm Snapdragon components, specifically within the WLAN Host processing of command messages. A double free occurs when a program calls free() twice on the same memory address, leading to memory corruption, which can be exploited to execute arbitrary code, cause denial of service, or escalate privileges. This vulnerability affects multiple Qualcomm FastConnect and Snapdragon chipset models, including FastConnect 6900, 7800, QCC2073, QCC2076, SC8380XP, WCD9380, WCD9385, WSA8840, WSA8845, and WSA8845H. The flaw arises during the handling of WLAN command messages, which are critical for wireless communication functions. The CVSS v3.1 score of 7.8 reflects a high impact with low attack complexity, requiring low privileges but no user interaction, and impacts confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability's nature and affected components make it a significant risk, especially as these chipsets are widely deployed in mobile devices and IoT products. The absence of published patches at this time increases the urgency for affected parties to monitor updates and implement interim mitigations.

Potential Impact

For European organizations, the impact of CVE-2025-27051 can be substantial due to the widespread use of Qualcomm Snapdragon chipsets in smartphones, tablets, and IoT devices prevalent in enterprise and consumer environments. Exploitation could lead to unauthorized access to sensitive data, disruption of wireless communications, and potential lateral movement within corporate networks. This is particularly critical for sectors relying heavily on mobile connectivity and IoT infrastructure, such as finance, healthcare, manufacturing, and telecommunications. The compromise of devices with these chipsets could undermine data confidentiality, integrity, and availability, potentially resulting in data breaches, operational downtime, and reputational damage. Given the low complexity of exploitation and lack of required user interaction, threat actors could automate attacks at scale, increasing risk exposure for European entities.

Mitigation Recommendations

Organizations should immediately inventory devices using the affected Qualcomm chipsets to assess exposure. Since no patches are currently available, interim mitigations include restricting WLAN command message processing through network segmentation and enhanced monitoring of wireless traffic for anomalous behavior indicative of exploitation attempts. Employing endpoint detection and response (EDR) solutions capable of identifying memory corruption patterns can help detect exploitation attempts early. Firmware and driver updates from device manufacturers should be closely tracked and applied promptly once released. Additionally, enforcing strict access controls and minimizing privileges on devices with these chipsets reduces the attack surface. For critical environments, consider isolating vulnerable devices or using alternative hardware until patches are available. Collaboration with vendors and participation in threat intelligence sharing within European cybersecurity communities will aid in timely response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2025-02-18T09:19:46.884Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d15066f40f0eb72f50fb4

Added to database: 7/8/2025, 12:54:30 PM

Last enriched: 7/8/2025, 1:11:11 PM

Last updated: 8/3/2025, 12:37:28 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats