Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27054: CWE-787: Out-of-bounds Write in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-27054cvecve-2025-27054cwe-787
Published: Thu Oct 09 2025 (10/09/2025, 03:18:03 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while processing a malformed license file during reboot.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:22:56 UTC

Technical Analysis

CVE-2025-27054 is a memory corruption vulnerability classified as an out-of-bounds write (CWE-787) found in Qualcomm Snapdragon products. The flaw arises during the processing of malformed license files at device reboot, leading to memory corruption that can be exploited to execute arbitrary code or cause denial of service. The vulnerability affects an extensive list of Qualcomm products, including various Snapdragon mobile platforms (from Snapdragon 4 Gen 1 to Snapdragon 8 Gen 3), IoT modems, automotive platforms, wearable platforms, compute platforms, and wireless connectivity chips. The CVSS v3.1 score is 7.8 (high severity), with attack vector local (AV:L), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and impacts confidentiality, integrity, and availability (C:H/I:H/A:H). Exploitation requires local access and privileges but no user interaction, meaning an attacker with limited access could leverage this vulnerability during reboot to gain elevated control or disrupt device operation. The vulnerability is currently published with no known exploits in the wild and no patches publicly available yet. The broad range of affected products indicates a systemic issue in license file handling code across Qualcomm's Snapdragon ecosystem. This vulnerability could be leveraged in targeted attacks against devices using these platforms, especially in environments where attackers can gain local access or manipulate license files. The memory corruption could lead to privilege escalation, arbitrary code execution, or persistent denial of service, severely impacting device security and reliability.

Potential Impact

The impact of CVE-2025-27054 is significant due to the broad range of affected Qualcomm Snapdragon platforms used globally in smartphones, IoT devices, automotive systems, wearables, and compute platforms. Successful exploitation can lead to full compromise of device confidentiality, integrity, and availability. This could allow attackers to execute arbitrary code with elevated privileges, potentially gaining persistent control over devices or causing system crashes and denial of service. For enterprises, this could mean compromised mobile endpoints, disrupted IoT operations, or vulnerable automotive systems, leading to data breaches, operational downtime, or safety risks. The requirement for local privileges limits remote exploitation but does not eliminate risk, as attackers could leverage social engineering, malware, or insider threats to gain initial access. The lack of current public exploits suggests a window for proactive mitigation, but the high severity and extensive affected product list underscore the urgency for patching and risk management. The vulnerability could also be leveraged in supply chain attacks or targeted espionage campaigns against critical infrastructure relying on Qualcomm hardware.

Mitigation Recommendations

1. Monitor Qualcomm advisories closely and apply official patches immediately once available to address the vulnerability in affected products. 2. Restrict access to license files and ensure they are validated and protected against tampering to prevent malformed file injection. 3. Implement strict access controls and privilege separation on devices to limit local user capabilities and reduce the risk of exploitation. 4. Employ runtime integrity monitoring and anomaly detection during device reboot processes to identify suspicious activity related to license file processing. 5. For enterprise-managed devices, enforce endpoint security policies that prevent unauthorized local access and use mobile device management (MDM) solutions to deploy updates rapidly. 6. Conduct security audits and penetration testing focusing on local privilege escalation vectors and license file handling mechanisms. 7. Collaborate with device manufacturers and vendors to confirm patch deployment and verify remediation effectiveness. 8. Educate users and administrators about the risks of local privilege misuse and the importance of applying security updates promptly. 9. Consider network segmentation and isolation for critical devices to limit attacker movement if local compromise occurs. 10. Maintain backups and recovery plans to mitigate potential denial-of-service impacts from exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2025-02-18T09:19:46.885Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e72afb32de7eb26af88b84

Added to database: 10/9/2025, 3:24:43 AM

Last enriched: 2/27/2026, 1:22:56 AM

Last updated: 3/24/2026, 5:46:48 PM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses