Skip to main content

CVE-2025-27055: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon

High
VulnerabilityCVE-2025-27055cvecve-2025-27055cwe-126
Published: Tue Jul 08 2025 (07/08/2025, 12:49:16 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption during the image encoding process.

AI-Powered Analysis

AILast updated: 07/08/2025, 13:10:41 UTC

Technical Analysis

CVE-2025-27055 is a high-severity buffer over-read vulnerability (CWE-126) affecting multiple Qualcomm Snapdragon platforms and related components. The flaw arises during the image encoding process, where improper bounds checking leads to memory corruption by reading beyond the allocated buffer. This vulnerability impacts a wide range of Snapdragon SoCs and FastConnect wireless subsystems, including but not limited to Snapdragon 7c, 8c, and 8cx Compute Platforms, FastConnect 6200 through 7800 series, and various Qualcomm audio and video collaboration platforms. The CVSS 3.1 score of 7.8 indicates a high impact, with the vector showing local attack vector (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Exploitation could allow an attacker with local access and limited privileges to cause memory corruption, potentially leading to arbitrary code execution, privilege escalation, or denial of service. Although no known exploits are currently reported in the wild, the broad range of affected devices and the critical impact on core system components make this vulnerability a significant risk. The lack of available patches at the time of publication further increases exposure. Given the involvement of image encoding, the vulnerability might be triggered by processing specially crafted image data, which could be delivered via local applications or services handling media content on affected devices.

Potential Impact

For European organizations, the impact of CVE-2025-27055 is considerable, especially those relying on devices powered by affected Qualcomm Snapdragon platforms. This includes enterprises using laptops, tablets, IoT devices, and mobile devices with Snapdragon SoCs in their operations. The vulnerability could be exploited to gain unauthorized access, execute arbitrary code, or disrupt services, potentially compromising sensitive data and operational continuity. Industries such as telecommunications, manufacturing, healthcare, and critical infrastructure that deploy Snapdragon-based devices for communication or edge computing are at heightened risk. The high confidentiality, integrity, and availability impact means that data breaches, system takeovers, or denial of service incidents could occur, leading to regulatory compliance issues under GDPR and other European data protection laws. Additionally, the local attack vector implies that insider threats or attackers with physical or network proximity could exploit this flaw, emphasizing the need for strict access controls and monitoring within organizational environments.

Mitigation Recommendations

Organizations should prioritize the following mitigation steps: 1) Inventory and identify all devices and systems using affected Qualcomm Snapdragon platforms and components. 2) Monitor Qualcomm and device vendors for official patches or firmware updates addressing CVE-2025-27055 and apply them promptly once available. 3) Until patches are released, implement strict access controls to limit local access to affected devices, including enforcing least privilege principles and physical security measures. 4) Employ application whitelisting and endpoint detection and response (EDR) solutions to detect anomalous behavior indicative of exploitation attempts. 5) Restrict or monitor the processing of untrusted image data on affected devices, especially from external or removable media sources. 6) Conduct security awareness training to inform users about the risks of local exploitation and the importance of device security. 7) Collaborate with supply chain partners to ensure that devices are updated and secured against this vulnerability. These targeted actions go beyond generic advice by focusing on the specific nature of the vulnerability (local exploitation via image encoding) and the affected platforms.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2025-02-18T09:19:46.885Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d15076f40f0eb72f50fc4

Added to database: 7/8/2025, 12:54:31 PM

Last enriched: 7/8/2025, 1:10:41 PM

Last updated: 8/13/2025, 1:50:07 AM

Views: 29

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats