Skip to main content

CVE-2025-27057: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon

High
VulnerabilityCVE-2025-27057cvecve-2025-27057cwe-126
Published: Tue Jul 08 2025 (07/08/2025, 12:49:18 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Transient DOS while handling beacon frames with invalid IE header length.

AI-Powered Analysis

AILast updated: 07/08/2025, 13:10:05 UTC

Technical Analysis

CVE-2025-27057 is a high-severity buffer over-read vulnerability classified under CWE-126 affecting a wide range of Qualcomm Snapdragon platforms and related wireless connectivity chipsets. The vulnerability arises from improper handling of beacon frames containing invalid Information Element (IE) header lengths, which leads to a transient Denial of Service (DoS) condition. Specifically, when the affected Snapdragon components process malformed beacon frames with incorrect IE header lengths, they read beyond the allocated buffer boundaries, causing system instability or crashes. This vulnerability impacts numerous Qualcomm products, including various Snapdragon mobile platforms (such as Snapdragon 8 Gen 2, Gen 3, and others), FastConnect wireless subsystems, Immersive Home platforms, IPQ series, QCA series, QCN series, QCS series, and others used in mobile devices, IoT, automotive, and networking equipment. The CVSS v3.1 base score is 7.5, reflecting a high severity due to network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:H) without affecting confidentiality or integrity. The vulnerability does not require authentication or user interaction, making it remotely exploitable by an attacker sending crafted beacon frames over the air. Although no known exploits are currently reported in the wild, the broad range of affected devices and ease of exploitation pose a significant risk. The lack of available patches at the time of publication increases the urgency for mitigation. This vulnerability primarily affects the wireless communication stack, which is critical for device connectivity and network availability.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to the availability of wireless communication infrastructure and connected devices. Many enterprises, telecom providers, and critical infrastructure operators in Europe rely on Qualcomm Snapdragon-based hardware for mobile communications, IoT deployments, and networking equipment. Exploitation could lead to transient DoS conditions, disrupting wireless connectivity, causing service outages, and impacting business operations reliant on mobile and wireless networks. This is particularly critical for sectors such as telecommunications, transportation, healthcare, and manufacturing, where reliable wireless communication is essential. The vulnerability could also affect consumer devices widely used in Europe, potentially leading to widespread service interruptions. Given the remote exploitability and no requirement for authentication, attackers could launch denial of service attacks from nearby wireless networks or through compromised devices, amplifying the threat landscape. The transient nature of the DoS might complicate detection and remediation, leading to intermittent connectivity issues that degrade user experience and operational continuity.

Mitigation Recommendations

1. Immediate mitigation should focus on network-level controls to filter and monitor beacon frames with anomalous or malformed IE header lengths. Deploy advanced wireless intrusion detection/prevention systems (WIDS/WIPS) capable of identifying and blocking suspicious beacon frames. 2. Coordinate with device and equipment vendors to obtain and apply firmware or software updates as soon as patches become available. Qualcomm and OEMs should prioritize releasing fixes for affected platforms. 3. Implement network segmentation to isolate critical wireless infrastructure from untrusted or public wireless networks, reducing exposure to malicious beacon frames. 4. Employ robust monitoring and logging of wireless network traffic to detect unusual patterns indicative of exploitation attempts. 5. For enterprise mobile devices, enforce strict device management policies including disabling unnecessary wireless interfaces when not in use and restricting connections to trusted networks. 6. Engage with telecom providers to ensure that base stations and network equipment using affected Qualcomm chipsets are updated and hardened against such attacks. 7. Educate security teams to recognize symptoms of transient DoS conditions related to wireless connectivity and establish incident response procedures tailored to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2025-02-18T09:19:46.886Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d15076f40f0eb72f50fca

Added to database: 7/8/2025, 12:54:31 PM

Last enriched: 7/8/2025, 1:10:05 PM

Last updated: 8/22/2025, 5:57:17 AM

Views: 46

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats