Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27059: CWE-823 Use of Out-of-range Pointer Offset in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-27059cvecve-2025-27059cwe-823
Published: Thu Oct 09 2025 (10/09/2025, 03:18:04 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while performing SCM call.

AI-Powered Analysis

AILast updated: 10/09/2025, 03:42:13 UTC

Technical Analysis

CVE-2025-27059 is a vulnerability identified in Qualcomm Snapdragon chipsets, specifically related to the use of an out-of-range pointer offset during Secure Channel Manager (SCM) calls, classified under CWE-823 (Use of Out-of-range Pointer Offset). This flaw causes memory corruption, which can be exploited by an attacker with local privileges to execute arbitrary code or cause denial of service. The affected products include a broad range of Snapdragon platforms such as Immersive Home series (214, 216, 316, 318) and various IPQ and QCN series chipsets (e.g., IPQ5010, QCN9000, QCN9274). The vulnerability has a CVSS v3.1 base score of 8.8, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and scope changed (S:C). The impact covers confidentiality, integrity, and availability, all rated high. The vulnerability allows an attacker with local access to corrupt memory during SCM calls, potentially leading to privilege escalation, arbitrary code execution, or system crashes. No patches were listed at the time of publication, and no exploits are known in the wild, but the risk is significant given the severity and affected platforms. The vulnerability is particularly relevant for embedded systems, IoT devices, and mobile devices using these Snapdragon chipsets, which are widely deployed in telecommunications and consumer electronics.

Potential Impact

For European organizations, the impact of CVE-2025-27059 is substantial, especially those relying on Qualcomm Snapdragon-based devices in critical infrastructure such as telecommunications, IoT deployments, and enterprise mobile devices. Successful exploitation could lead to unauthorized access to sensitive data, disruption of services, and potential takeover of affected devices. This could compromise network integrity and availability, affecting business operations and customer trust. Given the broad range of affected Snapdragon platforms, including those used in network equipment and embedded systems, the vulnerability poses a risk to both consumer-facing and industrial environments. The high severity and scope change indicate that an exploit could affect multiple system components beyond the initial vulnerable module, amplifying the potential damage. European telecom providers, IoT service operators, and enterprises with Snapdragon-powered devices must consider this vulnerability a critical security concern.

Mitigation Recommendations

1. Monitor Qualcomm’s official security advisories and apply patches immediately once released for the affected Snapdragon platforms. 2. Restrict local access to devices running vulnerable Snapdragon chipsets by enforcing strict physical and logical access controls, including limiting administrative privileges and using strong authentication mechanisms. 3. Employ runtime protections such as memory protection mechanisms (e.g., DEP, ASLR) where supported by the device firmware to mitigate exploitation attempts. 4. Conduct thorough inventory and asset management to identify all devices using the affected Snapdragon platforms within the organization. 5. For embedded and IoT devices, implement network segmentation to isolate vulnerable devices from critical network segments. 6. Use endpoint detection and response (EDR) tools to monitor for unusual local activity indicative of exploitation attempts. 7. Engage with device vendors and service providers to confirm patch availability and deployment timelines. 8. Consider deploying compensating controls such as application whitelisting and behavior monitoring to detect and prevent exploitation in the absence of immediate patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2025-02-18T09:19:46.886Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e72afb32de7eb26af88b87

Added to database: 10/9/2025, 3:24:43 AM

Last enriched: 10/9/2025, 3:42:13 AM

Last updated: 10/9/2025, 3:59:59 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats