CVE-2025-27064: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon
Information disclosure while registering commands from clients with diag through diagHal.
AI Analysis
Technical Summary
CVE-2025-27064 is a buffer over-read vulnerability classified under CWE-126 found in various Qualcomm Snapdragon platforms and related chipsets. The vulnerability arises during the process of registering commands from clients with the diagnostic interface (diag) through the diagHal component. This flaw allows an attacker with low-level privileges and local access to read beyond the intended memory boundaries, leading to unauthorized disclosure of sensitive information. The affected products include a broad range of Qualcomm chipsets such as FastConnect 6900 and 7800, Immersive Home platforms, multiple IPQ series, MDM9628, QCA series, Snapdragon 8 Gen 1 Mobile Platform, and automotive modem platforms among others. The CVSS v3.1 base score is 6.1, indicating a medium severity with a vector of AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L, meaning the attack requires local access with low privileges, no user interaction, and results in high confidentiality impact but no integrity or significant availability impact. No patches are currently linked, and no known exploits have been reported in the wild. The vulnerability could be leveraged to leak sensitive data from memory, potentially aiding further attacks or exposing confidential information. The broad range of affected chipsets indicates a wide attack surface spanning mobile devices, automotive systems, and IoT devices that rely on Qualcomm Snapdragon technology.
Potential Impact
For European organizations, the primary impact of CVE-2025-27064 is the potential unauthorized disclosure of sensitive information from devices using affected Qualcomm Snapdragon chipsets. This could include mobile phones, automotive telematics units, and IoT devices prevalent in enterprise and industrial environments. Confidentiality breaches may expose personal data, cryptographic keys, or proprietary information, increasing risks of targeted attacks or compliance violations under GDPR. The vulnerability requires local access with low privileges, which limits remote exploitation but raises concerns in environments where physical or local network access is possible, such as corporate offices, manufacturing plants, or automotive service centers. The wide range of affected chipsets means many device types could be vulnerable, complicating asset management and patch deployment. Although integrity and availability impacts are minimal, the information disclosure could facilitate subsequent attacks like privilege escalation or lateral movement. European organizations in sectors with high reliance on Qualcomm-powered devices, including telecommunications, automotive manufacturing, and critical infrastructure, face increased risk exposure.
Mitigation Recommendations
Organizations should implement a multi-layered mitigation strategy beyond generic patching advice. First, inventory all devices using affected Qualcomm Snapdragon chipsets, including mobile, automotive, and IoT devices, to understand exposure. Restrict local access to these devices by enforcing strict physical security controls and network segmentation to limit potential attacker proximity. Deploy endpoint detection and response (EDR) solutions capable of monitoring unusual local command registrations or diagnostic interface usage. Collaborate with device vendors and Qualcomm for timely security patches and firmware updates; prioritize patching on high-value or sensitive devices. Where patching is delayed, consider disabling or restricting diagnostic interfaces (diag/diagHal) if feasible without impacting critical functionality. Implement strict access controls and privilege management to minimize the number of users with local low-level access. Conduct regular security audits and penetration tests focusing on local privilege abuse scenarios. Finally, educate staff about the risks of local device access and enforce policies to prevent unauthorized physical or network access to vulnerable devices.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium
CVE-2025-27064: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon
Description
Information disclosure while registering commands from clients with diag through diagHal.
AI-Powered Analysis
Technical Analysis
CVE-2025-27064 is a buffer over-read vulnerability classified under CWE-126 found in various Qualcomm Snapdragon platforms and related chipsets. The vulnerability arises during the process of registering commands from clients with the diagnostic interface (diag) through the diagHal component. This flaw allows an attacker with low-level privileges and local access to read beyond the intended memory boundaries, leading to unauthorized disclosure of sensitive information. The affected products include a broad range of Qualcomm chipsets such as FastConnect 6900 and 7800, Immersive Home platforms, multiple IPQ series, MDM9628, QCA series, Snapdragon 8 Gen 1 Mobile Platform, and automotive modem platforms among others. The CVSS v3.1 base score is 6.1, indicating a medium severity with a vector of AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L, meaning the attack requires local access with low privileges, no user interaction, and results in high confidentiality impact but no integrity or significant availability impact. No patches are currently linked, and no known exploits have been reported in the wild. The vulnerability could be leveraged to leak sensitive data from memory, potentially aiding further attacks or exposing confidential information. The broad range of affected chipsets indicates a wide attack surface spanning mobile devices, automotive systems, and IoT devices that rely on Qualcomm Snapdragon technology.
Potential Impact
For European organizations, the primary impact of CVE-2025-27064 is the potential unauthorized disclosure of sensitive information from devices using affected Qualcomm Snapdragon chipsets. This could include mobile phones, automotive telematics units, and IoT devices prevalent in enterprise and industrial environments. Confidentiality breaches may expose personal data, cryptographic keys, or proprietary information, increasing risks of targeted attacks or compliance violations under GDPR. The vulnerability requires local access with low privileges, which limits remote exploitation but raises concerns in environments where physical or local network access is possible, such as corporate offices, manufacturing plants, or automotive service centers. The wide range of affected chipsets means many device types could be vulnerable, complicating asset management and patch deployment. Although integrity and availability impacts are minimal, the information disclosure could facilitate subsequent attacks like privilege escalation or lateral movement. European organizations in sectors with high reliance on Qualcomm-powered devices, including telecommunications, automotive manufacturing, and critical infrastructure, face increased risk exposure.
Mitigation Recommendations
Organizations should implement a multi-layered mitigation strategy beyond generic patching advice. First, inventory all devices using affected Qualcomm Snapdragon chipsets, including mobile, automotive, and IoT devices, to understand exposure. Restrict local access to these devices by enforcing strict physical security controls and network segmentation to limit potential attacker proximity. Deploy endpoint detection and response (EDR) solutions capable of monitoring unusual local command registrations or diagnostic interface usage. Collaborate with device vendors and Qualcomm for timely security patches and firmware updates; prioritize patching on high-value or sensitive devices. Where patching is delayed, consider disabling or restricting diagnostic interfaces (diag/diagHal) if feasible without impacting critical functionality. Implement strict access controls and privilege management to minimize the number of users with local low-level access. Conduct regular security audits and penetration tests focusing on local privilege abuse scenarios. Finally, educate staff about the risks of local device access and enforce policies to prevent unauthorized physical or network access to vulnerable devices.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- qualcomm
- Date Reserved
- 2025-02-18T09:19:46.887Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690977bf78d4f574c2b12d2a
Added to database: 11/4/2025, 3:49:19 AM
Last enriched: 11/4/2025, 4:03:41 AM
Last updated: 11/5/2025, 1:58:22 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
U.S. Sanctions 10 North Korean Entities for Laundering $12.7M in Crypto and IT Fraud
MediumMysterious 'SmudgedSerpent' Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions
MediumCVE-2025-12497: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in averta Premium Portfolio Features for Phlox theme
HighCVE-2025-11745: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in spacetime Ad Inserter – Ad Manager & AdSense Ads
MediumNikkei Says 17,000 Impacted by Data Breach Stemming From Slack Account Hack
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.