CVE-2025-27065: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon
Transient DOS while processing a frame with malformed shared-key descriptor.
AI Analysis
Technical Summary
CVE-2025-27065 is a high-severity vulnerability identified in a broad range of Qualcomm Snapdragon platforms and associated wireless connectivity chipsets. The vulnerability is classified as CWE-126, which corresponds to a buffer over-read condition. Specifically, this issue occurs when processing a frame containing a malformed shared-key descriptor, leading to a transient denial-of-service (DoS) condition. The affected products include numerous Snapdragon mobile platforms (from Snapdragon 8 Gen 1 through Gen 3, Snapdragon 865 series, and others), FastConnect wireless subsystems, Immersive Home platforms, IPQ series, QCA series wireless chipsets, and various other Qualcomm wireless and modem components. The vulnerability allows an unauthenticated attacker to send specially crafted frames over the network, triggering a buffer over-read during frame processing. This results in a temporary DoS state, potentially causing the affected device or subsystem to crash or become unresponsive. The CVSS v3.1 base score is 7.5, reflecting a high severity due to network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). No known exploits are currently reported in the wild, and no patches are linked yet. The vulnerability affects a wide array of Qualcomm wireless and mobile SoCs and chipsets, which are embedded in many consumer and enterprise devices, including smartphones, IoT devices, automotive systems, and networking equipment. The transient DoS could disrupt wireless connectivity, degrade device performance, or cause system instability during exploitation attempts.
Potential Impact
For European organizations, the impact of CVE-2025-27065 can be significant due to the widespread use of Qualcomm Snapdragon chipsets in mobile devices, IoT endpoints, and networking hardware. Enterprises relying on mobile communications, remote IoT sensors, or wireless infrastructure that incorporate affected Qualcomm components may experience service disruptions or degraded availability if targeted. The transient DoS could interrupt critical communications, affecting business operations, especially in sectors like telecommunications, finance, healthcare, and manufacturing where wireless connectivity is essential. Additionally, automotive systems using Snapdragon platforms for telematics or infotainment could face temporary outages, potentially impacting safety or user experience. Although the vulnerability does not compromise confidentiality or integrity, the availability impact can lead to operational downtime, increased support costs, and potential reputational damage. The lack of required privileges or user interaction means attackers can attempt exploitation remotely over the network, increasing the risk surface. However, the absence of known exploits in the wild currently reduces immediate threat levels, but proactive mitigation is advised given the broad device footprint.
Mitigation Recommendations
1. Monitor Qualcomm and device vendors for official patches or firmware updates addressing CVE-2025-27065 and apply them promptly once available. 2. Implement network-level filtering to detect and block malformed frames or suspicious wireless traffic patterns that could trigger the vulnerability, using advanced intrusion detection/prevention systems (IDS/IPS) tailored for wireless protocols. 3. For enterprise-managed mobile devices, enforce strict network access controls and use Mobile Device Management (MDM) solutions to ensure devices are updated and monitored for anomalous behavior. 4. Segment critical wireless networks to limit exposure and reduce the attack surface, isolating vulnerable devices from sensitive systems. 5. Conduct regular wireless network audits and vulnerability assessments to identify devices with affected Qualcomm chipsets and prioritize remediation. 6. In automotive or IoT deployments, coordinate with hardware vendors to schedule firmware updates and consider fallback mechanisms to maintain availability during patching. 7. Educate security teams on monitoring for transient DoS symptoms related to wireless connectivity issues that may indicate exploitation attempts. These targeted measures go beyond generic advice by focusing on network traffic filtering, device management, and segmentation specific to the affected Qualcomm wireless components.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland, Belgium
CVE-2025-27065: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon
Description
Transient DOS while processing a frame with malformed shared-key descriptor.
AI-Powered Analysis
Technical Analysis
CVE-2025-27065 is a high-severity vulnerability identified in a broad range of Qualcomm Snapdragon platforms and associated wireless connectivity chipsets. The vulnerability is classified as CWE-126, which corresponds to a buffer over-read condition. Specifically, this issue occurs when processing a frame containing a malformed shared-key descriptor, leading to a transient denial-of-service (DoS) condition. The affected products include numerous Snapdragon mobile platforms (from Snapdragon 8 Gen 1 through Gen 3, Snapdragon 865 series, and others), FastConnect wireless subsystems, Immersive Home platforms, IPQ series, QCA series wireless chipsets, and various other Qualcomm wireless and modem components. The vulnerability allows an unauthenticated attacker to send specially crafted frames over the network, triggering a buffer over-read during frame processing. This results in a temporary DoS state, potentially causing the affected device or subsystem to crash or become unresponsive. The CVSS v3.1 base score is 7.5, reflecting a high severity due to network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). No known exploits are currently reported in the wild, and no patches are linked yet. The vulnerability affects a wide array of Qualcomm wireless and mobile SoCs and chipsets, which are embedded in many consumer and enterprise devices, including smartphones, IoT devices, automotive systems, and networking equipment. The transient DoS could disrupt wireless connectivity, degrade device performance, or cause system instability during exploitation attempts.
Potential Impact
For European organizations, the impact of CVE-2025-27065 can be significant due to the widespread use of Qualcomm Snapdragon chipsets in mobile devices, IoT endpoints, and networking hardware. Enterprises relying on mobile communications, remote IoT sensors, or wireless infrastructure that incorporate affected Qualcomm components may experience service disruptions or degraded availability if targeted. The transient DoS could interrupt critical communications, affecting business operations, especially in sectors like telecommunications, finance, healthcare, and manufacturing where wireless connectivity is essential. Additionally, automotive systems using Snapdragon platforms for telematics or infotainment could face temporary outages, potentially impacting safety or user experience. Although the vulnerability does not compromise confidentiality or integrity, the availability impact can lead to operational downtime, increased support costs, and potential reputational damage. The lack of required privileges or user interaction means attackers can attempt exploitation remotely over the network, increasing the risk surface. However, the absence of known exploits in the wild currently reduces immediate threat levels, but proactive mitigation is advised given the broad device footprint.
Mitigation Recommendations
1. Monitor Qualcomm and device vendors for official patches or firmware updates addressing CVE-2025-27065 and apply them promptly once available. 2. Implement network-level filtering to detect and block malformed frames or suspicious wireless traffic patterns that could trigger the vulnerability, using advanced intrusion detection/prevention systems (IDS/IPS) tailored for wireless protocols. 3. For enterprise-managed mobile devices, enforce strict network access controls and use Mobile Device Management (MDM) solutions to ensure devices are updated and monitored for anomalous behavior. 4. Segment critical wireless networks to limit exposure and reduce the attack surface, isolating vulnerable devices from sensitive systems. 5. Conduct regular wireless network audits and vulnerability assessments to identify devices with affected Qualcomm chipsets and prioritize remediation. 6. In automotive or IoT deployments, coordinate with hardware vendors to schedule firmware updates and consider fallback mechanisms to maintain availability during patching. 7. Educate security teams on monitoring for transient DoS symptoms related to wireless connectivity issues that may indicate exploitation attempts. These targeted measures go beyond generic advice by focusing on network traffic filtering, device management, and segmentation specific to the affected Qualcomm wireless components.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- qualcomm
- Date Reserved
- 2025-02-18T09:19:46.887Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 689308a3ad5a09ad00ef01e5
Added to database: 8/6/2025, 7:47:47 AM
Last enriched: 8/6/2025, 8:04:50 AM
Last updated: 10/16/2025, 11:52:15 PM
Views: 19
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-23073: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Wikimedia Foundation Mediawiki - GlobalBlocking Extension
LowCVE-2025-62504: CWE-416: Use After Free in envoyproxy envoy
MediumCVE-2025-11864: Server-Side Request Forgery in NucleoidAI Nucleoid
MediumCVE-2024-42192: CWE-522 Insufficiently Protected Credentials in HCL Software Traveler for Microsoft Outlook
MediumHackers exploit Cisco SNMP flaw to deploy rootkit on switches
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.