CVE-2025-27065: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon
Transient DOS while processing a frame with malformed shared-key descriptor.
AI Analysis
Technical Summary
CVE-2025-27065 is a high-severity vulnerability identified in a broad range of Qualcomm Snapdragon platforms and associated wireless connectivity chipsets. The vulnerability is classified as CWE-126, which corresponds to a buffer over-read condition. Specifically, this issue occurs when processing a frame containing a malformed shared-key descriptor, leading to a transient denial-of-service (DoS) condition. The affected products include numerous Snapdragon mobile platforms (from Snapdragon 8 Gen 1 through Gen 3, Snapdragon 865 series, and others), FastConnect wireless subsystems, Immersive Home platforms, IPQ series, QCA series wireless chipsets, and various other Qualcomm wireless and modem components. The vulnerability allows an unauthenticated attacker to send specially crafted frames over the network, triggering a buffer over-read during frame processing. This results in a temporary DoS state, potentially causing the affected device or subsystem to crash or become unresponsive. The CVSS v3.1 base score is 7.5, reflecting a high severity due to network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). No known exploits are currently reported in the wild, and no patches are linked yet. The vulnerability affects a wide array of Qualcomm wireless and mobile SoCs and chipsets, which are embedded in many consumer and enterprise devices, including smartphones, IoT devices, automotive systems, and networking equipment. The transient DoS could disrupt wireless connectivity, degrade device performance, or cause system instability during exploitation attempts.
Potential Impact
For European organizations, the impact of CVE-2025-27065 can be significant due to the widespread use of Qualcomm Snapdragon chipsets in mobile devices, IoT endpoints, and networking hardware. Enterprises relying on mobile communications, remote IoT sensors, or wireless infrastructure that incorporate affected Qualcomm components may experience service disruptions or degraded availability if targeted. The transient DoS could interrupt critical communications, affecting business operations, especially in sectors like telecommunications, finance, healthcare, and manufacturing where wireless connectivity is essential. Additionally, automotive systems using Snapdragon platforms for telematics or infotainment could face temporary outages, potentially impacting safety or user experience. Although the vulnerability does not compromise confidentiality or integrity, the availability impact can lead to operational downtime, increased support costs, and potential reputational damage. The lack of required privileges or user interaction means attackers can attempt exploitation remotely over the network, increasing the risk surface. However, the absence of known exploits in the wild currently reduces immediate threat levels, but proactive mitigation is advised given the broad device footprint.
Mitigation Recommendations
1. Monitor Qualcomm and device vendors for official patches or firmware updates addressing CVE-2025-27065 and apply them promptly once available. 2. Implement network-level filtering to detect and block malformed frames or suspicious wireless traffic patterns that could trigger the vulnerability, using advanced intrusion detection/prevention systems (IDS/IPS) tailored for wireless protocols. 3. For enterprise-managed mobile devices, enforce strict network access controls and use Mobile Device Management (MDM) solutions to ensure devices are updated and monitored for anomalous behavior. 4. Segment critical wireless networks to limit exposure and reduce the attack surface, isolating vulnerable devices from sensitive systems. 5. Conduct regular wireless network audits and vulnerability assessments to identify devices with affected Qualcomm chipsets and prioritize remediation. 6. In automotive or IoT deployments, coordinate with hardware vendors to schedule firmware updates and consider fallback mechanisms to maintain availability during patching. 7. Educate security teams on monitoring for transient DoS symptoms related to wireless connectivity issues that may indicate exploitation attempts. These targeted measures go beyond generic advice by focusing on network traffic filtering, device management, and segmentation specific to the affected Qualcomm wireless components.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland, Belgium
CVE-2025-27065: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon
Description
Transient DOS while processing a frame with malformed shared-key descriptor.
AI-Powered Analysis
Technical Analysis
CVE-2025-27065 is a high-severity vulnerability identified in a broad range of Qualcomm Snapdragon platforms and associated wireless connectivity chipsets. The vulnerability is classified as CWE-126, which corresponds to a buffer over-read condition. Specifically, this issue occurs when processing a frame containing a malformed shared-key descriptor, leading to a transient denial-of-service (DoS) condition. The affected products include numerous Snapdragon mobile platforms (from Snapdragon 8 Gen 1 through Gen 3, Snapdragon 865 series, and others), FastConnect wireless subsystems, Immersive Home platforms, IPQ series, QCA series wireless chipsets, and various other Qualcomm wireless and modem components. The vulnerability allows an unauthenticated attacker to send specially crafted frames over the network, triggering a buffer over-read during frame processing. This results in a temporary DoS state, potentially causing the affected device or subsystem to crash or become unresponsive. The CVSS v3.1 base score is 7.5, reflecting a high severity due to network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). No known exploits are currently reported in the wild, and no patches are linked yet. The vulnerability affects a wide array of Qualcomm wireless and mobile SoCs and chipsets, which are embedded in many consumer and enterprise devices, including smartphones, IoT devices, automotive systems, and networking equipment. The transient DoS could disrupt wireless connectivity, degrade device performance, or cause system instability during exploitation attempts.
Potential Impact
For European organizations, the impact of CVE-2025-27065 can be significant due to the widespread use of Qualcomm Snapdragon chipsets in mobile devices, IoT endpoints, and networking hardware. Enterprises relying on mobile communications, remote IoT sensors, or wireless infrastructure that incorporate affected Qualcomm components may experience service disruptions or degraded availability if targeted. The transient DoS could interrupt critical communications, affecting business operations, especially in sectors like telecommunications, finance, healthcare, and manufacturing where wireless connectivity is essential. Additionally, automotive systems using Snapdragon platforms for telematics or infotainment could face temporary outages, potentially impacting safety or user experience. Although the vulnerability does not compromise confidentiality or integrity, the availability impact can lead to operational downtime, increased support costs, and potential reputational damage. The lack of required privileges or user interaction means attackers can attempt exploitation remotely over the network, increasing the risk surface. However, the absence of known exploits in the wild currently reduces immediate threat levels, but proactive mitigation is advised given the broad device footprint.
Mitigation Recommendations
1. Monitor Qualcomm and device vendors for official patches or firmware updates addressing CVE-2025-27065 and apply them promptly once available. 2. Implement network-level filtering to detect and block malformed frames or suspicious wireless traffic patterns that could trigger the vulnerability, using advanced intrusion detection/prevention systems (IDS/IPS) tailored for wireless protocols. 3. For enterprise-managed mobile devices, enforce strict network access controls and use Mobile Device Management (MDM) solutions to ensure devices are updated and monitored for anomalous behavior. 4. Segment critical wireless networks to limit exposure and reduce the attack surface, isolating vulnerable devices from sensitive systems. 5. Conduct regular wireless network audits and vulnerability assessments to identify devices with affected Qualcomm chipsets and prioritize remediation. 6. In automotive or IoT deployments, coordinate with hardware vendors to schedule firmware updates and consider fallback mechanisms to maintain availability during patching. 7. Educate security teams on monitoring for transient DoS symptoms related to wireless connectivity issues that may indicate exploitation attempts. These targeted measures go beyond generic advice by focusing on network traffic filtering, device management, and segmentation specific to the affected Qualcomm wireless components.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- qualcomm
- Date Reserved
- 2025-02-18T09:19:46.887Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 689308a3ad5a09ad00ef01e5
Added to database: 8/6/2025, 7:47:47 AM
Last enriched: 8/6/2025, 8:04:50 AM
Last updated: 9/2/2025, 11:17:37 AM
Views: 10
Related Threats
CVE-2025-58361: CWE-20: Improper Input Validation in MarceloTessaro promptcraft-forge-studio
CriticalCVE-2025-58353: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MarceloTessaro promptcraft-forge-studio
HighCVE-2025-32322: Elevation of privilege in Google Android
HighCVE-2025-22415: Elevation of privilege in Google Android
HighCVE-2025-22414: Elevation of privilege in Google Android
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.