Skip to main content

CVE-2025-27065: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon

High
VulnerabilityCVE-2025-27065cvecve-2025-27065cwe-126
Published: Wed Aug 06 2025 (08/06/2025, 07:26:01 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Transient DOS while processing a frame with malformed shared-key descriptor.

AI-Powered Analysis

AILast updated: 08/06/2025, 08:04:50 UTC

Technical Analysis

CVE-2025-27065 is a high-severity vulnerability identified in a broad range of Qualcomm Snapdragon platforms and associated wireless connectivity chipsets. The vulnerability is classified as CWE-126, which corresponds to a buffer over-read condition. Specifically, this issue occurs when processing a frame containing a malformed shared-key descriptor, leading to a transient denial-of-service (DoS) condition. The affected products include numerous Snapdragon mobile platforms (from Snapdragon 8 Gen 1 through Gen 3, Snapdragon 865 series, and others), FastConnect wireless subsystems, Immersive Home platforms, IPQ series, QCA series wireless chipsets, and various other Qualcomm wireless and modem components. The vulnerability allows an unauthenticated attacker to send specially crafted frames over the network, triggering a buffer over-read during frame processing. This results in a temporary DoS state, potentially causing the affected device or subsystem to crash or become unresponsive. The CVSS v3.1 base score is 7.5, reflecting a high severity due to network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). No known exploits are currently reported in the wild, and no patches are linked yet. The vulnerability affects a wide array of Qualcomm wireless and mobile SoCs and chipsets, which are embedded in many consumer and enterprise devices, including smartphones, IoT devices, automotive systems, and networking equipment. The transient DoS could disrupt wireless connectivity, degrade device performance, or cause system instability during exploitation attempts.

Potential Impact

For European organizations, the impact of CVE-2025-27065 can be significant due to the widespread use of Qualcomm Snapdragon chipsets in mobile devices, IoT endpoints, and networking hardware. Enterprises relying on mobile communications, remote IoT sensors, or wireless infrastructure that incorporate affected Qualcomm components may experience service disruptions or degraded availability if targeted. The transient DoS could interrupt critical communications, affecting business operations, especially in sectors like telecommunications, finance, healthcare, and manufacturing where wireless connectivity is essential. Additionally, automotive systems using Snapdragon platforms for telematics or infotainment could face temporary outages, potentially impacting safety or user experience. Although the vulnerability does not compromise confidentiality or integrity, the availability impact can lead to operational downtime, increased support costs, and potential reputational damage. The lack of required privileges or user interaction means attackers can attempt exploitation remotely over the network, increasing the risk surface. However, the absence of known exploits in the wild currently reduces immediate threat levels, but proactive mitigation is advised given the broad device footprint.

Mitigation Recommendations

1. Monitor Qualcomm and device vendors for official patches or firmware updates addressing CVE-2025-27065 and apply them promptly once available. 2. Implement network-level filtering to detect and block malformed frames or suspicious wireless traffic patterns that could trigger the vulnerability, using advanced intrusion detection/prevention systems (IDS/IPS) tailored for wireless protocols. 3. For enterprise-managed mobile devices, enforce strict network access controls and use Mobile Device Management (MDM) solutions to ensure devices are updated and monitored for anomalous behavior. 4. Segment critical wireless networks to limit exposure and reduce the attack surface, isolating vulnerable devices from sensitive systems. 5. Conduct regular wireless network audits and vulnerability assessments to identify devices with affected Qualcomm chipsets and prioritize remediation. 6. In automotive or IoT deployments, coordinate with hardware vendors to schedule firmware updates and consider fallback mechanisms to maintain availability during patching. 7. Educate security teams on monitoring for transient DoS symptoms related to wireless connectivity issues that may indicate exploitation attempts. These targeted measures go beyond generic advice by focusing on network traffic filtering, device management, and segmentation specific to the affected Qualcomm wireless components.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2025-02-18T09:19:46.887Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689308a3ad5a09ad00ef01e5

Added to database: 8/6/2025, 7:47:47 AM

Last enriched: 8/6/2025, 8:04:50 AM

Last updated: 9/2/2025, 11:17:37 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats