CVE-2025-27066: CWE-617 Reachable Assertion in Qualcomm, Inc. Snapdragon
Transient DOS while processing an ANQP message.
AI Analysis
Technical Summary
CVE-2025-27066 is a high-severity vulnerability identified in a broad range of Qualcomm Snapdragon products and platforms. The vulnerability is classified under CWE-617, which corresponds to a "Reachable Assertion" flaw. This type of vulnerability occurs when an assertion statement in the code can be triggered by crafted input, leading to unexpected behavior such as denial of service (DoS). Specifically, this vulnerability causes a transient denial of service while processing an Access Network Query Protocol (ANQP) message. ANQP is used in Wi-Fi networks to exchange information between clients and access points, often during network discovery and selection. The vulnerability affects a very wide array of Qualcomm products, including numerous Snapdragon mobile platforms (from older models like SD660 to recent ones like SD8 Gen 3), IoT modems, FastConnect wireless subsystems, automotive platforms, wearable platforms, and various other chipsets and modules. The CVSS v3.1 score is 7.5 (high), with the vector indicating that the attack can be performed remotely (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), no user interaction needed (UI:N), and impacts availability only (A:H) without affecting confidentiality or integrity. There are no known exploits in the wild yet, and no patches have been linked at the time of publication. The vulnerability could be triggered by sending a maliciously crafted ANQP message to a vulnerable device, causing it to assert and crash or reboot transiently, resulting in temporary service disruption. Given the extensive list of affected products, this vulnerability has a very broad attack surface across mobile, IoT, automotive, and wireless communication devices that use Qualcomm Snapdragon chipsets.
Potential Impact
For European organizations, the impact of CVE-2025-27066 could be significant, especially for those relying on devices and infrastructure powered by Qualcomm Snapdragon chipsets. The transient denial of service could disrupt mobile communications, IoT device operations, automotive systems, and wireless connectivity. This could affect enterprise mobile users, critical infrastructure relying on IoT sensors and devices, automotive fleets using Snapdragon-based telematics, and consumer devices used within corporate environments. Disruptions in wireless connectivity could degrade productivity, cause loss of real-time data, and impact safety-critical systems in automotive or industrial contexts. Although the vulnerability does not compromise confidentiality or integrity, the availability impact could lead to operational downtime and service interruptions. The broad range of affected products means that many sectors including telecommunications, manufacturing, automotive, healthcare, and public services could be impacted. The lack of known exploits currently reduces immediate risk, but the ease of exploitation (no privileges or user interaction needed) means attackers could develop exploits quickly once the vulnerability is publicly known. European organizations with large deployments of Qualcomm-based devices should consider this a high-priority issue.
Mitigation Recommendations
1. Monitor Qualcomm and device vendor advisories closely for patches or firmware updates addressing CVE-2025-27066 and apply them promptly once available. 2. Implement network-level filtering to block or scrutinize ANQP messages from untrusted or external sources, especially on Wi-Fi networks, to reduce exposure to malicious crafted ANQP packets. 3. For enterprise-managed mobile devices, enforce mobile device management (MDM) policies to ensure devices are updated regularly and restrict connectivity to trusted networks. 4. In automotive and IoT deployments, segment networks to isolate vulnerable devices and limit exposure to untrusted wireless traffic. 5. Employ anomaly detection systems to identify unusual network traffic patterns that could indicate attempts to exploit this vulnerability. 6. Engage with device manufacturers and suppliers to confirm the presence of this vulnerability in deployed hardware and request mitigation guidance or updates. 7. Prepare incident response plans to handle transient denial of service events affecting critical wireless communication systems. 8. Where possible, disable or restrict ANQP processing on devices or access points if not required for network operations.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland, Belgium
CVE-2025-27066: CWE-617 Reachable Assertion in Qualcomm, Inc. Snapdragon
Description
Transient DOS while processing an ANQP message.
AI-Powered Analysis
Technical Analysis
CVE-2025-27066 is a high-severity vulnerability identified in a broad range of Qualcomm Snapdragon products and platforms. The vulnerability is classified under CWE-617, which corresponds to a "Reachable Assertion" flaw. This type of vulnerability occurs when an assertion statement in the code can be triggered by crafted input, leading to unexpected behavior such as denial of service (DoS). Specifically, this vulnerability causes a transient denial of service while processing an Access Network Query Protocol (ANQP) message. ANQP is used in Wi-Fi networks to exchange information between clients and access points, often during network discovery and selection. The vulnerability affects a very wide array of Qualcomm products, including numerous Snapdragon mobile platforms (from older models like SD660 to recent ones like SD8 Gen 3), IoT modems, FastConnect wireless subsystems, automotive platforms, wearable platforms, and various other chipsets and modules. The CVSS v3.1 score is 7.5 (high), with the vector indicating that the attack can be performed remotely (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), no user interaction needed (UI:N), and impacts availability only (A:H) without affecting confidentiality or integrity. There are no known exploits in the wild yet, and no patches have been linked at the time of publication. The vulnerability could be triggered by sending a maliciously crafted ANQP message to a vulnerable device, causing it to assert and crash or reboot transiently, resulting in temporary service disruption. Given the extensive list of affected products, this vulnerability has a very broad attack surface across mobile, IoT, automotive, and wireless communication devices that use Qualcomm Snapdragon chipsets.
Potential Impact
For European organizations, the impact of CVE-2025-27066 could be significant, especially for those relying on devices and infrastructure powered by Qualcomm Snapdragon chipsets. The transient denial of service could disrupt mobile communications, IoT device operations, automotive systems, and wireless connectivity. This could affect enterprise mobile users, critical infrastructure relying on IoT sensors and devices, automotive fleets using Snapdragon-based telematics, and consumer devices used within corporate environments. Disruptions in wireless connectivity could degrade productivity, cause loss of real-time data, and impact safety-critical systems in automotive or industrial contexts. Although the vulnerability does not compromise confidentiality or integrity, the availability impact could lead to operational downtime and service interruptions. The broad range of affected products means that many sectors including telecommunications, manufacturing, automotive, healthcare, and public services could be impacted. The lack of known exploits currently reduces immediate risk, but the ease of exploitation (no privileges or user interaction needed) means attackers could develop exploits quickly once the vulnerability is publicly known. European organizations with large deployments of Qualcomm-based devices should consider this a high-priority issue.
Mitigation Recommendations
1. Monitor Qualcomm and device vendor advisories closely for patches or firmware updates addressing CVE-2025-27066 and apply them promptly once available. 2. Implement network-level filtering to block or scrutinize ANQP messages from untrusted or external sources, especially on Wi-Fi networks, to reduce exposure to malicious crafted ANQP packets. 3. For enterprise-managed mobile devices, enforce mobile device management (MDM) policies to ensure devices are updated regularly and restrict connectivity to trusted networks. 4. In automotive and IoT deployments, segment networks to isolate vulnerable devices and limit exposure to untrusted wireless traffic. 5. Employ anomaly detection systems to identify unusual network traffic patterns that could indicate attempts to exploit this vulnerability. 6. Engage with device manufacturers and suppliers to confirm the presence of this vulnerability in deployed hardware and request mitigation guidance or updates. 7. Prepare incident response plans to handle transient denial of service events affecting critical wireless communication systems. 8. Where possible, disable or restrict ANQP processing on devices or access points if not required for network operations.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- qualcomm
- Date Reserved
- 2025-02-18T09:19:46.887Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 689308a3ad5a09ad00ef01e8
Added to database: 8/6/2025, 7:47:47 AM
Last enriched: 8/6/2025, 8:04:37 AM
Last updated: 8/27/2025, 9:51:21 PM
Views: 8
Related Threats
CVE-2025-54142: CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') in Akamai AkamaiGhost
MediumCVE-2025-9600: SQL Injection in itsourcecode Apartment Management System
MediumCVE-2025-9599: SQL Injection in itsourcecode Apartment Management System
MediumCVE-2025-43284: An app may be able to cause unexpected system termination in Apple macOS
UnknownCVE-2025-43268: A malicious app may be able to gain root privileges in Apple macOS
UnknownActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.