Skip to main content

CVE-2025-27072: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qualcomm, Inc. Snapdragon

Medium
VulnerabilityCVE-2025-27072cvecve-2025-27072cwe-120
Published: Wed Aug 06 2025 (08/06/2025, 07:26:08 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Information disclosure while processing a packet at EAVB BE side with invalid header length.

AI-Powered Analysis

AILast updated: 08/06/2025, 08:04:24 UTC

Technical Analysis

CVE-2025-27072 is a medium-severity vulnerability classified under CWE-120, which refers to a classic buffer overflow due to improper handling of input size during buffer copy operations. This specific vulnerability affects multiple Qualcomm Snapdragon chipsets, including a broad range of models such as QAM8255P, SA8150P, SA9000P, and others. The flaw arises when processing packets at the Ethernet Audio Video Bridging (EAVB) Back-End (BE) side, particularly when the packet contains an invalid header length. The vulnerability allows information disclosure by exploiting a buffer copy operation that does not properly check the size of the input data, potentially leading to reading beyond the intended buffer boundaries. The CVSS 3.1 base score is 5.5, indicating a medium severity level. The vector string (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) shows that the attack requires local access with low privileges, no user interaction, and results in high confidentiality impact without affecting integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability's root cause is a classic buffer overflow, which is a well-understood issue but remains critical due to the potential for sensitive data leakage from memory. Qualcomm Snapdragon chipsets are widely used in mobile devices, embedded systems, and IoT devices, making this vulnerability relevant for a broad range of hardware platforms.

Potential Impact

For European organizations, the impact of CVE-2025-27072 could be significant, especially for those relying on devices powered by affected Qualcomm Snapdragon chipsets. This includes smartphones, tablets, embedded systems in industrial IoT, automotive telematics, and networking equipment. The information disclosure risk could lead to leakage of sensitive data, such as cryptographic keys, user credentials, or proprietary information stored in memory buffers. Although the vulnerability does not directly allow code execution or denial of service, the confidentiality breach could facilitate further attacks or espionage. Organizations in sectors such as telecommunications, automotive manufacturing, critical infrastructure, and government agencies are particularly at risk due to their reliance on Snapdragon-based devices and the sensitivity of their data. The requirement for local access with low privileges limits remote exploitation but does not eliminate risk in scenarios where attackers gain physical or local network access, such as through compromised devices or insider threats. The absence of known exploits in the wild suggests limited immediate risk, but the broad device footprint and potential for future exploit development necessitate proactive mitigation.

Mitigation Recommendations

Given the local access requirement, European organizations should focus on strengthening physical and local network security controls to prevent unauthorized access to vulnerable devices. Specific mitigation steps include: 1) Inventory and identify all devices using affected Qualcomm Snapdragon chipsets within the organization’s environment. 2) Monitor vendor communications closely for official patches or firmware updates addressing CVE-2025-27072 and apply them promptly once available. 3) Implement strict access controls and device hardening to limit local user privileges and prevent unauthorized device manipulation. 4) Employ network segmentation to isolate critical devices and reduce the attack surface for local exploits. 5) Use endpoint detection and response (EDR) tools to monitor for unusual local activity that could indicate exploitation attempts. 6) Educate users and administrators about the risks of local access vulnerabilities and enforce policies to prevent unauthorized physical access to devices. 7) For embedded and IoT devices, consider deploying runtime protections such as memory safety enforcement or anomaly detection to mitigate buffer overflow exploitation. 8) Collaborate with device manufacturers and suppliers to ensure timely vulnerability management and secure device lifecycle practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2025-02-18T09:19:46.888Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689308a3ad5a09ad00ef01f7

Added to database: 8/6/2025, 7:47:47 AM

Last enriched: 8/6/2025, 8:04:24 AM

Last updated: 8/8/2025, 12:34:03 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats