Skip to main content

CVE-2025-27073: CWE-617 Reachable Assertion in Qualcomm, Inc. Snapdragon

High
VulnerabilityCVE-2025-27073cvecve-2025-27073cwe-617
Published: Wed Aug 06 2025 (08/06/2025, 07:26:09 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Transient DOS while creating NDP instance.

AI-Powered Analysis

AILast updated: 08/06/2025, 08:03:23 UTC

Technical Analysis

CVE-2025-27073 is a high-severity vulnerability identified in a broad range of Qualcomm Snapdragon platforms and related chipsets. The vulnerability is classified as CWE-617, which corresponds to a Reachable Assertion flaw. Specifically, this vulnerability manifests as a transient Denial of Service (DoS) condition triggered during the creation of a Neighbor Discovery Protocol (NDP) instance. NDP is a critical component in IPv6 networking, responsible for functions such as address autoconfiguration and discovery of other network nodes. The assertion failure indicates that under certain conditions, the system encounters an unexpected state that causes it to halt or crash temporarily, disrupting normal operation. The vulnerability affects an extensive list of Qualcomm products, including multiple Snapdragon mobile platforms (e.g., Snapdragon 8 Gen 1, 8 Gen 2, 865 5G), FastConnect wireless subsystems, Immersive Home platforms, IPQ series, QCA series, and various modem and wireless connectivity chips. The CVSS v3.1 base score is 7.5, reflecting a high severity with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:H) without affecting confidentiality or integrity. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability could be exploited remotely by an unauthenticated attacker to cause temporary service disruption on affected devices by triggering the assertion failure during NDP instance creation. This could impact network connectivity and availability on devices using these chipsets, including smartphones, IoT devices, automotive systems, and enterprise networking equipment that rely on Qualcomm Snapdragon components for networking functions.

Potential Impact

For European organizations, the impact of CVE-2025-27073 could be significant due to the widespread use of Qualcomm Snapdragon chipsets in mobile devices, IoT infrastructure, and networking hardware. A transient DoS affecting network protocol handling could disrupt critical communications, especially in environments relying on IPv6 networking. Enterprises with large mobile workforces using affected Snapdragon-based smartphones may experience temporary loss of network connectivity, impacting productivity and communication. IoT deployments in smart buildings, industrial automation, or smart city infrastructure using affected platforms could face intermittent outages, potentially affecting operational continuity and safety systems. Telecommunications providers and network operators using Qualcomm-based equipment might see service degradation or outages, impacting end-users and business customers. The vulnerability's exploitation does not require authentication or user interaction, increasing the risk of remote attacks. While no data confidentiality or integrity loss is indicated, the availability impact could disrupt services and cause operational downtime. Given the critical role of networking in European digital infrastructure and the increasing adoption of IPv6, this vulnerability poses a tangible risk to service reliability and business continuity.

Mitigation Recommendations

Mitigation should focus on proactive network and device management strategies tailored to the affected Qualcomm platforms. Organizations should: 1) Monitor vendor advisories closely for official patches or firmware updates addressing CVE-2025-27073 and prioritize timely deployment once available. 2) Implement network segmentation and isolation for devices using affected chipsets to limit exposure and contain potential DoS impacts. 3) Employ IPv6 traffic filtering and anomaly detection to identify and block malformed or suspicious NDP packets that could trigger the assertion failure. 4) Use network intrusion prevention systems (IPS) with updated signatures to detect exploitation attempts targeting NDP vulnerabilities. 5) For critical infrastructure, consider fallback mechanisms or redundant network paths to maintain availability during transient outages. 6) Engage with device and equipment vendors to confirm vulnerability status and remediation timelines, ensuring coordinated patch management. 7) Educate IT and security teams on the specific nature of this vulnerability to enhance incident response readiness. These measures go beyond generic advice by focusing on network protocol-level defenses, vendor coordination, and operational continuity planning specific to Qualcomm Snapdragon-based environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2025-02-18T09:19:46.888Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689308a4ad5a09ad00ef0204

Added to database: 8/6/2025, 7:47:48 AM

Last enriched: 8/6/2025, 8:03:23 AM

Last updated: 8/8/2025, 12:34:03 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats