Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27074: CWE-131 Incorrect Calculation of Buffer Size in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-27074cvecve-2025-27074cwe-131
Published: Tue Nov 04 2025 (11/04/2025, 03:19:13 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while processing a GP command response.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:24:00 UTC

Technical Analysis

CVE-2025-27074 is a vulnerability identified in numerous Qualcomm Snapdragon platforms and related chipsets, stemming from an incorrect calculation of buffer size (CWE-131) during the processing of GP command responses. This flaw leads to memory corruption, which can be exploited by an attacker with low-level privileges on the device to manipulate memory, potentially resulting in arbitrary code execution, privilege escalation, or denial of service. The affected products span a broad range of Qualcomm hardware, including mobile platforms (e.g., Snapdragon 820, 821, 429), automotive platforms, IoT platforms (Immersive Home series), and various wireless connectivity chipsets (QCA series). The vulnerability does not require user interaction and can be exploited locally with low privileges, increasing the risk of compromise in environments where an attacker gains limited access. The CVSS v3.1 score of 8.8 indicates a high severity, with the vector showing low attack complexity, low privileges required, no user interaction, and a scope change, meaning the vulnerability affects components beyond the initially vulnerable module. Memory corruption vulnerabilities like this often lead to severe impacts including full system compromise. Although no exploits have been reported in the wild yet, the extensive list of affected devices and platforms, many of which are widely deployed in consumer, automotive, and industrial sectors, underscores the critical need for mitigation. Qualcomm has not yet published patches, so organizations must monitor for updates and apply them promptly once available.

Potential Impact

The impact of CVE-2025-27074 is significant due to the widespread deployment of affected Qualcomm Snapdragon platforms in smartphones, automotive systems, IoT devices, and wireless infrastructure. Successful exploitation can lead to arbitrary code execution, allowing attackers to gain unauthorized control over devices, escalate privileges, and compromise sensitive data confidentiality and integrity. Additionally, attackers can cause denial of service, disrupting device availability. The vulnerability’s local low-privilege exploitability means that attackers who gain limited access—such as through compromised applications or insider threats—can leverage this flaw to deepen their control. This poses risks to consumer privacy, automotive safety systems, industrial IoT reliability, and wireless network stability. The broad scope of affected devices increases the potential attack surface globally, impacting enterprises, service providers, and end users. The absence of known exploits currently provides a window for proactive defense, but the high severity score and critical nature of the flaw necessitate urgent mitigation to prevent future exploitation and potential large-scale impact.

Mitigation Recommendations

Given the absence of published patches at this time, organizations should implement the following specific mitigations: 1) Restrict local access to devices running affected Qualcomm Snapdragon platforms by enforcing strict user privilege separation and limiting administrative access to trusted personnel only. 2) Employ application whitelisting and runtime protection mechanisms to prevent untrusted code execution that could trigger the vulnerability. 3) Monitor device and system logs for unusual behavior indicative of memory corruption or exploitation attempts. 4) Segment networks to isolate critical devices, especially automotive and IoT platforms, reducing the risk of lateral movement by attackers with local access. 5) Coordinate with device vendors and Qualcomm for timely receipt and deployment of security patches once released. 6) For embedded and automotive systems, ensure secure boot and firmware integrity verification to prevent unauthorized firmware modifications that could exploit this vulnerability. 7) Conduct regular security assessments and penetration testing focusing on local privilege escalation vectors. These targeted actions go beyond generic advice by focusing on access control, monitoring, network segmentation, and vendor coordination tailored to the specific nature of this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-02-18T09:19:46.888Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690977bf78d4f574c2b12d30

Added to database: 11/4/2025, 3:49:19 AM

Last enriched: 2/27/2026, 1:24:00 AM

Last updated: 3/23/2026, 12:20:15 PM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses