Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47316: CWE-415 Double Free in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47316cvecve-2025-47316cwe-415
Published: Wed Sep 24 2025 (09/24/2025, 15:33:48 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption due to double free when multiple threads race to set the timestamp store.

AI-Powered Analysis

AILast updated: 10/02/2025, 01:14:07 UTC

Technical Analysis

CVE-2025-47316 is a high-severity memory corruption vulnerability classified under CWE-415 (Double Free) affecting multiple Qualcomm Snapdragon products, including various FastConnect modules, Snapdragon Compute Platforms, and associated wireless audio components. The flaw arises due to a race condition where multiple threads concurrently attempt to set a timestamp store, leading to a double free of memory. This double free can cause heap corruption, potentially allowing an attacker to execute arbitrary code, cause denial of service, or escalate privileges within the affected system. The vulnerability requires low privileges (PR:L) and no user interaction (UI:N) but has a local attack vector (AV:L), meaning the attacker must have local access to the device or system. The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability. The affected products span a wide range of Qualcomm Snapdragon chipsets and wireless components commonly used in mobile devices, laptops, and IoT devices. No known exploits are currently in the wild, and no patches have been linked yet, indicating that mitigation efforts are either in progress or pending release. The vulnerability's root cause is a concurrency issue in memory management, which is notoriously difficult to detect and fix, increasing the risk of exploitation once a reliable exploit is developed. Given the broad product impact and the critical nature of the flaw, this vulnerability represents a significant security risk for devices using affected Qualcomm components.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially those relying on devices powered by Qualcomm Snapdragon chipsets, including smartphones, tablets, laptops, and IoT devices. The potential for local privilege escalation and arbitrary code execution could allow attackers to compromise sensitive corporate data, disrupt operations, or gain persistent footholds within enterprise networks. Industries such as telecommunications, finance, healthcare, and critical infrastructure, which often use mobile and edge computing devices, could be particularly impacted. The vulnerability could also affect supply chain security, as compromised devices might be used as entry points for broader attacks. Additionally, the lack of current patches increases the window of exposure, necessitating immediate risk assessment and mitigation. The impact extends to user privacy and data protection, which are critical under the GDPR framework, potentially leading to regulatory and reputational consequences if exploited.

Mitigation Recommendations

1. Immediate inventory and identification of all devices using affected Qualcomm Snapdragon components within the organization to understand exposure. 2. Apply vendor-provided patches as soon as they become available; maintain close communication with Qualcomm and device manufacturers for updates. 3. Implement strict local access controls and endpoint security measures to limit the ability of unprivileged users to execute code or access vulnerable components. 4. Employ runtime protection technologies such as memory protection, control flow integrity, and exploit mitigation frameworks (e.g., DEP, ASLR) to reduce exploitation likelihood. 5. Monitor device behavior for anomalies indicative of memory corruption or exploitation attempts, using advanced endpoint detection and response (EDR) tools. 6. For critical environments, consider network segmentation and device isolation to limit lateral movement if a device is compromised. 7. Educate users and administrators about the risks of local attacks and enforce policies to prevent unauthorized physical or logical access to devices. 8. Engage in vulnerability management processes to prioritize patching and risk mitigation based on device criticality and exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.260Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d41181d0cbc63b6d41b28d

Added to database: 9/24/2025, 3:42:57 PM

Last enriched: 10/2/2025, 1:14:07 AM

Last updated: 10/7/2025, 1:52:48 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats