Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47317: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47317cvecve-2025-47317cwe-126
Published: Wed Sep 24 2025 (09/24/2025, 15:33:49 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption due to global buffer overflow when a test command uses an invalid payload type.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:40:23 UTC

Technical Analysis

CVE-2025-47317 is a buffer over-read vulnerability classified under CWE-126, discovered in Qualcomm Snapdragon chipsets and related platforms. The flaw arises from a global buffer overflow condition triggered when a test command is issued with an invalid payload type, causing memory corruption. This vulnerability affects a broad range of Qualcomm products, including FastConnect wireless modules (6200, 6700, 7800), various QCC series audio platforms, multiple Snapdragon mobile platforms (e.g., SM6475, SM6650, SM7550, SM8750), and several WCD and WCN wireless connectivity chips. The vulnerability allows an attacker with low-level privileges and local access to cause memory corruption without requiring user interaction. The CVSS v3.1 score of 7.8 reflects high severity due to the potential for significant confidentiality, integrity, and availability impacts. Although no exploits are currently known in the wild, the extensive list of affected platforms and the nature of the flaw make it a critical concern for device manufacturers and users relying on Qualcomm hardware. The vulnerability could be leveraged to execute arbitrary code, escalate privileges, or cause denial of service on affected devices. Qualcomm has reserved the CVE and published details but has not yet released patches. The flaw's exploitation vector is local, requiring access to the vulnerable interface, which may be exposed through diagnostic or test commands in firmware or driver layers.

Potential Impact

The vulnerability could have severe consequences for organizations and end-users globally. Devices using affected Qualcomm Snapdragon chipsets and wireless/audio platforms are at risk of memory corruption leading to arbitrary code execution, privilege escalation, or denial of service. This can compromise device confidentiality by exposing sensitive data, integrity by allowing unauthorized code execution or modification, and availability by causing crashes or system instability. Enterprises relying on Snapdragon-based mobile devices, IoT endpoints, or embedded systems could face operational disruptions, data breaches, or loss of control over critical infrastructure components. The broad range of affected products means that both consumer electronics and industrial devices could be impacted. Attackers with local access—such as through compromised apps, malicious insiders, or physical access—could exploit this flaw to gain deeper system control. The absence of known exploits currently provides a window for mitigation, but the high severity score indicates that once exploit code is developed, the impact could be significant and widespread.

Mitigation Recommendations

1. Monitor Qualcomm and device vendor advisories closely for official patches and firmware updates addressing CVE-2025-47317 and apply them promptly. 2. Restrict access to diagnostic, test, or debug interfaces that could be used to send malformed payloads, limiting them to trusted personnel and processes only. 3. Implement strict privilege separation and access controls on local interfaces interacting with Qualcomm chipsets to reduce the risk of unauthorized command execution. 4. Employ runtime protections such as memory corruption mitigations (e.g., stack canaries, ASLR) where possible in device firmware and drivers. 5. Conduct thorough security testing and fuzzing of interfaces exposed by Qualcomm components to detect similar vulnerabilities proactively. 6. For enterprise environments, enforce endpoint security policies that limit installation of untrusted applications and monitor for suspicious local activity that could indicate exploitation attempts. 7. Collaborate with Qualcomm and device manufacturers to prioritize vulnerability remediation in supply chain and update management processes. 8. Educate technical staff about the risks of local privilege vulnerabilities and the importance of controlling physical and logical access to devices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.260Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d41181d0cbc63b6d41b290

Added to database: 9/24/2025, 3:42:57 PM

Last enriched: 2/27/2026, 2:40:23 AM

Last updated: 3/24/2026, 5:41:50 PM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses