Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47318: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47318cvecve-2025-47318cwe-126
Published: Wed Sep 24 2025 (09/24/2025, 15:33:51 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Transient DOS while parsing the EPTM test control message to get the test pattern.

AI-Powered Analysis

AILast updated: 09/24/2025, 15:47:49 UTC

Technical Analysis

CVE-2025-47318 is a high-severity buffer over-read vulnerability (CWE-126) affecting a wide range of Qualcomm Snapdragon platforms and associated chipsets. The vulnerability arises during the parsing of the EPTM (Enhanced Packet Test Mode) test control message, specifically when retrieving the test pattern. This improper handling leads to a transient denial-of-service (DoS) condition. A buffer over-read occurs when the software reads data beyond the allocated buffer boundaries, potentially causing system instability or crashes. In this case, the impact is a transient DoS, meaning the affected device or component may temporarily become unresponsive or reboot due to the fault. The vulnerability affects numerous Qualcomm products, including mobile platforms (e.g., Snapdragon 8 Gen 1, Snapdragon 865 5G), automotive platforms, compute platforms, wearable platforms, modem-RF systems, and various wireless connectivity chipsets (FastConnect series, QCA series, WCD series, etc.). The vulnerability requires no privileges or user interaction to exploit (CVSS vector: AV:N/AC:L/PR:N/UI:N), making it remotely exploitable over the network. However, the impact is limited to availability, with no direct confidentiality or integrity compromise reported. No known exploits are currently in the wild, and no patches have been linked yet. The vulnerability was published on September 24, 2025, with a CVSS v3.1 score of 7.5 (high severity). This indicates a significant risk to devices using affected Qualcomm components, especially those exposed to untrusted networks or inputs that can trigger the EPTM test control message parsing. Given the extensive list of affected platforms, the vulnerability could impact a broad range of consumer, industrial, automotive, and enterprise devices relying on Qualcomm Snapdragon chipsets for connectivity and processing.

Potential Impact

For European organizations, the impact of CVE-2025-47318 can be substantial due to the widespread use of Qualcomm Snapdragon chipsets in smartphones, IoT devices, automotive systems, and networking equipment. A transient denial-of-service could disrupt critical communications, degrade user experience, or cause operational interruptions in connected devices. In sectors such as automotive manufacturing, telecommunications, healthcare, and industrial automation, where Qualcomm platforms are embedded, this vulnerability could lead to temporary outages or failures, affecting service availability and safety. Enterprises relying on mobile workforce devices or IoT sensors with affected chipsets may experience device instability, impacting productivity and operational continuity. Although the vulnerability does not directly compromise data confidentiality or integrity, repeated or targeted DoS attacks could be leveraged as part of broader attack campaigns to cause disruption or distract security teams. The lack of required privileges or user interaction increases the risk of remote exploitation, especially in environments with exposed wireless interfaces or poorly segmented networks. The absence of known exploits currently provides a window for mitigation, but the high severity score and broad affected product range necessitate prompt attention from European organizations to prevent potential service disruptions and maintain operational resilience.

Mitigation Recommendations

1. Monitor Qualcomm and device vendors for official patches or firmware updates addressing CVE-2025-47318 and apply them promptly once available. 2. Implement network segmentation and access controls to limit exposure of devices with affected Qualcomm chipsets to untrusted networks, reducing the attack surface. 3. Employ intrusion detection and prevention systems (IDS/IPS) capable of monitoring and blocking anomalous or malformed EPTM test control messages that could trigger the vulnerability. 4. For critical infrastructure and automotive systems, conduct thorough testing of firmware and software updates in controlled environments before deployment to ensure stability and security. 5. Maintain an inventory of devices using affected Qualcomm platforms to prioritize patching and risk management efforts. 6. Collaborate with device manufacturers and suppliers to confirm vulnerability status and remediation timelines. 7. Consider deploying endpoint protection solutions that can detect and mitigate DoS conditions or abnormal device behavior related to chipset vulnerabilities. 8. Educate IT and security teams about the vulnerability specifics to enhance incident response readiness and monitoring capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.260Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d41181d0cbc63b6d41b293

Added to database: 9/24/2025, 3:42:57 PM

Last enriched: 9/24/2025, 3:47:49 PM

Last updated: 10/7/2025, 12:58:18 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats