Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47319: CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere in Qualcomm, Inc. Snapdragon

0
Medium
VulnerabilityCVE-2025-47319cvecve-2025-47319cwe-497
Published: Thu Dec 18 2025 (12/18/2025, 05:28:57 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Information disclosure while exposing internal TA-to-TA communication APIs to HLOS

AI-Powered Analysis

AILast updated: 12/25/2025, 07:04:25 UTC

Technical Analysis

CVE-2025-47319 is a vulnerability categorized under CWE-497 (Exposure of Sensitive Information to an Unauthorized Actor) affecting Qualcomm Snapdragon platforms. The root cause is the exposure of internal Trusted Application (TA)-to-TA communication APIs to the High-Level Operating System (HLOS), which is not intended to have access to these internal communications. Trusted Applications run in a Trusted Execution Environment (TEE) and are designed to isolate sensitive operations from the main OS. By exposing these APIs, the vulnerability allows an attacker with high-level privileges on the HLOS to intercept or access sensitive data exchanged between TAs, potentially including cryptographic keys, authentication tokens, or other confidential information. The affected products span a broad range of Qualcomm chipsets and platforms, including mobile SoCs (e.g., Snapdragon 8 Gen 3, Snapdragon 6 Gen 1), automotive modems, FastConnect wireless subsystems, and various connectivity and multimedia components. The CVSS v3.1 score is 6.7 (medium), reflecting that exploitation requires local access with high privileges (PR:H), no user interaction (UI:N), and impacts confidentiality significantly (C:H), with limited integrity impact (I:L) and no availability impact (A:N). No public exploits are known, and no patches have been linked yet, indicating this is a recently disclosed vulnerability. The scope is changed (S:C), meaning the vulnerability affects components beyond the initially vulnerable component, increasing its complexity. This vulnerability could be leveraged by malicious insiders or malware that has escalated privileges on a device to extract sensitive information from the TEE, undermining the security guarantees of the trusted environment.

Potential Impact

For European organizations, the impact of CVE-2025-47319 is primarily on confidentiality of sensitive information processed within devices using affected Qualcomm Snapdragon components. This includes smartphones, tablets, automotive infotainment and telematics systems, IoT devices, and potentially enterprise mobile endpoints. Leakage of cryptographic keys or authentication credentials could lead to further compromise of user data, unauthorized access to corporate resources, or bypassing of device security features. Automotive systems are particularly sensitive as they may control safety-critical functions; exposure of internal communications could undermine trust in vehicle security. The vulnerability does not directly affect availability or integrity, but the confidentiality breach could facilitate secondary attacks. Organizations relying on mobile device management (MDM) or automotive telematics with Snapdragon hardware should be aware of the risk of local privilege escalation leading to sensitive data exposure. Given the widespread deployment of Snapdragon chipsets in Europe, the potential attack surface is large. However, the requirement for high privilege local access limits remote exploitation risk, reducing immediate threat from external attackers but increasing concern over insider threats or malware with elevated privileges.

Mitigation Recommendations

1. Monitor Qualcomm and device vendors for official patches or firmware updates addressing CVE-2025-47319 and apply them promptly once available. 2. Enforce strict access control policies on devices using affected Snapdragon platforms to limit local privilege escalation opportunities, including restricting administrative or root access to trusted personnel only. 3. Implement robust endpoint security solutions capable of detecting and preventing privilege escalation and suspicious local activity on mobile and automotive devices. 4. For enterprise environments, employ Mobile Device Management (MDM) solutions to enforce security policies, including disabling unnecessary debug or developer modes that could facilitate exploitation. 5. Conduct regular security audits and vulnerability assessments on devices incorporating affected Qualcomm components, focusing on privilege boundaries and TEE interactions. 6. Educate users and administrators about the risks of installing untrusted applications or software that could gain elevated privileges. 7. For automotive systems, collaborate with OEMs and suppliers to ensure secure firmware updates and integrity verification mechanisms are in place to prevent unauthorized modifications. 8. Consider network segmentation and isolation strategies for critical IoT and automotive devices to limit lateral movement if a device is compromised.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.260Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6943963858cc240f07ac2f28

Added to database: 12/18/2025, 5:50:48 AM

Last enriched: 12/25/2025, 7:04:25 AM

Last updated: 2/6/2026, 9:14:20 AM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats