Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47319: CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere in Qualcomm, Inc. Snapdragon

0
Medium
VulnerabilityCVE-2025-47319cvecve-2025-47319cwe-497
Published: Thu Dec 18 2025 (12/18/2025, 05:28:57 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Information disclosure while exposing internal TA-to-TA communication APIs to HLOS

AI-Powered Analysis

AILast updated: 12/18/2025, 06:08:07 UTC

Technical Analysis

CVE-2025-47319 is a vulnerability identified in various Qualcomm Snapdragon platforms and associated components, classified under CWE-497 (Exposure of Sensitive Information to an Unauthorized Actor). The issue stems from the exposure of internal Trusted Application (TA)-to-TA communication APIs to the High-Level Operating System (HLOS), which should normally be isolated to prevent unauthorized access. This improper exposure allows an attacker with high privileges on the device to access sensitive system information that is intended to remain protected within the secure environment of the Trusted Execution Environment (TEE). The vulnerability affects a broad spectrum of Qualcomm products, including multiple Snapdragon mobile platforms (e.g., Snapdragon 4 Gen 2, 6 Gen 1, 8 Gen 3), FastConnect wireless subsystems, modem-RF systems, and various other chipsets and modules used in mobile phones, IoT devices, and automotive systems. The CVSS v3.1 score is 6.7 (medium severity), with an attack vector of local (AV:L), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), and a scope change (S:C). The impact primarily compromises confidentiality (C:H), with limited integrity (I:L) and no availability (A:N) impact. No public exploits are known at this time, but the vulnerability could facilitate information leakage that aids further attacks or compromises device security. The lack of patches currently necessitates vigilance and proactive mitigation by device manufacturers and users. This vulnerability highlights the risks inherent in complex communication interfaces within secure environments and the importance of strict access controls between trusted and non-trusted system components.

Potential Impact

For European organizations, the impact of CVE-2025-47319 lies mainly in the potential exposure of sensitive information on devices using affected Qualcomm Snapdragon platforms. This includes smartphones, tablets, IoT devices, and automotive systems widely deployed across enterprises and critical infrastructure. Confidential data leakage could enable attackers to gather intelligence for further exploitation, such as privilege escalation or lateral movement within networks. The vulnerability’s requirement for high privileges limits remote exploitation but raises concerns for insider threats or malware that gains elevated access. Given the extensive use of Qualcomm chipsets in consumer and industrial devices, organizations relying on these technologies may face increased risk of data breaches or espionage. The confidentiality breach could affect personal data, cryptographic keys, or system configurations, undermining compliance with GDPR and other data protection regulations. Additionally, sectors like telecommunications, automotive, and manufacturing that integrate Snapdragon-based modules could experience operational risks if attackers leverage this vulnerability to extract proprietary or safety-critical information.

Mitigation Recommendations

To mitigate CVE-2025-47319, European organizations and device manufacturers should: 1) Monitor for firmware and software updates from Qualcomm and device vendors addressing this vulnerability and apply patches promptly once available. 2) Restrict access to TA-to-TA communication APIs by enforcing strict privilege separation and access controls within the device’s operating system and trusted execution environment. 3) Implement runtime monitoring and anomaly detection to identify unauthorized attempts to access or exploit TA communication interfaces. 4) Harden device configurations by disabling unnecessary services or interfaces that could be leveraged to gain high privileges. 5) Employ endpoint security solutions capable of detecting privilege escalation attempts and suspicious local activities. 6) For enterprise deployments, enforce strict device management policies, including limiting installation of untrusted applications and controlling administrative privileges. 7) Collaborate with vendors to ensure secure supply chain practices and verify the integrity of device firmware. 8) Educate users and administrators about the risks of granting elevated privileges to applications and the importance of applying security updates. These measures go beyond generic advice by focusing on controlling access to the vulnerable interfaces and enhancing detection capabilities specific to this vulnerability’s exploitation vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.260Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6943963858cc240f07ac2f28

Added to database: 12/18/2025, 5:50:48 AM

Last enriched: 12/18/2025, 6:08:07 AM

Last updated: 12/18/2025, 8:21:56 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats