Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47320: CWE-787: Out-of-bounds Write in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47320cvecve-2025-47320cwe-787
Published: Thu Dec 18 2025 (12/18/2025, 05:28:59 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while processing MFC channel configuration during music playback.

AI-Powered Analysis

AILast updated: 12/25/2025, 07:04:39 UTC

Technical Analysis

CVE-2025-47320 is an out-of-bounds write vulnerability classified under CWE-787 found in Qualcomm Snapdragon chipsets. The vulnerability occurs due to improper handling of memory during the processing of MFC (Multi-Function Codec) channel configuration in the context of music playback. This memory corruption flaw can be triggered by a local attacker with low privileges, potentially leading to arbitrary code execution or denial of service conditions. The affected products span a wide range of Qualcomm Snapdragon platforms, including numerous mobile platforms (e.g., Snapdragon 660, 865, 888 series), automotive platforms, wearable platforms, and connectivity modules such as FastConnect and modem-RF systems. The vulnerability does not require user interaction but does require local access with low privileges, indicating that exploitation might be feasible through malicious applications or compromised local users. The CVSS v3.1 score is 7.8, reflecting high severity with high impact on confidentiality, integrity, and availability. The attack vector is local (AV:L), with low attack complexity (AC:L), requiring privileges (PR:L), and no user interaction (UI:N). No public exploits are known at this time, and no patches have been linked yet, emphasizing the need for vigilance. The vulnerability's root cause is a classic out-of-bounds write, which can corrupt memory structures leading to unpredictable behavior or control flow hijacking. This affects the security posture of devices relying on these chipsets, especially those processing audio streams or multimedia content.

Potential Impact

For European organizations, the impact of CVE-2025-47320 is significant due to the widespread use of Qualcomm Snapdragon chipsets in smartphones, automotive systems, IoT devices, and embedded platforms. Confidentiality could be compromised if attackers gain arbitrary code execution, potentially accessing sensitive data stored or processed on affected devices. Integrity and availability are also at risk, as memory corruption can cause system crashes or persistent denial of service, disrupting business operations. In automotive contexts, exploitation could affect vehicle infotainment or telematics systems, raising safety concerns. Enterprises relying on mobile devices for secure communications or IoT deployments using affected platforms may face increased risk of targeted attacks or lateral movement within networks. The requirement for local access limits remote exploitation but does not eliminate risk, especially in environments where devices are shared or physically accessible. The absence of known exploits currently provides a window for proactive mitigation, but the broad range of affected platforms means many organizations must prioritize patch management and device security hardening.

Mitigation Recommendations

1. Monitor Qualcomm and device vendors for official patches and apply them promptly once available. 2. Restrict local access to devices with affected Snapdragon platforms, enforcing strict user privilege separation and minimizing installation of untrusted applications. 3. Employ mobile device management (MDM) solutions to enforce security policies and detect anomalous behavior related to audio processing or media playback components. 4. For automotive and embedded systems, coordinate with OEMs to receive firmware updates addressing this vulnerability. 5. Implement runtime protections such as memory corruption mitigations (e.g., DEP, ASLR) where supported by the platform. 6. Conduct security audits focusing on local privilege escalation vectors and limit physical access to critical devices. 7. Educate users about risks of installing unverified apps that might exploit local vulnerabilities. 8. Use endpoint detection and response (EDR) tools to identify suspicious activity indicative of exploitation attempts targeting media codecs or audio subsystems. 9. For organizations deploying IoT devices with affected chipsets, segment networks and apply strict access controls to reduce attack surface. 10. Maintain up-to-date inventories of devices using affected Qualcomm platforms to prioritize remediation efforts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.260Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6943963858cc240f07ac2f2b

Added to database: 12/18/2025, 5:50:48 AM

Last enriched: 12/25/2025, 7:04:39 AM

Last updated: 2/7/2026, 12:04:56 PM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats