Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47321: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47321cvecve-2025-47321cwe-120
Published: Thu Dec 18 2025 (12/18/2025, 05:29:01 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while copying packets received from unix clients.

AI-Powered Analysis

AILast updated: 12/25/2025, 07:04:56 UTC

Technical Analysis

CVE-2025-47321 is a classic buffer overflow vulnerability (CWE-120) identified in various Qualcomm Snapdragon platforms and related hardware components. The flaw arises from improper validation of input size during memory copying operations of packets received from Unix clients, leading to memory corruption. This vulnerability affects a broad spectrum of Snapdragon chipsets and platforms, including mobile processors (e.g., Snapdragon 765, 680, 6 Gen 1), modem-RF systems (e.g., Snapdragon X65, X35), wearable platforms (e.g., Snapdragon W5+ Gen 1), and other embedded systems. The vulnerability allows a local attacker with limited privileges to exploit the buffer overflow to execute arbitrary code, escalate privileges, or cause system crashes (denial of service). The CVSS v3.1 score of 7.8 reflects high severity, with attack vector classified as local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are reported in the wild, the wide range of affected devices and platforms makes this a significant threat. The vulnerability is particularly concerning because many consumer and enterprise devices rely on Snapdragon chipsets for connectivity and processing, making exploitation potentially impactful across multiple device categories.

Potential Impact

For European organizations, the impact of CVE-2025-47321 is considerable due to the widespread use of Qualcomm Snapdragon chipsets in smartphones, IoT devices, embedded systems, and networking equipment. Successful exploitation could lead to unauthorized code execution, allowing attackers to gain elevated privileges, access sensitive data, disrupt device functionality, or pivot within networks. This could compromise confidentiality of corporate data, integrity of system operations, and availability of critical services. Industries relying heavily on mobile and embedded technologies, such as telecommunications, manufacturing, healthcare, and critical infrastructure, are particularly vulnerable. The local attack vector means that attackers need some form of local access, which could be achieved through compromised devices, insider threats, or malware footholds. Given the strategic importance of secure communications and device integrity in Europe, this vulnerability poses a risk to both enterprise and consumer environments, potentially affecting supply chains and operational continuity.

Mitigation Recommendations

1. Apply official patches and firmware updates from Qualcomm and device manufacturers as soon as they become available to address the buffer overflow vulnerability. 2. Restrict local access to devices with affected Snapdragon components by enforcing strict access controls, including limiting physical access and securing local user accounts. 3. Implement network segmentation and endpoint security measures to reduce the risk of attackers gaining local access through compromised network nodes or malware. 4. Monitor device logs and network traffic for unusual activity indicative of exploitation attempts, such as unexpected crashes or anomalous packet processing. 5. Employ runtime protections such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) where supported by the device firmware to mitigate exploitation impact. 6. For organizations deploying IoT or embedded devices with affected chipsets, conduct thorough security assessments and consider compensating controls like device isolation and strict update policies. 7. Educate users and administrators about the risks of local access vulnerabilities and enforce policies to minimize exposure to untrusted local clients or applications.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.260Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6943963858cc240f07ac2f2e

Added to database: 12/18/2025, 5:50:48 AM

Last enriched: 12/25/2025, 7:04:56 AM

Last updated: 2/6/2026, 5:21:39 AM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats