Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47322: CWE-416 Use After Free in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47322cvecve-2025-47322cwe-416
Published: Thu Dec 18 2025 (12/18/2025, 05:29:02 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while handling IOCTL calls to set mode.

AI-Powered Analysis

AILast updated: 12/25/2025, 07:05:09 UTC

Technical Analysis

CVE-2025-47322 is a use-after-free vulnerability classified under CWE-416 found in Qualcomm Snapdragon chipsets and platforms. The flaw arises from improper memory management during the processing of IOCTL (Input/Output Control) calls that set operational modes on the affected hardware. This memory corruption can lead to arbitrary code execution, privilege escalation, or denial of service by freeing memory prematurely and then accessing it. The vulnerability affects a broad spectrum of Qualcomm products, including various Snapdragon mobile platforms (e.g., Snapdragon 8 Gen 2, Snapdragon 680 4G), modem-RF systems, wearable platforms, automotive platforms, and audio platforms. The CVSS v3.1 score is 7.8, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). Exploitation requires local access, such as through a compromised application or user with limited privileges, but no user interaction is needed once access is gained. The vulnerability is currently published with no known exploits in the wild and no patches publicly available yet. The broad range of affected devices means that many consumer, enterprise, automotive, and IoT devices using Qualcomm Snapdragon components are at risk. The vulnerability could be leveraged to gain unauthorized control over devices, extract sensitive data, disrupt services, or pivot within networks.

Potential Impact

For European organizations, the impact of CVE-2025-47322 is significant due to the widespread use of Qualcomm Snapdragon chipsets in mobile devices, automotive systems, IoT devices, and networking equipment. Confidentiality breaches could expose sensitive corporate or personal data. Integrity compromises might allow attackers to alter device behavior or firmware, potentially undermining trust in critical systems. Availability impacts could lead to denial of service, affecting business continuity, especially in sectors relying on connected devices such as automotive, healthcare, and industrial automation. The local attack vector implies that attackers need some level of access to the device, which could be achieved through malware, insider threats, or physical access. Given the integration of Snapdragon components in many European consumer and industrial devices, the vulnerability could facilitate lateral movement within corporate networks or enable persistent footholds. The lack of current exploits reduces immediate risk but also underscores the urgency for proactive mitigation before exploit code emerges.

Mitigation Recommendations

1. Monitor Qualcomm and device vendors for official patches and apply them promptly once available. 2. Restrict access to IOCTL interfaces on affected devices by enforcing strict access controls and limiting permissions to trusted processes only. 3. Employ endpoint detection and response (EDR) solutions to monitor for suspicious local activity indicative of exploitation attempts. 4. Harden device configurations by disabling unnecessary services and interfaces that could be used to trigger the vulnerability. 5. Implement network segmentation to isolate vulnerable devices, reducing the risk of lateral movement. 6. Educate users and administrators about the risks of local privilege escalation and enforce strong device access policies. 7. For organizations deploying Snapdragon-based automotive or IoT devices, conduct thorough security assessments and consider compensating controls until patches are available. 8. Use application whitelisting and privilege management to minimize the risk of malicious code execution exploiting this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.260Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6943963858cc240f07ac2f31

Added to database: 12/18/2025, 5:50:48 AM

Last enriched: 12/25/2025, 7:05:09 AM

Last updated: 2/4/2026, 5:49:57 PM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats