CVE-2025-47323: CWE-190 Integer Overflow or Wraparound in Qualcomm, Inc. Snapdragon
Memory corruption while routing GPR packets between user and root when handling large data packet.
AI Analysis
Technical Summary
CVE-2025-47323 is an integer overflow vulnerability (CWE-190) identified in Qualcomm Snapdragon chipsets and associated platforms. The flaw arises during the routing of General Packet Radio Service (GPR) packets between user and root contexts when handling large data packets. Specifically, the integer overflow or wraparound can lead to memory corruption, which attackers can exploit to manipulate memory, potentially leading to arbitrary code execution or privilege escalation. The vulnerability affects a wide array of Qualcomm products, including numerous Snapdragon mobile platforms (from Snapdragon 4 Gen 1 through Snapdragon 8+ Gen 2), FastConnect wireless subsystems, modem-RF systems, and various compute and wearable platforms. The CVSS v3.1 score is 7.8, indicating high severity, with the vector showing local attack vector (AV:L), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no exploits are currently known in the wild, the vulnerability's nature allows an attacker with limited privileges to corrupt memory during packet routing, potentially escalating privileges to root and compromising device security. This can affect device stability, data confidentiality, and system integrity. The vulnerability was reserved in May 2025 and published in December 2025, but no patches are linked yet, indicating that mitigation may still be pending or in progress.
Potential Impact
For European organizations, the impact of CVE-2025-47323 is significant due to the widespread use of Qualcomm Snapdragon chipsets in smartphones, IoT devices, automotive systems, and wearable technology. Exploitation could allow attackers to escalate privileges from a local user context to root, enabling full device compromise. This can lead to unauthorized access to sensitive corporate data, disruption of critical communication systems, and potential sabotage of industrial IoT and automotive systems. Given the high confidentiality, integrity, and availability impacts, organizations could face data breaches, operational downtime, and reputational damage. The vulnerability also poses risks to mobile workforce security and connected infrastructure, which are critical in sectors such as finance, manufacturing, healthcare, and transportation prevalent in Europe. The absence of known exploits currently provides a window for proactive mitigation, but the broad affected product range increases the attack surface considerably.
Mitigation Recommendations
1. Monitor Qualcomm and device vendors for official patches and apply them promptly once available. 2. Implement strict access controls and privilege restrictions on devices using affected Snapdragon platforms to limit local user capabilities. 3. Employ mobile device management (MDM) solutions to enforce security policies and control software installation on corporate mobile and IoT devices. 4. Conduct regular security audits and vulnerability assessments focusing on devices with Qualcomm chipsets. 5. Segment networks to isolate critical systems from potentially vulnerable endpoints. 6. Educate users about the risks of installing untrusted applications that could exploit local vulnerabilities. 7. Where feasible, disable or restrict services that handle GPR packet routing or related functionalities until patches are applied. 8. Utilize endpoint detection and response (EDR) tools capable of detecting anomalous behaviors indicative of exploitation attempts. 9. Collaborate with suppliers and partners to ensure their devices are also patched and secured. 10. Prepare incident response plans specific to device compromise scenarios involving Qualcomm Snapdragon vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Belgium, Poland
CVE-2025-47323: CWE-190 Integer Overflow or Wraparound in Qualcomm, Inc. Snapdragon
Description
Memory corruption while routing GPR packets between user and root when handling large data packet.
AI-Powered Analysis
Technical Analysis
CVE-2025-47323 is an integer overflow vulnerability (CWE-190) identified in Qualcomm Snapdragon chipsets and associated platforms. The flaw arises during the routing of General Packet Radio Service (GPR) packets between user and root contexts when handling large data packets. Specifically, the integer overflow or wraparound can lead to memory corruption, which attackers can exploit to manipulate memory, potentially leading to arbitrary code execution or privilege escalation. The vulnerability affects a wide array of Qualcomm products, including numerous Snapdragon mobile platforms (from Snapdragon 4 Gen 1 through Snapdragon 8+ Gen 2), FastConnect wireless subsystems, modem-RF systems, and various compute and wearable platforms. The CVSS v3.1 score is 7.8, indicating high severity, with the vector showing local attack vector (AV:L), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no exploits are currently known in the wild, the vulnerability's nature allows an attacker with limited privileges to corrupt memory during packet routing, potentially escalating privileges to root and compromising device security. This can affect device stability, data confidentiality, and system integrity. The vulnerability was reserved in May 2025 and published in December 2025, but no patches are linked yet, indicating that mitigation may still be pending or in progress.
Potential Impact
For European organizations, the impact of CVE-2025-47323 is significant due to the widespread use of Qualcomm Snapdragon chipsets in smartphones, IoT devices, automotive systems, and wearable technology. Exploitation could allow attackers to escalate privileges from a local user context to root, enabling full device compromise. This can lead to unauthorized access to sensitive corporate data, disruption of critical communication systems, and potential sabotage of industrial IoT and automotive systems. Given the high confidentiality, integrity, and availability impacts, organizations could face data breaches, operational downtime, and reputational damage. The vulnerability also poses risks to mobile workforce security and connected infrastructure, which are critical in sectors such as finance, manufacturing, healthcare, and transportation prevalent in Europe. The absence of known exploits currently provides a window for proactive mitigation, but the broad affected product range increases the attack surface considerably.
Mitigation Recommendations
1. Monitor Qualcomm and device vendors for official patches and apply them promptly once available. 2. Implement strict access controls and privilege restrictions on devices using affected Snapdragon platforms to limit local user capabilities. 3. Employ mobile device management (MDM) solutions to enforce security policies and control software installation on corporate mobile and IoT devices. 4. Conduct regular security audits and vulnerability assessments focusing on devices with Qualcomm chipsets. 5. Segment networks to isolate critical systems from potentially vulnerable endpoints. 6. Educate users about the risks of installing untrusted applications that could exploit local vulnerabilities. 7. Where feasible, disable or restrict services that handle GPR packet routing or related functionalities until patches are applied. 8. Utilize endpoint detection and response (EDR) tools capable of detecting anomalous behaviors indicative of exploitation attempts. 9. Collaborate with suppliers and partners to ensure their devices are also patched and secured. 10. Prepare incident response plans specific to device compromise scenarios involving Qualcomm Snapdragon vulnerabilities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- qualcomm
- Date Reserved
- 2025-05-06T08:33:16.260Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6943963858cc240f07ac2f34
Added to database: 12/18/2025, 5:50:48 AM
Last enriched: 12/18/2025, 6:06:42 AM
Last updated: 12/18/2025, 12:52:54 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14618: CWE-862 Missing Authorization in listingthemes Sweet Energy Efficiency
MediumCVE-2025-14437: CWE-532 Insertion of Sensitive Information into Log File in wpmudev Hummingbird Performance – Cache & Page Speed Optimization for Core Web Vitals | Critical CSS | Minify CSS | Defer CSS Javascript | CDN
HighCVE-2025-14277: CWE-918 Server-Side Request Forgery (SSRF) in bdthemes Prime Slider – Addons for Elementor
MediumCVE-2025-13110: CWE-639 Authorization Bypass Through User-Controlled Key in realmag777 HUSKY – Products Filter Professional for WooCommerce
MediumCVE-2025-10910: CWE-639 Authorization Bypass Through User-Controlled Key in Govee H6056
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.