Skip to main content

CVE-2025-47324: CWE-1230: Exposure of Sensitive Information Through Metadata in Qualcomm, Inc. Snapdragon

High
VulnerabilityCVE-2025-47324cvecve-2025-47324cwe-1230
Published: Wed Aug 06 2025 (08/06/2025, 07:26:12 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Information disclosure while accessing and modifying the PIB file of a remote device via powerline.

AI-Powered Analysis

AILast updated: 08/06/2025, 08:02:42 UTC

Technical Analysis

CVE-2025-47324 is a high-severity vulnerability affecting Qualcomm's Snapdragon product line, specifically the QCA7005 version. The vulnerability is categorized under CWE-1230, which involves the exposure of sensitive information through metadata. The issue arises when accessing and modifying the PIB (Parameter Information Block) file of a remote device via powerline communication. The PIB file typically contains configuration parameters and metadata essential for device operation. Due to insufficient access controls or improper handling of this file over the powerline interface, an attacker can remotely retrieve sensitive information without requiring authentication or user interaction. The CVSS 3.1 base score of 7.5 reflects the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N), with a high impact on confidentiality (C:H) but no impact on integrity or availability (I:N/A:N). This means an attacker can remotely and easily extract sensitive metadata from affected devices, potentially leading to further targeted attacks or privacy violations. No known exploits are currently reported in the wild, and no patches have been published yet, indicating that affected organizations should prioritize monitoring and mitigation efforts.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially those using Qualcomm Snapdragon QCA7005-based devices in their infrastructure or products that utilize powerline communication. The exposure of sensitive metadata can lead to leakage of configuration details, device identifiers, or network topology information, which adversaries can leverage for reconnaissance or to craft more sophisticated attacks. Industries relying on embedded systems, IoT devices, or smart grid technologies that incorporate powerline communication and Snapdragon chipsets are particularly vulnerable. Confidentiality breaches could result in regulatory non-compliance under GDPR, leading to legal and financial repercussions. Additionally, critical infrastructure sectors such as energy, manufacturing, and telecommunications could face operational risks if attackers use the disclosed information to disrupt services or escalate privileges.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement the following specific mitigations: 1) Restrict network access to powerline communication interfaces by segmenting networks and applying strict firewall rules to limit exposure to untrusted networks. 2) Employ network monitoring tools to detect unusual access patterns or attempts to read or modify PIB files remotely. 3) Use device-level encryption and secure boot features where available to protect configuration files and metadata. 4) Collaborate with Qualcomm and device vendors to obtain firmware updates or workarounds as soon as they become available. 5) Conduct thorough asset inventories to identify all devices running the affected QCA7005 chipset and assess their exposure. 6) Educate operational technology (OT) and IT teams about this vulnerability to ensure rapid response and containment in case of suspicious activity.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.260Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689308a4ad5a09ad00ef020d

Added to database: 8/6/2025, 7:47:48 AM

Last enriched: 8/6/2025, 8:02:42 AM

Last updated: 8/7/2025, 8:42:31 PM

Views: 25

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats