Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47325: CWE-822 Untrusted Pointer Dereference in Qualcomm, Inc. Snapdragon

0
Medium
VulnerabilityCVE-2025-47325cvecve-2025-47325cwe-822
Published: Thu Dec 18 2025 (12/18/2025, 05:29:06 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Information disclosure while processing system calls with invalid parameters.

AI-Powered Analysis

AILast updated: 12/25/2025, 07:05:37 UTC

Technical Analysis

CVE-2025-47325 is a vulnerability classified under CWE-822 (Untrusted Pointer Dereference) found in multiple Qualcomm Snapdragon chipsets, including CSR, IPQ, QCA, QCN, and SDX series. The flaw arises when the system call handler processes invalid parameters, leading to dereferencing pointers that are not properly validated or trusted. This can cause unintended information disclosure, potentially leaking sensitive data from kernel or system memory. The vulnerability requires the attacker to have low-level privileges (PR:L) but does not require user interaction (UI:N). The attack vector is local (AV:L), meaning exploitation requires local access to the device or system. The vulnerability’s scope is changed (S:C), indicating that exploitation can affect resources beyond the initially vulnerable component, increasing the impact. The CVSS 3.1 base score is 6.5, reflecting a medium severity level primarily due to the high confidentiality impact (C:H), no impact on integrity (I:N) or availability (A:N), and relatively low complexity of attack (AC:L). Affected Snapdragon versions span a wide range of Qualcomm’s embedded and IoT-focused SoCs, which are widely deployed in networking equipment, industrial devices, and consumer electronics. No patches or known exploits are currently reported, but the vulnerability’s nature suggests that attackers with local access and low privileges could extract sensitive information, potentially aiding further attacks or espionage. The vulnerability highlights the importance of robust input validation and pointer safety in low-level system call implementations within embedded chipsets.

Potential Impact

For European organizations, the primary impact of CVE-2025-47325 is the potential unauthorized disclosure of sensitive information from devices using affected Qualcomm Snapdragon chipsets. This is particularly critical for sectors relying on embedded systems and IoT devices, such as telecommunications infrastructure, industrial control systems, smart city deployments, and critical manufacturing. Information disclosure could expose cryptographic keys, configuration data, or personally identifiable information, leading to privacy violations, intellectual property theft, or enabling subsequent attacks like privilege escalation or lateral movement. Since the vulnerability requires local access, compromised or insider devices pose a higher risk. The broad range of affected Snapdragon variants means many devices in European networks could be vulnerable, especially those integrated into network equipment and IoT gateways. The confidentiality breach could undermine trust in critical infrastructure and disrupt compliance with European data protection regulations such as GDPR. Although no known exploits exist yet, the medium severity rating and potential for information leakage necessitate proactive risk management and mitigation by European entities.

Mitigation Recommendations

1. Monitor Qualcomm’s security advisories closely and apply official patches or firmware updates as soon as they become available for affected Snapdragon chipsets. 2. Implement strict access controls to limit local access to devices running vulnerable Snapdragon versions, including network segmentation and endpoint security measures. 3. Employ runtime protections such as memory safety enforcement and pointer validation mechanisms where possible within embedded systems. 4. Conduct thorough input validation on system call parameters at the OS or firmware level to prevent untrusted pointer dereference. 5. Use device attestation and integrity verification to detect unauthorized modifications or exploitation attempts. 6. Restrict installation of untrusted applications or code that could invoke vulnerable system calls. 7. For critical infrastructure, consider deploying intrusion detection systems tuned to detect anomalous local activity indicative of exploitation attempts. 8. Maintain an inventory of all devices using affected Snapdragon chipsets to prioritize patching and monitoring efforts. 9. Engage with device vendors and integrators to ensure timely security updates and mitigations are incorporated into product lifecycles.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.261Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6943963858cc240f07ac2f37

Added to database: 12/18/2025, 5:50:48 AM

Last enriched: 12/25/2025, 7:05:37 AM

Last updated: 2/5/2026, 9:46:16 PM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats