Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47329: CWE-763: Release of Invalid Pointer or Reference in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47329cvecve-2025-47329cwe-763
Published: Wed Sep 24 2025 (09/24/2025, 15:33:56 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while handling invalid inputs in application info setup.

AI-Powered Analysis

AILast updated: 10/02/2025, 01:01:20 UTC

Technical Analysis

CVE-2025-47329 is a high-severity vulnerability affecting multiple Qualcomm Snapdragon platforms and related chipsets, including FastConnect 7800, QAM series, QCA series, Snapdragon 8 Gen 3 Mobile Platform, Snapdragon AR1 Gen 1 Platform, Snapdragon W5+ Gen 1 Wearable Platform, and various WCD, WCN, and WSA components. The vulnerability is classified under CWE-763, which involves the release of an invalid pointer or reference, leading to memory corruption during the handling of invalid inputs in the application info setup process. This memory corruption can result in arbitrary code execution, privilege escalation, or denial of service due to the corruption of memory structures. The CVSS v3.1 base score is 7.8, indicating a high severity level. The vector string (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) reveals that the attack requires local access with low privileges and no user interaction, but can compromise confidentiality, integrity, and availability fully. The vulnerability affects a broad range of Qualcomm chipsets widely used in mobile devices, wearables, and IoT devices. No known exploits are reported in the wild yet, and no patches have been linked at the time of publication. The vulnerability arises from improper validation and handling of input data in the application info setup, which leads to the release of invalid pointers or references, causing memory corruption. This flaw can be exploited by a local attacker or malicious application with limited privileges to escalate privileges or disrupt device operation.

Potential Impact

For European organizations, this vulnerability poses significant risks, especially those relying on mobile devices, embedded systems, or IoT devices powered by Qualcomm Snapdragon chipsets. The potential impacts include unauthorized access to sensitive data (confidentiality breach), manipulation or corruption of data and system processes (integrity compromise), and disruption of device functionality or service outages (availability impact). Enterprises with Bring Your Own Device (BYOD) policies or those deploying Qualcomm-based IoT infrastructure could face increased exposure. Critical sectors such as finance, healthcare, telecommunications, and government agencies in Europe could be targeted to gain footholds or disrupt operations. The local attack vector means that attackers need some level of access to the device, which could be achieved through malicious apps or insider threats. The absence of user interaction requirement increases the risk of automated exploitation once local access is obtained. The broad range of affected chipsets means a large installed base across Europe is vulnerable, potentially impacting millions of devices and associated enterprise networks.

Mitigation Recommendations

1. Immediate mitigation involves monitoring for updates and patches from Qualcomm and device manufacturers, as no patches are currently linked. Organizations should prioritize patch management once fixes are available. 2. Implement strict application whitelisting and privilege restrictions on devices using affected chipsets to prevent installation or execution of untrusted local applications that could exploit this vulnerability. 3. Employ mobile device management (MDM) solutions to enforce security policies, restrict local access, and monitor for suspicious activities on devices. 4. Conduct regular security audits and vulnerability assessments on devices and embedded systems using Qualcomm Snapdragon platforms to identify potential exploitation attempts. 5. Educate users on the risks of installing untrusted applications and the importance of device security hygiene. 6. For critical infrastructure, consider network segmentation and enhanced endpoint detection and response (EDR) capabilities to detect anomalous behavior stemming from compromised devices. 7. Collaborate with vendors and Qualcomm to receive timely threat intelligence and coordinate incident response plans tailored to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.261Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d41181d0cbc63b6d41b2b2

Added to database: 9/24/2025, 3:42:57 PM

Last enriched: 10/2/2025, 1:01:20 AM

Last updated: 10/7/2025, 1:50:28 PM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats