CVE-2025-47330: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon
Transient DOS while parsing video packets received from the video firmware.
AI Analysis
Technical Summary
CVE-2025-47330 is a buffer over-read vulnerability classified under CWE-126 found in the video packet parsing component of Qualcomm Snapdragon platforms. This flaw occurs when the video firmware processes incoming video packets, leading to a transient denial of service (DoS) condition. The vulnerability affects an extensive list of Qualcomm products, including numerous Snapdragon mobile platforms (from Snapdragon 215 to Snapdragon 8 Gen 3), FastConnect wireless subsystems, automotive platforms, wearable platforms, and various modem-RF systems. The root cause is an out-of-bounds read during video packet parsing, which can cause the affected component to crash or become unresponsive temporarily, impacting system availability. The CVSS v3.1 score is 5.5 (medium), with attack vector local (AV:L), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and impacting only availability (A:H). Exploitation requires local access with limited privileges, meaning an attacker must already have some level of system access to trigger the flaw. There is no impact on confidentiality or integrity. No public exploits or active exploitation have been reported to date. The vulnerability was published in early 2026, with Qualcomm as the assigner, but no patches or mitigation links are currently available. The broad range of affected platforms indicates a systemic issue in the video firmware parsing logic across Qualcomm's Snapdragon ecosystem.
Potential Impact
For European organizations, the primary impact of CVE-2025-47330 is the potential for transient denial of service on devices using affected Qualcomm Snapdragon chipsets. This can lead to temporary unavailability of critical mobile, wearable, automotive, or IoT devices, disrupting business operations, communications, or safety-critical functions. Industries relying on mobile connectivity, such as telecommunications, automotive manufacturers, healthcare providers using wearable devices, and enterprises deploying IoT solutions, may face operational interruptions. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact can degrade user experience and service reliability. Given the requirement for local privileges, the risk is higher in environments where attackers can gain initial access, such as through insider threats or compromised endpoints. The widespread use of Snapdragon platforms in consumer and enterprise devices across Europe increases the attack surface. However, the lack of known exploits and the need for local access somewhat limit immediate risk. Still, critical infrastructure and high-value targets using affected hardware should prioritize mitigation to prevent potential exploitation.
Mitigation Recommendations
1. Monitor Qualcomm and device manufacturers for official patches or firmware updates addressing CVE-2025-47330 and apply them promptly once available. 2. Restrict local access to video firmware interfaces and related system components to trusted users and processes only, minimizing the risk of local exploitation. 3. Implement strict endpoint security controls to prevent unauthorized local access, including strong authentication, privilege management, and endpoint detection and response (EDR) solutions. 4. For enterprise-managed devices, enforce mobile device management (MDM) policies that limit installation of untrusted applications and control firmware updates. 5. Conduct regular security audits and vulnerability assessments on devices with Qualcomm Snapdragon chipsets to identify potential exploitation attempts. 6. Educate users and administrators about the risks of local privilege escalation and the importance of maintaining updated device firmware. 7. In automotive or IoT deployments, ensure secure firmware update mechanisms and network segmentation to isolate vulnerable components. 8. Consider deploying runtime protections or sandboxing for video processing components if supported by the platform. These steps go beyond generic advice by focusing on access control to the vulnerable component, proactive patch management, and environment hardening specific to Qualcomm Snapdragon-based devices.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland, Belgium
CVE-2025-47330: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon
Description
Transient DOS while parsing video packets received from the video firmware.
AI-Powered Analysis
Technical Analysis
CVE-2025-47330 is a buffer over-read vulnerability classified under CWE-126 found in the video packet parsing component of Qualcomm Snapdragon platforms. This flaw occurs when the video firmware processes incoming video packets, leading to a transient denial of service (DoS) condition. The vulnerability affects an extensive list of Qualcomm products, including numerous Snapdragon mobile platforms (from Snapdragon 215 to Snapdragon 8 Gen 3), FastConnect wireless subsystems, automotive platforms, wearable platforms, and various modem-RF systems. The root cause is an out-of-bounds read during video packet parsing, which can cause the affected component to crash or become unresponsive temporarily, impacting system availability. The CVSS v3.1 score is 5.5 (medium), with attack vector local (AV:L), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and impacting only availability (A:H). Exploitation requires local access with limited privileges, meaning an attacker must already have some level of system access to trigger the flaw. There is no impact on confidentiality or integrity. No public exploits or active exploitation have been reported to date. The vulnerability was published in early 2026, with Qualcomm as the assigner, but no patches or mitigation links are currently available. The broad range of affected platforms indicates a systemic issue in the video firmware parsing logic across Qualcomm's Snapdragon ecosystem.
Potential Impact
For European organizations, the primary impact of CVE-2025-47330 is the potential for transient denial of service on devices using affected Qualcomm Snapdragon chipsets. This can lead to temporary unavailability of critical mobile, wearable, automotive, or IoT devices, disrupting business operations, communications, or safety-critical functions. Industries relying on mobile connectivity, such as telecommunications, automotive manufacturers, healthcare providers using wearable devices, and enterprises deploying IoT solutions, may face operational interruptions. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact can degrade user experience and service reliability. Given the requirement for local privileges, the risk is higher in environments where attackers can gain initial access, such as through insider threats or compromised endpoints. The widespread use of Snapdragon platforms in consumer and enterprise devices across Europe increases the attack surface. However, the lack of known exploits and the need for local access somewhat limit immediate risk. Still, critical infrastructure and high-value targets using affected hardware should prioritize mitigation to prevent potential exploitation.
Mitigation Recommendations
1. Monitor Qualcomm and device manufacturers for official patches or firmware updates addressing CVE-2025-47330 and apply them promptly once available. 2. Restrict local access to video firmware interfaces and related system components to trusted users and processes only, minimizing the risk of local exploitation. 3. Implement strict endpoint security controls to prevent unauthorized local access, including strong authentication, privilege management, and endpoint detection and response (EDR) solutions. 4. For enterprise-managed devices, enforce mobile device management (MDM) policies that limit installation of untrusted applications and control firmware updates. 5. Conduct regular security audits and vulnerability assessments on devices with Qualcomm Snapdragon chipsets to identify potential exploitation attempts. 6. Educate users and administrators about the risks of local privilege escalation and the importance of maintaining updated device firmware. 7. In automotive or IoT deployments, ensure secure firmware update mechanisms and network segmentation to isolate vulnerable components. 8. Consider deploying runtime protections or sandboxing for video processing components if supported by the platform. These steps go beyond generic advice by focusing on access control to the vulnerable component, proactive patch management, and environment hardening specific to Qualcomm Snapdragon-based devices.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- qualcomm
- Date Reserved
- 2025-05-06T08:33:16.261Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695d93cc65deeab1b95d8154
Added to database: 1/6/2026, 10:59:24 PM
Last enriched: 1/14/2026, 1:38:27 AM
Last updated: 2/4/2026, 5:45:18 AM
Views: 40
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67850: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
HighCVE-2025-67849: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
HighCVE-2025-67848: Improper Handling of Insufficient Permissions or Privileges
HighCVE-2025-29867: CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') in Hancom Inc. Hancom Office 2018
HighCVE-2026-1791: CWE-434 Unrestricted Upload of File with Dangerous Type in Hillstone Networks Operation and Maintenance Security Gateway
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.