Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47331: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon

0
Medium
VulnerabilityCVE-2025-47331cvecve-2025-47331cwe-126
Published: Tue Jan 06 2026 (01/06/2026, 22:48:29 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Information disclosure while processing a firmware event.

AI-Powered Analysis

AILast updated: 01/06/2026, 23:18:38 UTC

Technical Analysis

CVE-2025-47331 is a buffer over-read vulnerability classified under CWE-126 found in Qualcomm Snapdragon firmware components. This vulnerability arises during the processing of specific firmware events, where the software reads beyond the intended buffer boundaries. Such an over-read can lead to the disclosure of sensitive information residing in adjacent memory areas. The vulnerability affects an extensive list of Qualcomm products, including numerous Snapdragon mobile platforms (e.g., Snapdragon 8 Gen series, Snapdragon 7 Gen series, Snapdragon 865, 888, and others), FastConnect wireless subsystems, IPQ networking platforms, automotive platforms, and various other chipsets used in embedded and IoT devices. The CVSS 3.1 base score is 6.1 (medium severity), with vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L, indicating that exploitation requires local access with low privileges, no user interaction, and results primarily in high confidentiality impact with limited integrity and availability impact. The vulnerability does not require user interaction but does require some level of privilege, likely local or application-level access to the device. No known exploits have been reported in the wild, and Qualcomm has not yet published patches. The flaw could be exploited by an attacker with local access to the device to read sensitive memory contents, potentially leaking cryptographic keys, credentials, or other confidential data. This poses a risk especially in environments where devices are shared, or where attackers can gain local access through other means. The broad range of affected products means that many device types, from smartphones to automotive and IoT devices, are vulnerable. The complexity of exploitation is moderate due to the need for local access and privilege, but the impact on confidentiality is significant.

Potential Impact

For European organizations, the impact of CVE-2025-47331 is primarily the risk of sensitive information disclosure from devices using affected Qualcomm Snapdragon platforms. This includes smartphones, tablets, embedded IoT devices, automotive systems, and networking equipment. Confidential data such as encryption keys, authentication tokens, or proprietary information could be exposed, potentially enabling further attacks or data breaches. Sectors such as telecommunications, automotive manufacturing, critical infrastructure, and enterprises with Bring Your Own Device (BYOD) policies are particularly at risk. The vulnerability could undermine trust in mobile communications and connected devices, impacting privacy and regulatory compliance under GDPR. Since exploitation requires local access, the threat is higher in environments where physical or logical access controls are weak or where insider threats exist. The lack of patches increases exposure duration. Additionally, the wide deployment of Snapdragon-based devices across Europe means a large attack surface. The vulnerability could also affect supply chain security for European companies relying on Snapdragon components in their products. Overall, the confidentiality impact could lead to data leaks, intellectual property theft, or compromise of secure communications.

Mitigation Recommendations

1. Maintain an up-to-date inventory of all devices and embedded systems using Qualcomm Snapdragon platforms to identify potentially affected assets. 2. Monitor Qualcomm and device vendor advisories closely for official patches or firmware updates addressing CVE-2025-47331 and apply them promptly once available. 3. Restrict local access to devices, enforcing strong physical security and limiting administrative privileges to trusted personnel only. 4. Employ endpoint detection and response (EDR) solutions to monitor for suspicious local activity that could indicate exploitation attempts. 5. Use runtime memory protection technologies such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) where supported to mitigate exploitation risk. 6. For mobile devices, enforce strong device management policies including remote wipe and encryption to reduce data exposure if devices are lost or stolen. 7. In automotive and IoT deployments, segment networks and apply strict access controls to prevent unauthorized local access to vulnerable devices. 8. Conduct regular security assessments and penetration tests focusing on local privilege escalation and memory disclosure vectors. 9. Educate users and administrators about the risks of local access vulnerabilities and the importance of device security hygiene. 10. Consider deploying additional encryption layers at the application level to protect sensitive data even if firmware memory is exposed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.261Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695d93cc65deeab1b95d8157

Added to database: 1/6/2026, 10:59:24 PM

Last enriched: 1/6/2026, 11:18:38 PM

Last updated: 1/8/2026, 12:38:37 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats