Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47332: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in Qualcomm, Inc. Snapdragon

0
Medium
VulnerabilityCVE-2025-47332cvecve-2025-47332cwe-367
Published: Tue Jan 06 2026 (01/06/2026, 22:48:30 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while processing a config call from userspace.

AI-Powered Analysis

AILast updated: 01/06/2026, 23:18:21 UTC

Technical Analysis

CVE-2025-47332 is a time-of-check to time-of-use (TOCTOU) race condition vulnerability classified under CWE-367, discovered in Qualcomm Snapdragon FastConnect and various Snapdragon mobile and IoT platforms. The vulnerability arises from improper handling of configuration calls originating from userspace, leading to memory corruption. This flaw occurs when the system checks a condition and then uses the resource based on that check, but the state changes between these two operations due to concurrent access, allowing an attacker to exploit the timing window. The affected products include a wide range of Snapdragon chipsets such as FastConnect 6200 through 7800 series, multiple Snapdragon Gen 1 to Gen 3 mobile platforms, AR platforms, and various wireless connectivity modules (WCD, WCN, WSA series). The CVSS v3.1 base score is 6.7 (medium severity), with vector AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H, indicating local attack vector, low attack complexity, requiring high privileges, no user interaction, unchanged scope, and high impact on confidentiality, integrity, and availability. Exploitation could allow a local privileged attacker to corrupt memory, potentially leading to arbitrary code execution or denial of service. No public exploits or patches are currently available, but the vulnerability is published and reserved since May 2025. The vulnerability primarily affects the kernel or firmware components handling configuration calls, which are critical for wireless connectivity and device operation.

Potential Impact

For European organizations, the impact of CVE-2025-47332 is significant due to the widespread use of Qualcomm Snapdragon chipsets in smartphones, IoT devices, and embedded systems. Successful exploitation could lead to unauthorized access to sensitive data, disruption of wireless communications, and potential device compromise. Telecommunications providers, mobile device manufacturers, and enterprises relying on Snapdragon-based devices for critical operations could face confidentiality breaches, integrity violations, and availability outages. The vulnerability could also be leveraged for lateral movement within networks if attackers gain elevated privileges on endpoint devices. Given the high penetration of Snapdragon-powered devices in Europe, the risk extends to both consumer and enterprise environments, potentially affecting data privacy compliance under GDPR if personal data is exposed. The lack of known exploits currently reduces immediate risk but does not eliminate the threat, especially as patches are not yet available.

Mitigation Recommendations

Mitigation should focus on minimizing the attack surface and preparing for patch deployment. Organizations should: 1) Restrict local privileged access on devices using affected Snapdragon platforms to trusted personnel only. 2) Implement strict access controls and monitoring on devices to detect unusual configuration calls or memory corruption indicators. 3) Maintain up-to-date inventories of devices with affected chipsets to prioritize patching once Qualcomm releases fixes. 4) Collaborate with device manufacturers and mobile carriers to ensure timely firmware and software updates. 5) Employ endpoint detection and response (EDR) solutions capable of identifying exploitation attempts related to memory corruption or race conditions. 6) Educate users and administrators about the risks of privilege escalation and the importance of applying updates. 7) Consider network segmentation to limit potential lateral movement from compromised devices. 8) Monitor threat intelligence feeds for emerging exploit information related to CVE-2025-47332.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.261Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695d93cc65deeab1b95d815a

Added to database: 1/6/2026, 10:59:24 PM

Last enriched: 1/6/2026, 11:18:21 PM

Last updated: 1/8/2026, 12:00:42 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats