Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47333: CWE-416 Use After Free in Qualcomm, Inc. Snapdragon

0
Medium
VulnerabilityCVE-2025-47333cvecve-2025-47333cwe-416
Published: Tue Jan 06 2026 (01/06/2026, 22:48:31 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while handling buffer mapping operations in the cryptographic driver.

AI-Powered Analysis

AILast updated: 01/06/2026, 23:18:09 UTC

Technical Analysis

CVE-2025-47333 is a use-after-free vulnerability categorized under CWE-416 found in the cryptographic driver of Qualcomm Snapdragon chipsets. The vulnerability occurs during buffer mapping operations where memory is improperly freed and subsequently accessed, leading to memory corruption. This flaw can be exploited by an attacker with local privileges to execute arbitrary code, escalate privileges, or cause denial of service by crashing the affected driver or system components. The affected products encompass an extensive list of Snapdragon platforms, including mobile platforms (e.g., Snapdragon 8 Gen series, Snapdragon 7 Gen series), automotive platforms, IoT and wearable platforms, and various modem and connectivity chipsets. The vulnerability does not require user interaction but does require local access, which limits remote exploitation but raises concerns for multi-user or shared environments. The CVSS 3.1 score of 6.6 reflects a medium severity with low attack vector (local), low complexity, and partial impacts on confidentiality, high impact on integrity, and low impact on availability. No public exploits or patches are currently available, indicating the need for proactive mitigation. The vulnerability's presence in cryptographic drivers is particularly concerning as it may undermine the security guarantees provided by cryptographic operations on affected devices.

Potential Impact

For European organizations, the impact of CVE-2025-47333 is multifaceted. Devices and embedded systems using affected Snapdragon chipsets are prevalent in smartphones, automotive systems, industrial IoT, and wearable devices across Europe. Exploitation could allow attackers with local access to escalate privileges, potentially gaining unauthorized access to sensitive data or control over device functions. This is particularly critical for sectors such as automotive manufacturing, telecommunications, and critical infrastructure that rely on secure communications and device integrity. The vulnerability could lead to data breaches, disruption of services, or compromise of cryptographic operations, undermining trust in device security. Given the widespread use of Snapdragon platforms in consumer and enterprise devices, the scope of affected systems is broad. Although remote exploitation is unlikely, insider threats or malware with local access could leverage this flaw. The lack of patches increases the risk window, necessitating immediate attention to access controls and monitoring. Overall, the vulnerability poses a medium risk to confidentiality and a high risk to integrity, with potential availability impacts in critical systems.

Mitigation Recommendations

1. Monitor Qualcomm and device vendor advisories closely for the release of security patches addressing CVE-2025-47333 and apply updates promptly. 2. Restrict local access to devices running affected Snapdragon platforms by enforcing strict user privilege management and limiting administrative access. 3. Employ endpoint detection and response (EDR) solutions to monitor for suspicious local activity indicative of exploitation attempts. 4. Use hardware-based security features such as Trusted Execution Environments (TEE) and secure boot to limit the impact of memory corruption vulnerabilities. 5. For automotive and IoT deployments, segment networks to isolate vulnerable devices and reduce the risk of lateral movement. 6. Conduct regular security audits and penetration testing focusing on local privilege escalation vectors. 7. Educate users and administrators about the risks of local exploitation and enforce policies to prevent unauthorized software installation. 8. Consider deploying runtime memory protection technologies (e.g., Control Flow Integrity, Address Space Layout Randomization) where supported to mitigate use-after-free exploitation. 9. Maintain an inventory of devices with affected Snapdragon chipsets to prioritize patching and risk management. 10. Collaborate with suppliers and integrators to ensure timely vulnerability management in embedded systems.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.261Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695d93cc65deeab1b95d815d

Added to database: 1/6/2026, 10:59:24 PM

Last enriched: 1/6/2026, 11:18:09 PM

Last updated: 1/8/2026, 12:38:35 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats