Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47334: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qualcomm, Inc. Snapdragon

0
Medium
VulnerabilityCVE-2025-47334cvecve-2025-47334cwe-120
Published: Tue Jan 06 2026 (01/06/2026, 22:48:32 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while processing shared command buffer packet between camera userspace and kernel.

AI-Powered Analysis

AILast updated: 01/06/2026, 23:17:53 UTC

Technical Analysis

CVE-2025-47334 is a classic buffer overflow vulnerability (CWE-120) identified in Qualcomm Snapdragon platforms, specifically in the memory handling of shared command buffer packets between the camera userspace and the kernel. The flaw occurs because the system does not properly check the size of input data before copying it into a buffer, leading to memory corruption. This vulnerability affects an extensive list of Qualcomm chipsets and platforms, including many Snapdragon mobile platforms (from Snapdragon 4 Gen 1 to Snapdragon 8 Gen 3), FastConnect modules, robotics platforms, wearable platforms, and various wireless connectivity chips. The vulnerability requires local privileged access (PR:H) and does not require user interaction (UI:N), indicating that an attacker must already have elevated privileges on the device to exploit it. The CVSS v3.1 base score is 6.7, categorized as medium severity, reflecting the high impact on confidentiality, integrity, and availability if exploited, but limited by the attack vector and required privileges. Exploitation could allow an attacker to execute arbitrary code in kernel space, potentially leading to full device compromise. No public exploits or patches are currently available, but the broad range of affected devices and platforms makes this a significant concern for device manufacturers and users. The vulnerability is particularly relevant for devices that rely on Snapdragon chipsets for camera and multimedia processing, including smartphones, IoT devices, robotics, and wearable technology.

Potential Impact

For European organizations, the impact of CVE-2025-47334 can be substantial due to the widespread use of Qualcomm Snapdragon chipsets in consumer and industrial devices. Smartphones, tablets, and IoT devices powered by affected Snapdragon platforms are common in Europe, including in sectors such as telecommunications, manufacturing, healthcare, and critical infrastructure. Exploitation could lead to unauthorized access to sensitive data, disruption of device functionality, and potential lateral movement within networks if compromised devices are connected to enterprise environments. The ability to execute arbitrary code with kernel privileges could allow attackers to bypass security controls, install persistent malware, or disrupt device operations, impacting business continuity and data protection compliance under regulations like GDPR. Additionally, industrial and robotics platforms using affected chipsets could face operational disruptions or safety risks. Although exploitation requires high privileges, insider threats or chained vulnerabilities could increase risk. The lack of current known exploits provides a window for proactive mitigation, but organizations must remain vigilant given the broad attack surface.

Mitigation Recommendations

1. Monitor Qualcomm and device vendors for official patches and apply them promptly once available to address the vulnerability at the source. 2. Restrict and monitor privileged access on devices using affected Snapdragon platforms to reduce the risk of local exploitation. 3. Implement strict access controls and endpoint security measures to prevent privilege escalation that could enable exploitation. 4. Employ runtime protection and anomaly detection focused on kernel and camera subsystem behaviors to identify potential exploitation attempts. 5. For enterprise-managed mobile devices, enforce mobile device management (MDM) policies that limit installation of untrusted applications and restrict debugging or rooting capabilities. 6. Conduct regular security audits and vulnerability assessments on IoT and robotics devices incorporating affected chipsets. 7. Educate users and administrators about the risks of privilege escalation and the importance of applying security updates. 8. Consider network segmentation for critical devices to limit potential lateral movement if a device is compromised. 9. Collaborate with vendors to understand device-specific mitigations and firmware update processes. 10. Maintain incident response readiness to quickly address any exploitation attempts or anomalies related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.261Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695d93cc65deeab1b95d8160

Added to database: 1/6/2026, 10:59:24 PM

Last enriched: 1/6/2026, 11:17:53 PM

Last updated: 1/8/2026, 11:36:14 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats