Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47335: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qualcomm, Inc. Snapdragon

0
Medium
VulnerabilityCVE-2025-47335cvecve-2025-47335cwe-120
Published: Tue Jan 06 2026 (01/06/2026, 22:48:33 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while parsing clock configuration data for a specific hardware type.

AI-Powered Analysis

AILast updated: 01/14/2026, 01:39:46 UTC

Technical Analysis

CVE-2025-47335 is a classic buffer overflow vulnerability (CWE-120) identified in Qualcomm Snapdragon chipsets, specifically in the parsing logic for clock configuration data related to certain hardware types. The flaw occurs because the code does not properly verify the size of input data before copying it into a buffer, leading to memory corruption. This vulnerability affects a wide range of Qualcomm products, including FastConnect modules (e.g., 6700, 6900, 7800), various Snapdragon SoCs (e.g., SM6650, SM7635, SM8750), and related wireless connectivity components (e.g., WCD9370 series, WCN6650 series). The CVSS 3.1 base score is 6.7, indicating medium severity, with vector AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H. This means exploitation requires local access with high privileges, no user interaction, and can impact confidentiality, integrity, and availability. The vulnerability could allow an attacker with elevated local privileges to execute arbitrary code or cause denial of service by corrupting memory during clock configuration data parsing. No public exploits are known at this time, and Qualcomm has not yet released patches. The vulnerability was reserved in May 2025 and published in January 2026. Given the affected components are embedded in many mobile and IoT devices, the scope is broad, but exploitation complexity and required privileges limit immediate risk.

Potential Impact

For European organizations, the impact of CVE-2025-47335 depends largely on the deployment of affected Qualcomm Snapdragon devices within their infrastructure. Enterprises and government agencies using mobile devices, embedded systems, or IoT devices powered by these chipsets could face risks of local privilege escalation, data leakage, or service disruption. Sectors such as telecommunications, critical infrastructure, and manufacturing that rely on embedded Qualcomm hardware for connectivity or control systems may be particularly vulnerable. The vulnerability could enable attackers with existing high-level access to further compromise device security, potentially leading to espionage, sabotage, or operational downtime. Although remote exploitation is not feasible, insider threats or malware that gains elevated privileges could leverage this flaw. The absence of known exploits reduces immediate threat but underscores the need for proactive mitigation to prevent future attacks.

Mitigation Recommendations

Organizations should monitor Qualcomm advisories closely and apply security patches promptly once available. Until patches are released, restrict local administrative access to devices containing affected Snapdragon chipsets to trusted personnel only. Employ strict access controls and endpoint security solutions to detect and prevent privilege escalation attempts. Conduct thorough inventory and asset management to identify devices with impacted hardware versions. For critical systems, consider network segmentation to limit exposure of vulnerable devices. Implement runtime protections such as memory corruption mitigations (e.g., DEP, ASLR) where supported by device firmware. Engage with device vendors to confirm patch timelines and request interim mitigations or workarounds. Regularly update device firmware and operating systems to incorporate security improvements. Finally, educate IT staff and users about the risks of granting high-level privileges and the importance of device security hygiene.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.261Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695d93cc65deeab1b95d8163

Added to database: 1/6/2026, 10:59:24 PM

Last enriched: 1/14/2026, 1:39:46 AM

Last updated: 2/7/2026, 5:24:39 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats