Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47336: CWE-416 Use After Free in Qualcomm, Inc. Snapdragon

0
Medium
VulnerabilityCVE-2025-47336cvecve-2025-47336cwe-416
Published: Tue Jan 06 2026 (01/06/2026, 22:48:34 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while performing sensor register read operations.

AI-Powered Analysis

AILast updated: 01/06/2026, 23:17:18 UTC

Technical Analysis

CVE-2025-47336 is a use-after-free vulnerability categorized under CWE-416, discovered in Qualcomm Snapdragon chipsets, specifically affecting sensor register read operations. This flaw arises from improper memory management during sensor data handling, leading to memory corruption that can be exploited to compromise system confidentiality, integrity, and availability. The affected products include a wide range of Snapdragon models such as FastConnect 7800, QMP1000, SM8735, SM8750 series, and several WCD and WCN series components, which are integral to many modern mobile and embedded devices. The vulnerability requires local access with high privileges (PR:H) but does not require user interaction (UI:N), indicating that an attacker must already have significant control over the device to exploit it. The CVSS v3.1 base score is 6.7, reflecting a medium severity level, with high impact on confidentiality, integrity, and availability (C:H/I:H/A:H) but limited attack vector (local). No public exploits or patches are currently available, increasing the importance of proactive mitigation. The vulnerability could allow attackers to execute arbitrary code, escalate privileges, or cause denial of service by exploiting the memory corruption during sensor register reads. Given the widespread deployment of affected Snapdragon chipsets in mobile devices, this vulnerability poses a significant risk to device security and user data protection.

Potential Impact

For European organizations, the impact of CVE-2025-47336 could be substantial, particularly in sectors relying heavily on mobile communications and embedded systems using Qualcomm Snapdragon chipsets. The vulnerability's ability to compromise confidentiality, integrity, and availability means sensitive data could be exposed or manipulated, and device functionality disrupted. Telecommunications providers, critical infrastructure operators, and enterprises with mobile-dependent operations may face risks of targeted attacks if adversaries gain local privileged access to devices. Although exploitation requires high privileges and local access, insider threats or malware with elevated permissions could leverage this flaw to escalate control or disrupt services. The absence of known exploits currently reduces immediate risk, but the lack of patches necessitates vigilance. The broad range of affected Snapdragon models implies a wide attack surface, potentially impacting numerous devices across Europe. This could lead to operational disruptions, data breaches, and erosion of trust in mobile device security if exploited at scale.

Mitigation Recommendations

To mitigate CVE-2025-47336, European organizations should implement several targeted measures beyond generic advice: 1) Enforce strict access controls to limit local privileged access on devices using affected Snapdragon chipsets, including robust endpoint security and privilege management. 2) Monitor devices for unusual behavior or signs of exploitation attempts, focusing on sensor-related operations and memory anomalies. 3) Coordinate with device manufacturers and Qualcomm to obtain timely security patches and firmware updates once released, and prioritize their deployment in enterprise environments. 4) Employ application whitelisting and integrity checking to prevent unauthorized code execution that could leverage this vulnerability. 5) Educate users and administrators about the risks of granting elevated privileges to untrusted applications or users. 6) Consider network segmentation and device isolation strategies to limit the spread and impact of potential compromises. 7) Maintain up-to-date inventories of devices with affected Snapdragon models to assess exposure and prioritize remediation efforts. These steps collectively reduce the likelihood of successful exploitation and limit potential damage.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.262Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695d93cc65deeab1b95d8166

Added to database: 1/6/2026, 10:59:24 PM

Last enriched: 1/6/2026, 11:17:18 PM

Last updated: 1/8/2026, 2:28:38 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats