CVE-2025-47341: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qualcomm, Inc. Snapdragon
memory corruption while processing an image encoding completion event.
AI Analysis
Technical Summary
CVE-2025-47341 is a buffer overflow vulnerability classified under CWE-120, discovered in Qualcomm Snapdragon and related platforms including FastConnect modules, Snapdragon compute platforms, and various audio components. The flaw arises from improper validation of input size during the processing of an image encoding completion event, leading to memory corruption. This vulnerability allows an attacker with low privileges and local access to potentially execute arbitrary code, escalate privileges, or cause denial of service by corrupting memory. The affected products span a broad range of Qualcomm hardware widely used in mobile devices, IoT, and compute platforms. The CVSS v3.1 base score of 7.8 reflects high severity, with attack vector local, low attack complexity, low privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no exploits have been reported in the wild yet, the vulnerability poses a significant risk due to the extensive deployment of affected hardware. The lack of currently available patches necessitates proactive risk management. This vulnerability highlights the critical need for rigorous input validation in multimedia processing components within embedded systems. Qualcomm’s broad product impact means that many device manufacturers and end users could be affected, especially in sectors relying on Snapdragon platforms for communication, computation, and multimedia processing.
Potential Impact
The vulnerability can lead to severe consequences including unauthorized code execution, privilege escalation, and denial of service on devices using affected Qualcomm Snapdragon and related platforms. Given the widespread use of these chipsets in smartphones, tablets, IoT devices, and compute platforms, exploitation could compromise user data confidentiality, device integrity, and availability of services. Attackers with local access could leverage this flaw to gain persistent control or disrupt critical functions, impacting both consumer and enterprise environments. The high impact on confidentiality, integrity, and availability combined with the low privilege and no user interaction requirements make this vulnerability particularly dangerous. Organizations deploying affected devices in sensitive environments such as telecommunications, healthcare, finance, and government could face significant operational and reputational damage if exploited. The broad product range affected increases the attack surface, potentially enabling attackers to target a variety of device types and use cases.
Mitigation Recommendations
1. Monitor Qualcomm and device manufacturers for official security patches and apply them promptly once released. 2. Restrict local access to devices running affected Qualcomm platforms by enforcing strict physical and logical access controls. 3. Implement application whitelisting and sandboxing for processes handling image encoding and multimedia functions to limit exploitation scope. 4. Employ runtime protection mechanisms such as Control Flow Integrity (CFI) and Address Space Layout Randomization (ASLR) where supported by the platform. 5. Conduct regular security audits and fuzz testing on multimedia processing components to detect similar vulnerabilities proactively. 6. For enterprise deployments, segment networks to isolate vulnerable devices and monitor for anomalous behavior indicative of exploitation attempts. 7. Educate users and administrators about the risks of local privilege escalation vulnerabilities and the importance of timely updates. 8. Consider deploying endpoint detection and response (EDR) solutions capable of identifying suspicious memory corruption or code execution patterns related to this vulnerability.
Affected Countries
United States, China, India, South Korea, Japan, Germany, United Kingdom, France, Brazil, Russia, Canada, Australia, Taiwan, Singapore
CVE-2025-47341: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qualcomm, Inc. Snapdragon
Description
memory corruption while processing an image encoding completion event.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-47341 is a buffer overflow vulnerability classified under CWE-120, discovered in Qualcomm Snapdragon and related platforms including FastConnect modules, Snapdragon compute platforms, and various audio components. The flaw arises from improper validation of input size during the processing of an image encoding completion event, leading to memory corruption. This vulnerability allows an attacker with low privileges and local access to potentially execute arbitrary code, escalate privileges, or cause denial of service by corrupting memory. The affected products span a broad range of Qualcomm hardware widely used in mobile devices, IoT, and compute platforms. The CVSS v3.1 base score of 7.8 reflects high severity, with attack vector local, low attack complexity, low privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no exploits have been reported in the wild yet, the vulnerability poses a significant risk due to the extensive deployment of affected hardware. The lack of currently available patches necessitates proactive risk management. This vulnerability highlights the critical need for rigorous input validation in multimedia processing components within embedded systems. Qualcomm’s broad product impact means that many device manufacturers and end users could be affected, especially in sectors relying on Snapdragon platforms for communication, computation, and multimedia processing.
Potential Impact
The vulnerability can lead to severe consequences including unauthorized code execution, privilege escalation, and denial of service on devices using affected Qualcomm Snapdragon and related platforms. Given the widespread use of these chipsets in smartphones, tablets, IoT devices, and compute platforms, exploitation could compromise user data confidentiality, device integrity, and availability of services. Attackers with local access could leverage this flaw to gain persistent control or disrupt critical functions, impacting both consumer and enterprise environments. The high impact on confidentiality, integrity, and availability combined with the low privilege and no user interaction requirements make this vulnerability particularly dangerous. Organizations deploying affected devices in sensitive environments such as telecommunications, healthcare, finance, and government could face significant operational and reputational damage if exploited. The broad product range affected increases the attack surface, potentially enabling attackers to target a variety of device types and use cases.
Mitigation Recommendations
1. Monitor Qualcomm and device manufacturers for official security patches and apply them promptly once released. 2. Restrict local access to devices running affected Qualcomm platforms by enforcing strict physical and logical access controls. 3. Implement application whitelisting and sandboxing for processes handling image encoding and multimedia functions to limit exploitation scope. 4. Employ runtime protection mechanisms such as Control Flow Integrity (CFI) and Address Space Layout Randomization (ASLR) where supported by the platform. 5. Conduct regular security audits and fuzz testing on multimedia processing components to detect similar vulnerabilities proactively. 6. For enterprise deployments, segment networks to isolate vulnerable devices and monitor for anomalous behavior indicative of exploitation attempts. 7. Educate users and administrators about the risks of local privilege escalation vulnerabilities and the importance of timely updates. 8. Consider deploying endpoint detection and response (EDR) solutions capable of identifying suspicious memory corruption or code execution patterns related to this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- qualcomm
- Date Reserved
- 2025-05-06T08:33:16.262Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e72afb32de7eb26af88ba1
Added to database: 10/9/2025, 3:24:43 AM
Last enriched: 2/27/2026, 2:42:14 AM
Last updated: 3/25/2026, 7:09:56 AM
Views: 72
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.