Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47343: CWE-822 Untrusted Pointer Dereference in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47343cvecve-2025-47343cwe-822
Published: Tue Jan 06 2026 (01/06/2026, 22:48:37 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while processing a video session to set video parameters.

AI-Powered Analysis

AILast updated: 01/14/2026, 01:40:57 UTC

Technical Analysis

CVE-2025-47343 is a vulnerability classified under CWE-822 (Untrusted Pointer Dereference) found in Qualcomm Snapdragon platforms and associated hardware modules. The flaw arises from improper handling of pointers during the processing of video sessions when setting video parameters, which leads to memory corruption. This memory corruption can be exploited to manipulate the device's memory, potentially allowing an attacker to execute arbitrary code, escalate privileges, or cause denial of service conditions. The vulnerability affects a broad range of Qualcomm products, including FastConnect modules (6700, 6900, 7800), various QCM and WCD series chips, and the Qualcomm Video Collaboration VC3 Platform, among others. The CVSS v3.1 score is 7.8, indicating a high severity level, with an attack vector requiring local access (AV:L), low attack complexity (AC:L), low privileges (PR:L), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (all high). The vulnerability was reserved in May 2025 and published in January 2026, with no known exploits in the wild at the time of reporting. The technical root cause is the dereferencing of untrusted pointers, which can corrupt memory during video parameter configuration, a critical operation in multimedia processing on Snapdragon devices. This vulnerability is particularly concerning due to the widespread use of affected Snapdragon components in mobile devices, IoT, and embedded systems, which are integral to modern communication and computing infrastructure.

Potential Impact

The impact of CVE-2025-47343 on European organizations can be significant, especially those relying heavily on mobile and embedded devices powered by Qualcomm Snapdragon platforms. The vulnerability can lead to unauthorized access to sensitive data (confidentiality breach), manipulation or corruption of system operations (integrity compromise), and service disruptions or device crashes (availability impact). Telecommunications providers, mobile network operators, and enterprises with large mobile workforces are at heightened risk, as exploitation could enable attackers to intercept communications, deploy malware, or disrupt critical services. Additionally, sectors such as finance, healthcare, and government that depend on secure mobile communications and video collaboration tools may face increased exposure. The requirement for local access and low privileges means insider threats or malware already present on devices could exploit this vulnerability to escalate their control. The absence of user interaction lowers the barrier for exploitation once an attacker gains limited access. Given the pervasive deployment of Snapdragon chips in smartphones and IoT devices across Europe, the potential for widespread impact exists, particularly if attackers develop reliable exploit code.

Mitigation Recommendations

To mitigate CVE-2025-47343, European organizations should implement a multi-layered approach: 1) Monitor Qualcomm and device vendors for official patches or firmware updates addressing this vulnerability and deploy them promptly across all affected devices. 2) Restrict local access to devices, especially limiting access to video processing interfaces and services that handle video session parameters, through device hardening and access control policies. 3) Employ endpoint detection and response (EDR) solutions capable of identifying anomalous behavior related to memory corruption or unauthorized video session manipulations. 4) Enforce strict privilege management to minimize the number of users and processes with the ability to interact with vulnerable components. 5) Conduct regular security audits and vulnerability assessments on mobile and embedded devices within the organization’s infrastructure. 6) Educate users and administrators about the risks of local privilege escalation and the importance of device security hygiene. 7) Consider network segmentation to isolate critical systems from devices that might be compromised via this vulnerability. 8) Collaborate with device manufacturers and service providers to ensure timely communication and coordinated response to emerging threats related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.263Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695d93cc65deeab1b95d816f

Added to database: 1/6/2026, 10:59:24 PM

Last enriched: 1/14/2026, 1:40:57 AM

Last updated: 2/7/2026, 2:58:30 PM

Views: 119

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats