Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47344: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in Qualcomm, Inc. Snapdragon

0
Medium
VulnerabilityCVE-2025-47344cvecve-2025-47344cwe-367
Published: Tue Jan 06 2026 (01/06/2026, 22:48:38 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while handling sensor utility operations.

AI-Powered Analysis

AILast updated: 01/06/2026, 23:16:17 UTC

Technical Analysis

CVE-2025-47344 is a Time-of-check to Time-of-use (TOCTOU) race condition vulnerability classified under CWE-367, found in Qualcomm Snapdragon platforms. This vulnerability arises from improper synchronization when handling sensor utility operations, leading to memory corruption. The affected products include a broad range of Qualcomm chipsets and modules such as CSRA series, FastConnect series, QCA, QCM, QCS, SM series, Snapdragon mobile platforms (including 4 Gen 1/2, 480, 695, 8 Gen 3), robotics platforms, and various wireless connectivity components (WCD, WCN, WSA series). The flaw allows an attacker with high privileges (PR:H) and local access (AV:L) to exploit the race condition without requiring user interaction (UI:N). Successful exploitation can result in high impact on confidentiality, integrity, and availability of the affected system, potentially enabling privilege escalation, arbitrary code execution, or denial of service. The vulnerability was published on January 6, 2026, with a CVSS v3.1 score of 6.7, indicating medium severity. No public exploits or patches are currently available, increasing the urgency for affected parties to monitor vendor advisories. The root cause is a timing window between the check and use of resources in sensor utility operations, which attackers can manipulate to corrupt memory and alter system behavior. Given the widespread use of Snapdragon platforms in mobile devices, IoT, and embedded systems, this vulnerability poses a significant risk to device security and operational stability.

Potential Impact

For European organizations, the impact of CVE-2025-47344 can be substantial due to the widespread deployment of Qualcomm Snapdragon-based devices in mobile phones, IoT devices, and embedded systems used in critical infrastructure, industrial automation, and enterprise environments. Exploitation could lead to unauthorized access to sensitive data, disruption of device functionality, and potential lateral movement within networks if attackers escalate privileges. This is particularly concerning for sectors relying on secure mobile communications, such as finance, healthcare, and government services. The vulnerability's requirement for local privileged access limits remote exploitation but raises risks from insider threats or compromised devices. Memory corruption could cause system crashes or unpredictable behavior, impacting availability and reliability of services. The lack of patches increases exposure time, necessitating proactive risk management. Additionally, the integration of affected Snapdragon platforms in robotics and video collaboration systems could affect operational technology environments, potentially disrupting manufacturing or communication workflows.

Mitigation Recommendations

1. Monitor Qualcomm and device vendor advisories closely for patches or firmware updates addressing CVE-2025-47344 and apply them promptly once available. 2. Restrict and audit privileged access on devices using affected Snapdragon platforms to minimize opportunities for local exploitation. 3. Implement strict access controls and endpoint security measures to detect and prevent unauthorized privilege escalation attempts. 4. Employ runtime protection and memory corruption detection tools where possible to identify anomalous behavior related to sensor utility operations. 5. For organizations deploying IoT or embedded systems with affected hardware, segment networks to isolate vulnerable devices and limit potential lateral movement. 6. Conduct regular security assessments and penetration tests focusing on privilege escalation vectors and race condition vulnerabilities. 7. Educate internal teams about the risks of TOCTOU vulnerabilities and the importance of timely patching and access management. 8. Consider deploying host-based intrusion detection systems (HIDS) that can monitor for suspicious activity related to sensor utilities. 9. If feasible, disable or limit sensor utility features not critical to operations to reduce the attack surface until patches are applied. 10. Collaborate with suppliers and partners to ensure supply chain security and timely vulnerability remediation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.263Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695d93cd65deeab1b95d81a6

Added to database: 1/6/2026, 10:59:25 PM

Last enriched: 1/6/2026, 11:16:17 PM

Last updated: 1/8/2026, 2:29:13 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats