Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47345: CWE-323: Reusing a Nonce, Key Pair in Encryption in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47345cvecve-2025-47345cwe-323
Published: Tue Jan 06 2026 (01/06/2026, 22:48:39 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Cryptographic issue may occur while encrypting license data.

AI-Powered Analysis

AILast updated: 01/14/2026, 01:41:38 UTC

Technical Analysis

CVE-2025-47345 is a cryptographic vulnerability identified in multiple Qualcomm Snapdragon platforms and related wireless connectivity components. The root cause is the reuse of a nonce and key pair during the encryption process of license data, which violates the fundamental cryptographic principle that nonces must be unique per encryption operation to ensure security. This vulnerability is classified under CWE-323, indicating improper verification of cryptographic nonce usage. The affected products span a broad range of Snapdragon chipsets, including mobile platforms (e.g., Snapdragon 6 Gen 1, Snapdragon 8 Gen 3), modem-RF systems, and wireless connectivity modules (FastConnect series, QCA series, WCN series, etc.). The CVSS v3.1 score is 8.4 (high severity), with an attack vector of local access (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and a scope change (S:C). The vulnerability allows an attacker with local access and low privileges to exploit the nonce reuse to decrypt or manipulate encrypted license data, compromising confidentiality and integrity without affecting availability. Although no exploits are currently known in the wild, the vulnerability presents a significant risk due to the widespread deployment of affected Snapdragon components in mobile devices, automotive systems, and IoT devices. The cryptographic flaw could enable attackers to bypass license protections, extract sensitive information, or manipulate device behavior. Qualcomm and ecosystem partners need to develop and distribute patches to ensure unique nonce usage in encryption routines. Until patches are available, organizations should monitor for suspicious local activity and validate cryptographic operations where possible.

Potential Impact

The impact of CVE-2025-47345 on European organizations is substantial due to the extensive use of Qualcomm Snapdragon chipsets in consumer mobile devices, automotive telematics, and IoT infrastructure across Europe. Confidentiality breaches could expose sensitive license data, intellectual property, or user information, leading to privacy violations and regulatory non-compliance under GDPR. Integrity compromises could allow attackers to manipulate device functions or license enforcement, potentially disrupting services or enabling unauthorized features. Sectors such as telecommunications, automotive manufacturing, and critical infrastructure are particularly at risk given their reliance on Snapdragon-based hardware. The local attack vector and low privilege requirement mean that insider threats or malware with limited access could exploit this vulnerability. Although availability is not directly impacted, the indirect effects of data compromise and trust erosion could be severe. The absence of known exploits in the wild provides a window for proactive mitigation, but the broad affected product range and high severity score necessitate urgent attention to prevent targeted attacks or exploitation in the European threat landscape.

Mitigation Recommendations

1. Immediate coordination with device manufacturers and Qualcomm to obtain and deploy official patches that address nonce reuse in encryption routines. 2. For organizations managing fleets of devices, implement asset inventory and identify all devices with affected Snapdragon components to prioritize patching. 3. Employ endpoint detection and response (EDR) tools to monitor for unusual local access patterns or attempts to access cryptographic license data. 4. Where possible, enforce strict access controls and limit local user privileges to reduce the attack surface. 5. Conduct cryptographic audits on custom applications interfacing with affected hardware to ensure nonce uniqueness and proper key management. 6. For automotive and IoT deployments, apply network segmentation and anomaly detection to detect exploitation attempts. 7. Maintain up-to-date threat intelligence feeds to monitor for emerging exploits targeting this vulnerability. 8. Educate internal security teams about the vulnerability’s specifics to enhance incident response readiness. 9. Consider temporary compensating controls such as disabling non-essential local interfaces that could be leveraged for exploitation until patches are applied. 10. Engage with Qualcomm and industry groups for coordinated vulnerability disclosure and mitigation guidance.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.263Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695d93cd65deeab1b95d81a9

Added to database: 1/6/2026, 10:59:25 PM

Last enriched: 1/14/2026, 1:41:38 AM

Last updated: 2/6/2026, 4:55:13 PM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats