Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47345: CWE-323: Reusing a Nonce, Key Pair in Encryption in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47345cvecve-2025-47345cwe-323
Published: Tue Jan 06 2026 (01/06/2026, 22:48:39 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Cryptographic issue may occur while encrypting license data.

AI-Powered Analysis

AILast updated: 01/06/2026, 23:16:03 UTC

Technical Analysis

CVE-2025-47345 is a cryptographic vulnerability identified in Qualcomm Snapdragon platforms, specifically involving the reuse of a nonce and key pair during the encryption of license data. This issue is categorized under CWE-323, which pertains to improper verification of cryptographic nonces, leading to potential cryptographic failures. Nonce reuse in encryption schemes, especially symmetric encryption or authenticated encryption modes, can critically undermine the security guarantees by enabling attackers to decrypt or forge encrypted data. The vulnerability affects a wide array of Qualcomm products, including numerous Snapdragon mobile platforms, FastConnect wireless subsystems, modem-RF systems, and various wireless connectivity chips. The flaw arises because the encryption implementation does not ensure unique nonces per encryption operation, violating fundamental cryptographic principles. Exploiting this vulnerability requires local access with low privileges but does not require user interaction, making it feasible for attackers who have gained limited system access to escalate their capabilities or extract sensitive license data. The vulnerability impacts confidentiality and integrity but does not affect availability. The CVSS v3.1 score of 8.4 reflects the high impact on confidentiality and integrity, low attack complexity, and limited privileges required. No public exploits are known yet, but the broad range of affected devices and the critical nature of cryptographic failures make this a significant security issue. Qualcomm has not yet published patches, so mitigation currently relies on detection and limiting local access. This vulnerability could be leveraged to undermine digital rights management, secure boot processes, or other license-based protections embedded in affected devices.

Potential Impact

For European organizations, the impact of CVE-2025-47345 is substantial due to the widespread use of Qualcomm Snapdragon chipsets in mobile devices, automotive systems, and IoT infrastructure. Confidentiality breaches could expose sensitive license data, potentially leading to unauthorized use or piracy of software and services. Integrity compromises might allow attackers to manipulate license validation or security-critical configurations, undermining trust in device security and potentially enabling further exploitation or persistence. Telecommunications providers, automotive manufacturers, and industrial IoT operators in Europe could face operational disruptions or reputational damage if attackers exploit this vulnerability to bypass security controls. The vulnerability's requirement for local access limits remote exploitation but increases risk from insider threats or malware that gains foothold on devices. Given the strategic importance of secure communications and automotive safety in Europe, successful exploitation could have cascading effects on critical infrastructure and consumer trust. The lack of current patches increases exposure duration, emphasizing the need for proactive risk management. Additionally, regulatory compliance frameworks such as GDPR and NIS Directive may impose obligations on affected entities to manage and disclose risks related to this vulnerability.

Mitigation Recommendations

1. Monitor Qualcomm's official channels closely for security patches addressing CVE-2025-47345 and apply them promptly across all affected devices and systems. 2. Implement strict access controls and endpoint protection to prevent unauthorized local access, as exploitation requires local privileges. 3. Conduct cryptographic audits on affected systems to verify nonce generation and key management practices, ensuring no reuse occurs in custom or layered encryption implementations. 4. Employ runtime detection mechanisms to identify anomalous encryption operations or repeated nonce usage patterns indicative of exploitation attempts. 5. For critical systems, consider network segmentation and device isolation to limit the spread of potential local exploits. 6. Engage with device vendors and service providers to confirm the presence of affected Qualcomm components and their patch status. 7. Educate internal security teams about the vulnerability's specifics to enhance incident response readiness. 8. Where feasible, replace or upgrade hardware components that cannot be patched in a timely manner, especially in high-risk environments. 9. Review and reinforce software license management and digital rights enforcement mechanisms to detect irregularities stemming from this vulnerability. 10. Maintain comprehensive logging and monitoring to facilitate forensic analysis if exploitation is suspected.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.263Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695d93cd65deeab1b95d81a9

Added to database: 1/6/2026, 10:59:25 PM

Last enriched: 1/6/2026, 11:16:03 PM

Last updated: 1/8/2026, 12:38:36 PM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats