Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47346: CWE-787: Out-of-bounds Write in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47346cvecve-2025-47346cwe-787
Published: Tue Jan 06 2026 (01/06/2026, 22:48:40 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while processing a secure logging command in the trusted application.

AI-Powered Analysis

AILast updated: 01/06/2026, 23:15:18 UTC

Technical Analysis

CVE-2025-47346 is an out-of-bounds write vulnerability classified under CWE-787, discovered in Qualcomm Snapdragon chipsets and related platforms. The vulnerability occurs due to improper memory handling while processing a secure logging command within a trusted application environment. This memory corruption can lead to arbitrary code execution or privilege escalation by overwriting critical memory regions. Affected products include a broad spectrum of Qualcomm hardware such as FastConnect modules, Snapdragon mobile platforms (including Snapdragon 4 Gen 2, 6 Gen 1, 8 Gen 3), various modem-RF systems, and multiple wireless connectivity chipsets. The vulnerability requires local attacker privileges but does not require user interaction, making it exploitable by malicious applications or users with limited access to the device. The CVSS 3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and low privileges required. No patches are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability's presence in trusted applications handling secure logging suggests potential for deep system compromise if exploited. Due to the widespread deployment of Qualcomm Snapdragon chipsets in mobile phones, IoT devices, and automotive systems, the vulnerability poses a significant risk to device security and user data integrity.

Potential Impact

European organizations using devices powered by affected Qualcomm Snapdragon chipsets face risks including unauthorized privilege escalation, potential remote code execution (if combined with other vulnerabilities), and system instability or crashes. This can lead to data breaches, disruption of critical services, and compromise of sensitive communications. Telecommunications providers, automotive manufacturers, and IoT device operators in Europe are particularly vulnerable due to their reliance on these chipsets for connectivity and processing. The vulnerability could be exploited to bypass security controls, access confidential information, or disrupt device availability, impacting business operations and user safety. Given the integration of these chipsets in consumer and industrial devices, the attack surface is extensive, increasing the likelihood of targeted attacks or malware leveraging this flaw. The absence of known exploits currently provides a window for proactive mitigation, but the high severity score indicates urgency in addressing the vulnerability to prevent future exploitation.

Mitigation Recommendations

1. Monitor Qualcomm’s official security advisories and apply firmware or software patches promptly once released. 2. Restrict local access to devices, limiting the ability of unprivileged users or applications to interact with trusted applications handling secure logging. 3. Employ mobile device management (MDM) solutions to enforce security policies and control application permissions on affected devices. 4. Conduct regular security audits and anomaly detection focusing on secure logging processes and memory integrity. 5. For organizations deploying IoT or automotive systems with affected chipsets, implement network segmentation and strict access controls to minimize exposure. 6. Educate users and administrators about the risks of installing untrusted applications that could exploit local vulnerabilities. 7. Collaborate with device vendors to ensure timely updates and verify patch deployment status across all affected assets. 8. Consider deploying runtime application self-protection (RASP) or endpoint detection and response (EDR) tools capable of detecting exploitation attempts targeting memory corruption vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.263Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695d93cd65deeab1b95d81ac

Added to database: 1/6/2026, 10:59:25 PM

Last enriched: 1/6/2026, 11:15:18 PM

Last updated: 1/8/2026, 6:12:30 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats