Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47346: CWE-787: Out-of-bounds Write in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47346cvecve-2025-47346cwe-787
Published: Tue Jan 06 2026 (01/06/2026, 22:48:40 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while processing a secure logging command in the trusted application.

AI-Powered Analysis

AILast updated: 01/14/2026, 01:41:55 UTC

Technical Analysis

CVE-2025-47346 is an out-of-bounds write vulnerability classified under CWE-787 found in Qualcomm Snapdragon chipsets and associated wireless connectivity products. The vulnerability occurs due to improper memory handling while processing a secure logging command within a trusted application running on these platforms. This memory corruption can lead to arbitrary code execution or denial of service conditions. The affected products span a wide range of Qualcomm hardware, including multiple generations of Snapdragon mobile platforms (e.g., Snapdragon 4 Gen 2, 6 Gen 1, 8 Gen 3), various FastConnect wireless subsystems, modem-RF systems, and audio components. The vulnerability requires local access with low privileges (AV:L, PR:L) but does not require user interaction (UI:N), making it exploitable by an attacker who can execute code locally, such as through a compromised app or local user account. The CVSS v3.1 score is 7.8, reflecting high impact on confidentiality, integrity, and availability. No public exploits are known yet, but the broad range of affected devices, including smartphones, automotive platforms, and IoT devices, increases the potential attack surface. The vulnerability's presence in trusted applications that handle secure logging commands is particularly concerning as it may allow attackers to escalate privileges or disrupt critical system functions. The lack of currently available patches necessitates vigilance and interim mitigations to reduce risk.

Potential Impact

For European organizations, the impact of CVE-2025-47346 is significant due to the widespread use of Qualcomm Snapdragon chipsets in mobile devices, automotive systems, and IoT infrastructure. Confidentiality risks include potential data leakage from compromised devices, while integrity and availability impacts could disrupt critical services relying on these platforms. Enterprises with Bring Your Own Device (BYOD) policies or those deploying Qualcomm-based embedded systems in operational technology environments face increased exposure. The vulnerability could be exploited to gain unauthorized access or cause system crashes, affecting business continuity and potentially leading to data breaches. Automotive manufacturers and suppliers in Europe using affected Snapdragon Auto platforms might experience safety and operational risks. Additionally, telecom providers using Snapdragon modem-RF systems could see network disruptions or targeted attacks. The absence of known exploits currently provides a window for proactive defense, but the high severity and broad product range necessitate urgent attention to prevent exploitation.

Mitigation Recommendations

1. Monitor Qualcomm and device vendors for official patches and apply them immediately upon release to affected products. 2. Restrict local access to devices running affected Snapdragon components by enforcing strong access controls and limiting administrative privileges. 3. Employ application whitelisting and sandboxing to reduce the risk of malicious code execution within trusted applications handling secure logging commands. 4. Implement runtime memory protection mechanisms such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) where supported by the device firmware. 5. Conduct regular security audits and behavioral monitoring to detect anomalous activities indicative of exploitation attempts, especially on devices used in critical infrastructure. 6. For automotive and IoT deployments, ensure secure firmware update mechanisms are in place to facilitate timely patching. 7. Educate users and administrators about the risks of local privilege escalation vulnerabilities and the importance of device hygiene. 8. Consider network segmentation and isolation of vulnerable devices to limit potential lateral movement in enterprise environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.263Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695d93cd65deeab1b95d81ac

Added to database: 1/6/2026, 10:59:25 PM

Last enriched: 1/14/2026, 1:41:55 AM

Last updated: 2/7/2026, 4:09:32 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats