CVE-2025-47349: CWE-823 Use of Out-of-range Pointer Offset in Qualcomm, Inc. Snapdragon
Memory corruption while processing an escape call.
AI Analysis
Technical Summary
CVE-2025-47349 is a vulnerability classified under CWE-823 (Use of Out-of-range Pointer Offset) affecting Qualcomm Snapdragon components, specifically multiple FastConnect and WCD series chips widely used in mobile and IoT devices. The flaw arises from improper handling of pointer offsets during the processing of an escape call, leading to memory corruption. This memory corruption can be exploited by an attacker with local privileges to execute arbitrary code, escalate privileges, or cause denial of service by crashing the affected component. The vulnerability has a CVSS v3.1 base score of 7.8, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits have been reported in the wild, the potential impact is significant due to the critical nature of the Snapdragon components in communication and processing within devices. The affected versions include FastConnect 6900, 7800, and various WCD and WSA chipsets, which are embedded in numerous smartphones, tablets, and IoT devices. The vulnerability was reserved in May 2025 and published in October 2025, but Qualcomm has not yet released public patches, increasing the urgency for mitigation. The flaw's exploitation requires local access, which limits remote exploitation but raises concerns for insider threats or malware already present on devices. The memory corruption could allow attackers to bypass security controls, access sensitive data, or disrupt device functionality.
Potential Impact
For European organizations, this vulnerability poses a significant risk to devices relying on affected Qualcomm Snapdragon components, including smartphones, tablets, and IoT devices. Confidentiality could be compromised if attackers execute arbitrary code to access sensitive information. Integrity is at risk due to potential unauthorized code execution or manipulation of device operations. Availability may be impacted through denial of service by crashing the affected components. The local access requirement means that attackers need to have some level of access to the device, either physically or via malware, which could be a vector in enterprise environments with Bring Your Own Device (BYOD) policies or unmanaged IoT devices. Critical infrastructure and sectors relying on secure communications and device integrity, such as finance, healthcare, and government, could be particularly vulnerable. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once patches are available. The widespread use of Qualcomm Snapdragon chips in European consumer and enterprise devices amplifies the potential impact across multiple sectors.
Mitigation Recommendations
Organizations should immediately inventory devices using affected Qualcomm Snapdragon components to identify exposure. Since no patches are currently available, mitigation should focus on restricting local access to devices, enforcing strict endpoint security controls, and monitoring for suspicious local activity that could indicate exploitation attempts. Deploy mobile device management (MDM) solutions to enforce security policies and restrict installation of unauthorized applications that could exploit the vulnerability. Encourage users to avoid installing untrusted software and maintain updated antivirus and endpoint detection and response (EDR) solutions. Coordinate with device manufacturers and Qualcomm for timely patch releases and apply updates as soon as they become available. For IoT devices, segment networks to limit lateral movement and isolate vulnerable devices. Conduct regular security awareness training to reduce insider threat risks. Implement strong authentication and access controls on devices to minimize the risk of local exploitation. Finally, monitor threat intelligence feeds for any emerging exploit code or indicators of compromise related to CVE-2025-47349.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden
CVE-2025-47349: CWE-823 Use of Out-of-range Pointer Offset in Qualcomm, Inc. Snapdragon
Description
Memory corruption while processing an escape call.
AI-Powered Analysis
Technical Analysis
CVE-2025-47349 is a vulnerability classified under CWE-823 (Use of Out-of-range Pointer Offset) affecting Qualcomm Snapdragon components, specifically multiple FastConnect and WCD series chips widely used in mobile and IoT devices. The flaw arises from improper handling of pointer offsets during the processing of an escape call, leading to memory corruption. This memory corruption can be exploited by an attacker with local privileges to execute arbitrary code, escalate privileges, or cause denial of service by crashing the affected component. The vulnerability has a CVSS v3.1 base score of 7.8, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits have been reported in the wild, the potential impact is significant due to the critical nature of the Snapdragon components in communication and processing within devices. The affected versions include FastConnect 6900, 7800, and various WCD and WSA chipsets, which are embedded in numerous smartphones, tablets, and IoT devices. The vulnerability was reserved in May 2025 and published in October 2025, but Qualcomm has not yet released public patches, increasing the urgency for mitigation. The flaw's exploitation requires local access, which limits remote exploitation but raises concerns for insider threats or malware already present on devices. The memory corruption could allow attackers to bypass security controls, access sensitive data, or disrupt device functionality.
Potential Impact
For European organizations, this vulnerability poses a significant risk to devices relying on affected Qualcomm Snapdragon components, including smartphones, tablets, and IoT devices. Confidentiality could be compromised if attackers execute arbitrary code to access sensitive information. Integrity is at risk due to potential unauthorized code execution or manipulation of device operations. Availability may be impacted through denial of service by crashing the affected components. The local access requirement means that attackers need to have some level of access to the device, either physically or via malware, which could be a vector in enterprise environments with Bring Your Own Device (BYOD) policies or unmanaged IoT devices. Critical infrastructure and sectors relying on secure communications and device integrity, such as finance, healthcare, and government, could be particularly vulnerable. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once patches are available. The widespread use of Qualcomm Snapdragon chips in European consumer and enterprise devices amplifies the potential impact across multiple sectors.
Mitigation Recommendations
Organizations should immediately inventory devices using affected Qualcomm Snapdragon components to identify exposure. Since no patches are currently available, mitigation should focus on restricting local access to devices, enforcing strict endpoint security controls, and monitoring for suspicious local activity that could indicate exploitation attempts. Deploy mobile device management (MDM) solutions to enforce security policies and restrict installation of unauthorized applications that could exploit the vulnerability. Encourage users to avoid installing untrusted software and maintain updated antivirus and endpoint detection and response (EDR) solutions. Coordinate with device manufacturers and Qualcomm for timely patch releases and apply updates as soon as they become available. For IoT devices, segment networks to limit lateral movement and isolate vulnerable devices. Conduct regular security awareness training to reduce insider threat risks. Implement strong authentication and access controls on devices to minimize the risk of local exploitation. Finally, monitor threat intelligence feeds for any emerging exploit code or indicators of compromise related to CVE-2025-47349.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- qualcomm
- Date Reserved
- 2025-05-06T08:33:16.263Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e72afc32de7eb26af88baa
Added to database: 10/9/2025, 3:24:44 AM
Last enriched: 10/9/2025, 3:40:33 AM
Last updated: 10/9/2025, 10:21:02 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10862: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in roxnor Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers
HighCVE-2025-11522: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Elated-Themes Search & Go - Directory WordPress Theme
CriticalCVE-2025-11539: CWE-94 Improper Control of Generation of Code ('Code Injection') in Grafana grafana-image-renderer
CriticalCVE-2025-7634: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in wptravelengine WP Travel Engine – Tour Booking Plugin – Tour Operator Software
CriticalCVE-2025-7526: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in wptravelengine WP Travel Engine – Tour Booking Plugin – Tour Operator Software
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.