CVE-2025-47349: CWE-823 Use of Out-of-range Pointer Offset in Qualcomm, Inc. Snapdragon
Memory corruption while processing an escape call.
AI Analysis
Technical Summary
CVE-2025-47349 is a vulnerability classified under CWE-823, indicating the use of an out-of-range pointer offset that leads to memory corruption. This flaw exists in Qualcomm Snapdragon components, specifically affecting a range of products such as FastConnect 6900 and 7800 modules, QCC2072, SC8380XP, WCD9378C, WCD9380, WCD9385, WSA8840, WSA8845, WSA8845H, and several X-series chipsets. The vulnerability arises during the processing of an escape call, a mechanism often used to handle special or vendor-specific commands. Improper bounds checking or pointer arithmetic leads to referencing memory outside the intended buffer, causing corruption. The CVSS v3.1 base score of 7.8 reflects high severity, with attack vector being local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). This means an attacker with local access and limited privileges can exploit this flaw to execute arbitrary code, escalate privileges, or cause denial of service. No patches or known exploits are currently reported, but the broad range of affected hardware and the critical impact make this a significant threat to devices relying on these Qualcomm components.
Potential Impact
The vulnerability can have severe consequences for organizations worldwide that deploy affected Qualcomm Snapdragon hardware. Exploitation could lead to unauthorized access to sensitive data, complete system compromise, or denial of service on devices. This is particularly critical for mobile devices, IoT endpoints, and embedded systems that use these chipsets, as attackers could leverage the flaw to bypass security controls and gain persistent footholds. The local attack vector implies that attackers need some form of local access, which could be achieved via compromised applications, malicious insiders, or physical access. The high impact on confidentiality, integrity, and availability means that critical business operations, user privacy, and device functionality could be severely disrupted. Industries relying heavily on mobile communications, such as telecommunications, finance, healthcare, and government sectors, are at elevated risk due to the sensitive nature of data and services involved.
Mitigation Recommendations
Organizations should monitor Qualcomm’s advisories closely for official patches and apply them promptly once available. Until patches are released, mitigating risk involves restricting local access to devices, enforcing strict privilege separation, and monitoring for unusual behavior indicative of exploitation attempts. Employing endpoint detection and response (EDR) solutions that can detect memory corruption or anomalous escape call usage may help identify exploitation attempts early. Developers and integrators should audit any custom code interacting with Qualcomm components to ensure proper input validation and bounds checking. Network segmentation and limiting physical access to critical devices can reduce the attack surface. Additionally, educating users about the risks of installing untrusted applications or granting unnecessary permissions can help prevent attackers from gaining the local access needed to exploit this vulnerability.
Affected Countries
United States, China, South Korea, Japan, Germany, India, United Kingdom, France, Canada, Australia
CVE-2025-47349: CWE-823 Use of Out-of-range Pointer Offset in Qualcomm, Inc. Snapdragon
Description
Memory corruption while processing an escape call.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-47349 is a vulnerability classified under CWE-823, indicating the use of an out-of-range pointer offset that leads to memory corruption. This flaw exists in Qualcomm Snapdragon components, specifically affecting a range of products such as FastConnect 6900 and 7800 modules, QCC2072, SC8380XP, WCD9378C, WCD9380, WCD9385, WSA8840, WSA8845, WSA8845H, and several X-series chipsets. The vulnerability arises during the processing of an escape call, a mechanism often used to handle special or vendor-specific commands. Improper bounds checking or pointer arithmetic leads to referencing memory outside the intended buffer, causing corruption. The CVSS v3.1 base score of 7.8 reflects high severity, with attack vector being local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). This means an attacker with local access and limited privileges can exploit this flaw to execute arbitrary code, escalate privileges, or cause denial of service. No patches or known exploits are currently reported, but the broad range of affected hardware and the critical impact make this a significant threat to devices relying on these Qualcomm components.
Potential Impact
The vulnerability can have severe consequences for organizations worldwide that deploy affected Qualcomm Snapdragon hardware. Exploitation could lead to unauthorized access to sensitive data, complete system compromise, or denial of service on devices. This is particularly critical for mobile devices, IoT endpoints, and embedded systems that use these chipsets, as attackers could leverage the flaw to bypass security controls and gain persistent footholds. The local attack vector implies that attackers need some form of local access, which could be achieved via compromised applications, malicious insiders, or physical access. The high impact on confidentiality, integrity, and availability means that critical business operations, user privacy, and device functionality could be severely disrupted. Industries relying heavily on mobile communications, such as telecommunications, finance, healthcare, and government sectors, are at elevated risk due to the sensitive nature of data and services involved.
Mitigation Recommendations
Organizations should monitor Qualcomm’s advisories closely for official patches and apply them promptly once available. Until patches are released, mitigating risk involves restricting local access to devices, enforcing strict privilege separation, and monitoring for unusual behavior indicative of exploitation attempts. Employing endpoint detection and response (EDR) solutions that can detect memory corruption or anomalous escape call usage may help identify exploitation attempts early. Developers and integrators should audit any custom code interacting with Qualcomm components to ensure proper input validation and bounds checking. Network segmentation and limiting physical access to critical devices can reduce the attack surface. Additionally, educating users about the risks of installing untrusted applications or granting unnecessary permissions can help prevent attackers from gaining the local access needed to exploit this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- qualcomm
- Date Reserved
- 2025-05-06T08:33:16.263Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e72afc32de7eb26af88baa
Added to database: 10/9/2025, 3:24:44 AM
Last enriched: 2/27/2026, 2:42:42 AM
Last updated: 3/22/2026, 2:51:42 PM
Views: 123
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.