Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47349: CWE-823 Use of Out-of-range Pointer Offset in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47349cvecve-2025-47349cwe-823
Published: Thu Oct 09 2025 (10/09/2025, 03:18:13 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while processing an escape call.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:42:42 UTC

Technical Analysis

CVE-2025-47349 is a vulnerability classified under CWE-823, indicating the use of an out-of-range pointer offset that leads to memory corruption. This flaw exists in Qualcomm Snapdragon components, specifically affecting a range of products such as FastConnect 6900 and 7800 modules, QCC2072, SC8380XP, WCD9378C, WCD9380, WCD9385, WSA8840, WSA8845, WSA8845H, and several X-series chipsets. The vulnerability arises during the processing of an escape call, a mechanism often used to handle special or vendor-specific commands. Improper bounds checking or pointer arithmetic leads to referencing memory outside the intended buffer, causing corruption. The CVSS v3.1 base score of 7.8 reflects high severity, with attack vector being local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). This means an attacker with local access and limited privileges can exploit this flaw to execute arbitrary code, escalate privileges, or cause denial of service. No patches or known exploits are currently reported, but the broad range of affected hardware and the critical impact make this a significant threat to devices relying on these Qualcomm components.

Potential Impact

The vulnerability can have severe consequences for organizations worldwide that deploy affected Qualcomm Snapdragon hardware. Exploitation could lead to unauthorized access to sensitive data, complete system compromise, or denial of service on devices. This is particularly critical for mobile devices, IoT endpoints, and embedded systems that use these chipsets, as attackers could leverage the flaw to bypass security controls and gain persistent footholds. The local attack vector implies that attackers need some form of local access, which could be achieved via compromised applications, malicious insiders, or physical access. The high impact on confidentiality, integrity, and availability means that critical business operations, user privacy, and device functionality could be severely disrupted. Industries relying heavily on mobile communications, such as telecommunications, finance, healthcare, and government sectors, are at elevated risk due to the sensitive nature of data and services involved.

Mitigation Recommendations

Organizations should monitor Qualcomm’s advisories closely for official patches and apply them promptly once available. Until patches are released, mitigating risk involves restricting local access to devices, enforcing strict privilege separation, and monitoring for unusual behavior indicative of exploitation attempts. Employing endpoint detection and response (EDR) solutions that can detect memory corruption or anomalous escape call usage may help identify exploitation attempts early. Developers and integrators should audit any custom code interacting with Qualcomm components to ensure proper input validation and bounds checking. Network segmentation and limiting physical access to critical devices can reduce the attack surface. Additionally, educating users about the risks of installing untrusted applications or granting unnecessary permissions can help prevent attackers from gaining the local access needed to exploit this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.263Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e72afc32de7eb26af88baa

Added to database: 10/9/2025, 3:24:44 AM

Last enriched: 2/27/2026, 2:42:42 AM

Last updated: 3/22/2026, 2:51:42 PM

Views: 123

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses