Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47350: CWE-416 Use After Free in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47350cvecve-2025-47350cwe-416
Published: Thu Dec 18 2025 (12/18/2025, 05:29:08 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while handling concurrent memory mapping and unmapping requests from a user-space application.

AI-Powered Analysis

AILast updated: 12/25/2025, 07:05:52 UTC

Technical Analysis

CVE-2025-47350 is a use-after-free vulnerability classified under CWE-416 affecting Qualcomm Snapdragon chipsets, including models such as FastConnect 6900, 7800, WCD9378C, and others. The flaw occurs due to improper handling of concurrent memory mapping and unmapping requests originating from user-space applications, leading to memory corruption. This corruption can be exploited by a low-privileged attacker to execute arbitrary code within the kernel context, escalate privileges, or cause system instability and denial of service. The vulnerability does not require user interaction and has low attack complexity, but does require local access with limited privileges. The CVSS v3.1 score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) indicates high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the widespread deployment of affected Snapdragon chipsets in mobile devices, IoT gadgets, and embedded systems. The vulnerability was reserved in May 2025 and published in December 2025, but no patches have yet been linked, emphasizing the need for vigilance and proactive mitigation. The root cause is a race condition in memory management routines that mishandle concurrent requests, leading to use-after-free scenarios that attackers can leverage for kernel-level compromise.

Potential Impact

For European organizations, the impact of CVE-2025-47350 is substantial given the widespread use of Qualcomm Snapdragon chipsets in smartphones, tablets, IoT devices, and embedded systems across industries such as telecommunications, manufacturing, and critical infrastructure. Exploitation could lead to unauthorized data access, system takeovers, and disruption of services, affecting confidentiality, integrity, and availability of sensitive information and operational technology. Enterprises relying on mobile workforce devices or IoT deployments may face increased risk of lateral movement and persistent threats. The vulnerability’s ability to escalate privileges locally means compromised endpoints could serve as beachheads for broader network intrusion. Additionally, denial of service conditions could interrupt business continuity. The absence of known exploits currently provides a window for mitigation, but the high severity score and ease of exploitation underline the urgency for European organizations to assess exposure and implement controls promptly.

Mitigation Recommendations

1. Monitor Qualcomm and device vendors for official patches and apply them immediately upon release. 2. Restrict local user privileges to the minimum necessary, preventing untrusted applications from issuing concurrent memory mapping/unmapping requests. 3. Employ endpoint detection and response (EDR) solutions to monitor for anomalous memory operations or unusual kernel activity indicative of exploitation attempts. 4. Harden device configurations by disabling unnecessary services and interfaces that could be leveraged to trigger the vulnerability. 5. Conduct regular security audits and penetration testing focusing on local privilege escalation vectors. 6. For IoT deployments, segment networks to limit lateral movement from compromised devices. 7. Educate users about risks of installing untrusted applications that could exploit local vulnerabilities. 8. Implement strict application whitelisting and sandboxing to reduce attack surface. 9. Maintain up-to-date inventory of devices using affected Snapdragon versions to prioritize remediation efforts. 10. Collaborate with suppliers and service providers to ensure timely vulnerability management and incident response readiness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.263Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6943963858cc240f07ac2f3a

Added to database: 12/18/2025, 5:50:48 AM

Last enriched: 12/25/2025, 7:05:52 AM

Last updated: 2/7/2026, 11:07:36 AM

Views: 95

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats