Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47351: CWE-190 Integer Overflow or Wraparound in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47351cvecve-2025-47351cwe-190
Published: Thu Oct 09 2025 (10/09/2025, 03:18:14 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while processing user buffers.

AI-Powered Analysis

AILast updated: 10/16/2025, 08:47:26 UTC

Technical Analysis

CVE-2025-47351 is an integer overflow vulnerability classified under CWE-190 that affects multiple Qualcomm Snapdragon components, including FastConnect wireless subsystems (6200, 6700, 6900, 7800) and several Snapdragon SoCs (SG6150, SM8750, SM8850, etc.) as well as wireless connectivity chips (WCD9370 series, WCN3950 series, WSA88xx series). The vulnerability stems from improper handling of user buffers during processing, which can cause an integer overflow or wraparound. This leads to memory corruption, potentially enabling an attacker with local privileges to execute arbitrary code, escalate privileges, or cause denial of service. The CVSS v3.1 score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and limited privileges required but no user interaction needed. The flaw was publicly disclosed on October 9, 2025, with no known exploits in the wild at the time of publication. The affected components are widely used in mobile devices, IoT, and embedded systems, making this a significant threat vector. The absence of patch links indicates that fixes may still be pending or in development, emphasizing the need for vigilance and interim mitigations.

Potential Impact

The impact of CVE-2025-47351 on European organizations is substantial due to the widespread use of Qualcomm Snapdragon chipsets in smartphones, tablets, and IoT devices across Europe. Successful exploitation could lead to unauthorized access to sensitive data, disruption of critical communications, and potential takeover of affected devices. Telecommunications providers, mobile network operators, and enterprises relying on mobile endpoints are particularly at risk. The vulnerability could be leveraged to compromise user privacy, disrupt business operations, or serve as a foothold for further network intrusion. Given the high confidentiality, integrity, and availability impacts, organizations could face regulatory penalties under GDPR if personal data is exposed. The local privilege requirement somewhat limits remote exploitation but does not eliminate risk, especially in environments where devices are shared or physically accessible. The broad range of affected hardware means that many sectors, including finance, healthcare, and government, could be impacted if mitigation is not promptly applied.

Mitigation Recommendations

1. Monitor Qualcomm and device vendors for official patches and apply them immediately upon release. 2. Implement strict input validation and buffer size checks at the application and OS levels to reduce the risk of integer overflow exploitation. 3. Employ memory protection mechanisms such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) to mitigate exploitation impact. 4. Restrict local access to devices by enforcing strong authentication and physical security controls to limit attacker opportunities. 5. Use mobile device management (MDM) solutions to enforce security policies and monitor for anomalous behavior indicative of exploitation attempts. 6. Educate users and administrators about the risks of local privilege escalation vulnerabilities and encourage prompt reporting of suspicious activity. 7. For embedded and IoT deployments, consider network segmentation to isolate vulnerable devices and reduce attack surface. 8. Conduct regular security assessments and penetration testing focusing on local privilege escalation vectors.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.264Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e72afc32de7eb26af88bad

Added to database: 10/9/2025, 3:24:44 AM

Last enriched: 10/16/2025, 8:47:26 AM

Last updated: 11/22/2025, 8:10:56 AM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats