Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47354: CWE-416 Use After Free in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47354cvecve-2025-47354cwe-416
Published: Thu Oct 09 2025 (10/09/2025, 03:18:15 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while allocating buffers in DSP service.

AI-Powered Analysis

AILast updated: 10/09/2025, 03:40:06 UTC

Technical Analysis

CVE-2025-47354 is a use-after-free vulnerability classified under CWE-416 affecting Qualcomm Snapdragon chipsets, specifically in the Digital Signal Processor (DSP) service responsible for buffer allocation. The vulnerability occurs due to improper memory management when allocating buffers, leading to memory corruption. This flaw can be exploited by an attacker with low privileges and local access to execute arbitrary code, escalate privileges, or cause denial of service by crashing the DSP service or the entire device. The affected products include a wide range of Qualcomm FastConnect modules (6200, 6700, 7800), Snapdragon mobile platforms (4 Gen 2, 6 Gen 1), wearable platforms (W5+ Gen 1), and various wireless connectivity chips (WCD, WCN, WSA series). The CVSS v3.1 score of 7.8 reflects high severity, with attack vector being local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). No patches are currently linked, and no exploits are known in the wild, but the vulnerability's nature and affected platforms make it a significant risk. The DSP service is critical for handling audio, connectivity, and other signal processing tasks, so exploitation could disrupt device functionality or leak sensitive data. The vulnerability was reserved in May 2025 and published in October 2025, indicating recent discovery and disclosure.

Potential Impact

For European organizations, the impact of CVE-2025-47354 is substantial due to the widespread use of Qualcomm Snapdragon chipsets in smartphones, tablets, wearables, and IoT devices. Confidentiality breaches could expose sensitive corporate or personal data processed on affected devices. Integrity compromises might allow attackers to manipulate device operations or firmware, potentially undermining trust in mobile communications and applications. Availability impacts could disrupt critical services relying on mobile connectivity, including remote work, financial transactions, and emergency communications. Sectors such as telecommunications, finance, healthcare, and government are particularly vulnerable due to their reliance on secure mobile infrastructure. The local attack vector means that attackers need some form of access to the device, which could be achieved via malware, physical access, or compromised applications. The absence of known exploits currently provides a window for mitigation, but the high severity score underscores the urgency for European organizations to assess and remediate affected devices to prevent targeted attacks or espionage, especially given geopolitical tensions and increased cyber threat activity in the region.

Mitigation Recommendations

1. Monitor Qualcomm and device manufacturers for official patches addressing CVE-2025-47354 and apply them promptly across all affected devices. 2. Implement strict local access controls on devices using affected Snapdragon chipsets to prevent unauthorized users or applications from interacting with the DSP service. 3. Employ mobile device management (MDM) solutions to enforce security policies, restrict installation of untrusted applications, and detect anomalous behavior related to DSP or connectivity services. 4. Conduct regular security audits and vulnerability assessments focusing on mobile and wearable devices within the organization’s environment. 5. Educate users about the risks of installing unverified software and the importance of device security hygiene. 6. For critical infrastructure, consider network segmentation and additional monitoring of mobile endpoints to detect exploitation attempts. 7. Collaborate with vendors and cybersecurity communities to share threat intelligence and stay informed about emerging exploits or mitigation techniques. 8. Where feasible, disable or limit DSP service functionalities that are not essential to reduce the attack surface until patches are available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.264Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e72afc32de7eb26af88bb0

Added to database: 10/9/2025, 3:24:44 AM

Last enriched: 10/9/2025, 3:40:06 AM

Last updated: 10/9/2025, 10:20:59 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats