Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47355: CWE-787: Out-of-bounds Write in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47355cvecve-2025-47355cwe-787
Published: Thu Oct 09 2025 (10/09/2025, 03:18:16 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while invoking remote procedure IOCTL calls.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:44:21 UTC

Technical Analysis

CVE-2025-47355 is a memory corruption vulnerability classified as an out-of-bounds write (CWE-787) found in Qualcomm Snapdragon and associated FastConnect and WCD chipsets. The issue occurs during the processing of remote procedure IOCTL calls, which are used for device control operations at the kernel or driver level. An attacker with low privileges (PR:L) but local access can exploit this vulnerability without requiring user interaction (UI:N) to write beyond allocated memory boundaries. This can lead to arbitrary code execution, privilege escalation, or system crashes, affecting confidentiality, integrity, and availability. The affected products include a wide range of Snapdragon SoCs and connectivity modules such as FastConnect 6700/6900/7800, Snapdragon 7c+ Gen 3 Compute, Snapdragon 8cx Gen 3 Compute, and various WCD and WSA series chips. The vulnerability has a CVSS 3.1 base score of 7.8, indicating high severity, with low attack complexity and no need for user interaction, but requiring local privileges. No patches or known exploits are currently available, but the broad deployment of these chipsets in smartphones, laptops, and IoT devices makes this a critical issue to address promptly.

Potential Impact

The impact of CVE-2025-47355 is significant due to the potential for arbitrary code execution and system compromise on devices using affected Qualcomm Snapdragon and related chipsets. Exploitation could allow attackers to escalate privileges, bypass security controls, and gain persistent access to sensitive data or system functions. This threatens confidentiality by exposing private information, integrity by enabling unauthorized code execution or modification, and availability by causing system instability or denial of service. Given the widespread use of these chipsets in mobile phones, laptops, and wireless connectivity devices globally, the vulnerability could affect millions of users and enterprise environments. Attackers with local access, such as malicious apps or insiders, could leverage this flaw to compromise devices, making it a critical concern for device manufacturers, mobile carriers, and enterprises relying on Qualcomm hardware.

Mitigation Recommendations

To mitigate CVE-2025-47355, organizations and device manufacturers should: 1) Monitor Qualcomm and vendor advisories closely and apply security patches or firmware updates as soon as they become available. 2) Restrict access to IOCTL interfaces by enforcing strict privilege separation and limiting which processes or users can invoke these calls. 3) Employ runtime protections such as memory protection mechanisms (e.g., DEP, ASLR) and kernel integrity checks to reduce exploitation likelihood. 4) Conduct thorough code audits and fuzz testing on IOCTL handlers in affected drivers to identify and remediate similar vulnerabilities proactively. 5) For enterprises, implement endpoint detection and response (EDR) solutions to monitor for suspicious local privilege escalation attempts. 6) Educate users to avoid installing untrusted applications that could exploit local vulnerabilities. 7) Consider network segmentation and device hardening to limit attacker lateral movement if compromise occurs. These targeted steps go beyond generic advice by focusing on controlling IOCTL access and preparing for rapid patch deployment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.264Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e72afc32de7eb26af88bb3

Added to database: 10/9/2025, 3:24:44 AM

Last enriched: 2/27/2026, 2:44:21 AM

Last updated: 3/22/2026, 2:22:14 AM

Views: 125

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses