Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47356: CWE-415 Double Free in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47356cvecve-2025-47356cwe-415
Published: Tue Jan 06 2026 (01/06/2026, 22:48:42 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory Corruption when multiple threads concurrently access and modify shared resources.

AI-Powered Analysis

AILast updated: 01/14/2026, 01:42:28 UTC

Technical Analysis

CVE-2025-47356 is a memory corruption vulnerability classified as CWE-415 (Double Free) found in multiple Qualcomm Snapdragon components, including FastConnect 6900, FastConnect 7800, and various WCD and X-series chipsets. The root cause is improper handling of memory when multiple threads concurrently access and modify shared resources, leading to double free conditions. This flaw can cause the system to free the same memory region twice, resulting in undefined behavior such as heap corruption, crashes, or arbitrary code execution. The vulnerability requires low privileges (PR:L) and no user interaction (UI:N), but local access is necessary (AV:L), meaning an attacker must have some level of access to the device. The impact includes high confidentiality, integrity, and availability consequences, as indicated by the CVSS vector (C:H/I:H/A:H). No public exploits are known yet, but the vulnerability's nature makes it a critical risk for devices using affected Snapdragon hardware, which are widely deployed in smartphones, IoT devices, and embedded systems. The vulnerability was reserved in May 2025 and published in January 2026, but Qualcomm has not yet released patches. The complexity of exploitation is low due to the concurrency issue and memory corruption, increasing the urgency for mitigation.

Potential Impact

For European organizations, this vulnerability threatens the security of mobile devices and embedded systems that incorporate affected Qualcomm Snapdragon chipsets. Potential impacts include unauthorized data access, privilege escalation, and denial of service, which could disrupt business operations, compromise sensitive information, and undermine trust in mobile communications. Industries relying heavily on mobile connectivity, such as finance, healthcare, and critical infrastructure, are particularly at risk. The vulnerability could also affect supply chains and IoT deployments that use Snapdragon-based modules, leading to broader systemic risks. Given the high severity and the widespread use of Qualcomm Snapdragon in European consumer and enterprise devices, the threat could have significant operational and reputational consequences if exploited.

Mitigation Recommendations

Organizations should monitor Qualcomm’s security advisories closely and apply patches promptly once available. In the interim, implement strict access controls to limit local access to devices, reducing the risk of exploitation. Employ runtime protections such as memory corruption mitigations (e.g., heap canaries, ASLR, and DEP) where supported by the device OS. Conduct thorough testing of multi-threaded applications to detect and prevent concurrency issues. For critical environments, consider network segmentation and device isolation to contain potential compromises. Additionally, maintain up-to-date endpoint detection and response (EDR) solutions capable of identifying anomalous behavior indicative of exploitation attempts. Engage with device vendors to confirm patch availability and deployment timelines. Finally, educate users about the risks of installing untrusted applications that could leverage local access to exploit this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.264Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695d93cd65deeab1b95d81b2

Added to database: 1/6/2026, 10:59:25 PM

Last enriched: 1/14/2026, 1:42:28 AM

Last updated: 2/7/2026, 7:59:04 AM

Views: 244

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats