Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47359: CWE-416 Use After Free in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47359cvecve-2025-47359cwe-416
Published: Mon Feb 02 2026 (02/02/2026, 15:20:38 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory Corruption when multiple threads simultaneously access a memory free API.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 07:27:32 UTC

Technical Analysis

CVE-2025-47359 is a use-after-free vulnerability classified under CWE-416 that affects a broad spectrum of Qualcomm Snapdragon platforms and associated wireless connectivity and audio components. The root cause is a memory corruption flaw triggered when multiple threads simultaneously invoke a memory free API, leading to the potential reuse of freed memory. This concurrency issue can cause unpredictable behavior, including arbitrary code execution, data corruption, or system crashes. The vulnerability impacts numerous Snapdragon compute platforms (including the 8c, 8cx, and 8cx Gen 2 and Gen 3 series), FastConnect wireless modules (6200, 6800, 6900, 7800), and various WCD and WSA audio components. The CVSS v3.1 score is 7.8, reflecting high severity due to the vulnerability's ability to compromise confidentiality, integrity, and availability. Exploitation requires low privileges (PR:L), no user interaction (UI:N), and local access (AV:L), indicating that an attacker with limited access could trigger the flaw. Although no known exploits are currently reported in the wild, the wide deployment of affected hardware in smartphones, laptops, and IoT devices makes this a significant threat. The lack of published patches at the time of disclosure necessitates proactive mitigation and monitoring. The concurrency nature of the flaw suggests that race conditions in multi-threaded environments are the exploitation vector, emphasizing the need for thread-safe memory management in the affected firmware and drivers.

Potential Impact

The impact of CVE-2025-47359 is substantial for organizations worldwide that utilize Qualcomm Snapdragon-based devices and modules. Successful exploitation can lead to arbitrary code execution, allowing attackers to gain control over affected devices, potentially leading to data theft, espionage, or persistent malware installation. The vulnerability also threatens system stability by enabling denial-of-service conditions through crashes or memory corruption. Given the prevalence of Snapdragon platforms in mobile phones, laptops, and IoT devices, the attack surface is extensive, affecting both consumer and enterprise environments. Confidentiality breaches could expose sensitive corporate or personal data, while integrity violations might allow manipulation of device operations or firmware. Availability impacts could disrupt critical communications or services relying on wireless connectivity. The requirement for local access and low privileges means attackers might leverage other vulnerabilities or social engineering to gain initial footholds, then exploit this flaw to escalate control. The absence of known exploits currently provides a window for mitigation, but the high severity score underscores the urgency for remediation to prevent future attacks.

Mitigation Recommendations

To mitigate CVE-2025-47359 effectively, organizations should implement several specific measures beyond generic advice. First, restrict and monitor access to devices and systems running affected Qualcomm Snapdragon platforms, especially limiting local user privileges to trusted personnel and processes. Employ application whitelisting and endpoint detection to identify anomalous behavior indicative of exploitation attempts. Since the flaw arises from concurrent access to a memory free API, developers and firmware engineers should audit and update multi-threaded memory management code to ensure thread safety and proper synchronization. Until official patches are released by Qualcomm, consider deploying runtime protections such as control-flow integrity (CFI) and memory protection mechanisms (e.g., AddressSanitizer or similar tools) in development and testing environments. Network segmentation can reduce the risk of lateral movement if a device is compromised. Maintain up-to-date inventories of affected hardware to prioritize patching once available. Engage with Qualcomm and device vendors for timely security updates and advisories. Finally, educate users about the risks of local privilege escalation and encourage strict device usage policies to minimize exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.264Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6980c319f9fa50a62f48b5e1

Added to database: 2/2/2026, 3:30:33 PM

Last enriched: 2/27/2026, 7:27:32 AM

Last updated: 3/24/2026, 11:07:53 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses