Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47360: CWE-121 Stack-based Buffer Overflow in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47360cvecve-2025-47360cwe-121
Published: Tue Nov 04 2025 (11/04/2025, 03:19:18 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while processing client message during device management.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:44:34 UTC

Technical Analysis

CVE-2025-47360 is a stack-based buffer overflow vulnerability classified under CWE-121, discovered in Qualcomm Snapdragon chipsets during the processing of client messages in device management functions. This vulnerability results from improper handling of memory buffers, leading to memory corruption that can be exploited to execute arbitrary code with elevated privileges. The affected Snapdragon models span a wide range of Qualcomm’s product line, including QAM, QCA, SA, and SRV series chipsets, which are widely used in mobile devices, IoT devices, and embedded systems globally. The vulnerability requires low privileges (PR:L) but does not require user interaction (UI:N), and the attack vector is local (AV:L), meaning the attacker must have some level of access to the device. The CVSS v3.1 score of 7.8 reflects high impact on confidentiality, integrity, and availability, as successful exploitation could allow attackers to gain control over the device, leak sensitive data, or disrupt device functionality. No public exploits have been reported yet, but the broad range of affected devices and the critical nature of the flaw make it a significant threat. Qualcomm has not yet published patches, so mitigation currently relies on limiting access and monitoring. The vulnerability’s root cause is a classic stack buffer overflow, a well-understood issue that can lead to arbitrary code execution if exploited successfully.

Potential Impact

The impact of CVE-2025-47360 is substantial for organizations worldwide that use devices powered by affected Qualcomm Snapdragon chipsets. Exploitation could lead to unauthorized code execution, allowing attackers to take control of devices, access sensitive data, or disrupt operations. This is particularly critical for mobile devices, IoT endpoints, and embedded systems in sectors such as telecommunications, healthcare, finance, and critical infrastructure. Compromise of these devices could facilitate lateral movement within networks, espionage, data theft, or service disruption. The local attack vector means that attackers need some access to the device, which could be achieved through physical access, compromised apps, or other local attack methods. The lack of user interaction requirement increases the risk of automated or stealthy exploitation. The broad range of affected Snapdragon models means a large global footprint, impacting millions of devices and potentially critical systems that rely on these chipsets.

Mitigation Recommendations

Organizations should implement the following specific mitigation strategies: 1) Monitor and restrict access to device management interfaces to trusted personnel and systems only, using network segmentation and access control lists. 2) Employ runtime protection mechanisms such as stack canaries, address space layout randomization (ASLR), and control flow integrity (CFI) where supported by the device firmware. 3) Deploy endpoint detection and response (EDR) solutions capable of identifying anomalous behavior indicative of exploitation attempts. 4) Coordinate with device manufacturers and Qualcomm for timely patch deployment once available, prioritizing high-risk devices. 5) Conduct regular security audits and vulnerability assessments on devices using affected Snapdragon chipsets. 6) Educate users and administrators about the risks of local privilege escalation vulnerabilities and enforce strict policies on application installation and device usage. 7) For critical environments, consider isolating vulnerable devices or using alternative hardware until patches are applied. These measures go beyond generic advice by focusing on limiting local access, enhancing detection, and preparing for patch management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.264Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690977c178d4f574c2b12d4a

Added to database: 11/4/2025, 3:49:21 AM

Last enriched: 2/27/2026, 2:44:34 AM

Last updated: 3/25/2026, 2:41:31 AM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses