Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47361: CWE-129 Improper Validation of Array Index in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47361cvecve-2025-47361cwe-129
Published: Tue Nov 04 2025 (11/04/2025, 03:19:19 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption when triggering a subsystem crash with an out-of-range identifier.

AI-Powered Analysis

AILast updated: 11/04/2025, 04:01:28 UTC

Technical Analysis

CVE-2025-47361 is a vulnerability identified in Qualcomm Snapdragon chipsets characterized by improper validation of array indices (CWE-129). Specifically, the flaw arises when a subsystem crash is triggered using an out-of-range identifier, causing memory corruption. This memory corruption can lead to severe consequences including arbitrary code execution, privilege escalation, or denial of service on affected devices. The vulnerability affects a broad range of Snapdragon models, including QAM8255P, QAM8295P, SA9000P, and others, which are commonly integrated into smartphones, tablets, and IoT devices. The CVSS v3.1 score is 7.8, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). Exploitation requires local access but no user interaction, making it feasible for attackers with limited access to escalate privileges or disrupt device operation. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the widespread deployment of affected Snapdragon chipsets. The root cause is insufficient bounds checking on array indices, a classic programming error that leads to memory corruption vulnerabilities. This can be leveraged to manipulate memory contents, potentially allowing attackers to execute arbitrary code or cause system crashes. Qualcomm is expected to release patches, but none are available yet.

Potential Impact

For European organizations, the impact of CVE-2025-47361 is substantial, particularly for those relying on mobile devices and IoT infrastructure powered by affected Snapdragon chipsets. Successful exploitation could lead to unauthorized access to sensitive data, disruption of critical communications, and potential compromise of device integrity. This is especially critical for sectors such as finance, healthcare, telecommunications, and government, where mobile device security is paramount. Memory corruption vulnerabilities can also be leveraged as pivot points for further network intrusion or espionage. The requirement for local access limits remote exploitation but does not eliminate risk, as attackers could exploit insider threats, malicious applications, or physical access scenarios. The absence of user interaction requirement increases the risk of automated or stealthy attacks once local access is obtained. The broad range of affected Snapdragon models means many consumer and enterprise devices in Europe could be vulnerable, potentially impacting business continuity and data protection compliance under regulations like GDPR.

Mitigation Recommendations

1. Monitor Qualcomm’s official channels for security advisories and promptly apply firmware or software patches once released to address CVE-2025-47361. 2. Implement strict access controls on devices using affected Snapdragon chipsets to limit local access only to trusted users and processes. 3. Employ mobile device management (MDM) solutions to enforce security policies, restrict installation of untrusted applications, and monitor device behavior for signs of exploitation attempts. 4. Conduct regular security audits and vulnerability assessments on mobile and IoT devices to detect anomalous subsystem crashes or memory corruption symptoms. 5. Educate employees about the risks of physical device access and the importance of securing devices against unauthorized use. 6. For critical deployments, consider network segmentation to isolate vulnerable devices and reduce the attack surface. 7. Utilize endpoint detection and response (EDR) tools capable of identifying exploitation attempts targeting memory corruption vulnerabilities. 8. Collaborate with device vendors and service providers to ensure timely updates and coordinated vulnerability management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.264Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690977c178d4f574c2b12d4d

Added to database: 11/4/2025, 3:49:21 AM

Last enriched: 11/4/2025, 4:01:28 AM

Last updated: 11/4/2025, 7:50:37 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats