Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47361: CWE-129 Improper Validation of Array Index in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47361cvecve-2025-47361cwe-129
Published: Tue Nov 04 2025 (11/04/2025, 03:19:19 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption when triggering a subsystem crash with an out-of-range identifier.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:44:54 UTC

Technical Analysis

CVE-2025-47361 is a vulnerability identified in multiple Qualcomm Snapdragon chipsets characterized by improper validation of array indices (CWE-129). This flaw arises when the system processes an out-of-range identifier, leading to memory corruption and triggering a subsystem crash. The affected Snapdragon models span a wide range of Qualcomm’s product line, including QAM8255P, SA9000P, and others, which are commonly used in mobile devices and embedded systems globally. The vulnerability has a CVSS 3.1 base score of 7.8, indicating high severity, with an attack vector requiring local access (AV:L), low attack complexity (AC:L), low privileges (PR:L), no user interaction (UI:N), and impacts confidentiality, integrity, and availability (C:H/I:H/A:H). Exploiting this flaw could allow an attacker with limited privileges to cause denial of service or potentially execute arbitrary code by corrupting memory structures. Although no known exploits are currently reported in the wild, the broad range of affected devices and the critical nature of the flaw necessitate urgent attention. The root cause is the failure to properly validate array indices before use, which is a common programming error leading to buffer overflows or out-of-bounds memory access. Qualcomm has not yet released patches, so mitigation currently relies on defensive measures and monitoring.

Potential Impact

The impact of CVE-2025-47361 is significant for organizations worldwide that deploy devices with affected Qualcomm Snapdragon chipsets. The vulnerability can lead to memory corruption, causing subsystem crashes that result in denial of service, disrupting device availability. More critically, the memory corruption could be leveraged to execute arbitrary code with low privileges, potentially allowing attackers to escalate privileges, access sensitive data, or implant persistent malware. This threatens the confidentiality, integrity, and availability of affected systems. Mobile devices, IoT devices, and embedded systems using these Snapdragon variants could be compromised, impacting enterprise mobile security, consumer privacy, and critical infrastructure relying on embedded Qualcomm hardware. The requirement for local access limits remote exploitation but does not eliminate risk, especially in environments where attackers can gain physical or local network access. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation as attackers analyze the vulnerability.

Mitigation Recommendations

Organizations should implement the following specific mitigation strategies: 1) Monitor vendor communications closely for official Qualcomm patches and apply them promptly once available. 2) Restrict local access to devices with affected Snapdragon chipsets by enforcing strong physical security controls and limiting user privileges. 3) Employ runtime protections such as memory corruption mitigations (e.g., DEP, ASLR) where supported by the device to reduce exploitation likelihood. 4) Implement input validation and sanitization at the application and system level to prevent malformed or out-of-range identifiers from reaching vulnerable code paths. 5) Use endpoint detection and response (EDR) tools to monitor for unusual crashes or suspicious behavior indicative of exploitation attempts. 6) For organizations deploying embedded systems, consider network segmentation and strict access controls to minimize exposure. 7) Engage in threat hunting focused on memory corruption indicators and anomalous subsystem crashes. These measures go beyond generic advice by focusing on local access restriction, memory protection, and proactive monitoring tailored to this vulnerability’s characteristics.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.264Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690977c178d4f574c2b12d4d

Added to database: 11/4/2025, 3:49:21 AM

Last enriched: 2/27/2026, 2:44:54 AM

Last updated: 3/26/2026, 10:06:17 AM

Views: 96

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses