CVE-2025-47363: CWE-190 Integer Overflow or Wraparound in Qualcomm, Inc. Snapdragon
Memory corruption when calculating oversized partition sizes without proper checks.
AI Analysis
Technical Summary
CVE-2025-47363 is a medium severity integer overflow vulnerability (CWE-190) identified in multiple Qualcomm Snapdragon chipset versions, including QAM and SA series models widely used in mobile devices and embedded systems. The vulnerability occurs due to insufficient validation when calculating partition sizes, allowing an integer overflow or wraparound that leads to memory corruption. This memory corruption can be exploited to achieve arbitrary code execution or cause denial of service by corrupting critical memory structures. The CVSS 3.1 base score of 6.8 reflects a medium severity with attack vector requiring physical or local access (AV:P), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact includes high confidentiality, integrity, and availability consequences if exploited. No public exploits are currently known, but the vulnerability is significant given the widespread deployment of affected Snapdragon chipsets in consumer and industrial devices. The flaw was reserved in May 2025 and published in February 2026, with no patches currently linked, indicating a need for vigilance and prompt remediation once fixes are available.
Potential Impact
For European organizations, this vulnerability threatens the security of devices relying on affected Snapdragon chipsets, including smartphones, IoT devices, and embedded systems critical to operations. Exploitation could lead to unauthorized data access, system compromise, or service disruption, impacting confidentiality, integrity, and availability. Sectors such as telecommunications, manufacturing, and critical infrastructure that utilize Snapdragon-based hardware may face operational risks and potential data breaches. The requirement for local access limits remote exploitation but does not eliminate insider threats or attacks via compromised local networks. The medium severity rating suggests a significant but not catastrophic risk, emphasizing the importance of timely patching and system hardening to prevent exploitation.
Mitigation Recommendations
Organizations should monitor Qualcomm and device vendors for official patches addressing this vulnerability and prioritize their deployment across all affected devices. Until patches are available, implement strict access controls to limit local access to trusted personnel and devices. Employ runtime protections such as memory corruption mitigations (e.g., DEP, ASLR) where supported by the device firmware. Conduct thorough input validation and boundary checks in custom firmware or software interacting with partition management. Regularly audit device configurations to detect unusual partition size parameters or memory anomalies. For critical environments, consider network segmentation to isolate vulnerable devices and reduce attack surface. Engage with device manufacturers to confirm patch timelines and request security updates. Maintain incident response readiness to detect and respond to potential exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland
CVE-2025-47363: CWE-190 Integer Overflow or Wraparound in Qualcomm, Inc. Snapdragon
Description
Memory corruption when calculating oversized partition sizes without proper checks.
AI-Powered Analysis
Technical Analysis
CVE-2025-47363 is a medium severity integer overflow vulnerability (CWE-190) identified in multiple Qualcomm Snapdragon chipset versions, including QAM and SA series models widely used in mobile devices and embedded systems. The vulnerability occurs due to insufficient validation when calculating partition sizes, allowing an integer overflow or wraparound that leads to memory corruption. This memory corruption can be exploited to achieve arbitrary code execution or cause denial of service by corrupting critical memory structures. The CVSS 3.1 base score of 6.8 reflects a medium severity with attack vector requiring physical or local access (AV:P), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact includes high confidentiality, integrity, and availability consequences if exploited. No public exploits are currently known, but the vulnerability is significant given the widespread deployment of affected Snapdragon chipsets in consumer and industrial devices. The flaw was reserved in May 2025 and published in February 2026, with no patches currently linked, indicating a need for vigilance and prompt remediation once fixes are available.
Potential Impact
For European organizations, this vulnerability threatens the security of devices relying on affected Snapdragon chipsets, including smartphones, IoT devices, and embedded systems critical to operations. Exploitation could lead to unauthorized data access, system compromise, or service disruption, impacting confidentiality, integrity, and availability. Sectors such as telecommunications, manufacturing, and critical infrastructure that utilize Snapdragon-based hardware may face operational risks and potential data breaches. The requirement for local access limits remote exploitation but does not eliminate insider threats or attacks via compromised local networks. The medium severity rating suggests a significant but not catastrophic risk, emphasizing the importance of timely patching and system hardening to prevent exploitation.
Mitigation Recommendations
Organizations should monitor Qualcomm and device vendors for official patches addressing this vulnerability and prioritize their deployment across all affected devices. Until patches are available, implement strict access controls to limit local access to trusted personnel and devices. Employ runtime protections such as memory corruption mitigations (e.g., DEP, ASLR) where supported by the device firmware. Conduct thorough input validation and boundary checks in custom firmware or software interacting with partition management. Regularly audit device configurations to detect unusual partition size parameters or memory anomalies. For critical environments, consider network segmentation to isolate vulnerable devices and reduce attack surface. Engage with device manufacturers to confirm patch timelines and request security updates. Maintain incident response readiness to detect and respond to potential exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- qualcomm
- Date Reserved
- 2025-05-06T08:33:16.265Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6980c319f9fa50a62f48b5e4
Added to database: 2/2/2026, 3:30:33 PM
Last enriched: 2/2/2026, 3:48:13 PM
Last updated: 2/6/2026, 10:53:15 PM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2070: Buffer Overflow in UTT 进取 520W
HighCVE-2026-2069: Stack-based Buffer Overflow in ggml-org llama.cpp
MediumCVE-2026-25764: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opf openproject
LowCVE-2026-25763: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in opf openproject
CriticalCVE-2026-2068: Buffer Overflow in UTT 进取 520W
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.