Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47363: CWE-190 Integer Overflow or Wraparound in Qualcomm, Inc. Snapdragon

0
Medium
VulnerabilityCVE-2025-47363cvecve-2025-47363cwe-190
Published: Mon Feb 02 2026 (02/02/2026, 15:20:40 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption when calculating oversized partition sizes without proper checks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 07:27:46 UTC

Technical Analysis

CVE-2025-47363 is a medium-severity integer overflow vulnerability classified under CWE-190, discovered in Qualcomm Snapdragon chipsets. The vulnerability occurs during the calculation of partition sizes where oversized values are not properly checked, causing an integer overflow or wraparound. This leads to memory corruption, which can be exploited to compromise system confidentiality, integrity, and availability. The affected Snapdragon versions include a broad range of models such as QAM8255P, SA8150P, SA9000P, and others widely deployed in mobile devices, IoT, and embedded systems. The CVSS 3.1 vector (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) indicates that exploitation requires physical or local access but no privileges or user interaction, making it somewhat challenging but feasible in certain scenarios. Memory corruption from this overflow could allow attackers to execute arbitrary code, escalate privileges, or cause denial of service. No patches or known exploits have been reported yet, but the vulnerability's presence in critical hardware components makes it a significant concern. Qualcomm and device manufacturers need to develop and distribute firmware updates to address this issue. Until then, affected organizations should implement strict access controls and monitor device integrity.

Potential Impact

This vulnerability can have severe consequences for organizations relying on affected Snapdragon chipsets. Exploitation could lead to unauthorized code execution, data leakage, or system crashes, impacting confidentiality, integrity, and availability of critical systems. Mobile devices, IoT endpoints, and embedded systems using these chipsets could be compromised, potentially allowing attackers to bypass security controls or disrupt operations. Given the widespread use of Snapdragon processors globally, the vulnerability poses risks to consumer electronics, telecommunications infrastructure, and industrial control systems. The requirement for physical or local access limits remote exploitation but insider threats or physical device theft could enable attacks. The absence of patches increases exposure time, raising the risk of future exploitation. Organizations in sectors such as telecommunications, defense, manufacturing, and critical infrastructure are particularly vulnerable due to their reliance on Snapdragon-powered devices.

Mitigation Recommendations

1. Monitor Qualcomm and device vendor advisories closely for firmware or software patches addressing CVE-2025-47363. 2. Apply patches promptly once available to eliminate the integer overflow condition. 3. Restrict physical and local access to devices containing affected Snapdragon chipsets to trusted personnel only. 4. Implement device integrity monitoring and anomaly detection to identify signs of exploitation or memory corruption. 5. For high-risk environments, consider isolating vulnerable devices from critical networks until patched. 6. Employ hardware security modules or trusted execution environments where possible to limit impact of memory corruption. 7. Conduct regular security audits and penetration tests focusing on device firmware and hardware interfaces. 8. Educate staff on risks related to physical device access and enforce strict device handling policies. 9. Collaborate with vendors to prioritize vulnerability remediation and secure supply chains. 10. Maintain comprehensive asset inventories to identify all devices with affected Snapdragon versions for targeted mitigation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.265Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6980c319f9fa50a62f48b5e4

Added to database: 2/2/2026, 3:30:33 PM

Last enriched: 2/27/2026, 7:27:46 AM

Last updated: 3/24/2026, 1:00:24 AM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses