Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47363: CWE-190 Integer Overflow or Wraparound in Qualcomm, Inc. Snapdragon

0
Medium
VulnerabilityCVE-2025-47363cvecve-2025-47363cwe-190
Published: Mon Feb 02 2026 (02/02/2026, 15:20:40 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption when calculating oversized partition sizes without proper checks.

AI-Powered Analysis

AILast updated: 02/02/2026, 15:48:13 UTC

Technical Analysis

CVE-2025-47363 is a medium severity integer overflow vulnerability (CWE-190) identified in multiple Qualcomm Snapdragon chipset versions, including QAM and SA series models widely used in mobile devices and embedded systems. The vulnerability occurs due to insufficient validation when calculating partition sizes, allowing an integer overflow or wraparound that leads to memory corruption. This memory corruption can be exploited to achieve arbitrary code execution or cause denial of service by corrupting critical memory structures. The CVSS 3.1 base score of 6.8 reflects a medium severity with attack vector requiring physical or local access (AV:P), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact includes high confidentiality, integrity, and availability consequences if exploited. No public exploits are currently known, but the vulnerability is significant given the widespread deployment of affected Snapdragon chipsets in consumer and industrial devices. The flaw was reserved in May 2025 and published in February 2026, with no patches currently linked, indicating a need for vigilance and prompt remediation once fixes are available.

Potential Impact

For European organizations, this vulnerability threatens the security of devices relying on affected Snapdragon chipsets, including smartphones, IoT devices, and embedded systems critical to operations. Exploitation could lead to unauthorized data access, system compromise, or service disruption, impacting confidentiality, integrity, and availability. Sectors such as telecommunications, manufacturing, and critical infrastructure that utilize Snapdragon-based hardware may face operational risks and potential data breaches. The requirement for local access limits remote exploitation but does not eliminate insider threats or attacks via compromised local networks. The medium severity rating suggests a significant but not catastrophic risk, emphasizing the importance of timely patching and system hardening to prevent exploitation.

Mitigation Recommendations

Organizations should monitor Qualcomm and device vendors for official patches addressing this vulnerability and prioritize their deployment across all affected devices. Until patches are available, implement strict access controls to limit local access to trusted personnel and devices. Employ runtime protections such as memory corruption mitigations (e.g., DEP, ASLR) where supported by the device firmware. Conduct thorough input validation and boundary checks in custom firmware or software interacting with partition management. Regularly audit device configurations to detect unusual partition size parameters or memory anomalies. For critical environments, consider network segmentation to isolate vulnerable devices and reduce attack surface. Engage with device manufacturers to confirm patch timelines and request security updates. Maintain incident response readiness to detect and respond to potential exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.265Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6980c319f9fa50a62f48b5e4

Added to database: 2/2/2026, 3:30:33 PM

Last enriched: 2/2/2026, 3:48:13 PM

Last updated: 2/6/2026, 10:53:15 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats