CVE-2025-47364: CWE-190 Integer Overflow or Wraparound in Qualcomm, Inc. Snapdragon
Memory corruption while calculating offset from partition start point.
AI Analysis
Technical Summary
CVE-2025-47364 is a vulnerability classified under CWE-190 (Integer Overflow or Wraparound) found in Qualcomm Snapdragon chipsets. The flaw occurs during the calculation of offsets from partition start points, where an integer overflow leads to memory corruption. This can cause buffer overflows or memory mismanagement, potentially allowing an attacker to manipulate memory contents, leading to arbitrary code execution or system crashes. The affected Snapdragon models include a broad range of recent and widely deployed chipsets such as QAM8255P, SA8150P, SA9000P, and others used in smartphones, IoT devices, and embedded systems. The CVSS 3.1 base score is 6.8, reflecting a medium severity with high impact on confidentiality, integrity, and availability. The attack vector is physical, meaning an attacker must have physical access to the device, but no privileges or user interaction are required. The vulnerability is currently published and reserved since May 2025, with no known exploits in the wild and no patches released yet. The memory corruption caused by the integer overflow could be leveraged to bypass security controls, escalate privileges, or cause denial of service, depending on the device context and exploitation method. Qualcomm and device manufacturers are expected to release firmware updates to address this issue.
Potential Impact
The potential impact of CVE-2025-47364 is significant for organizations relying on affected Snapdragon chipsets, especially in mobile devices, IoT, and embedded systems. Successful exploitation could lead to unauthorized code execution, data leakage, or device unavailability, compromising confidentiality, integrity, and availability. This could affect enterprise mobile security, critical infrastructure devices, and consumer electronics. The physical access requirement limits remote exploitation but raises concerns for devices in physically accessible environments such as kiosks, industrial controls, or lost/stolen devices. The broad range of affected Snapdragon models means a large attack surface globally. Enterprises with Bring Your Own Device (BYOD) policies or supply chains using these chipsets may face increased risk. The absence of known exploits currently provides a window for proactive mitigation, but the medium severity score and high impact components warrant urgent attention.
Mitigation Recommendations
To mitigate CVE-2025-47364, organizations should: 1) Enforce strict physical security controls to prevent unauthorized physical access to devices using affected Snapdragon chipsets. 2) Monitor Qualcomm and device vendor advisories closely for firmware or software patches addressing this vulnerability and prioritize timely deployment. 3) Implement device management policies that restrict installation of untrusted software and limit device functionality in sensitive environments. 4) Use hardware-based security features such as secure boot and trusted execution environments to reduce exploitation impact. 5) Conduct regular security audits and penetration testing focusing on physical attack vectors. 6) Educate users and administrators about the risks of physical device compromise and encourage reporting of lost or stolen devices. 7) For critical infrastructure, consider network segmentation and additional monitoring to detect anomalous device behavior that could indicate exploitation attempts. These steps go beyond generic advice by focusing on physical access control and proactive patch management specific to embedded chipset vulnerabilities.
Affected Countries
United States, China, India, South Korea, Japan, Germany, United Kingdom, France, Brazil, Russia, Canada, Australia, Taiwan, Singapore, Mexico
CVE-2025-47364: CWE-190 Integer Overflow or Wraparound in Qualcomm, Inc. Snapdragon
Description
Memory corruption while calculating offset from partition start point.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-47364 is a vulnerability classified under CWE-190 (Integer Overflow or Wraparound) found in Qualcomm Snapdragon chipsets. The flaw occurs during the calculation of offsets from partition start points, where an integer overflow leads to memory corruption. This can cause buffer overflows or memory mismanagement, potentially allowing an attacker to manipulate memory contents, leading to arbitrary code execution or system crashes. The affected Snapdragon models include a broad range of recent and widely deployed chipsets such as QAM8255P, SA8150P, SA9000P, and others used in smartphones, IoT devices, and embedded systems. The CVSS 3.1 base score is 6.8, reflecting a medium severity with high impact on confidentiality, integrity, and availability. The attack vector is physical, meaning an attacker must have physical access to the device, but no privileges or user interaction are required. The vulnerability is currently published and reserved since May 2025, with no known exploits in the wild and no patches released yet. The memory corruption caused by the integer overflow could be leveraged to bypass security controls, escalate privileges, or cause denial of service, depending on the device context and exploitation method. Qualcomm and device manufacturers are expected to release firmware updates to address this issue.
Potential Impact
The potential impact of CVE-2025-47364 is significant for organizations relying on affected Snapdragon chipsets, especially in mobile devices, IoT, and embedded systems. Successful exploitation could lead to unauthorized code execution, data leakage, or device unavailability, compromising confidentiality, integrity, and availability. This could affect enterprise mobile security, critical infrastructure devices, and consumer electronics. The physical access requirement limits remote exploitation but raises concerns for devices in physically accessible environments such as kiosks, industrial controls, or lost/stolen devices. The broad range of affected Snapdragon models means a large attack surface globally. Enterprises with Bring Your Own Device (BYOD) policies or supply chains using these chipsets may face increased risk. The absence of known exploits currently provides a window for proactive mitigation, but the medium severity score and high impact components warrant urgent attention.
Mitigation Recommendations
To mitigate CVE-2025-47364, organizations should: 1) Enforce strict physical security controls to prevent unauthorized physical access to devices using affected Snapdragon chipsets. 2) Monitor Qualcomm and device vendor advisories closely for firmware or software patches addressing this vulnerability and prioritize timely deployment. 3) Implement device management policies that restrict installation of untrusted software and limit device functionality in sensitive environments. 4) Use hardware-based security features such as secure boot and trusted execution environments to reduce exploitation impact. 5) Conduct regular security audits and penetration testing focusing on physical attack vectors. 6) Educate users and administrators about the risks of physical device compromise and encourage reporting of lost or stolen devices. 7) For critical infrastructure, consider network segmentation and additional monitoring to detect anomalous device behavior that could indicate exploitation attempts. These steps go beyond generic advice by focusing on physical access control and proactive patch management specific to embedded chipset vulnerabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- qualcomm
- Date Reserved
- 2025-05-06T08:33:16.265Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6980c319f9fa50a62f48b5e7
Added to database: 2/2/2026, 3:30:33 PM
Last enriched: 2/27/2026, 7:28:04 AM
Last updated: 3/24/2026, 12:20:36 AM
Views: 73
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.