Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47364: CWE-190 Integer Overflow or Wraparound in Qualcomm, Inc. Snapdragon

0
Medium
VulnerabilityCVE-2025-47364cvecve-2025-47364cwe-190
Published: Mon Feb 02 2026 (02/02/2026, 15:20:41 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while calculating offset from partition start point.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 07:28:04 UTC

Technical Analysis

CVE-2025-47364 is a vulnerability classified under CWE-190 (Integer Overflow or Wraparound) found in Qualcomm Snapdragon chipsets. The flaw occurs during the calculation of offsets from partition start points, where an integer overflow leads to memory corruption. This can cause buffer overflows or memory mismanagement, potentially allowing an attacker to manipulate memory contents, leading to arbitrary code execution or system crashes. The affected Snapdragon models include a broad range of recent and widely deployed chipsets such as QAM8255P, SA8150P, SA9000P, and others used in smartphones, IoT devices, and embedded systems. The CVSS 3.1 base score is 6.8, reflecting a medium severity with high impact on confidentiality, integrity, and availability. The attack vector is physical, meaning an attacker must have physical access to the device, but no privileges or user interaction are required. The vulnerability is currently published and reserved since May 2025, with no known exploits in the wild and no patches released yet. The memory corruption caused by the integer overflow could be leveraged to bypass security controls, escalate privileges, or cause denial of service, depending on the device context and exploitation method. Qualcomm and device manufacturers are expected to release firmware updates to address this issue.

Potential Impact

The potential impact of CVE-2025-47364 is significant for organizations relying on affected Snapdragon chipsets, especially in mobile devices, IoT, and embedded systems. Successful exploitation could lead to unauthorized code execution, data leakage, or device unavailability, compromising confidentiality, integrity, and availability. This could affect enterprise mobile security, critical infrastructure devices, and consumer electronics. The physical access requirement limits remote exploitation but raises concerns for devices in physically accessible environments such as kiosks, industrial controls, or lost/stolen devices. The broad range of affected Snapdragon models means a large attack surface globally. Enterprises with Bring Your Own Device (BYOD) policies or supply chains using these chipsets may face increased risk. The absence of known exploits currently provides a window for proactive mitigation, but the medium severity score and high impact components warrant urgent attention.

Mitigation Recommendations

To mitigate CVE-2025-47364, organizations should: 1) Enforce strict physical security controls to prevent unauthorized physical access to devices using affected Snapdragon chipsets. 2) Monitor Qualcomm and device vendor advisories closely for firmware or software patches addressing this vulnerability and prioritize timely deployment. 3) Implement device management policies that restrict installation of untrusted software and limit device functionality in sensitive environments. 4) Use hardware-based security features such as secure boot and trusted execution environments to reduce exploitation impact. 5) Conduct regular security audits and penetration testing focusing on physical attack vectors. 6) Educate users and administrators about the risks of physical device compromise and encourage reporting of lost or stolen devices. 7) For critical infrastructure, consider network segmentation and additional monitoring to detect anomalous device behavior that could indicate exploitation attempts. These steps go beyond generic advice by focusing on physical access control and proactive patch management specific to embedded chipset vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.265Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6980c319f9fa50a62f48b5e7

Added to database: 2/2/2026, 3:30:33 PM

Last enriched: 2/27/2026, 7:28:04 AM

Last updated: 3/24/2026, 7:05:32 AM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses