CVE-2025-47365: CWE-190 Integer Overflow or Wraparound in Qualcomm, Inc. Snapdragon
Memory corruption while processing large input data from a remote source via a communication interface.
AI Analysis
Technical Summary
CVE-2025-47365 is an integer overflow or wraparound vulnerability classified under CWE-190, affecting a broad range of Qualcomm Snapdragon chipsets. The vulnerability arises during the processing of large input data received via a remote communication interface, leading to memory corruption. This memory corruption can compromise the confidentiality, integrity, and availability of the affected device. The flaw exists because the software does not properly handle integer arithmetic when calculating buffer sizes or offsets, causing an overflow that results in buffer overflows or other memory safety issues. The affected Snapdragon models include a wide array of recent and widely deployed chipsets such as QAM8255P, SA8150P, SA9000P, and others, which power many smartphones, IoT devices, and embedded systems. The CVSS v3.1 score is 7.8 (high), with attack vector local, low attack complexity, low privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Exploitation requires access to the vulnerable communication interface, which may be exposed in certain device configurations or through local network access. No public patches or known exploits are currently available, but the vulnerability's nature suggests that exploitation could allow attackers to execute arbitrary code, escalate privileges, or cause denial of service. The vulnerability was reserved in May 2025 and published in November 2025, indicating recent discovery and disclosure.
Potential Impact
For European organizations, the impact of CVE-2025-47365 is significant due to the widespread use of Qualcomm Snapdragon chipsets in mobile devices, IoT deployments, and embedded systems critical to business operations. Confidential data on affected devices could be exposed or manipulated, leading to data breaches or loss of data integrity. The ability to cause memory corruption may allow attackers to execute arbitrary code, potentially leading to device takeover or lateral movement within networks. Availability could also be disrupted through crashes or denial-of-service conditions, impacting operational continuity. Telecommunications providers, enterprises using Snapdragon-powered devices for secure communications, and industries deploying IoT sensors or controllers with these chipsets are particularly at risk. The vulnerability could also affect supply chains relying on Snapdragon-based hardware, amplifying the risk of widespread disruption. Given the local access requirement, insider threats or attackers gaining initial footholds on networks could leverage this vulnerability to escalate privileges or pivot to sensitive systems.
Mitigation Recommendations
To mitigate CVE-2025-47365, European organizations should implement the following specific measures: 1) Restrict access to vulnerable communication interfaces by enforcing strict network segmentation and access controls, limiting exposure to trusted users and systems only. 2) Monitor and filter input data sizes on affected interfaces to detect and block abnormally large or malformed packets that could trigger the overflow. 3) Deploy endpoint detection and response (EDR) solutions capable of identifying anomalous memory corruption behaviors or exploitation attempts on Snapdragon-based devices. 4) Coordinate with device vendors and Qualcomm for timely receipt and application of security patches once released, prioritizing devices in critical infrastructure and high-risk environments. 5) Conduct thorough inventory and asset management to identify all devices using affected Snapdragon models and assess exposure. 6) Implement strict privilege management to minimize the impact of low-privilege exploitation. 7) Educate IT and security teams about the vulnerability specifics to enhance detection and response capabilities. 8) Consider temporary compensating controls such as disabling or isolating vulnerable interfaces if patching is delayed. These measures go beyond generic advice by focusing on interface access control, anomaly detection, and vendor coordination tailored to the Snapdragon ecosystem.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland, Belgium
CVE-2025-47365: CWE-190 Integer Overflow or Wraparound in Qualcomm, Inc. Snapdragon
Description
Memory corruption while processing large input data from a remote source via a communication interface.
AI-Powered Analysis
Technical Analysis
CVE-2025-47365 is an integer overflow or wraparound vulnerability classified under CWE-190, affecting a broad range of Qualcomm Snapdragon chipsets. The vulnerability arises during the processing of large input data received via a remote communication interface, leading to memory corruption. This memory corruption can compromise the confidentiality, integrity, and availability of the affected device. The flaw exists because the software does not properly handle integer arithmetic when calculating buffer sizes or offsets, causing an overflow that results in buffer overflows or other memory safety issues. The affected Snapdragon models include a wide array of recent and widely deployed chipsets such as QAM8255P, SA8150P, SA9000P, and others, which power many smartphones, IoT devices, and embedded systems. The CVSS v3.1 score is 7.8 (high), with attack vector local, low attack complexity, low privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Exploitation requires access to the vulnerable communication interface, which may be exposed in certain device configurations or through local network access. No public patches or known exploits are currently available, but the vulnerability's nature suggests that exploitation could allow attackers to execute arbitrary code, escalate privileges, or cause denial of service. The vulnerability was reserved in May 2025 and published in November 2025, indicating recent discovery and disclosure.
Potential Impact
For European organizations, the impact of CVE-2025-47365 is significant due to the widespread use of Qualcomm Snapdragon chipsets in mobile devices, IoT deployments, and embedded systems critical to business operations. Confidential data on affected devices could be exposed or manipulated, leading to data breaches or loss of data integrity. The ability to cause memory corruption may allow attackers to execute arbitrary code, potentially leading to device takeover or lateral movement within networks. Availability could also be disrupted through crashes or denial-of-service conditions, impacting operational continuity. Telecommunications providers, enterprises using Snapdragon-powered devices for secure communications, and industries deploying IoT sensors or controllers with these chipsets are particularly at risk. The vulnerability could also affect supply chains relying on Snapdragon-based hardware, amplifying the risk of widespread disruption. Given the local access requirement, insider threats or attackers gaining initial footholds on networks could leverage this vulnerability to escalate privileges or pivot to sensitive systems.
Mitigation Recommendations
To mitigate CVE-2025-47365, European organizations should implement the following specific measures: 1) Restrict access to vulnerable communication interfaces by enforcing strict network segmentation and access controls, limiting exposure to trusted users and systems only. 2) Monitor and filter input data sizes on affected interfaces to detect and block abnormally large or malformed packets that could trigger the overflow. 3) Deploy endpoint detection and response (EDR) solutions capable of identifying anomalous memory corruption behaviors or exploitation attempts on Snapdragon-based devices. 4) Coordinate with device vendors and Qualcomm for timely receipt and application of security patches once released, prioritizing devices in critical infrastructure and high-risk environments. 5) Conduct thorough inventory and asset management to identify all devices using affected Snapdragon models and assess exposure. 6) Implement strict privilege management to minimize the impact of low-privilege exploitation. 7) Educate IT and security teams about the vulnerability specifics to enhance detection and response capabilities. 8) Consider temporary compensating controls such as disabling or isolating vulnerable interfaces if patching is delayed. These measures go beyond generic advice by focusing on interface access control, anomaly detection, and vendor coordination tailored to the Snapdragon ecosystem.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
 - 5.2
 - Assigner Short Name
 - qualcomm
 - Date Reserved
 - 2025-05-06T08:33:16.265Z
 - Cvss Version
 - 3.1
 - State
 - PUBLISHED
 
Threat ID: 690977c178d4f574c2b12d53
Added to database: 11/4/2025, 3:49:21 AM
Last enriched: 11/4/2025, 4:01:14 AM
Last updated: 11/4/2025, 8:23:52 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-20749: CWE-121 Stack Overflow in MediaTek, Inc. MT6789, MT6835, MT6855, MT6878, MT6879, MT6886, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8169, MT8188, MT8195, MT8196, MT8781, MT8796
UnknownCVE-2025-20748: CWE-120 Classic Buffer Overflow in MediaTek, Inc. MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986
UnknownCVE-2025-20747: CWE-121 Stack Overflow in MediaTek, Inc. MT2718, MT2737, MT6835, MT6878, MT6886, MT6897, MT6899, MT6982, MT6985, MT6986, MT6986D, MT6989, MT6990, MT6991, MT8676, MT8678, MT8755, MT8893
UnknownCVE-2025-20746: CWE-121 Stack Overflow in MediaTek, Inc. MT2718, MT2737, MT6835, MT6878, MT6886, MT6897, MT6899, MT6982, MT6985, MT6986, MT6986D, MT6989, MT6990, MT6991, MT8676, MT8678, MT8755, MT8893
UnknownCVE-2025-20745: CWE-416 Use After Free in MediaTek, Inc. MT2718, MT6989, MT6991, MT8370, MT8390, MT8395, MT8676, MT8678, MT87920
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.