CVE-2025-47365: CWE-190 Integer Overflow or Wraparound in Qualcomm, Inc. Snapdragon
Memory corruption while processing large input data from a remote source via a communication interface.
AI Analysis
Technical Summary
CVE-2025-47365 is an integer overflow or wraparound vulnerability classified under CWE-190, affecting a wide range of Qualcomm Snapdragon chipsets including models such as QAM8255P, SA8150P, and SRV1M among others. The vulnerability occurs during the processing of large input data received from a remote source through a communication interface, which leads to memory corruption. This memory corruption can result in arbitrary code execution, privilege escalation, or denial of service conditions. The vulnerability requires local access with low privileges (AV:L, PR:L), does not require user interaction (UI:N), and has low attack complexity (AC:L). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). The flaw stems from insufficient validation of input sizes, causing integer overflow that leads to buffer overflows or similar memory safety issues. Although no exploits have been observed in the wild, the broad range of affected Snapdragon chipsets, which are widely deployed in smartphones, tablets, and IoT devices, increases the risk of exploitation once weaponized. Qualcomm has not yet published patches, so affected parties must rely on interim mitigations and monitoring. The vulnerability was reserved in May 2025 and published in November 2025, indicating recent discovery and disclosure.
Potential Impact
The impact of CVE-2025-47365 is significant for organizations worldwide that rely on devices powered by affected Qualcomm Snapdragon chipsets. Exploitation can lead to full compromise of device confidentiality, integrity, and availability, enabling attackers to execute arbitrary code, escalate privileges, or cause denial of service. This can result in data breaches, disruption of critical services, and loss of control over mobile and IoT devices. Enterprises with large mobile device fleets, telecom providers, and IoT deployments are particularly at risk. The vulnerability's requirement for local access limits remote exploitation but does not eliminate risk, as attackers may leverage other vulnerabilities or social engineering to gain local access. The absence of known exploits currently provides a window for proactive defense, but the high CVSS score and broad chipset coverage underscore the urgency of mitigation. Compromise of devices in sensitive sectors such as finance, healthcare, and government could have cascading effects on national security and privacy.
Mitigation Recommendations
1. Monitor Qualcomm’s official channels and security advisories closely for the release of patches addressing CVE-2025-47365 and apply them immediately upon availability. 2. Implement strict access controls to limit local access to devices running affected Snapdragon chipsets, including enforcing strong authentication and physical security measures. 3. Employ runtime protections such as memory corruption mitigations (e.g., DEP, ASLR) and intrusion detection systems that can detect anomalous behavior indicative of exploitation attempts. 4. For enterprise mobile device management (MDM), enforce policies that restrict installation of untrusted applications and limit communication interfaces exposed to untrusted networks. 5. Conduct regular security audits and vulnerability assessments on devices using affected chipsets to identify potential exploitation vectors. 6. Educate users and administrators about the risks of local access vulnerabilities and encourage vigilance against social engineering attacks that could facilitate local access. 7. Where feasible, isolate critical devices or networks to reduce the attack surface and prevent lateral movement in case of compromise. 8. Collaborate with device manufacturers to ensure firmware updates incorporate necessary fixes and security enhancements.
Affected Countries
United States, China, India, South Korea, Japan, Germany, United Kingdom, France, Brazil, Russia, Canada, Australia, Singapore, Taiwan, Mexico
CVE-2025-47365: CWE-190 Integer Overflow or Wraparound in Qualcomm, Inc. Snapdragon
Description
Memory corruption while processing large input data from a remote source via a communication interface.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-47365 is an integer overflow or wraparound vulnerability classified under CWE-190, affecting a wide range of Qualcomm Snapdragon chipsets including models such as QAM8255P, SA8150P, and SRV1M among others. The vulnerability occurs during the processing of large input data received from a remote source through a communication interface, which leads to memory corruption. This memory corruption can result in arbitrary code execution, privilege escalation, or denial of service conditions. The vulnerability requires local access with low privileges (AV:L, PR:L), does not require user interaction (UI:N), and has low attack complexity (AC:L). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). The flaw stems from insufficient validation of input sizes, causing integer overflow that leads to buffer overflows or similar memory safety issues. Although no exploits have been observed in the wild, the broad range of affected Snapdragon chipsets, which are widely deployed in smartphones, tablets, and IoT devices, increases the risk of exploitation once weaponized. Qualcomm has not yet published patches, so affected parties must rely on interim mitigations and monitoring. The vulnerability was reserved in May 2025 and published in November 2025, indicating recent discovery and disclosure.
Potential Impact
The impact of CVE-2025-47365 is significant for organizations worldwide that rely on devices powered by affected Qualcomm Snapdragon chipsets. Exploitation can lead to full compromise of device confidentiality, integrity, and availability, enabling attackers to execute arbitrary code, escalate privileges, or cause denial of service. This can result in data breaches, disruption of critical services, and loss of control over mobile and IoT devices. Enterprises with large mobile device fleets, telecom providers, and IoT deployments are particularly at risk. The vulnerability's requirement for local access limits remote exploitation but does not eliminate risk, as attackers may leverage other vulnerabilities or social engineering to gain local access. The absence of known exploits currently provides a window for proactive defense, but the high CVSS score and broad chipset coverage underscore the urgency of mitigation. Compromise of devices in sensitive sectors such as finance, healthcare, and government could have cascading effects on national security and privacy.
Mitigation Recommendations
1. Monitor Qualcomm’s official channels and security advisories closely for the release of patches addressing CVE-2025-47365 and apply them immediately upon availability. 2. Implement strict access controls to limit local access to devices running affected Snapdragon chipsets, including enforcing strong authentication and physical security measures. 3. Employ runtime protections such as memory corruption mitigations (e.g., DEP, ASLR) and intrusion detection systems that can detect anomalous behavior indicative of exploitation attempts. 4. For enterprise mobile device management (MDM), enforce policies that restrict installation of untrusted applications and limit communication interfaces exposed to untrusted networks. 5. Conduct regular security audits and vulnerability assessments on devices using affected chipsets to identify potential exploitation vectors. 6. Educate users and administrators about the risks of local access vulnerabilities and encourage vigilance against social engineering attacks that could facilitate local access. 7. Where feasible, isolate critical devices or networks to reduce the attack surface and prevent lateral movement in case of compromise. 8. Collaborate with device manufacturers to ensure firmware updates incorporate necessary fixes and security enhancements.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- qualcomm
- Date Reserved
- 2025-05-06T08:33:16.265Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690977c178d4f574c2b12d53
Added to database: 11/4/2025, 3:49:21 AM
Last enriched: 2/27/2026, 2:45:09 AM
Last updated: 3/23/2026, 12:52:12 PM
Views: 127
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.