Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47366: CWE-749: Exposed Dangerous Method or Function in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47366cvecve-2025-47366cwe-749
Published: Mon Feb 02 2026 (02/02/2026, 15:20:42 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Cryptographic issue when a Trusted Zone with outdated code is triggered by a HLOS providing incorrect input.

AI-Powered Analysis

AILast updated: 02/02/2026, 15:45:46 UTC

Technical Analysis

CVE-2025-47366 is a cryptographic vulnerability classified under CWE-749 (Exposed Dangerous Method or Function) affecting Qualcomm Snapdragon platforms. The root cause lies in outdated code within the Trusted Zone—a secure execution environment designed to protect sensitive operations—where a dangerous method is exposed and can be triggered by malformed input from the High-Level Operating System (HLOS). This flaw allows an attacker with limited privileges (local access) to manipulate cryptographic operations, potentially compromising the confidentiality and integrity of sensitive data processed within the Trusted Zone. The vulnerability spans a broad spectrum of Qualcomm products, including numerous Snapdragon mobile platforms, FastConnect wireless subsystems, automotive platforms, wearable platforms, and modem-RF systems. The CVSS v3.1 score of 7.1 reflects a high severity, with attack vector local, low attack complexity, requiring low privileges but no user interaction, and impacting confidentiality and integrity significantly. Although no known exploits have been reported in the wild, the extensive list of affected devices indicates a large attack surface, especially in mobile and embedded device ecosystems. The Trusted Zone is critical for secure key storage, cryptographic computations, and enforcing security policies; thus, exploitation could lead to unauthorized data disclosure or manipulation, undermining device security. The absence of patches at the time of publication necessitates vigilance and proactive risk management by affected parties.

Potential Impact

For European organizations, the impact of CVE-2025-47366 is considerable due to the widespread use of Qualcomm Snapdragon chipsets in smartphones, IoT devices, automotive systems, and wearables. Confidentiality breaches could expose sensitive corporate or personal data, while integrity compromises might allow attackers to alter cryptographic operations, potentially enabling further attacks such as privilege escalation or bypassing security controls. Industries relying on mobile communications, automotive telematics, and IoT deployments—such as finance, healthcare, manufacturing, and critical infrastructure—are particularly vulnerable. The local attack vector implies that attackers need some level of access to the device, which could be achieved via malware, insider threats, or physical access. The lack of user interaction requirement increases the risk of stealthy exploitation. Disruption or data leakage in automotive or industrial IoT devices could have safety and operational consequences. The broad product impact means that supply chain security and device lifecycle management become critical concerns for European enterprises and government agencies.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement a layered defense strategy. First, enforce strict access controls and device usage policies to minimize local privilege escalation opportunities. Employ endpoint detection and response (EDR) solutions capable of monitoring anomalous behavior indicative of Trusted Zone exploitation attempts. Maintain rigorous device inventory and firmware version tracking to identify affected hardware. Collaborate with device manufacturers and Qualcomm for timely updates and patches, and plan rapid deployment once available. For critical environments, consider network segmentation to isolate vulnerable devices and reduce attack surface exposure. Educate users and administrators about the risks of installing untrusted applications or firmware that could trigger the vulnerability. Additionally, leverage mobile device management (MDM) solutions to enforce security configurations and monitor device integrity. For automotive and IoT deployments, implement secure boot and hardware attestation mechanisms to detect unauthorized modifications. Finally, conduct regular security assessments and penetration testing focusing on local privilege escalation vectors to identify potential exploitation paths.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.265Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6980c319f9fa50a62f48b5ea

Added to database: 2/2/2026, 3:30:33 PM

Last enriched: 2/2/2026, 3:45:46 PM

Last updated: 2/2/2026, 5:36:37 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats