Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47369: CWE-200 Information Exposure in Qualcomm, Inc. Snapdragon

0
Medium
VulnerabilityCVE-2025-47369cvecve-2025-47369cwe-200
Published: Tue Jan 06 2026 (01/06/2026, 22:48:43 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Information disclosure when a weak hashed value is returned to userland code in response to a IOCTL call to obtain a session ID.

AI-Powered Analysis

AILast updated: 01/14/2026, 01:42:44 UTC

Technical Analysis

CVE-2025-47369 is a medium-severity information disclosure vulnerability identified in numerous Qualcomm Snapdragon platforms and associated chipsets. The flaw arises from the system returning a weak hashed value in response to an IOCTL (Input/Output Control) call intended to retrieve a session ID. This weak hash can be exploited by an attacker with local privileges to gain access to sensitive session information that should otherwise remain confidential. The vulnerability spans a broad spectrum of Qualcomm products, including mobile platforms (e.g., Snapdragon 8 Gen series, Snapdragon 7 Gen series, Snapdragon 4 Gen series), automotive platforms, wearable platforms, and various modem and connectivity subsystems. The attack vector is local (AV:L), requiring low privileges (PR:L) but no user interaction (UI:N). The confidentiality impact is high (C:H) because session IDs can be leveraged to compromise user privacy or facilitate further attacks, though integrity and availability remain unaffected. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). Despite the extensive list of affected products, no known exploits have been reported in the wild, and Qualcomm has not yet released patches. The vulnerability's existence highlights the risk of weak cryptographic practices in kernel-to-userland communications, especially in IOCTL interfaces that expose sensitive data. Organizations relying on affected Snapdragon devices should monitor for vendor updates and consider restricting access to vulnerable IOCTL interfaces to mitigate exploitation risks.

Potential Impact

For European organizations, the primary impact of CVE-2025-47369 lies in the potential exposure of sensitive session identifiers, which can compromise user privacy and enable further attacks such as session hijacking or unauthorized access to services. This is particularly critical for sectors relying heavily on mobile communications, IoT devices, automotive telematics, and wearable technologies that incorporate affected Snapdragon chipsets. Confidentiality breaches could lead to data leakage, regulatory non-compliance (e.g., GDPR violations), and erosion of customer trust. While the vulnerability does not affect system integrity or availability directly, the exposure of session IDs can serve as a stepping stone for more severe attacks. The requirement for local privileges limits remote exploitation but does not eliminate risk in environments where attackers can gain local access, such as through malware or insider threats. The broad range of affected Snapdragon platforms means that many consumer and enterprise devices in Europe could be vulnerable, impacting industries from telecommunications to automotive manufacturing and healthcare. The absence of patches increases the urgency for interim mitigations to protect sensitive data and maintain compliance with European data protection standards.

Mitigation Recommendations

1. Restrict access to IOCTL interfaces that provide session ID information to only trusted and authenticated processes, using strict access control mechanisms at the OS level. 2. Employ application whitelisting and privilege management to minimize the risk of local privilege escalation that could enable exploitation of this vulnerability. 3. Monitor device and system logs for unusual IOCTL calls or attempts to access session ID information, enabling early detection of exploitation attempts. 4. Coordinate with device manufacturers and Qualcomm for timely receipt and deployment of security patches once available. 5. For organizations deploying custom firmware or device management solutions, consider implementing additional cryptographic hardening or validation of session ID generation and transmission. 6. Educate users and administrators about the risks of installing untrusted applications that could gain local access and exploit this vulnerability. 7. In high-risk environments, consider network segmentation and endpoint security controls to limit the impact of compromised devices. 8. Regularly update device firmware and operating systems to incorporate security improvements and reduce attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.265Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695d93cd65deeab1b95d81b5

Added to database: 1/6/2026, 10:59:25 PM

Last enriched: 1/14/2026, 1:42:44 AM

Last updated: 2/7/2026, 1:53:14 PM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats