Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47369: CWE-200 Information Exposure in Qualcomm, Inc. Snapdragon

0
Medium
VulnerabilityCVE-2025-47369cvecve-2025-47369cwe-200
Published: Tue Jan 06 2026 (01/06/2026, 22:48:43 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Information disclosure when a weak hashed value is returned to userland code in response to a IOCTL call to obtain a session ID.

AI-Powered Analysis

AILast updated: 01/06/2026, 23:15:45 UTC

Technical Analysis

CVE-2025-47369 is a medium severity information disclosure vulnerability identified in numerous Qualcomm Snapdragon platforms and related hardware components. The vulnerability arises from the system returning a weak hashed value representing a session ID in response to an IOCTL call made by userland code. IOCTL (Input/Output Control) calls are used for communication between user applications and device drivers. In this case, the weak hashing mechanism fails to adequately protect the session ID, allowing an attacker with low-level privileges to retrieve sensitive session information. This exposure can lead to confidentiality breaches, potentially enabling attackers to track or impersonate sessions, or gather intelligence useful for further attacks. The vulnerability affects a wide array of Snapdragon chipsets and platforms, including mobile platforms (e.g., Snapdragon 8 Gen series, Snapdragon 7 Gen series), connectivity modules (FastConnect series), automotive and robotics platforms, and wearable device platforms. Exploitation requires local access with low privileges but does not require user interaction, making it feasible for malicious local applications or compromised processes. The CVSS v3.1 score is 5.5 (medium), reflecting the vulnerability’s limited attack vector (local), low complexity, and significant confidentiality impact without affecting integrity or availability. No public exploits or patches are currently reported, emphasizing the need for proactive mitigation. The vulnerability is classified under CWE-200 (Information Exposure), highlighting the risk of sensitive data leakage due to improper protection mechanisms. Given the extensive list of affected products, the vulnerability has broad implications for devices using Qualcomm Snapdragon components across multiple sectors.

Potential Impact

For European organizations, the primary impact of CVE-2025-47369 is the potential unauthorized disclosure of sensitive session identifiers on devices using affected Qualcomm Snapdragon platforms. This can compromise user privacy and confidentiality, especially in mobile communications, IoT devices, and embedded systems prevalent in critical infrastructure, automotive, and industrial applications. Attackers gaining session IDs could facilitate session hijacking, user tracking, or lateral movement within networks if combined with other vulnerabilities. Telecommunications providers, enterprises deploying mobile and IoT devices, and sectors relying on embedded Qualcomm hardware (e.g., automotive, robotics) face increased risk. The vulnerability does not directly affect system integrity or availability but undermines trust in device security and data confidentiality. Given the widespread use of Snapdragon chipsets in smartphones and connected devices, the scale of potential exposure is significant. Organizations handling sensitive personal or operational data must consider this vulnerability in their risk assessments and incident response planning. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits targeting local privilege escalation or malicious apps.

Mitigation Recommendations

1. Monitor Qualcomm’s security advisories and apply official patches or firmware updates promptly once available to address the weak hashing mechanism. 2. Restrict access to IOCTL interfaces that expose session ID information by enforcing strict access controls and permissions at the OS and driver levels, limiting calls to trusted processes only. 3. Employ endpoint security solutions capable of detecting anomalous local process behavior or unauthorized attempts to invoke IOCTL calls. 4. For organizations deploying custom or embedded devices with affected Snapdragon components, implement additional application-layer encryption or obfuscation of session identifiers to mitigate leakage risks. 5. Conduct regular security audits and penetration testing focusing on local privilege escalation and information disclosure vectors on devices using Qualcomm hardware. 6. Educate users and administrators about the risks of installing untrusted local applications that could exploit this vulnerability. 7. Where feasible, isolate critical devices or segments to reduce the impact of potential local exploits. 8. Collaborate with device manufacturers and vendors to ensure timely updates and security hardening in supply chains.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.265Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695d93cd65deeab1b95d81b5

Added to database: 1/6/2026, 10:59:25 PM

Last enriched: 1/6/2026, 11:15:45 PM

Last updated: 1/8/2026, 5:28:15 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats