CVE-2025-47370: CWE-617 Reachable Assertion in Qualcomm, Inc. Snapdragon
Transient DOS when a remote device sends an invalid connection request during BT connectable LE scan.
AI Analysis
Technical Summary
CVE-2025-47370 is a vulnerability identified as CWE-617 (Reachable Assertion) affecting numerous Qualcomm Snapdragon platforms and associated wireless connectivity modules. The issue arises during Bluetooth Low Energy (LE) connectable scanning when a remote device sends an invalid connection request. This malformed request triggers an assertion failure within the Bluetooth stack, causing a transient denial of service (DoS) condition. The assertion failure disrupts normal Bluetooth operations, temporarily affecting device availability but does not lead to data compromise or persistent device malfunction. The vulnerability has a CVSS 3.1 base score of 6.5, reflecting medium severity, with an attack vector of adjacent network (Bluetooth), low attack complexity, no privileges required, no user interaction, and impact limited to availability. The affected products span a broad range of Qualcomm Snapdragon chipsets and wireless platforms, including mobile platforms (e.g., Snapdragon 8 Gen 2, 7c+ Gen 3 Compute), automotive modems, and sound platforms. The vulnerability was publicly disclosed on November 4, 2025, with no known exploits in the wild and no patches currently linked. The flaw could be exploited by an attacker within Bluetooth range sending crafted invalid connection requests to cause temporary service disruption on affected devices.
Potential Impact
For European organizations, the primary impact of CVE-2025-47370 is transient denial of service on devices using affected Qualcomm Snapdragon chipsets. This can disrupt Bluetooth connectivity, affecting mobile devices, automotive systems, and IoT devices that rely on Bluetooth LE for communication. In sectors such as automotive manufacturing, logistics, and mobile communications, this could lead to temporary loss of critical wireless functions, impacting operational continuity and user experience. While the vulnerability does not compromise confidentiality or integrity, availability interruptions could affect business processes, especially in environments with high reliance on Bluetooth-enabled devices. The broad range of affected chipsets means many consumer and enterprise devices across Europe could be vulnerable. The lack of user interaction or privileges required makes exploitation feasible by nearby attackers, increasing risk in public or unsecured environments. However, the transient nature of the DoS limits long-term damage.
Mitigation Recommendations
1. Monitor Qualcomm and device vendor advisories closely for patches or firmware updates addressing CVE-2025-47370 and apply them promptly once available. 2. Implement Bluetooth access controls by disabling Bluetooth LE scanning or connectivity on devices where it is not required, especially in sensitive or critical environments. 3. Use Bluetooth device whitelisting or MAC address filtering to restrict connections to trusted devices only. 4. In enterprise and automotive environments, consider deploying Bluetooth intrusion detection/prevention systems to detect and block malformed connection attempts. 5. Educate users and administrators about the risks of connecting to unknown Bluetooth devices and encourage disabling Bluetooth when not in use. 6. For critical infrastructure, evaluate the feasibility of physical or RF shielding to limit Bluetooth attack surface. 7. Maintain network segmentation to isolate vulnerable devices and limit potential impact of Bluetooth-based disruptions.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Sweden, Finland
CVE-2025-47370: CWE-617 Reachable Assertion in Qualcomm, Inc. Snapdragon
Description
Transient DOS when a remote device sends an invalid connection request during BT connectable LE scan.
AI-Powered Analysis
Technical Analysis
CVE-2025-47370 is a vulnerability identified as CWE-617 (Reachable Assertion) affecting numerous Qualcomm Snapdragon platforms and associated wireless connectivity modules. The issue arises during Bluetooth Low Energy (LE) connectable scanning when a remote device sends an invalid connection request. This malformed request triggers an assertion failure within the Bluetooth stack, causing a transient denial of service (DoS) condition. The assertion failure disrupts normal Bluetooth operations, temporarily affecting device availability but does not lead to data compromise or persistent device malfunction. The vulnerability has a CVSS 3.1 base score of 6.5, reflecting medium severity, with an attack vector of adjacent network (Bluetooth), low attack complexity, no privileges required, no user interaction, and impact limited to availability. The affected products span a broad range of Qualcomm Snapdragon chipsets and wireless platforms, including mobile platforms (e.g., Snapdragon 8 Gen 2, 7c+ Gen 3 Compute), automotive modems, and sound platforms. The vulnerability was publicly disclosed on November 4, 2025, with no known exploits in the wild and no patches currently linked. The flaw could be exploited by an attacker within Bluetooth range sending crafted invalid connection requests to cause temporary service disruption on affected devices.
Potential Impact
For European organizations, the primary impact of CVE-2025-47370 is transient denial of service on devices using affected Qualcomm Snapdragon chipsets. This can disrupt Bluetooth connectivity, affecting mobile devices, automotive systems, and IoT devices that rely on Bluetooth LE for communication. In sectors such as automotive manufacturing, logistics, and mobile communications, this could lead to temporary loss of critical wireless functions, impacting operational continuity and user experience. While the vulnerability does not compromise confidentiality or integrity, availability interruptions could affect business processes, especially in environments with high reliance on Bluetooth-enabled devices. The broad range of affected chipsets means many consumer and enterprise devices across Europe could be vulnerable. The lack of user interaction or privileges required makes exploitation feasible by nearby attackers, increasing risk in public or unsecured environments. However, the transient nature of the DoS limits long-term damage.
Mitigation Recommendations
1. Monitor Qualcomm and device vendor advisories closely for patches or firmware updates addressing CVE-2025-47370 and apply them promptly once available. 2. Implement Bluetooth access controls by disabling Bluetooth LE scanning or connectivity on devices where it is not required, especially in sensitive or critical environments. 3. Use Bluetooth device whitelisting or MAC address filtering to restrict connections to trusted devices only. 4. In enterprise and automotive environments, consider deploying Bluetooth intrusion detection/prevention systems to detect and block malformed connection attempts. 5. Educate users and administrators about the risks of connecting to unknown Bluetooth devices and encourage disabling Bluetooth when not in use. 6. For critical infrastructure, evaluate the feasibility of physical or RF shielding to limit Bluetooth attack surface. 7. Maintain network segmentation to isolate vulnerable devices and limit potential impact of Bluetooth-based disruptions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
 - 5.2
 - Assigner Short Name
 - qualcomm
 - Date Reserved
 - 2025-05-06T08:33:16.265Z
 - Cvss Version
 - 3.1
 - State
 - PUBLISHED
 
Threat ID: 690977c178d4f574c2b12d5c
Added to database: 11/4/2025, 3:49:21 AM
Last enriched: 11/4/2025, 4:02:51 AM
Last updated: 11/4/2025, 10:25:01 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-20749: CWE-121 Stack Overflow in MediaTek, Inc. MT6789, MT6835, MT6855, MT6878, MT6879, MT6886, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8169, MT8188, MT8195, MT8196, MT8781, MT8796
UnknownCVE-2025-20748: CWE-120 Classic Buffer Overflow in MediaTek, Inc. MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986
UnknownCVE-2025-20747: CWE-121 Stack Overflow in MediaTek, Inc. MT2718, MT2737, MT6835, MT6878, MT6886, MT6897, MT6899, MT6982, MT6985, MT6986, MT6986D, MT6989, MT6990, MT6991, MT8676, MT8678, MT8755, MT8893
UnknownCVE-2025-20746: CWE-121 Stack Overflow in MediaTek, Inc. MT2718, MT2737, MT6835, MT6878, MT6886, MT6897, MT6899, MT6982, MT6985, MT6986, MT6986D, MT6989, MT6990, MT6991, MT8676, MT8678, MT8755, MT8893
UnknownCVE-2025-20745: CWE-416 Use After Free in MediaTek, Inc. MT2718, MT6989, MT6991, MT8370, MT8390, MT8395, MT8676, MT8678, MT87920
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.