CVE-2025-47372: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qualcomm, Inc. Snapdragon
Memory Corruption when a corrupted ELF image with an oversized file size is read into a buffer without authentication.
AI Analysis
Technical Summary
CVE-2025-47372 is a classic buffer overflow vulnerability (CWE-120) identified in Qualcomm Snapdragon chipsets, specifically affecting a broad range of versions including QAM8255P, QAM8620P, SA9000P, and others. The vulnerability arises when a corrupted ELF (Executable and Linkable Format) image containing an oversized file size is read into a buffer without proper size validation, leading to memory corruption. This flaw does not require any authentication or user interaction, making it easier for an attacker with local access to exploit. The vulnerability impacts confidentiality and integrity severely by allowing an attacker to potentially execute arbitrary code or leak sensitive information. The CVSS v3.1 score of 9.0 reflects its critical severity, with an attack vector classified as local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component. Although no known exploits are currently in the wild, the vulnerability poses a significant risk due to the widespread use of affected Snapdragon chipsets in mobile devices, IoT, and embedded systems. The lack of available patches at the time of publication necessitates proactive mitigation strategies. Qualcomm’s Snapdragon processors are integral to many devices used in telecommunications, automotive, and industrial sectors, increasing the potential impact of this vulnerability.
Potential Impact
For European organizations, the impact of CVE-2025-47372 can be substantial. Snapdragon chipsets are embedded in numerous mobile devices, IoT devices, and network equipment used across Europe. Exploitation could lead to unauthorized access to sensitive corporate and personal data, compromise of device integrity, and potential disruption of services relying on affected hardware. Telecommunications providers using Snapdragon-based infrastructure could face risks to network security and customer data privacy. Critical infrastructure sectors such as automotive, manufacturing, and healthcare that deploy Snapdragon-powered embedded systems may experience operational disruptions or safety risks. The vulnerability’s ability to bypass authentication and cause memory corruption without user interaction increases the likelihood of stealthy attacks, complicating detection and response. Given the high mobile device penetration and reliance on connected devices in Europe, the threat could affect a broad range of industries and consumers, potentially leading to financial losses, regulatory penalties, and reputational damage.
Mitigation Recommendations
1. Monitor Qualcomm’s official security advisories and apply patches immediately once they become available for all affected Snapdragon chipset versions. 2. Implement strict input validation and integrity checks on ELF images and other executable files processed by devices using Snapdragon chips to prevent malformed inputs from triggering the vulnerability. 3. Restrict local access to devices with affected chipsets by enforcing strong physical security controls and limiting administrative privileges. 4. Employ runtime protection mechanisms such as memory protection, stack canaries, and address space layout randomization (ASLR) where supported to mitigate exploitation attempts. 5. Conduct regular security audits and penetration testing focused on embedded systems and mobile devices to detect potential exploitation attempts. 6. Educate users and administrators about the risks of installing untrusted software or files that could contain corrupted ELF images. 7. Collaborate with device manufacturers and telecom providers to ensure secure firmware and software update mechanisms are in place to facilitate rapid patch deployment. 8. Consider network segmentation and monitoring to detect anomalous behavior indicative of exploitation attempts on affected devices.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland
CVE-2025-47372: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qualcomm, Inc. Snapdragon
Description
Memory Corruption when a corrupted ELF image with an oversized file size is read into a buffer without authentication.
AI-Powered Analysis
Technical Analysis
CVE-2025-47372 is a classic buffer overflow vulnerability (CWE-120) identified in Qualcomm Snapdragon chipsets, specifically affecting a broad range of versions including QAM8255P, QAM8620P, SA9000P, and others. The vulnerability arises when a corrupted ELF (Executable and Linkable Format) image containing an oversized file size is read into a buffer without proper size validation, leading to memory corruption. This flaw does not require any authentication or user interaction, making it easier for an attacker with local access to exploit. The vulnerability impacts confidentiality and integrity severely by allowing an attacker to potentially execute arbitrary code or leak sensitive information. The CVSS v3.1 score of 9.0 reflects its critical severity, with an attack vector classified as local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component. Although no known exploits are currently in the wild, the vulnerability poses a significant risk due to the widespread use of affected Snapdragon chipsets in mobile devices, IoT, and embedded systems. The lack of available patches at the time of publication necessitates proactive mitigation strategies. Qualcomm’s Snapdragon processors are integral to many devices used in telecommunications, automotive, and industrial sectors, increasing the potential impact of this vulnerability.
Potential Impact
For European organizations, the impact of CVE-2025-47372 can be substantial. Snapdragon chipsets are embedded in numerous mobile devices, IoT devices, and network equipment used across Europe. Exploitation could lead to unauthorized access to sensitive corporate and personal data, compromise of device integrity, and potential disruption of services relying on affected hardware. Telecommunications providers using Snapdragon-based infrastructure could face risks to network security and customer data privacy. Critical infrastructure sectors such as automotive, manufacturing, and healthcare that deploy Snapdragon-powered embedded systems may experience operational disruptions or safety risks. The vulnerability’s ability to bypass authentication and cause memory corruption without user interaction increases the likelihood of stealthy attacks, complicating detection and response. Given the high mobile device penetration and reliance on connected devices in Europe, the threat could affect a broad range of industries and consumers, potentially leading to financial losses, regulatory penalties, and reputational damage.
Mitigation Recommendations
1. Monitor Qualcomm’s official security advisories and apply patches immediately once they become available for all affected Snapdragon chipset versions. 2. Implement strict input validation and integrity checks on ELF images and other executable files processed by devices using Snapdragon chips to prevent malformed inputs from triggering the vulnerability. 3. Restrict local access to devices with affected chipsets by enforcing strong physical security controls and limiting administrative privileges. 4. Employ runtime protection mechanisms such as memory protection, stack canaries, and address space layout randomization (ASLR) where supported to mitigate exploitation attempts. 5. Conduct regular security audits and penetration testing focused on embedded systems and mobile devices to detect potential exploitation attempts. 6. Educate users and administrators about the risks of installing untrusted software or files that could contain corrupted ELF images. 7. Collaborate with device manufacturers and telecom providers to ensure secure firmware and software update mechanisms are in place to facilitate rapid patch deployment. 8. Consider network segmentation and monitoring to detect anomalous behavior indicative of exploitation attempts on affected devices.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- qualcomm
- Date Reserved
- 2025-05-06T08:33:16.265Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6943963858cc240f07ac2f3d
Added to database: 12/18/2025, 5:50:48 AM
Last enriched: 12/25/2025, 7:06:09 AM
Last updated: 2/6/2026, 9:03:47 AM
Views: 203
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2011: SQL Injection in itsourcecode Student Management System
MediumCVE-2026-24930: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Huawei HarmonyOS
HighCVE-2026-24929: CWE-476 NULL Pointer Dereference in Huawei HarmonyOS
MediumCVE-2026-24923: CWE-264 Permissions, Privileges, and Access Controls in Huawei HarmonyOS
MediumCVE-2026-24922: CWE-122 Heap-based Buffer Overflow in Huawei HarmonyOS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.