Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47375: CWE-416 Use After Free in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47375cvecve-2025-47375cwe-416
Published: Mon Mar 02 2026 (03/02/2026, 16:53:45 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while handling different IOCTL calls from the user-space simultaneously.

AI-Powered Analysis

AILast updated: 03/02/2026, 17:33:29 UTC

Technical Analysis

CVE-2025-47375 is a use-after-free vulnerability classified under CWE-416 that affects a wide array of Qualcomm Snapdragon products and platforms. The root cause is memory corruption triggered by concurrent handling of different IOCTL (Input/Output Control) calls from user-space processes. IOCTL calls are interfaces allowing user-space applications to communicate with kernel drivers, and improper synchronization or memory management in this context can lead to use-after-free conditions. This vulnerability allows an attacker with low-level privileges on the device to exploit the flaw without requiring user interaction, potentially leading to arbitrary code execution, privilege escalation, or denial of service by corrupting kernel memory. The affected products span numerous Snapdragon mobile platforms (from Snapdragon 215 to Snapdragon 8 Gen 3), automotive platforms, wearable platforms, modem-RF systems, and various wireless connectivity chips, indicating a widespread impact across consumer electronics, automotive, and IoT devices. The vulnerability was published on March 2, 2026, with a CVSS v3.1 score of 7.8, reflecting high severity due to its impact on confidentiality, integrity, and availability, ease of exploitation with low privileges, and no requirement for user interaction. No patches or known exploits are currently reported, but the broad attack surface and critical nature of the flaw necessitate urgent attention from affected vendors and users.

Potential Impact

The impact of CVE-2025-47375 is significant due to the extensive range of affected Qualcomm Snapdragon platforms used globally in smartphones, automotive systems, wearables, and IoT devices. Successful exploitation could allow attackers to execute arbitrary code in kernel context, leading to full system compromise, data theft, or persistent malware installation. This threatens confidentiality by exposing sensitive user and system data, integrity by enabling unauthorized code execution and modification of system state, and availability by causing system crashes or denial of service. The vulnerability requires only low privileges and no user interaction, increasing the risk of automated or stealthy attacks from local adversaries or malicious applications. Enterprises relying on Snapdragon-based devices for critical communications, automotive safety, or industrial IoT may face operational disruptions and security breaches. The lack of known exploits currently provides a window for mitigation, but the broad device footprint and potential for privilege escalation make this a high-risk vulnerability worldwide.

Mitigation Recommendations

1. Monitor Qualcomm and device vendors for official patches and apply them promptly once available to address the use-after-free flaw. 2. Until patches are released, restrict local access to devices by enforcing strict user privilege separation and disabling unnecessary accounts or services that could invoke IOCTL calls. 3. Employ application whitelisting and runtime protections to prevent untrusted or malicious applications from executing or invoking vulnerable IOCTL interfaces. 4. Use mobile device management (MDM) solutions to enforce security policies and monitor for anomalous behavior indicative of exploitation attempts. 5. For enterprise and automotive deployments, isolate critical systems from untrusted networks and users to reduce the attack surface. 6. Conduct regular security audits and vulnerability assessments focusing on kernel-level interfaces and privilege escalation vectors. 7. Educate users and administrators about the risks of installing untrusted applications or granting excessive permissions that could trigger the vulnerability. 8. Implement kernel hardening techniques such as memory tagging or use-after-free detection tools where supported to mitigate exploitation risk.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.265Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a5c5c8b6c0d8506faa2987

Added to database: 3/2/2026, 5:15:52 PM

Last enriched: 3/2/2026, 5:33:29 PM

Last updated: 3/2/2026, 11:04:47 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses