Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47376: CWE-416 Use After Free in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47376cvecve-2025-47376cwe-416
Published: Mon Mar 02 2026 (03/02/2026, 16:53:46 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory Corruption when concurrent access to shared buffer occurs during IOCTL calls.

AI-Powered Analysis

AILast updated: 03/02/2026, 17:32:20 UTC

Technical Analysis

CVE-2025-47376 is a use-after-free vulnerability classified under CWE-416 that affects numerous Qualcomm Snapdragon platforms and associated wireless connectivity components. The root cause is a memory corruption issue triggered by concurrent access to a shared buffer during IOCTL (Input/Output Control) calls, which are system calls used for device-specific operations. When multiple threads or processes access this shared buffer simultaneously without proper synchronization, it can lead to the buffer being freed while still in use, resulting in use-after-free conditions. This memory corruption can be exploited by an attacker with low-level privileges on the device to execute arbitrary code, escalate privileges, or cause a denial of service by crashing the affected component. The vulnerability spans a broad spectrum of Qualcomm products, including mobile platforms (e.g., Snapdragon 865, 888, 8 Gen 2), automotive platforms, wearable platforms, and various modem and wireless connectivity chips. The CVSS v3.1 base score is 7.8, reflecting high severity due to the potential for complete compromise of confidentiality, integrity, and availability. Exploitation requires local access with low privileges but does not require user interaction, increasing the risk in multi-user or shared device environments. No public exploits or active exploitation have been reported yet, but the extensive list of affected devices and platforms makes this a critical issue for Qualcomm device users and manufacturers. Qualcomm has not yet published patches at the time of this report, emphasizing the need for vigilance and proactive mitigation.

Potential Impact

The impact of CVE-2025-47376 is significant for organizations and individuals using devices powered by affected Qualcomm Snapdragon platforms. Successful exploitation can lead to arbitrary code execution, allowing attackers to gain elevated privileges, access sensitive data, or disrupt device functionality. This can compromise the confidentiality, integrity, and availability of affected systems. In mobile devices, this could result in unauthorized access to personal data, interception of communications, or persistent malware installation. In automotive and IoT contexts, exploitation could disrupt critical systems, leading to safety risks or operational failures. The vulnerability's requirement for local access limits remote exploitation but does not eliminate risk in environments where attackers can gain physical or local network access, such as shared devices, corporate environments, or compromised applications. The broad range of affected platforms increases the attack surface globally, impacting industries relying on Qualcomm technology for mobile communications, automotive telematics, wearable devices, and industrial IoT. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future attacks, especially as threat actors develop proof-of-concept exploits.

Mitigation Recommendations

1. Restrict local access to devices using affected Qualcomm Snapdragon platforms by enforcing strict user permissions and limiting physical access. 2. Monitor system logs and IOCTL call patterns for unusual or concurrent access attempts that could indicate exploitation attempts. 3. Employ application whitelisting and sandboxing to reduce the risk of malicious code executing IOCTL calls. 4. Coordinate with device manufacturers and Qualcomm for timely receipt and deployment of security patches once available. 5. For organizations managing fleets of devices, implement automated patch management and vulnerability scanning focused on Qualcomm components. 6. Educate users about the risks of installing untrusted applications that could leverage local privileges to exploit this vulnerability. 7. In high-security environments, consider network segmentation and endpoint detection solutions to identify anomalous behavior related to this vulnerability. 8. Review and harden device configurations to minimize unnecessary IOCTL call exposure and shared buffer usage where possible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.265Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a5c5c8b6c0d8506faa298a

Added to database: 3/2/2026, 5:15:52 PM

Last enriched: 3/2/2026, 5:32:20 PM

Last updated: 3/2/2026, 9:37:13 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses