Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47380: CWE-822 Untrusted Pointer Dereference in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47380cvecve-2025-47380cwe-822
Published: Tue Jan 06 2026 (01/06/2026, 22:48:44 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while preprocessing IOCTLs in sensors.

AI-Powered Analysis

AILast updated: 01/06/2026, 23:14:37 UTC

Technical Analysis

CVE-2025-47380 is a vulnerability classified under CWE-822 (Untrusted Pointer Dereference) affecting Qualcomm Snapdragon chipsets, specifically in the memory handling of IOCTL (Input/Output Control) commands related to sensor preprocessing. The flaw exists in multiple Qualcomm products including FastConnect 7800, QCC2072, WCD9378C, and several WSA and X-series modules widely deployed in mobile devices, IoT endpoints, and embedded systems. The vulnerability allows a local attacker with low privileges to trigger memory corruption by supplying crafted IOCTL requests to the sensor subsystem. This can lead to arbitrary code execution, privilege escalation, or denial of service conditions due to corrupted memory states. The CVSS v3.1 score of 7.8 reflects high severity with attack vector being local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). Although no exploits are currently known in the wild, the vulnerability’s characteristics make it a critical risk for devices relying on these chipsets. The absence of patches at the time of publication necessitates immediate risk mitigation through access restrictions and monitoring. The flaw’s exploitation could compromise sensitive data, disrupt device functionality, and undermine trust in critical communication and control systems.

Potential Impact

For European organizations, the impact of CVE-2025-47380 is significant due to the widespread use of Qualcomm Snapdragon chipsets in smartphones, automotive telematics, industrial IoT devices, and telecommunications infrastructure. Confidentiality breaches could expose sensitive corporate or personal data, while integrity violations might allow attackers to manipulate sensor data or device behavior, potentially causing operational disruptions. Availability impacts could result in denial of service, affecting critical business functions and services. Industries such as automotive manufacturing, telecommunications providers, healthcare device manufacturers, and critical infrastructure operators are particularly vulnerable. The local attack vector means insider threats or compromised devices could be leveraged to exploit this vulnerability. Given the high severity and broad device footprint, unmitigated exploitation could lead to large-scale disruptions and data breaches within European markets.

Mitigation Recommendations

1. Immediately restrict local access to IOCTL interfaces related to sensor subsystems on affected devices, using OS-level access controls and sandboxing techniques. 2. Monitor system logs and sensor-related activities for unusual or unauthorized IOCTL calls indicative of exploitation attempts. 3. Implement strict privilege separation and minimize the number of processes with access to vulnerable interfaces. 4. Coordinate with Qualcomm and device manufacturers to obtain and deploy patches as soon as they become available. 5. For enterprise-managed devices, enforce endpoint detection and response (EDR) solutions capable of detecting memory corruption exploits. 6. Conduct security audits on IoT and embedded devices using affected chipsets to identify exposure. 7. Educate internal teams about the vulnerability and enforce policies limiting local access to sensitive device components. 8. Consider network segmentation for devices with Snapdragon chipsets to limit lateral movement in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.266Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695d93cd65deeab1b95d81b8

Added to database: 1/6/2026, 10:59:25 PM

Last enriched: 1/6/2026, 11:14:37 PM

Last updated: 1/8/2026, 10:02:13 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats