Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47382: CWE-863: Incorrect Authorization in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47382cvecve-2025-47382cwe-863
Published: Thu Dec 18 2025 (12/18/2025, 05:29:11 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while loading an invalid firmware in boot loader.

AI-Powered Analysis

AILast updated: 12/18/2025, 06:06:01 UTC

Technical Analysis

CVE-2025-47382 is a vulnerability classified under CWE-863 (Incorrect Authorization) affecting Qualcomm Snapdragon chipsets and associated wireless connectivity modules. The flaw arises from improper authorization checks during the boot loader process when loading firmware. Specifically, the vulnerability leads to memory corruption if an invalid firmware image is loaded, which can be triggered by an attacker with low-level privileges. The affected products include a broad spectrum of Qualcomm’s FastConnect, QCA, QCM, QCS, SA, SG, SM, Snapdragon Mobile Platforms, and various wireless connectivity chips. The vulnerability’s CVSS 3.1 base score is 7.8, indicating high severity, with an attack vector of local access (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). This means an attacker with local access but limited privileges can exploit the flaw without user interaction to cause significant system compromise, including potential arbitrary code execution or persistent device control. The vulnerability was publicly disclosed on December 18, 2025, with no known exploits in the wild at the time. The lack of patch links suggests that fixes may be pending or in development. The broad range of affected devices indicates a systemic issue in the firmware validation process within Qualcomm’s boot loader implementations. This vulnerability could be leveraged in targeted attacks against devices using these chipsets, especially in environments where local access can be obtained, such as through compromised applications or physical access.

Potential Impact

For European organizations, the impact of CVE-2025-47382 is significant due to the widespread use of Qualcomm Snapdragon chipsets in mobile devices, IoT equipment, and embedded systems critical to business operations and infrastructure. Successful exploitation could lead to unauthorized firmware loading, resulting in memory corruption that compromises device confidentiality, integrity, and availability. This could enable attackers to execute arbitrary code at a low level, potentially gaining persistent control over devices, intercepting sensitive communications, or disrupting services. Industries such as telecommunications, finance, healthcare, and critical infrastructure that rely heavily on mobile and embedded Qualcomm hardware are particularly vulnerable. The vulnerability could facilitate espionage, data theft, or sabotage, especially in environments where devices are shared or physically accessible. Additionally, the lack of user interaction requirement increases the risk of stealthy exploitation. The absence of known exploits currently provides a window for proactive mitigation, but the high severity score underscores the urgency for European entities to assess their exposure and implement controls.

Mitigation Recommendations

European organizations should adopt a multi-layered mitigation strategy beyond generic patching advice. First, inventory all devices and embedded systems using affected Qualcomm Snapdragon chipsets to understand exposure. Restrict local access to devices by enforcing strict physical security controls and limiting administrative privileges to trusted personnel. Implement runtime integrity checks and monitor for anomalous firmware loading or boot processes using endpoint detection and response (EDR) tools tailored for embedded systems. Collaborate with device manufacturers and Qualcomm to obtain and deploy firmware updates or patches as soon as they become available. Where patching is delayed, consider deploying network segmentation to isolate vulnerable devices and reduce attack surface. Employ secure boot mechanisms and cryptographic validation of firmware images to prevent unauthorized firmware execution. Conduct regular security audits and penetration testing focusing on firmware and boot loader security. Finally, raise user awareness about the risks of unauthorized device access and ensure that devices are not exposed to untrusted environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.266Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6943963858cc240f07ac2f40

Added to database: 12/18/2025, 5:50:48 AM

Last enriched: 12/18/2025, 6:06:01 AM

Last updated: 12/18/2025, 9:13:40 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats