Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47383: CWE-325: Missing Cryptographic Step in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47383cvecve-2025-47383cwe-325
Published: Mon Mar 02 2026 (03/02/2026, 16:53:52 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Weak configuration may lead to cryptographic issue when a VoWiFi call is triggered from UE.

AI-Powered Analysis

AILast updated: 03/02/2026, 17:30:46 UTC

Technical Analysis

CVE-2025-47383 is a vulnerability identified in multiple Qualcomm Snapdragon platforms, characterized by a missing cryptographic step during the initiation of Voice over WiFi (VoWiFi) calls from user equipment (UE). This cryptographic omission results in weak configuration that undermines the security guarantees typically provided by cryptographic protocols, potentially allowing attackers to intercept, manipulate, or disrupt VoWiFi communications. The vulnerability is classified under CWE-325, which refers to missing required cryptographic steps that can lead to insecure implementations. The affected products encompass a vast array of Qualcomm chipsets and platforms, including but not limited to mobile platforms (e.g., Snapdragon 8 Gen series, Snapdragon 7 series), automotive platforms, wearable platforms, compute platforms, and various modem and connectivity subsystems. The CVSS v3.1 base score is 7.2, reflecting high severity due to the vulnerability's impact on confidentiality, integrity, and availability, combined with network attack vector, low attack complexity, and the requirement for high privileges but no user interaction. The flaw could be exploited remotely over the network, particularly during VoWiFi call setup, potentially allowing attackers with elevated privileges to compromise call security. Although no exploits have been reported in the wild, the extensive deployment of affected Qualcomm components in smartphones, IoT devices, automotive systems, and other connected devices makes this vulnerability a significant concern. The lack of a patch at the time of reporting necessitates immediate risk mitigation strategies. The vulnerability's broad impact is compounded by the critical role of VoWiFi in modern telecommunication, especially in environments where cellular coverage is limited. The technical root cause is a missing cryptographic step, which may involve omitted encryption, authentication, or integrity verification processes during call initiation, thereby exposing the communication channel to interception or tampering.

Potential Impact

The impact of CVE-2025-47383 is substantial for organizations worldwide that rely on Qualcomm Snapdragon-based devices for secure communications. The vulnerability compromises the confidentiality, integrity, and availability of VoWiFi calls, potentially allowing attackers to eavesdrop on sensitive conversations, inject malicious data, or disrupt communication services. This can lead to data breaches, loss of intellectual property, exposure of personally identifiable information (PII), and operational disruptions. Enterprises using Snapdragon-powered mobile devices, automotive systems, or IoT devices for critical communications are at risk of targeted attacks exploiting this flaw. The automotive sector could face safety risks if vehicle communication systems are compromised. The widespread presence of affected platforms in consumer and enterprise devices increases the attack surface, making large-scale exploitation feasible once an exploit is developed. The requirement for elevated privileges to exploit the vulnerability somewhat limits the attack vector but does not eliminate risk, especially in environments where privilege escalation is possible. The absence of known exploits in the wild currently reduces immediate threat but does not preclude future exploitation. Overall, the vulnerability poses a high risk to confidentiality and integrity of communications and could impact availability if exploited to disrupt VoWiFi services.

Mitigation Recommendations

1. Monitor Qualcomm and device manufacturers for official patches or firmware updates addressing CVE-2025-47383 and apply them promptly across all affected devices. 2. Implement network segmentation and strict access controls to limit exposure of devices using vulnerable Snapdragon platforms, especially restricting access to VoWiFi call initiation services to trusted networks and users. 3. Employ intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics tuned to detect anomalous VoWiFi call initiation patterns or cryptographic anomalies. 4. Enforce strong privilege management policies to minimize the risk of privilege escalation that could enable exploitation of this vulnerability. 5. Use endpoint security solutions capable of monitoring and restricting unauthorized modifications to communication modules or cryptographic configurations. 6. For organizations deploying Snapdragon-based automotive or IoT devices, ensure secure boot and firmware integrity verification mechanisms are in place to prevent unauthorized firmware tampering. 7. Educate security teams about the specific risk associated with VoWiFi cryptographic weaknesses and incorporate this vulnerability into incident response plans. 8. Where feasible, consider alternative communication methods or additional encryption layers at the application level to mitigate risks until patches are available. 9. Collaborate with vendors to obtain detailed technical guidance and support for remediation efforts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.266Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a5c5cab6c0d8506faa2aa7

Added to database: 3/2/2026, 5:15:54 PM

Last enriched: 3/2/2026, 5:30:46 PM

Last updated: 3/2/2026, 7:59:02 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses