CVE-2025-47384: CWE-617 Reachable Assertion in Qualcomm, Inc. Snapdragon
Transient DOS when MAC configures config id greater than supported maximum value.
AI Analysis
Technical Summary
CVE-2025-47384 is a vulnerability classified under CWE-617 (Reachable Assertion) affecting numerous Qualcomm Snapdragon and related wireless communication platforms. The root cause is a reachable assertion triggered when the MAC (Media Access Control) layer attempts to configure a configuration ID that exceeds the maximum supported value. This assertion failure leads to a transient denial of service condition, disrupting the normal functioning of the affected device or component. The vulnerability spans a broad range of Qualcomm products, including Snapdragon mobile platforms from Snapdragon 4 Gen 1 up to Snapdragon 888+, FastConnect wireless modules (6200 through 6900 series), various QCA and WCD chipsets, and modem-RF systems like Snapdragon X53 and X55. The CVSS v3.1 score is 6.5 (medium severity), reflecting that the attack vector is adjacent network (AV:A), requires low attack complexity (AC:L), no privileges (PR:N), no user interaction (UI:N), and impacts availability only (A:H) without affecting confidentiality or integrity. The vulnerability does not require authentication and can be triggered remotely by sending malformed MAC configuration commands. No patches are currently linked, and no known exploits have been reported in the wild. The transient DoS could affect device connectivity and wireless communication reliability, potentially impacting end-user experience and network operations.
Potential Impact
The primary impact of CVE-2025-47384 is a transient denial of service affecting availability on devices using vulnerable Qualcomm Snapdragon and related wireless platforms. This can lead to temporary loss of wireless connectivity or degraded network performance on mobile devices, IoT endpoints, fixed wireless access points, and automotive systems relying on these chipsets. For enterprises and service providers, this could translate into intermittent service disruptions, reduced productivity, and potential customer dissatisfaction. Critical infrastructure or automotive systems using affected platforms could experience momentary communication outages, which may have safety or operational implications depending on deployment context. Since the vulnerability does not compromise confidentiality or integrity, data theft or manipulation is not a concern. However, the ease of remote exploitation without authentication increases the risk of opportunistic attacks, especially in environments with exposed wireless interfaces or insufficient network segmentation.
Mitigation Recommendations
Organizations should monitor Qualcomm advisories for official patches addressing CVE-2025-47384 and apply updates promptly once available. In the interim, network-level mitigations can reduce exploitation risk: restrict access to wireless management interfaces to trusted networks, implement strict MAC filtering and anomaly detection to identify malformed configuration attempts, and employ intrusion prevention systems capable of detecting abnormal MAC layer traffic. Device manufacturers and integrators should validate configuration parameters rigorously to prevent out-of-range values reaching the MAC layer. For critical deployments, consider isolating vulnerable devices on segmented networks and limiting exposure to untrusted wireless clients. Regularly auditing device firmware versions and configurations will help identify and remediate vulnerable systems. Additionally, educating network administrators about this vulnerability can improve incident response readiness.
Affected Countries
United States, China, India, South Korea, Japan, Germany, United Kingdom, France, Brazil, Russia, Canada, Australia, Taiwan, Singapore
CVE-2025-47384: CWE-617 Reachable Assertion in Qualcomm, Inc. Snapdragon
Description
Transient DOS when MAC configures config id greater than supported maximum value.
AI-Powered Analysis
Technical Analysis
CVE-2025-47384 is a vulnerability classified under CWE-617 (Reachable Assertion) affecting numerous Qualcomm Snapdragon and related wireless communication platforms. The root cause is a reachable assertion triggered when the MAC (Media Access Control) layer attempts to configure a configuration ID that exceeds the maximum supported value. This assertion failure leads to a transient denial of service condition, disrupting the normal functioning of the affected device or component. The vulnerability spans a broad range of Qualcomm products, including Snapdragon mobile platforms from Snapdragon 4 Gen 1 up to Snapdragon 888+, FastConnect wireless modules (6200 through 6900 series), various QCA and WCD chipsets, and modem-RF systems like Snapdragon X53 and X55. The CVSS v3.1 score is 6.5 (medium severity), reflecting that the attack vector is adjacent network (AV:A), requires low attack complexity (AC:L), no privileges (PR:N), no user interaction (UI:N), and impacts availability only (A:H) without affecting confidentiality or integrity. The vulnerability does not require authentication and can be triggered remotely by sending malformed MAC configuration commands. No patches are currently linked, and no known exploits have been reported in the wild. The transient DoS could affect device connectivity and wireless communication reliability, potentially impacting end-user experience and network operations.
Potential Impact
The primary impact of CVE-2025-47384 is a transient denial of service affecting availability on devices using vulnerable Qualcomm Snapdragon and related wireless platforms. This can lead to temporary loss of wireless connectivity or degraded network performance on mobile devices, IoT endpoints, fixed wireless access points, and automotive systems relying on these chipsets. For enterprises and service providers, this could translate into intermittent service disruptions, reduced productivity, and potential customer dissatisfaction. Critical infrastructure or automotive systems using affected platforms could experience momentary communication outages, which may have safety or operational implications depending on deployment context. Since the vulnerability does not compromise confidentiality or integrity, data theft or manipulation is not a concern. However, the ease of remote exploitation without authentication increases the risk of opportunistic attacks, especially in environments with exposed wireless interfaces or insufficient network segmentation.
Mitigation Recommendations
Organizations should monitor Qualcomm advisories for official patches addressing CVE-2025-47384 and apply updates promptly once available. In the interim, network-level mitigations can reduce exploitation risk: restrict access to wireless management interfaces to trusted networks, implement strict MAC filtering and anomaly detection to identify malformed configuration attempts, and employ intrusion prevention systems capable of detecting abnormal MAC layer traffic. Device manufacturers and integrators should validate configuration parameters rigorously to prevent out-of-range values reaching the MAC layer. For critical deployments, consider isolating vulnerable devices on segmented networks and limiting exposure to untrusted wireless clients. Regularly auditing device firmware versions and configurations will help identify and remediate vulnerable systems. Additionally, educating network administrators about this vulnerability can improve incident response readiness.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- qualcomm
- Date Reserved
- 2025-05-06T08:33:16.266Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a5c5cab6c0d8506faa2cf2
Added to database: 3/2/2026, 5:15:54 PM
Last enriched: 3/2/2026, 5:33:15 PM
Last updated: 3/2/2026, 8:53:58 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2256: CWE-94 Improper Control of Generation of Code ('Code Injection') in ModelScope ms-agent
CriticalCVE-2026-26713: n/a
HighCVE-2026-26712: n/a
HighCVE-2026-25477: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in toeverything AFFiNE
MediumCVE-2026-21882: CWE-273: Improper Check for Dropped Privileges in AsfhtgkDavid theshit
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.