Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47385: CWE-1262: Improper Access Control for Register Interface in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47385cvecve-2025-47385cwe-1262
Published: Mon Mar 02 2026 (03/02/2026, 16:53:54 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory Corruption when accessing trusted execution environment without proper privilege check.

AI-Powered Analysis

AILast updated: 03/02/2026, 17:30:28 UTC

Technical Analysis

CVE-2025-47385 is a vulnerability categorized under CWE-1262 (Improper Access Control) affecting Qualcomm Snapdragon platforms and associated FastConnect wireless modules. The flaw arises from inadequate privilege verification when accessing the trusted execution environment (TEE) register interface, leading to memory corruption. The TEE is a secure area within the main processor that ensures sensitive code and data are protected from unauthorized access. Improper access control here means that processes with insufficient privileges can interact with registers that should be restricted, potentially causing memory corruption. This can be exploited by a local attacker with low privileges to escalate their rights, compromise the confidentiality and integrity of the device, and disrupt availability. The affected products span a broad range of Qualcomm chipsets, including Snapdragon 4, 6, 7, and 8 series mobile platforms, FastConnect modules (6200 through 7800), and various wireless connectivity chips used in smartphones, wearables, and IoT devices. The vulnerability does not require user interaction but does require local access, which could be achieved through compromised apps or physical device access. The CVSS v3.1 score is 7.8, reflecting high severity due to high impact on confidentiality, integrity, and availability, combined with low attack complexity and low privileges required. No patches or known exploits are currently reported, but the extensive list of affected devices indicates a large attack surface. The vulnerability was publicly disclosed in March 2026, with Qualcomm as the assigner. Organizations using affected Snapdragon platforms should monitor for vendor patches and apply them promptly once available.

Potential Impact

The potential impact of CVE-2025-47385 is significant for organizations and individuals relying on Qualcomm Snapdragon-based devices. Exploitation can lead to privilege escalation from low-privileged processes to higher privileges within the trusted execution environment, undermining device security. This can result in unauthorized access to sensitive data, compromise of cryptographic keys, and manipulation or disruption of secure operations. The memory corruption aspect may also cause device instability or denial of service. Given the widespread use of Snapdragon chipsets in smartphones, tablets, wearables, and IoT devices globally, the vulnerability poses a broad risk to confidentiality, integrity, and availability of these systems. Enterprises with mobile device fleets, especially those handling sensitive or regulated data, face increased risk of data breaches or device compromise. The lack of known exploits currently reduces immediate risk, but the vulnerability’s nature and broad device impact make it a prime target for future exploitation. Additionally, attackers with local access—via malicious apps or physical device access—can leverage this flaw to gain persistent control or bypass security controls, increasing the threat to organizational security postures.

Mitigation Recommendations

To mitigate CVE-2025-47385, organizations should implement a multi-layered approach: 1) Monitor Qualcomm and device manufacturers for official patches or firmware updates addressing this vulnerability and apply them promptly across all affected devices. 2) Enforce strict access controls on devices to limit local access, including restricting installation of untrusted applications and employing mobile device management (MDM) solutions to control app permissions and device configurations. 3) Utilize hardware-backed security features such as secure boot and trusted platform modules to reduce the risk of unauthorized privilege escalation. 4) Conduct regular security audits and vulnerability assessments on mobile and IoT device fleets to detect anomalous behavior indicative of exploitation attempts. 5) Educate users on the risks of installing unverified applications and the importance of device physical security to prevent local exploitation vectors. 6) For organizations deploying IoT or embedded systems with affected Qualcomm components, implement network segmentation and monitoring to detect and isolate compromised devices. 7) Collaborate with vendors to obtain timely security advisories and participate in coordinated vulnerability disclosure programs to stay ahead of emerging threats related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.266Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a5c5cab6c0d8506faa2cf6

Added to database: 3/2/2026, 5:15:54 PM

Last enriched: 3/2/2026, 5:30:28 PM

Last updated: 3/2/2026, 7:32:34 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses