Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47387: CWE-822 Untrusted Pointer Dereference in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47387cvecve-2025-47387cwe-822
Published: Thu Dec 18 2025 (12/18/2025, 05:29:13 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory Corruption when processing IOCTLs for JPEG data without verification.

AI-Powered Analysis

AILast updated: 12/25/2025, 07:06:36 UTC

Technical Analysis

CVE-2025-47387 is a vulnerability identified in multiple Qualcomm Snapdragon platforms and associated components, including FastConnect modules, various Snapdragon Compute Platforms (7c, 8c, 8cx series), and audio codecs (WCD and WSA series). The root cause is an untrusted pointer dereference (CWE-822) during the processing of IOCTL commands related to JPEG data. Specifically, the affected code fails to verify pointers passed via IOCTL calls, leading to memory corruption. This flaw can be triggered by a local attacker with low privileges (PR:L) without requiring user interaction (UI:N), making exploitation feasible in scenarios where an attacker has local access, such as through compromised apps or local user accounts. The CVSS v3.1 base score is 7.8 (high), reflecting high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Successful exploitation could allow arbitrary code execution, privilege escalation, or denial of service by corrupting memory structures. The vulnerability affects a broad range of Snapdragon SoCs and related hardware, widely used in smartphones, tablets, IoT devices, and compute platforms. No patches or known exploits are currently reported, but the extensive affected product list and severity indicate a significant risk. The vulnerability was reserved in May 2025 and published in December 2025, indicating recent discovery and disclosure.

Potential Impact

European organizations utilizing devices powered by affected Qualcomm Snapdragon platforms face significant risks. The vulnerability could enable attackers with local access to execute arbitrary code, leading to full device compromise, data theft, or persistent malware installation. Critical infrastructure relying on IoT devices or compute platforms with these chipsets could experience service disruption or data integrity breaches. Mobile devices used by employees could be targeted to gain footholds in corporate networks. The high impact on confidentiality, integrity, and availability means sensitive information could be exposed or systems rendered inoperable. Given the widespread use of Snapdragon chips in consumer and enterprise devices, the attack surface is broad. The lack of known exploits currently provides a window for mitigation, but the potential for rapid weaponization exists. Organizations in sectors such as telecommunications, finance, healthcare, and government are particularly at risk due to the strategic importance of mobile and edge computing devices.

Mitigation Recommendations

1. Monitor Qualcomm and device vendor advisories closely for official patches addressing CVE-2025-47387 and apply them promptly once available. 2. Until patches are released, restrict access to IOCTL interfaces related to JPEG processing by enforcing strict access controls and limiting local user privileges. 3. Employ application whitelisting and endpoint protection to prevent unauthorized local code execution attempts. 4. Conduct thorough audits of devices using affected Snapdragon platforms to identify and isolate vulnerable hardware. 5. Implement network segmentation to limit lateral movement from compromised devices. 6. Educate users on the risks of installing untrusted applications that could exploit local vulnerabilities. 7. For enterprise-managed devices, consider disabling or restricting features that invoke vulnerable IOCTL calls if feasible. 8. Use runtime protection technologies that can detect and block memory corruption attempts. 9. Maintain up-to-date backups and incident response plans to mitigate potential damage from exploitation. 10. Collaborate with device manufacturers to verify patch deployment and device security status.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.268Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6943963a58cc240f07ac2f64

Added to database: 12/18/2025, 5:50:50 AM

Last enriched: 12/25/2025, 7:06:36 AM

Last updated: 2/7/2026, 11:04:44 AM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats