Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47388: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47388cvecve-2025-47388cwe-120
Published: Tue Jan 06 2026 (01/06/2026, 22:48:45 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while passing pages to DSP with an unaligned starting address.

AI-Powered Analysis

AILast updated: 01/14/2026, 01:43:17 UTC

Technical Analysis

CVE-2025-47388 is a classic buffer overflow vulnerability (CWE-120) identified in Qualcomm Snapdragon and associated platforms, including FastConnect wireless modules and various Snapdragon mobile and wearable platforms. The vulnerability arises from improper handling of memory when passing pages to the Digital Signal Processor (DSP) with an unaligned starting address, leading to memory corruption. This flaw can be exploited by an attacker with local access and low privileges to overwrite memory regions, potentially enabling arbitrary code execution, privilege escalation, or denial of service conditions. The vulnerability affects a wide range of Qualcomm products such as FastConnect 6200, 6700, 6900, 7800, Snapdragon 4 Gen 2, 6 Gen 1, W5+ Gen 1 Wearable platforms, and multiple wireless connectivity chips (WCD, WCN, WSA series). The CVSS v3.1 score is 7.8 (high severity) with vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating local attack vector, low complexity, low privileges required, no user interaction, unchanged scope, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the broad product impact and potential severity make this a critical vulnerability to address. The root cause is a lack of proper input size validation and alignment checks before copying memory buffers to the DSP, a critical component responsible for processing multimedia and connectivity functions. This vulnerability could be leveraged to compromise device security, disrupt communications, or extract sensitive data.

Potential Impact

For European organizations, this vulnerability poses significant risks, particularly for those relying on mobile devices, IoT endpoints, and embedded systems powered by Qualcomm Snapdragon platforms. The potential for arbitrary code execution and privilege escalation can lead to unauthorized access to sensitive corporate data, interception or manipulation of communications, and disruption of critical services. Telecommunications providers, enterprises with mobile workforces, and sectors such as finance, healthcare, and government are especially vulnerable due to their reliance on secure mobile communications. The widespread use of affected Qualcomm chips in smartphones, wearables, and wireless modules means that a large number of devices in Europe could be impacted, increasing the attack surface. Additionally, the vulnerability could be exploited to undermine the integrity and availability of communication infrastructure, affecting service continuity. The local attack vector limits remote exploitation but does not eliminate risk, as attackers could leverage other vulnerabilities or social engineering to gain local access. The absence of known exploits in the wild provides a window for proactive mitigation, but the high impact score necessitates urgent attention.

Mitigation Recommendations

1. Monitor Qualcomm and device vendor advisories closely and apply security patches promptly once released to address CVE-2025-47388. 2. Implement strict access controls to limit local access to devices, reducing the risk of exploitation by unauthorized users. 3. Employ endpoint detection and response (EDR) solutions capable of detecting anomalous memory operations or privilege escalation attempts on affected devices. 4. Conduct regular security audits and penetration testing focusing on local privilege escalation vectors in mobile and embedded systems. 5. For organizations deploying IoT or embedded devices with Qualcomm chips, enforce network segmentation to isolate vulnerable devices and limit lateral movement. 6. Educate users and administrators about the risks of local exploitation and encourage vigilance against social engineering tactics that could grant local access. 7. Collaborate with device manufacturers to ensure firmware updates include proper input validation and memory alignment checks to prevent buffer overflows. 8. Where feasible, disable or restrict DSP functionalities that are not essential to reduce the attack surface. 9. Maintain an inventory of all devices using affected Qualcomm platforms to prioritize patching and monitoring efforts. 10. Consider deploying mobile threat defense solutions that can detect exploitation attempts targeting Qualcomm vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.268Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695d93cd65deeab1b95d81bb

Added to database: 1/6/2026, 10:59:25 PM

Last enriched: 1/14/2026, 1:43:17 AM

Last updated: 2/7/2026, 7:44:44 AM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats