Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47394: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47394cvecve-2025-47394cwe-120
Published: Tue Jan 06 2026 (01/06/2026, 22:48:47 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption when copying overlapping buffers during memory operations due to incorrect offset calculations.

AI-Powered Analysis

AILast updated: 01/14/2026, 01:43:54 UTC

Technical Analysis

CVE-2025-47394 is a classic buffer overflow vulnerability categorized under CWE-120, discovered in various Qualcomm Snapdragon platforms and associated wireless connectivity chips. The root cause is improper handling of overlapping buffers during memory copy operations, where incorrect offset calculations lead to memory corruption. This flaw exists in multiple affected versions including FastConnect 6200 through 7800 series, Snapdragon 4 Gen 2 and 6 Gen 1 Mobile Platforms, Snapdragon W5+ Gen 1 Wearable Platform, and numerous wireless connectivity modules (e.g., WCD9370 series, WCN series, WSA series). The vulnerability allows an attacker with low-level privileges (local access) to exploit the buffer overflow without requiring user interaction, potentially leading to arbitrary code execution or denial of service by corrupting memory. The CVSS v3.1 base score is 7.8, reflecting high severity with high impact on confidentiality, integrity, and availability. No public exploits are known yet, but the broad range of affected devices and the critical nature of the flaw make it a significant risk. The vulnerability was reserved in May 2025 and published in January 2026, indicating recent discovery and disclosure. Qualcomm has not yet released patches, so affected organizations must prepare for rapid deployment once available. The vulnerability's exploitation complexity is low given local access and no UI required, but it requires some privilege level, limiting remote exploitation vectors. This vulnerability is particularly concerning for mobile devices and IoT endpoints that rely on these Qualcomm platforms, as exploitation could compromise device security and user data.

Potential Impact

For European organizations, the impact of CVE-2025-47394 is substantial due to the widespread use of Qualcomm Snapdragon chips in smartphones, wearables, and IoT devices. Confidentiality could be compromised if attackers gain arbitrary code execution, allowing data exfiltration or espionage. Integrity and availability are also at risk, as memory corruption can cause system crashes or persistent device malfunction, disrupting business operations. Industries relying on mobile communications, such as finance, healthcare, and critical infrastructure, may face increased risk of targeted attacks exploiting this vulnerability. The local access requirement somewhat limits remote exploitation, but insider threats or malware with local execution capabilities could leverage this flaw. The vulnerability also poses risks to supply chain security, as compromised devices could be used as entry points into corporate networks. Given the high adoption of Snapdragon-based devices across Europe, the potential for widespread impact is significant, especially in sectors with high mobility and IoT device usage.

Mitigation Recommendations

Organizations should prioritize the following mitigations: 1) Monitor Qualcomm’s security advisories closely and apply patches immediately upon release to affected platforms. 2) Implement strict access controls to limit local access to devices, reducing the risk of exploitation by low-privilege users or malware. 3) Employ endpoint detection and response (EDR) solutions capable of detecting anomalous memory operations or local privilege escalation attempts. 4) Conduct regular security audits and vulnerability assessments on mobile and IoT devices using Qualcomm components. 5) Use application whitelisting and sandboxing to restrict execution of unauthorized code on affected devices. 6) Educate users and administrators about the risks of local exploitation and enforce policies to prevent installation of untrusted software. 7) For critical environments, consider network segmentation to isolate vulnerable devices and limit lateral movement in case of compromise. 8) Collaborate with device vendors to ensure timely firmware and software updates are deployed. These steps go beyond generic advice by focusing on local access control, behavioral detection, and proactive patch management tailored to the Qualcomm Snapdragon ecosystem.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.275Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695d93cd65deeab1b95d81c1

Added to database: 1/6/2026, 10:59:25 PM

Last enriched: 1/14/2026, 1:43:54 AM

Last updated: 2/7/2026, 10:41:14 AM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats