Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47394: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47394cvecve-2025-47394cwe-120
Published: Tue Jan 06 2026 (01/06/2026, 22:48:47 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption when copying overlapping buffers during memory operations due to incorrect offset calculations.

AI-Powered Analysis

AILast updated: 01/06/2026, 23:13:56 UTC

Technical Analysis

CVE-2025-47394 is a classic buffer overflow vulnerability classified under CWE-120, discovered in Qualcomm Snapdragon platforms and associated FastConnect wireless connectivity and video collaboration products. The root cause is improper handling of overlapping buffers during memory copy operations, where incorrect offset calculations lead to memory corruption. This can cause overwriting of adjacent memory regions, potentially allowing attackers with limited privileges to escalate their access or execute arbitrary code. The affected products include a wide range of Snapdragon mobile platforms (e.g., Snapdragon 4 Gen 2, 6 Gen 1, W5+ Gen 1), FastConnect wireless modules (6200, 6700, 6900, 7800), and various Qualcomm wireless connectivity chips (WCD9370 series, WCN series, WSA series). The vulnerability requires local access with low privileges and no user interaction, making exploitation feasible in scenarios where an attacker has some foothold on the device. The CVSS v3.1 score of 7.8 indicates high severity due to the potential for complete compromise of confidentiality, integrity, and availability. Although no exploits are known in the wild yet, the broad deployment of affected hardware in mobile phones, wearables, and IoT devices makes this a critical issue. The vulnerability was publicly disclosed in January 2026, with no patches currently available, underscoring the urgency for Qualcomm and device manufacturers to issue updates. The flaw could be exploited to bypass security controls, inject malicious code, or cause denial of service, impacting device stability and security.

Potential Impact

For European organizations, the impact of CVE-2025-47394 is significant due to the widespread use of Qualcomm Snapdragon-based devices in corporate and consumer environments. Mobile devices, wearables, and IoT endpoints incorporating affected Snapdragon platforms are common in enterprise settings, enabling attackers to leverage this vulnerability for privilege escalation or persistent access. Confidential data stored or processed on these devices could be exposed or manipulated, undermining data protection compliance such as GDPR. The integrity of communications and applications running on these devices may be compromised, potentially affecting business operations. Additionally, disruption of device availability through crashes or denial-of-service conditions could impact critical mobile-dependent workflows. The vulnerability also poses risks to telecom infrastructure and mobile network operators using Qualcomm hardware, which could have cascading effects on service availability. Given the local access requirement, insider threats or malware already present on devices could exploit this flaw to deepen compromise. The absence of known exploits currently provides a window for mitigation, but the high severity score demands prompt attention to prevent future attacks.

Mitigation Recommendations

Organizations should prioritize monitoring for vendor advisories and apply Qualcomm-issued patches as soon as they become available. Until patches are released, restricting local access to devices and enforcing strict endpoint security controls can reduce exploitation risk. Employing application whitelisting and behavior-based detection on mobile and wearable devices may help identify attempts to exploit memory corruption. Developers should audit and harden memory handling routines in custom applications interfacing with Qualcomm components. Network segmentation and limiting the use of vulnerable devices in sensitive environments can further contain potential impact. Regularly updating device firmware and operating systems ensures incorporation of security fixes. Security teams should also educate users about the risks of installing untrusted applications that could leverage local access to exploit this vulnerability. For critical infrastructure, consider deploying additional runtime protections such as Control Flow Integrity (CFI) and Address Space Layout Randomization (ASLR) where supported by device platforms. Collaboration with device vendors and mobile operators is essential to coordinate timely patch deployment and incident response.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.275Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695d93cd65deeab1b95d81c1

Added to database: 1/6/2026, 10:59:25 PM

Last enriched: 1/6/2026, 11:13:56 PM

Last updated: 1/8/2026, 5:28:16 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats