CVE-2025-47395: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon
Transient DOS while parsing a WLAN management frame with a Vendor Specific Information Element.
AI Analysis
Technical Summary
CVE-2025-47395 is a buffer over-read vulnerability classified under CWE-126, affecting Qualcomm Snapdragon WCN7861 wireless chipsets. The vulnerability arises when the chipset processes WLAN management frames that include a Vendor Specific Information Element. Specifically, improper bounds checking during parsing leads to reading beyond the intended buffer, causing transient denial of service conditions such as device crashes or wireless subsystem resets. This vulnerability does not compromise confidentiality or integrity but impacts availability by disrupting wireless connectivity. The attack vector is remote and requires only network proximity, as the attacker must send specially crafted WLAN management frames to the target device. No privileges or user interaction are required, increasing the ease of exploitation. The CVSS v3.1 base score is 6.5, reflecting medium severity with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality or integrity impact (C:N/I:N), and high availability impact (A:H). Qualcomm has not yet published patches, and no exploits have been observed in the wild. This vulnerability primarily affects devices embedding the WCN7861 chipset, commonly found in mobile phones, tablets, and IoT devices using Snapdragon platforms. The transient DoS can cause network disruptions and device instability, potentially impacting critical wireless communications.
Potential Impact
For European organizations, this vulnerability poses a risk of transient denial of service on devices using the affected Qualcomm Snapdragon WCN7861 chipsets. This can lead to temporary loss of wireless connectivity, device reboots, or crashes, impacting business operations reliant on stable wireless communications. Sectors such as telecommunications, manufacturing with IoT deployments, and mobile workforce environments are particularly vulnerable. Although the vulnerability does not expose sensitive data or allow unauthorized control, the availability disruption could affect critical services, especially in environments with dense wireless device usage. The ease of exploitation without authentication means attackers in physical proximity could cause localized network outages. This could be leveraged for targeted disruption or as part of a larger attack chain. The absence of known exploits reduces immediate risk, but the medium severity score warrants proactive mitigation to prevent future exploitation.
Mitigation Recommendations
Organizations should monitor vendor communications for patches addressing CVE-2025-47395 and apply them promptly once available. In the interim, network administrators can implement wireless intrusion detection systems (WIDS) to identify and block malformed WLAN management frames containing suspicious Vendor Specific Information Elements. Restricting wireless network access to trusted devices and limiting physical proximity to critical infrastructure can reduce exposure. Firmware updates for affected devices should be prioritized, and device inventories must be reviewed to identify those using the WCN7861 chipset. Additionally, segmenting wireless networks and employing robust network access controls can limit the impact of potential DoS attacks. Security teams should also educate staff on reporting unusual wireless connectivity issues that may indicate exploitation attempts. Collaboration with device vendors and Qualcomm for timely vulnerability intelligence and remediation guidance is essential.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden
CVE-2025-47395: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon
Description
Transient DOS while parsing a WLAN management frame with a Vendor Specific Information Element.
AI-Powered Analysis
Technical Analysis
CVE-2025-47395 is a buffer over-read vulnerability classified under CWE-126, affecting Qualcomm Snapdragon WCN7861 wireless chipsets. The vulnerability arises when the chipset processes WLAN management frames that include a Vendor Specific Information Element. Specifically, improper bounds checking during parsing leads to reading beyond the intended buffer, causing transient denial of service conditions such as device crashes or wireless subsystem resets. This vulnerability does not compromise confidentiality or integrity but impacts availability by disrupting wireless connectivity. The attack vector is remote and requires only network proximity, as the attacker must send specially crafted WLAN management frames to the target device. No privileges or user interaction are required, increasing the ease of exploitation. The CVSS v3.1 base score is 6.5, reflecting medium severity with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality or integrity impact (C:N/I:N), and high availability impact (A:H). Qualcomm has not yet published patches, and no exploits have been observed in the wild. This vulnerability primarily affects devices embedding the WCN7861 chipset, commonly found in mobile phones, tablets, and IoT devices using Snapdragon platforms. The transient DoS can cause network disruptions and device instability, potentially impacting critical wireless communications.
Potential Impact
For European organizations, this vulnerability poses a risk of transient denial of service on devices using the affected Qualcomm Snapdragon WCN7861 chipsets. This can lead to temporary loss of wireless connectivity, device reboots, or crashes, impacting business operations reliant on stable wireless communications. Sectors such as telecommunications, manufacturing with IoT deployments, and mobile workforce environments are particularly vulnerable. Although the vulnerability does not expose sensitive data or allow unauthorized control, the availability disruption could affect critical services, especially in environments with dense wireless device usage. The ease of exploitation without authentication means attackers in physical proximity could cause localized network outages. This could be leveraged for targeted disruption or as part of a larger attack chain. The absence of known exploits reduces immediate risk, but the medium severity score warrants proactive mitigation to prevent future exploitation.
Mitigation Recommendations
Organizations should monitor vendor communications for patches addressing CVE-2025-47395 and apply them promptly once available. In the interim, network administrators can implement wireless intrusion detection systems (WIDS) to identify and block malformed WLAN management frames containing suspicious Vendor Specific Information Elements. Restricting wireless network access to trusted devices and limiting physical proximity to critical infrastructure can reduce exposure. Firmware updates for affected devices should be prioritized, and device inventories must be reviewed to identify those using the WCN7861 chipset. Additionally, segmenting wireless networks and employing robust network access controls can limit the impact of potential DoS attacks. Security teams should also educate staff on reporting unusual wireless connectivity issues that may indicate exploitation attempts. Collaboration with device vendors and Qualcomm for timely vulnerability intelligence and remediation guidance is essential.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- qualcomm
- Date Reserved
- 2025-05-06T08:33:16.275Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695d93ce65deeab1b95d81ce
Added to database: 1/6/2026, 10:59:26 PM
Last enriched: 1/14/2026, 1:44:13 AM
Last updated: 2/6/2026, 11:14:17 PM
Views: 88
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighCVE-2026-25803: CWE-798: Use of Hard-coded Credentials in denpiligrim 3dp-manager
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.