Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47395: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon

0
Medium
VulnerabilityCVE-2025-47395cvecve-2025-47395cwe-126
Published: Tue Jan 06 2026 (01/06/2026, 22:48:48 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Transient DOS while parsing a WLAN management frame with a Vendor Specific Information Element.

AI-Powered Analysis

AILast updated: 01/06/2026, 23:15:30 UTC

Technical Analysis

CVE-2025-47395 is a buffer over-read vulnerability classified under CWE-126 found in Qualcomm's Snapdragon WCN7861 wireless chipset. The flaw arises when the chipset parses WLAN management frames that include a Vendor Specific Information Element. Specifically, the vulnerability causes the chipset to read beyond the allocated buffer boundaries, leading to transient denial of service conditions such as device crashes or wireless subsystem resets. The vulnerability is remotely exploitable by an attacker within wireless range who can craft and transmit specially malformed WLAN management frames. No privileges or user interaction are required, and the attack vector is adjacent network access (wireless). The CVSS v3.1 score is 6.5, reflecting a medium severity primarily due to the impact on availability without affecting confidentiality or integrity. No patches are currently linked, and no exploits have been observed in the wild, indicating the vulnerability is newly disclosed and potentially under analysis by threat actors. The affected product version is the WCN7861 chipset, commonly integrated into Snapdragon platforms used in mobile devices and embedded wireless systems. The transient DoS could disrupt wireless connectivity, impacting device functionality and network availability temporarily.

Potential Impact

For European organizations, this vulnerability could lead to temporary denial of service on devices using the affected Snapdragon WCN7861 chipset, disrupting wireless communications. This may affect mobile devices, IoT equipment, and embedded systems relying on this chipset for WLAN connectivity. Critical sectors such as telecommunications, manufacturing, and public services that depend on reliable wireless networks could experience operational interruptions. While the vulnerability does not compromise data confidentiality or integrity, the availability impact could degrade service quality and cause downtime. Given the transient nature of the DoS, the disruption might be brief but could be exploited repeatedly to cause persistent outages. Organizations with extensive use of Snapdragon-based wireless hardware in their infrastructure or employee devices are at higher risk. The lack of known exploits currently reduces immediate threat but does not eliminate the risk of future exploitation.

Mitigation Recommendations

Organizations should monitor Qualcomm's advisories closely for official patches addressing CVE-2025-47395 and apply them promptly once available. In the interim, network administrators can implement wireless intrusion detection and prevention systems (WIDS/WIPS) to detect and block malformed WLAN management frames containing suspicious Vendor Specific Information Elements. Limiting wireless network exposure by enforcing strong access controls and segmenting critical wireless infrastructure can reduce the attack surface. Device firmware and driver updates should be kept current to minimize vulnerabilities. Additionally, organizations should conduct wireless network traffic analysis to identify anomalous frame patterns indicative of exploitation attempts. For critical environments, consider deploying alternative wireless chipsets or devices not affected by this vulnerability until patches are applied. Employee awareness about potential wireless disruptions can help in rapid incident response.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.275Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695d93ce65deeab1b95d81ce

Added to database: 1/6/2026, 10:59:26 PM

Last enriched: 1/6/2026, 11:15:30 PM

Last updated: 1/8/2026, 5:27:26 AM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats