Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47399: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2025-47399cvecve-2025-47399cwe-120
Published: Mon Feb 02 2026 (02/02/2026, 15:20:45 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory Corruption while processing IOCTL call to update sensor property settings with invalid input parameters.

AI-Powered Analysis

AILast updated: 02/02/2026, 15:44:40 UTC

Technical Analysis

CVE-2025-47399 is a classic buffer overflow vulnerability (CWE-120) identified in Qualcomm Snapdragon chipsets, including models such as Cologne, FastConnect 7800, and various WSA and X-series components. The flaw occurs during the processing of IOCTL calls intended to update sensor property settings, where the input parameters are not properly checked for size, leading to memory corruption. This vulnerability can be triggered by a local attacker with limited privileges (PR:L) without requiring user interaction (UI:N). The improper bounds checking allows an attacker to overwrite memory regions, potentially leading to arbitrary code execution, privilege escalation, or system crashes. The vulnerability affects confidentiality, integrity, and availability, as indicated by the CVSS vector (C:H/I:H/A:H). Although no known exploits have been reported in the wild, the vulnerability's nature and impact make it a critical concern for devices relying on affected Snapdragon chipsets. The vulnerability was reserved in May 2025 and published in February 2026, with no patches currently linked, indicating that mitigation efforts should be prioritized once vendor updates are released.

Potential Impact

For European organizations, this vulnerability poses significant risks, especially those relying on mobile devices, embedded systems, or IoT devices powered by affected Qualcomm Snapdragon chipsets. Exploitation could allow attackers to gain elevated privileges, execute arbitrary code, or cause denial of service, compromising sensitive data and disrupting critical operations. Sectors such as telecommunications, finance, healthcare, and manufacturing, which heavily depend on mobile and IoT technologies, could face operational and reputational damage. The local attack vector means that attackers need some level of access to the device, which could be achieved through physical access or by compromising less privileged user accounts. The high impact on confidentiality, integrity, and availability underscores the potential for severe breaches and system failures. Additionally, the widespread use of Snapdragon chipsets in consumer and enterprise devices across Europe increases the attack surface, making this a pressing security concern.

Mitigation Recommendations

1. Monitor Qualcomm's official channels for patches addressing CVE-2025-47399 and apply them promptly once available. 2. Restrict access to IOCTL interfaces related to sensor property settings by enforcing strict access controls and limiting permissions to trusted processes only. 3. Employ runtime security mechanisms such as stack canaries, address space layout randomization (ASLR), and control-flow integrity (CFI) to mitigate exploitation risks. 4. Conduct thorough security audits and code reviews of custom drivers or software interacting with affected chipsets to identify and remediate unsafe input handling. 5. Implement endpoint detection and response (EDR) solutions capable of detecting anomalous behavior indicative of exploitation attempts. 6. Educate users and administrators about the risks of local privilege escalation vulnerabilities and enforce strong physical security controls to prevent unauthorized device access. 7. For organizations deploying IoT devices, ensure firmware integrity verification and secure update mechanisms are in place to facilitate timely patching.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.276Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6980c319f9fa50a62f48b5f3

Added to database: 2/2/2026, 3:30:33 PM

Last enriched: 2/2/2026, 3:44:40 PM

Last updated: 2/2/2026, 5:19:32 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats