Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47402: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon

0
Medium
VulnerabilityCVE-2025-47402cvecve-2025-47402cwe-126
Published: Mon Feb 02 2026 (02/02/2026, 15:20:47 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Transient DOS when processing a received frame with an excessively large authentication information element.

AI-Powered Analysis

AILast updated: 02/02/2026, 15:47:20 UTC

Technical Analysis

CVE-2025-47402 is a buffer over-read vulnerability classified under CWE-126 found in multiple Qualcomm Snapdragon chipsets and wireless connectivity platforms. The issue arises when the affected device processes a received frame containing an authentication information element that is excessively large, leading to transient denial of service (DoS). This vulnerability does not require any privileges or user interaction to exploit but requires the attacker to be within network range to send crafted frames. The flaw impacts the availability of the affected systems by causing temporary service disruption or device instability during frame processing. The vulnerability affects a broad spectrum of Qualcomm products, including Snapdragon mobile platforms (e.g., Snapdragon 8 Gen 3, Snapdragon 8 Elite), FastConnect wireless subsystems, various QCA and QCN series chipsets, and several audio and modem components. The CVSS v3.1 base score is 6.5 (medium severity), reflecting the ease of exploitation (adjacent network), lack of required privileges or user interaction, and the impact limited to availability without compromising confidentiality or integrity. No patches are currently linked, and no known exploits have been reported in the wild, indicating the vulnerability is newly disclosed. The vulnerability could be leveraged by attackers to disrupt wireless communications temporarily, impacting mobile devices, IoT endpoints, and embedded systems using these chipsets.

Potential Impact

For European organizations, the primary impact of CVE-2025-47402 is the potential for transient denial of service on devices utilizing affected Qualcomm Snapdragon chipsets. This can disrupt wireless connectivity, affecting mobile communications, IoT device operations, and embedded systems critical to business processes. Industries relying heavily on wireless infrastructure, such as telecommunications, manufacturing automation, healthcare devices, and smart city deployments, may experience service interruptions. Although the vulnerability does not compromise data confidentiality or integrity, availability disruptions can lead to operational downtime, reduced productivity, and potential safety risks in critical environments. The widespread use of Snapdragon components in smartphones, tablets, automotive systems, and industrial IoT devices across Europe increases the attack surface. Organizations with large mobile workforces or those deploying Snapdragon-based IoT solutions should be particularly vigilant. The lack of known exploits currently limits immediate risk, but the medium severity score and broad device impact necessitate proactive mitigation to prevent future exploitation.

Mitigation Recommendations

1. Monitor Qualcomm and device vendor advisories for official patches addressing CVE-2025-47402 and apply them promptly once available. 2. Implement network-level filtering to detect and block malformed or oversized authentication information elements in wireless frames, reducing exposure to crafted packets. 3. Employ wireless intrusion detection/prevention systems (WIDS/WIPS) to monitor for anomalous frame patterns indicative of exploitation attempts. 4. Segment critical wireless networks and restrict access to trusted devices to minimize the attack surface. 5. For enterprise-managed mobile devices, enforce security policies that limit exposure to untrusted wireless networks. 6. Collaborate with device manufacturers to verify firmware updates include fixes for this vulnerability. 7. Conduct regular security assessments of wireless infrastructure to identify and remediate vulnerable devices. 8. Educate IT and security teams about this vulnerability to ensure rapid response to any signs of exploitation. 9. In environments where patching is delayed, consider temporary disabling or limiting wireless features that process authentication information elements if feasible. 10. Maintain updated asset inventories to identify all devices with affected Qualcomm components for targeted mitigation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2025-05-06T08:33:16.277Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6980c31af9fa50a62f48b600

Added to database: 2/2/2026, 3:30:34 PM

Last enriched: 2/2/2026, 3:47:20 PM

Last updated: 2/2/2026, 4:50:14 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats