CVE-2025-47402: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon
Transient DOS when processing a received frame with an excessively large authentication information element.
AI Analysis
Technical Summary
CVE-2025-47402 is a buffer over-read vulnerability classified under CWE-126 found in multiple Qualcomm Snapdragon chipsets and wireless connectivity platforms. The issue arises when the affected device processes a received frame containing an authentication information element that is excessively large, leading to transient denial of service (DoS). This vulnerability does not require any privileges or user interaction to exploit but requires the attacker to be within network range to send crafted frames. The flaw impacts the availability of the affected systems by causing temporary service disruption or device instability during frame processing. The vulnerability affects a broad spectrum of Qualcomm products, including Snapdragon mobile platforms (e.g., Snapdragon 8 Gen 3, Snapdragon 8 Elite), FastConnect wireless subsystems, various QCA and QCN series chipsets, and several audio and modem components. The CVSS v3.1 base score is 6.5 (medium severity), reflecting the ease of exploitation (adjacent network), lack of required privileges or user interaction, and the impact limited to availability without compromising confidentiality or integrity. No patches are currently linked, and no known exploits have been reported in the wild, indicating the vulnerability is newly disclosed. The vulnerability could be leveraged by attackers to disrupt wireless communications temporarily, impacting mobile devices, IoT endpoints, and embedded systems using these chipsets.
Potential Impact
For European organizations, the primary impact of CVE-2025-47402 is the potential for transient denial of service on devices utilizing affected Qualcomm Snapdragon chipsets. This can disrupt wireless connectivity, affecting mobile communications, IoT device operations, and embedded systems critical to business processes. Industries relying heavily on wireless infrastructure, such as telecommunications, manufacturing automation, healthcare devices, and smart city deployments, may experience service interruptions. Although the vulnerability does not compromise data confidentiality or integrity, availability disruptions can lead to operational downtime, reduced productivity, and potential safety risks in critical environments. The widespread use of Snapdragon components in smartphones, tablets, automotive systems, and industrial IoT devices across Europe increases the attack surface. Organizations with large mobile workforces or those deploying Snapdragon-based IoT solutions should be particularly vigilant. The lack of known exploits currently limits immediate risk, but the medium severity score and broad device impact necessitate proactive mitigation to prevent future exploitation.
Mitigation Recommendations
1. Monitor Qualcomm and device vendor advisories for official patches addressing CVE-2025-47402 and apply them promptly once available. 2. Implement network-level filtering to detect and block malformed or oversized authentication information elements in wireless frames, reducing exposure to crafted packets. 3. Employ wireless intrusion detection/prevention systems (WIDS/WIPS) to monitor for anomalous frame patterns indicative of exploitation attempts. 4. Segment critical wireless networks and restrict access to trusted devices to minimize the attack surface. 5. For enterprise-managed mobile devices, enforce security policies that limit exposure to untrusted wireless networks. 6. Collaborate with device manufacturers to verify firmware updates include fixes for this vulnerability. 7. Conduct regular security assessments of wireless infrastructure to identify and remediate vulnerable devices. 8. Educate IT and security teams about this vulnerability to ensure rapid response to any signs of exploitation. 9. In environments where patching is delayed, consider temporary disabling or limiting wireless features that process authentication information elements if feasible. 10. Maintain updated asset inventories to identify all devices with affected Qualcomm components for targeted mitigation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland, Belgium
CVE-2025-47402: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon
Description
Transient DOS when processing a received frame with an excessively large authentication information element.
AI-Powered Analysis
Technical Analysis
CVE-2025-47402 is a buffer over-read vulnerability classified under CWE-126 found in multiple Qualcomm Snapdragon chipsets and wireless connectivity platforms. The issue arises when the affected device processes a received frame containing an authentication information element that is excessively large, leading to transient denial of service (DoS). This vulnerability does not require any privileges or user interaction to exploit but requires the attacker to be within network range to send crafted frames. The flaw impacts the availability of the affected systems by causing temporary service disruption or device instability during frame processing. The vulnerability affects a broad spectrum of Qualcomm products, including Snapdragon mobile platforms (e.g., Snapdragon 8 Gen 3, Snapdragon 8 Elite), FastConnect wireless subsystems, various QCA and QCN series chipsets, and several audio and modem components. The CVSS v3.1 base score is 6.5 (medium severity), reflecting the ease of exploitation (adjacent network), lack of required privileges or user interaction, and the impact limited to availability without compromising confidentiality or integrity. No patches are currently linked, and no known exploits have been reported in the wild, indicating the vulnerability is newly disclosed. The vulnerability could be leveraged by attackers to disrupt wireless communications temporarily, impacting mobile devices, IoT endpoints, and embedded systems using these chipsets.
Potential Impact
For European organizations, the primary impact of CVE-2025-47402 is the potential for transient denial of service on devices utilizing affected Qualcomm Snapdragon chipsets. This can disrupt wireless connectivity, affecting mobile communications, IoT device operations, and embedded systems critical to business processes. Industries relying heavily on wireless infrastructure, such as telecommunications, manufacturing automation, healthcare devices, and smart city deployments, may experience service interruptions. Although the vulnerability does not compromise data confidentiality or integrity, availability disruptions can lead to operational downtime, reduced productivity, and potential safety risks in critical environments. The widespread use of Snapdragon components in smartphones, tablets, automotive systems, and industrial IoT devices across Europe increases the attack surface. Organizations with large mobile workforces or those deploying Snapdragon-based IoT solutions should be particularly vigilant. The lack of known exploits currently limits immediate risk, but the medium severity score and broad device impact necessitate proactive mitigation to prevent future exploitation.
Mitigation Recommendations
1. Monitor Qualcomm and device vendor advisories for official patches addressing CVE-2025-47402 and apply them promptly once available. 2. Implement network-level filtering to detect and block malformed or oversized authentication information elements in wireless frames, reducing exposure to crafted packets. 3. Employ wireless intrusion detection/prevention systems (WIDS/WIPS) to monitor for anomalous frame patterns indicative of exploitation attempts. 4. Segment critical wireless networks and restrict access to trusted devices to minimize the attack surface. 5. For enterprise-managed mobile devices, enforce security policies that limit exposure to untrusted wireless networks. 6. Collaborate with device manufacturers to verify firmware updates include fixes for this vulnerability. 7. Conduct regular security assessments of wireless infrastructure to identify and remediate vulnerable devices. 8. Educate IT and security teams about this vulnerability to ensure rapid response to any signs of exploitation. 9. In environments where patching is delayed, consider temporary disabling or limiting wireless features that process authentication information elements if feasible. 10. Maintain updated asset inventories to identify all devices with affected Qualcomm components for targeted mitigation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- qualcomm
- Date Reserved
- 2025-05-06T08:33:16.277Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6980c31af9fa50a62f48b600
Added to database: 2/2/2026, 3:30:34 PM
Last enriched: 2/2/2026, 3:47:20 PM
Last updated: 2/2/2026, 4:50:14 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1232: CWE-693 in BeyondTrust Privilege management for Windows
MediumCVE-2025-47399: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qualcomm, Inc. Snapdragon
HighCVE-2025-47398: CWE-416 Use After Free in Qualcomm, Inc. Snapdragon
HighCVE-2025-47397: CWE-401 Improper Release of Memory Before Removing Last Reference ('Memory Leak') in Qualcomm, Inc. Snapdragon
HighCVE-2025-47366: CWE-749: Exposed Dangerous Method or Function in Qualcomm, Inc. Snapdragon
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.