CVE Alert: CVE-2025-21482 – Qualcomm, Inc. – Snapdragon

CVE-2025-21482

HIGHNo exploitation known

Cryptographic issue while performing RSA PKCS padding decoding.

CVSS v3.1 (7.1)
AV LOCAL · AC LOW · PR LOW · UI NONE · S UNCHANGED
Vendor
Qualcomm, Inc.
Product
Snapdragon
Versions
315 5G IoT Modem | 9205 LTE Modem | 9206 LTE Modem | 9207 LTE Modem | APQ8017 | APQ8037 | APQ8064AU | APQ8092 | APQ8094 | AQT1000 | AR3012 | AR7420 | AR8031 | AR8035 | AR9380 | C-V2X 9150 | CSR8811 | CSRA6620 | CSRA6640 | CSRB31024 | FastConnect 6200 | FastConnect 6700 | FastConnect 6800 | FastConnect 6900 | FastConnect 7800 | Flight RB5 5G Platform | FSM9900 | FSM9905 | FSM9910 | FSM9915 | FSM9916 | FSM9950 | FSM9955 | Home Hub 100 Platform | Immersive Home 214 Platform | Immersive Home 216 Platform | Immersive Home 316 Platform | Immersive Home 318 Platform | Immersive Home 3210 Platform | Immersive Home 326 Platform | IPQ4018 | IPQ4019 | IPQ4028 | IPQ4029 | IPQ5010 | IPQ5028 | IPQ5300 | IPQ5302 | IPQ5312 | IPQ5332 | IPQ6000 | IPQ6005 | IPQ6010 | IPQ6018 | IPQ6028 | IPQ8062 | IPQ8064 | IPQ8065 | IPQ8066 | IPQ8068 | IPQ8069 | IPQ8070 | IPQ8070A | IPQ8071 | IPQ8071A | IPQ8072 | IPQ8072A | IPQ8074 | IPQ8074A | IPQ8076 | IPQ8076A | IPQ8078 | IPQ8078A | IPQ8173 | IPQ8174 | IPQ9008 | IPQ9048 | IPQ9554 | IPQ9570 | IPQ9574 | MDM8207 | MDM9205S | MDM9250 | MDM9628 | MDM9640 | MDM9645 | MDM9650 | MSM8996AU | PM8937 | PMP8074 | Qualcomm 215 Mobile Platform | Qualcomm Video Collaboration VC1 Platform | Qualcomm Video Collaboration VC3 Platform | Qualcomm Video Collaboration VC5 Platform | QXM8083 | Robotics RB2 Platform | Robotics RB3 Platform | Robotics RB5 Platform | SA2150P | SA4150P | SA4155P | SA6145P | SA6150P | SA6155 | SA6155P | SA7255P | SA7775P | SA8145P | SA8150P | SA8155 | SA8155P | SA8195P | SA8255P | SA8295P | SA8530P | SA8540P | SA8620P | SA8650P | SA8770P | SA8775P | SA9000P | SC8180X+SDX55 | SC8380XP | SD 455 | SD 675 | SD 8 Gen1 5G | SD 8CX | SD460 | SD626 | SD660 | SD662 | SD670 | SD675 | SD730 | SD820 | SD821 | SD835 | SD855 | SD865 5G | SD888 | SDM429W | SDX20M | SDX55 | SDX57M | SDX61 | SDX65M | SDX71M | SDX80M | SG4150P | SG8275P | SM4125 | SM4635 | SM6250 | SM6250P | SM6370 | SM6650 | SM7250P | SM7315 | SM7325P | SM7635 | SM7675 | SM7675P | SM8550P | SM8635 | SM8635P | SM8650Q | SM8735 | SM8750 | SM8750P | Smart Audio 400 Platform | Smart Display 200 Platform (APQ5053-AA) | Snapdragon 1100 Wearable Platform | Snapdragon 1200 Wearable Platform | Snapdragon 4 Gen 1 Mobile Platform | Snapdragon 4 Gen 2 Mobile Platform | Snapdragon 425 Mobile Platform | Snapdragon 427 Mobile Platform | Snapdragon 429 Mobile Platform | Snapdragon 430 Mobile Platform | Snapdragon 435 Mobile Platform | Snapdragon 439 Mobile Platform | Snapdragon 450 Mobile Platform | Snapdragon 855 Mobile Platform | Snapdragon 855+/860 Mobile Platform (SM8150-AC) | Snapdragon 865 5G Mobile Platform | Snapdragon 865+ 5G Mobile Platform (SM8250-AB) | Snapdragon 870 5G Mobile Platform (SM8250-AC) | Snapdragon 888 5G Mobile Platform | Snapdragon 888+ 5G Mobile Platform (SM8350-AC) | Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite" | Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite" | Snapdragon 8cx Compute Platform (SC8180X-AA, AB) | Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro" | Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro" | Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB) | Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB) | Snapdragon AR1 Gen 1 Platform | Snapdragon AR1 Gen 1 Platform "Luna1" | Snapdragon AR2 Gen 1 Platform | Snapdragon Auto 5G Modem-RF | Snapdragon Auto 5G Modem-RF Gen 2 | Snapdragon W5+ Gen 1 Wearable Platform | Snapdragon Wear 1300 Platform | Snapdragon Wear 4100+ Platform | Snapdragon X12 LTE Modem | Snapdragon X20 LTE Modem | Snapdragon X24 LTE Modem | Snapdragon X35 5G Modem-RF System | Snapdragon X5 LTE Modem | Snapdragon X50 5G Modem-RF System | Snapdragon X55 5G Modem-RF System | Snapdragon X62 5G Modem-RF System | Snapdragon X65 5G Modem-RF System | Snapdragon X70 Modem-RF System | Snapdragon X72 5G Modem-RF System | Snapdragon X75 5G Modem-RF System | Snapdragon XR1 Platform | Snapdragon XR2 5G Platform | Snapdragon XR2+ Gen 1 Platform | Snapdragon Auto 4G Modem | SRV1H | SRV1L | SRV1M | SSG2115P | SSG2125P | SW5100 | SW5100P | SXR1120 | SXR1230P | SXR2130 | SXR2230P | SXR2250P | SXR2330P | TalynPlus | Vision Intelligence 100 Platform (APQ8053-AA) | Vision Intelligence 200 Platform (APQ8053-AC) | Vision Intelligence 300 Platform | Vision Intelligence 400 Platform | WCD9306 | WCD9326 | WCD9330 | WCD9335 | WCD9340 | WCD9341 | WCD9360 | WCD9370 | WCD9371 | WCD9375 | WCD9378 | WCD9380 | WCD9385 | WCD9390 | WCD9395 | WCN3610 | WCN3615 | WCN3620 | WCN3660 | WCN3660B | WCN3680 | WCN3680B | WCN3910 | WCN3950 | WCN3980 | WCN3988 | WCN3990 | WCN3999 | WCN6450 | WCN6650 | WCN6740 | WCN6755 | WCN7750 | WCN7860 | WCN7861 | WCN7880 | WCN7881 | WSA8810 | WSA8815 | WSA8830 | WSA8832 | WSA8835 | WSA8840 | WSA8845 | WSA8845H
CWE
CWE-310, CWE-310 Cryptographic Issues
Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Published
2025-09-24T15:33:29.640Z
Updated
2025-09-24T15:33:29.640Z

AI Summary Analysis

Risk verdict

High risk: a cryptographic issue in RSA PKCS padding decoding on Qualcomm Snapdragon platforms could affect confidentiality and integrity, with exploitation feasible from local access; remediation should be pursued promptly.

Why this matters

Critical cryptographic weakness in widely deployed system-on-chips may enable leakage of decrypted data or tampered data within affected devices. The broad product family spans mobile, automotive, IoT and embedded devices, increasing the potential blast radius across customer fleets, supply chains and end-user endpoints.

Most likely attack path

An attacker with local access and low privileges could trigger vulnerable RSA PKCS padding handling to glean information or corrupt cryptographic outcomes. The absence of user interaction lowers barriers once initial foothold is gained, and the attack remains contained to the compromised device unless exposed crypto materials or keys are exfiltrated for broader abuse.

Who is most exposed

Any deployment using Qualcomm Snapdragon cryptographic libraries across mobile, automotive, IoT and wearables is affected; the breadth of platforms implies both consumer devices and industrial/vehicle systems are at risk.

Detection ideas

  • Monitor cryptographic library errors focusing on RSA PKCS padding decode failures.
  • Look for abnormal spikes in cryptographic operations or relays to the RSA path.
  • Track crashes or exceptions in security modules tied to PKCS decoding.
  • Correlate with unusual data decryption or integrity-check failures on affected platforms.
  • Review logs for repeated, failed padding checks from local processes.

Mitigation and prioritisation

  • Apply vendor advisories and update affected Snapdragon components to patched releases; coordinate with device firmware/hardware teams for timely deployment.
  • If patches are unavailable, implement compensating controls: restrict physical access, enforce robust device hardening, disable or sandbox vulnerable cryptographic pathways, and use hardware-backed key protection where feasible.
  • Initiate change-management: schedule remediation in maintenance windows, test compatibility with critical apps, and communicate timelines to stakeholders.
  • Given the CVSS impact, treat as a priority 2 in environments with high local-access risk or sensitive data handling; escalate to priority 1 if KEV or EPSS indicators later become available.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.