CVE Alert: CVE-2025-21484 – Qualcomm, Inc. – Snapdragon

CVE-2025-21484

HIGHNo exploitation known

Information disclosure when UE receives the RTP packet from the network, while decoding and reassembling the fragments from RTP packet.

CVSS v3.1 (8.2)
AV NETWORK · AC LOW · PR NONE · UI NONE · S UNCHANGED
Vendor
Qualcomm, Inc.
Product
Snapdragon
Versions
APQ8064AU | AQT1000 | FastConnect 6200 | FastConnect 6700 | FastConnect 6800 | FastConnect 6900 | FastConnect 7800 | MSM8108 | MSM8209 | MSM8608 | MSM8996AU | QAM8255P | QAM8295P | QAM8650P | QAM8775P | QCA6310 | QCA6320 | QCA6335 | QCA6391 | QCA6420 | QCA6426 | QCA6430 | QCA6436 | QCA6564 | QCA6564A | QCA6564AU | QCA6574 | QCA6574A | QCA6574AU | QCA6595 | QCA6595AU | QCA6678AQ | QCA6688AQ | QCA6696 | QCA6698AQ | QCA6698AU | QCA6797AQ | QCM4490 | QCM5430 | QCM6125 | QCM6490 | QCS410 | QCS4490 | QCS5430 | QCS610 | QCS6125 | QCS6490 | Qualcomm 205 Mobile Platform | Qualcomm 215 Mobile Platform | Qualcomm Video Collaboration VC1 Platform | Qualcomm Video Collaboration VC3 Platform | Robotics RB3 Platform | SA4150P | SA4155P | SA6145P | SA6150P | SA6155 | SA6155P | SA7255P | SA7775P | SA8145P | SA8150P | SA8155 | SA8155P | SA8195P | SA8255P | SA8295P | SA8620P | SA8650P | SA8770P | SA8775P | SA9000P | SD626 | SD660 | SD730 | SD835 | SD855 | SD865 5G | SDM429W | SDX55 | SG4150P | SM4125 | SM6250 | SM6370 | SM7250P | SM8750 | SM8750P | SM8850 | SM8850P | Smart Audio 200 Platform | Smart Display 200 Platform (APQ5053-AA) | Snapdragon 208 Processor | Snapdragon 210 Processor | Snapdragon 212 Mobile Platform | Snapdragon 4 Gen 1 Mobile Platform | Snapdragon 429 Mobile Platform | Snapdragon 460 Mobile Platform | Snapdragon 480 5G Mobile Platform | Snapdragon 480+ 5G Mobile Platform (SM4350-AC) | Snapdragon 625 Mobile Platform | Snapdragon 626 Mobile Platform | Snapdragon 660 Mobile Platform | Snapdragon 662 Mobile Platform | Snapdragon 675 Mobile Platform | Snapdragon 678 Mobile Platform (SM6150-AC) | Snapdragon 680 4G Mobile Platform | Snapdragon 685 4G Mobile Platform (SM6225-AD) | Snapdragon 690 5G Mobile Platform | Snapdragon 695 5G Mobile Platform | Snapdragon 720G Mobile Platform | Snapdragon 730 Mobile Platform (SM7150-AA) | Snapdragon 730G Mobile Platform (SM7150-AB) | Snapdragon 732G Mobile Platform (SM7150-AC) | Snapdragon 750G 5G Mobile Platform | Snapdragon 765 5G Mobile Platform (SM7250-AA) | Snapdragon 765G 5G Mobile Platform (SM7250-AB) | Snapdragon 768G 5G Mobile Platform (SM7250-AC) | Snapdragon 8 Gen 3 Mobile Platform | Snapdragon 8+ Gen 1 Mobile Platform | Snapdragon 820 Automotive Platform | Snapdragon 835 Mobile PC Platform | Snapdragon 845 Mobile Platform | Snapdragon 855 Mobile Platform | Snapdragon 855+/860 Mobile Platform (SM8150-AC) | Snapdragon 865 5G Mobile Platform | Snapdragon 865+ 5G Mobile Platform (SM8250-AB) | Snapdragon 870 5G Mobile Platform (SM8250-AC) | Snapdragon W5+ Gen 1 Wearable Platform | Snapdragon X50 5G Modem-RF System | Snapdragon X55 5G Modem-RF System | Snapdragon XR1 Platform | Snapdragon XR2 5G Platform | Snapdragon XR2+ Gen 1 Platform | SW5100 | SW5100P | SXR1120 | SXR2130 | Vision Intelligence 100 Platform (APQ8053-AA) | Vision Intelligence 200 Platform (APQ8053-AC) | Vision Intelligence 300 Platform | Vision Intelligence 400 Platform | WCD9326 | WCD9335 | WCD9340 | WCD9341 | WCD9370 | WCD9375 | WCD9380 | WCD9385 | WCD9390 | WCD9395 | WCN3610 | WCN3615 | WCN3620 | WCN3660B | WCN3680B | WCN3910 | WCN3950 | WCN3980 | WCN3988 | WCN3990 | WCN7860 | WCN7861 | WCN7880 | WCN7881 | WSA8810 | WSA8815 | WSA8830 | WSA8832 | WSA8835 | WSA8840 | WSA8845 | WSA8845H
CWE
CWE-126, CWE-126 Buffer Over-read
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L
Published
2025-09-24T15:33:32.879Z
Updated
2025-09-24T15:33:32.879Z

AI Summary Analysis

Risk verdict

High risk of remote information disclosure via the Qualcomm Snapdragon data network stack; no user interaction required, so exposure is scalable across network-connected devices.

Why this matters

The flaw enables an attacker to read memory contents by manipulating RTP traffic, potentially exposing sensitive data across mobile, automotive, IoT and other Snapdragon-enabled platforms. In practice, this could support targeted data exfiltration or reconnaissance across devices in enterprise or consumer environments.

Most likely attack path

An attacker ships crafted RTP streams to vulnerable devices over the network to trigger a buffer over-read. With privileges required being none and user interaction not needed, exploitation could occur at scale where RTP is processed during normal media delivery, subject to the victim device’s scope and network exposure.

Who is most exposed

Any deployment with exposed RTP-enabled network services on Snapdragon-based platforms—mobile, automotive, IoT, wearables and related connectivity stacks—across consumer and industrial environments.

Detection ideas

  • Monitor for abnormal RTP fragmentation/reassembly errors and unusual memory access patterns in runtime logs.
  • Look for spikes in memory-read indicators or device reboots/crashes tied to RTP processing.
  • Correlate network traffic to identify floods or crafted RTP streams targeting Snapdragon-enabled endpoints.
  • Instrument RTP handling modules for boundary checks and unusual payload sizes.
  • Validate vendor advisories and firmware telemetry for unexpected RTP-related exceptions.

Mitigation and prioritisation

  • Apply vendor security bulletin updates and deploy patched firmware where available; prioritise vulnerable device classes.
  • Implement network controls to restrict RTP access to trusted segments and devices; segment vulnerable endpoints from sensitive assets.
  • Disable or harden RTP fragmentation/reassembly pathways if feasible; enforce strict input validation at network edge.
  • Develop compensating controls and test patches in staging before broader rollout; track progress in change-management records.
  • If KEV is present or EPSS ≥ 0.5, treat as priority 1; otherwise, prioritise promptly given the network-exposed, high-impact nature.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.