CVE Alert: CVE-2025-27077 – Qualcomm, Inc. – Snapdragon

CVE-2025-27077

HIGHNo exploitation known

Memory corruption while processing message in guest VM.

CVSS v3.1 (7.8)
AV LOCAL · AC LOW · PR LOW · UI NONE · S UNCHANGED
Vendor
Qualcomm, Inc.
Product
Snapdragon
Versions
QAM8255P | QAM8295P | QAM8620P | QAM8650P | QAM8775P | QAMSRV1H | QAMSRV1M | QCA6574AU | QCA6595 | QCA6595AU | QCA6688AQ | QCA6696 | QCA6698AQ | QCA6797AQ | SA7255P | SA7775P | SA8255P | SA8295P | SA8540P | SA8620P | SA8650P | SA8770P | SA8775P | SA9000P | SRV1H | SRV1L | SRV1M
CWE
CWE-416, CWE-416 Use After Free
Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Published
2025-09-24T15:33:44.799Z
Updated
2025-09-24T15:33:44.799Z

AI Summary Analysis

Risk verdict

High risk with local exploitation potential; immediate attention warranted, subject to confirmation of KEV/EPSS indicators (see mitigation notes).

Why this matters

The flaw permits memory corruption from locally triggered input within a guest VM, with high impact to confidentiality, integrity and availability. In automotive contexts, exploitation could affect safety‑critical or backend VM functions, potentially disrupting operations or exposing sensitive data during vehicle maintenance or servicing.

Most likely attack path

An attacker with local access to the platform could craft inputs to the guest VM’s messaging path to trigger the vulnerability. Given low attack complexity, low privileges required and no UI interaction, automated abuse within the module is plausible. Because the scope is unchanged, the impact is contained within the affected security domain, though that domain may house critical processes.

Who is most exposed

Vehicles deploying Snapdragon Automotive platforms with QNX guest VMs and exposed local interfaces (diagnostics, maintenance, OT portals) are at greatest risk, especially where local access controls are weak or maintenance workflows are insecure.

Detection ideas

  • Crashes, kernel or user-space memory faults in the guest VM; crash dumps or panics.
  • Unusual or malformed messages processed by the guest VM; increased message latency or rejection patterns.
  • Memory allocator errors or heap corruption signs in VM logs.
  • Repeated restart of the guest VM or related watchdog alerts following specific messages.
  • Anomalous access patterns to memory regions previously freed.

Mitigation and prioritisation

  • Apply vendor firmware/OS updates for the affected Snapdragon/QNX stack as soon as available; prioritise patching in test-sandboxes before rollout.
  • If KEV is true or EPSS ≥ 0.5, treat as Priority 1; otherwise escalate to high priority with a fixed patch window.
  • Enforce strict local-access controls; minimize exposed maintenance interfaces; segment the guest VM from critical domains.
  • Implement input validation and memory-safety hardening in the messaging path; enable memory-sanitising or fault-tolerance features if supported.
  • Coordinate with safety certs and change-management to validate fixes in vehicle simulations and field tests.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.