CVE Alert: CVE-2025-47326 – Qualcomm, Inc. – Snapdragon
CVE-2025-47326
Transient DOS while handling command data during power control processing.
AI Summary Analysis
Risk verdict
High risk of remote denial-of-service via the WLAN subsystem, with no user interaction or privileges required; urgency depends on exploitation activity not currently confirmed in KEV/EPSS data.
Why this matters
A transient DoS on the WLAN stack can disable network connectivity for numerous devices in business and consumer deployments, leading to degraded communications, disrupted IoT operations, and potential impact on critical services relying on wireless access.
Most likely attack path
An attacker on the same network can trigger the vulnerability by sending crafted command data to the WLAN handling component, exploiting network access with no authentication. The impact is a DoS during power-control processing, described as transient and primarily affecting availability.
Who is most exposed
Devices using Qualcomm-supplied WLAN IP across mobile, industrial IoT, and embedded networking platforms are at risk, including smartphones, IoT gateways, and enterprise access devices that rely on the affected HAL in real deployments.
Detection ideas
- Spikes in WLAN outages or device reboots linked to wireless activity
- Logs showing WLAN HAL crashes or watchdog resets during connectivity events
- Unusual power-management or command-processing thread activity around wireless events
- Anomalous traffic patterns or command data sequences hitting the WLAN path
Mitigation and prioritisation
- Apply the latest firmware/driver update from the vendor; treat as high priority when patch becomes available
- Implement network segmentation and rate-limiting to limit exposure of WLAN services
- Monitor for DoS-like signals and establish alerting on WLAN HAL instability
- Validate changes in a lab before deployment and schedule patching during a maintenance window
- Contingency: have alternative connectivity paths or disable affected features if feasible
Note: If KEV is true or EPSS ≥ 0.5, treat as priority 1. Data not provided in this instance.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.