CVE Alert: CVE-2025-47347 – Qualcomm, Inc. – Snapdragon

CVE-2025-47347

HIGHNo exploitation known

Memory corruption while processing control commands in the virtual memory management interface.

CVSS v3.1 (7.8)
AV LOCAL · AC LOW · PR LOW · UI NONE · S UNCHANGED
Vendor
Qualcomm, Inc.
Product
Snapdragon
Versions
QAM8255P | QAM8295P | QAM8620P | QAM8650P | QAM8775P | QAMSRV1H | QAMSRV1M | QCA6574A | QCA6574AU | QCA6595 | QCA6595AU | QCA6688AQ | QCA6696 | QCA6698AQ | QCA6797AQ | SA6145P | SA6150P | SA6155 | SA6155P | SA7255P | SA7775P | SA8145P | SA8150P | SA8155 | SA8155P | SA8195P | SA8255P | SA8295P | SA8540P | SA8620P | SA8650P | SA8770P | SA8775P | SA9000P | SRV1H | SRV1L | SRV1M
CWE
CWE-121, CWE-121 Stack-based Buffer Overflow
Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Published
2025-10-09T03:18:11.938Z
Updated
2025-10-09T14:07:42.657Z

AI Summary Analysis

Risk verdict

High potential impact due to memory corruption in a VM memory management interface, but currently no publicly observed exploitation activity.

Why this matters

If exploited, an attacker with local access could escalate to arbitrary code execution within the automotive software stack, potentially affecting safety-critical functions or privacy. In deployed fleets using automotive SoCs with a QNX-based stack, this can enable persistent control-plane disruption or stealthy device compromise, especially where maintenance or diagnostic interfaces are physically accessible.

Most likely attack path

Exploitation requires local access (local attacker) with low privileges and no user interaction, targeting the VM memory management component via control commands. The low attack complexity raises feasibility for adversaries with physical access or compromised service environments; unchanged scope indicates the attacker would likely operate within the same device boundary, limiting cross-ECU movement unless additional flaws exist.

Who is most exposed

Vehicles and fleets that rely on mass-market automotive SoCs with a QNX-based stack, especially where maintenance dashboards or diagnostic interfaces are accessible or poorly segmented. Organizations with public-facing or physically accessible engineering interfaces are at greater risk.

Detection ideas

  • Frequent VM memory management faults or kernel-level crashes.
  • Memory corruption crash dumps showing stack-based overflow patterns.
  • Abnormal sequences of control commands to the VM interface triggering faults.
  • Elevated memory access events or unusual privilege transitions in local logs.
  • Anomalous, repeatable fault bursts during diagnostic or control-command activity.

Mitigation and prioritisation

  • Apply vendor-provided firmware/driver updates as soon as available; align with the October 2025 advisory cadence.
  • Enforce strict local access controls: segment diagnostic interfaces, require authentication, and limit privileged commands to trusted operators.
  • Disable or tightly gate non-essential control channels to the VM memory manager; implement input validation and sanity checks.
  • Monitor crash analytics and memory corruption indicators; establish alerting for repeated VM faults.
  • If patching is delayed, implement compensating controls and document a remediation timeline; treat as priority 2 unless a KEV/EPSS update elevates it.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.