CVE Alert: CVE-2025-47361 – Qualcomm, Inc. – Snapdragon

CVE-2025-47361

HIGHNo exploitation known

Memory corruption when triggering a subsystem crash with an out-of-range identifier.

CVSS v3.1 (7.8)
AV LOCAL · AC LOW · PR LOW · UI NONE · S UNCHANGED
Vendor
Qualcomm, Inc.
Product
Snapdragon
Versions
QAM8255P | QAM8295P | QAM8620P | QAM8650P | QAM8775P | QAMSRV1H | QAMSRV1M | QCA6574AU | QCA6595 | QCA6595AU | QCA6688AQ | QCA6696 | QCA6698AQ | QCA6797AQ | QCA8695AU | SA7255P | SA7775P | SA8255P | SA8295P | SA8540P | SA8620P | SA8650P | SA8770P | SA8775P | SA9000P | SRV1H | SRV1L | SRV1M
CWE
CWE-129, CWE-129 Improper Validation of Array Index
Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Published
2025-11-04T03:19:19.924Z
Updated
2025-11-04T03:19:19.924Z

AI Summary Analysis

Risk verdict

High severity local memory corruption vulnerability; patch promptly when a fix is available, with urgency if exploitation becomes observable.

Why this matters

Exploitation requires local access with low privileges and no user interaction, but the impact can be a crash or corruption of critical in-vehicle subsystems and data. In automotive contexts, such misuse can degrade safety‑critical functions or enable lateral movement within the same trust boundary, especially on QNX‑based Snapdragon Auto platforms.

Most likely attack path

An attacker with local access could trigger the issue by sending input containing an out‑of‑range identifier to a subsystem function that performs array indexing. The lack of user interaction means automated or device‑internal exploit paths are plausible, potentially causing a crash or state corruption without privilege escalation beyond the initial foothold. Scope is unchanged, so damage remains within the affected subsystem rather than cross‑domain.

Who is most exposed

Vehicles deploying Qualcomm Snapdragon Auto platforms with QNX‑based automotive software are most exposed, particularly infotainment and domain controller subsystems that expose array‑indexing interfaces to internal components.

Detection ideas

  • Subsystem crashes or watchdog resets linked to out‑of‑range indices in memory access paths.
  • Memory corruption crash dumps or stack traces pointing to array indexing code.
  • Anomalous locally generated IPC/API calls carrying invalid IDs.
  • Repetitive crash or fault events initiated without user interaction.
  • Unusual memory access patterns in crash and diagnostic logs.

Mitigation and prioritisation

  • Apply the vendor’s November 2025 security bulletin patch to all affected components; schedule via standard OTA or service campaigns.
  • Implement compensating controls: restrict local component access to trusted processes, segment IPC endpoints, disable unused services, enable memory safety monitoring.
  • Change-management: validate in a safe testbed for safety-critical subsystems before deployment; plan phased rollout in vehicles with rollback capabilities.
  • Verification: confirm patch removes observed crash patterns in test scenarios; run regression tests for safety‑relevant functions.
  • Prioritisation: treat as priority 1 if KEV is true or EPSS ≥ 0.5; otherwise proceed with prompt remediation based on vehicle exposure and patch availability.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features