CVE Alert: CVE-2025-21476 – Qualcomm, Inc. – Snapdragon

CVE-2025-21476

HIGHNo exploitation known

Memory corruption when passing parameters to the Trusted Virtual Machine during the handshake.

CVSS v3.1 (7.8)
AV LOCAL · AC LOW · PR LOW · UI NONE · S UNCHANGED
Vendor
Qualcomm, Inc.
Product
Snapdragon
Versions
QCM5430 | QCM6490 | QCM8550 | QCS5430 | QCS615 | QCS6490 | QCS8550 | QCS9100 | SG8275 | SG8275P | SM6650 | SM7635 | SM7675 | SM7675P | SM8550 | SM8550P | SM8635 | SM8635P | SM8650 | SM8650P | SM8650Q | SM8750 | SM8750P | SXR2330P | QCA6391 | QCA6698AQ | QCN9011 | QCN9012 | QCN9274 | WCN3910 | WCN3950 | WCN6650 | WCN6750 | WCN6755 | WCN6855 | WCN6856 | WCN7850 | WCN7851 | WCN7860 | WCN7861 | WCN7880 | WCN7881
CWE
CWE-120, CWE-120 Buffer Copy Without Checking Size of Input (‘Classic Buffer Overflow’)
Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Published
2025-09-24T15:33:26.225Z
Updated
2025-09-24T15:33:26.225Z

AI Summary Analysis

Risk verdict

High risk of local memory corruption in the Trusted Virtual Machine during handshake, with potential full device compromise; exploitation requires local access and no user interaction.

Why this matters

Snapdragon TEEs are widespread across mobile and IoT deployments; an attacker with local foothold could escalate privileges, exfiltrate data, or disrupt services. The high impact across confidentiality, integrity and availability means substantial business risk for devices relying on these components.

Most likely attack path

Preconditions are local access to the device and low privileges; no user interaction is required. An attacker could trigger the TEE handshake to induce a buffer overflow, potentially escaping to the OS/kernel and gaining persistent control or data access.

Who is most exposed

Devices using Qualcomm Snapdragon SoCs in mobile, consumer IoT and industrial units, especially where TrustZone/TEE-backed secure operations are relied upon.

Detection ideas

  • Recurrent TrustZone/TEE faults or kernel panics linked to handshake activity
  • Crash dumps or memory corruption errors referencing handshake/TEE code
  • Unusual or repeated handshake failures without obvious user action
  • Anomalous local processes attempting handshake interactions
  • Correlated device reboot loops or degraded service following handshake attempts

Mitigation and prioritisation

  • Apply vendor firmware/driver updates via OTA as soon as available
  • Restrict local access and tighten app privileges affecting the handshake surface
  • Enable strict input validation and tamper-evident logging around TEE interactions
  • Monitor for TrustZone/TEE faults and collect memory crash dumps for analysis
  • Plan staged change-management rollout with testing and a backout path; document risk and update schedules
  • Treat as high-priority due to CVSS 7.8 and potential impact when patched (no KEV/EPSS indicators provided)

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.