CVE Alert: CVE-2025-21481 – Qualcomm, Inc. – Snapdragon

CVE-2025-21481

HIGHNo exploitation known

Memory corruption while performing private key encryption in trusted application.

CVSS v3.1 (7.8)
AV LOCAL · AC LOW · PR LOW · UI NONE · S UNCHANGED
Vendor
Qualcomm, Inc.
Product
Snapdragon
Versions
315 5G IoT Modem | AQT1000 | AR8031 | AR8035 | C-V2X 9150 | CSRA6620 | CSRA6640 | FastConnect 6200 | FastConnect 6700 | FastConnect 6800 | FastConnect 6900 | FastConnect 7800 | Flight RB5 5G Platform | QAM8255P | QAM8295P | QAM8620P | QAM8650P | QAM8775P | QAMSRV1H | QAMSRV1M | QCA6174A | QCA6391 | QCA6420 | QCA6421 | QCA6426 | QCA6430 | QCA6431 | QCA6436 | QCA6574 | QCA6574A | QCA6574AU | QCA6584AU | QCA6595 | QCA6595AU | QCA6678AQ | QCA6688AQ | QCA6696 | QCA6698AQ | QCA6797AQ | QCA8081 | QCA8337 | QCC710 | QCM2290 | QCM4290 | QCM5430 | QCM6125 | QCM6490 | QCM8550 | QCN6024 | QCN6224 | QCN6274 | QCN7606 | QCN9024 | QCN9074 | QCN9274 | QCS2290 | QCS410 | QCS4290 | QCS5430 | QCS610 | QCS6125 | QCS6490 | QCS8300 | QCS8550 | QCS9100 | QDU1000 | QDU1010 | QDU1110 | QDU1210 | QDX1010 | QDX1011 | QEP8111 | QFW7114 | QFW7124 | QMP1000 | QRB5165M | QRB5165N | QRU1032 | QRU1052 | QRU1062 | QSM8250 | QSM8350 | Qualcomm Video Collaboration VC1 Platform | Qualcomm Video Collaboration VC3 Platform | Robotics RB2 Platform | Robotics RB5 Platform | SA2150P | SA4150P | SA4155P | SA6145P | SA6150P | SA6155 | SA6155P | SA7255P | SA7775P | SA8145P | SA8150P | SA8155 | SA8155P | SA8195P | SA8255P | SA8295P | SA8530P | SA8540P | SA8620P | SA8650P | SA8770P | SA8775P | SA9000P | SC8180X+SDX55 | SC8380XP | SD 675 | SD 8 Gen1 5G | SD670 | SD675 | SD730 | SD855 | SD865 5G | SD888 | SDX55 | SDX61 | SG4150P | SM4125 | SM4635 | SM6250 | SM6250P | SM6370 | SM6650 | SM7250P | SM7315 | SM7325P | SM7635 | SM7675 | SM7675P | SM8635 | SM8635P | SM8650Q | SM8735 | SM8750 | SM8750P | Smart Audio 400 Platform | Snapdragon 4 Gen 1 Mobile Platform | Snapdragon 460 Mobile Platform | Snapdragon 480 5G Mobile Platform | Snapdragon 480+ 5G Mobile Platform (SM4350-AC) | Snapdragon 662 Mobile Platform | Snapdragon 665 Mobile Platform | Snapdragon 670 Mobile Platform | Snapdragon 675 Mobile Platform | Snapdragon 678 Mobile Platform (SM6150-AC) | Snapdragon 680 4G Mobile Platform | Snapdragon 685 4G Mobile Platform (SM6225-AD) | Snapdragon 690 5G Mobile Platform | Snapdragon 695 5G Mobile Platform | Snapdragon 710 Mobile Platform | Snapdragon 720G Mobile Platform | Snapdragon 730 Mobile Platform (SM7150-AA) | Snapdragon 730G Mobile Platform (SM7150-AB) | Snapdragon 732G Mobile Platform (SM7150-AC) | Snapdragon 750G 5G Mobile Platform | Snapdragon 765 5G Mobile Platform (SM7250-AA) | Snapdragon 765G 5G Mobile Platform (SM7250-AB) | Snapdragon 768G 5G Mobile Platform (SM7250-AC) | Snapdragon 778G 5G Mobile Platform | Snapdragon 778G+ 5G Mobile Platform (SM7325-AE) | Snapdragon 780G 5G Mobile Platform | Snapdragon 782G Mobile Platform (SM7325-AF) | Snapdragon 7c Compute Platform (SC7180-AC) | Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro" | Snapdragon 7c+ Gen 3 Compute | Snapdragon 8 Gen 1 Mobile Platform | Snapdragon 8 Gen 3 Mobile Platform | Snapdragon 855 Mobile Platform | Snapdragon 855+/860 Mobile Platform (SM8150-AC) | Snapdragon 865 5G Mobile Platform | Snapdragon 865+ 5G Mobile Platform (SM8250-AB) | Snapdragon 870 5G Mobile Platform (SM8250-AC) | Snapdragon 888 5G Mobile Platform | Snapdragon 888+ 5G Mobile Platform (SM8350-AC) | Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite" | Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite" | Snapdragon 8cx Compute Platform (SC8180X-AA, AB) | Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro" | Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro" | Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB) | Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB) | Snapdragon Auto 5G Modem-RF | Snapdragon Auto 5G Modem-RF Gen 2 | Snapdragon W5+ Gen 1 Wearable Platform | Snapdragon X35 5G Modem-RF System | Snapdragon X50 5G Modem-RF System | Snapdragon X55 5G Modem-RF System | Snapdragon X62 5G Modem-RF System | Snapdragon X65 5G Modem-RF System | Snapdragon X72 5G Modem-RF System | Snapdragon X75 5G Modem-RF System | Snapdragon XR1 Platform | Snapdragon XR2 5G Platform | Snapdragon XR2+ Gen 1 Platform | Snapdragon Auto 4G Modem | SRV1H | SRV1L | SRV1M | SW5100 | SW5100P | SXR1120 | SXR2130 | SXR2330P | WCD9326 | WCD9335 | WCD9340 | WCD9341 | WCD9360 | WCD9370 | WCD9371 | WCD9375 | WCD9378 | WCD9380 | WCD9385 | WCD9390 | WCD9395 | WCN3910 | WCN3950 | WCN3980 | WCN3988 | WCN3990 | WCN3999 | WCN6450 | WCN6650 | WCN6740 | WCN6755 | WCN7750 | WCN7860 | WCN7861 | WCN7880 | WCN7881 | WSA8810 | WSA8815 | WSA8830 | WSA8832 | WSA8835 | WSA8840 | WSA8845 | WSA8845H
CWE
CWE-120, CWE-120 Buffer Copy Without Checking Size of Input (‘Classic Buffer Overflow’)
Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Published
2025-09-24T15:33:27.834Z
Updated
2025-09-24T15:33:27.834Z

AI Summary Analysis

Risk verdict

High risk: local attacker with low privileges could trigger memory corruption in the trusted encryption path, potentially enabling arbitrary code execution within the trusted domain.

Why this matters

Memory corruption in cryptographic handling on widely deployed Snapdragon platforms could expose cryptographic keys, undermine data integrity, or disrupt device operation across mobile, IoT and automotive use cases. The broad device surface increases the chance of prolific exploitation if a patch is delayed.

Most likely attack path

An attacker who already has local code execution targets the private key encryption routine in the high‑level OS (HLOS). By submitting crafted input to the cryptographic function, a classic buffer overflow could occur, enabling code execution within the trusted context. No user interaction is required, and the vulnerability’s impact spans confidentiality, integrity and availability if the attacker gains control of the crypto path.

Who is most exposed

Any device using Qualcomm Snapdragon platforms performing private key operations in trusted applications—mobile phones, wearables, IoT, automotive and industrial systems—presents exposure, especially where crypto services are exposed to third‑party apps.

Detection ideas

  • Crashes or hangs in the cryptographic/private key path during encryption.
  • Memory corruption or kernel crash dumps referencing the crypto module.
  • Unusual long‑running crypto operations or unexpected input lengths triggering faults.
  • New or repeated stack traces showing buffer overflow signs in the HLOS crypto code.
  • Anomalous attempts to invoke private key encryption from untrusted apps.

Mitigation and prioritisation

  • Apply vendor patch from the latest Qualcomm security bulletin; coordinate with device OEMs to roll firmware updates.
  • If patching lags, disable or tightly sandbox the vulnerable crypto API; enforce strict input validation on the encryption path.
  • Strengthen memory safety practices around crypto handling; enable ASLR and robust crash reporting.
  • Audit and limit third‑party access to private key operations; enforce signed, verified apps only.
  • Schedule patch deployment and testing; monitor for related cryptographic anomalies. If KEV or EPSS data later indicate high exploitation likelihood, elevate to priority 1.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.