CVE Alert: CVE-2025-21488 – Qualcomm, Inc. – Snapdragon

CVE-2025-21488

HIGHNo exploitation known

Information disclosure while decoding this RTP packet headers received by UE from the network when the padding bit is set.

CVSS v3.1 (8.2)
AV NETWORK · AC LOW · PR NONE · UI NONE · S UNCHANGED
Vendor
Qualcomm, Inc.
Product
Snapdragon
Versions
FastConnect 6200 | FastConnect 6700 | FastConnect 6900 | FastConnect 7800 | MSM8996AU | QCA6564 | QCA6564A | QCA6564AU | QCA6574 | QCA6574A | QCA6574AU | QCA6595AU | QCA6696 | QCM4490 | QCS410 | QCS4490 | QCS610 | QMP1000 | Qualcomm Video Collaboration VC1 Platform | Qualcomm Video Collaboration VC3 Platform | SA6145P | SA6155 | SA6155P | SA8155 | SA8155P | SD 8 Gen1 5G | SD660 | SD670 | SD865 5G | SDM429W | SG4150P | SM4125 | SM4635 | SM6370 | SM6650 | SM7635 | SM7675 | SM7675P | SM8550P | SM8635 | SM8635P | SM8650Q | SM8735 | SM8750 | SM8750P | Snapdragon 4 Gen 1 Mobile Platform | Snapdragon 4 Gen 2 Mobile Platform | Snapdragon 429 Mobile Platform | Snapdragon 460 Mobile Platform | Snapdragon 480 5G Mobile Platform | Snapdragon 480+ 5G Mobile Platform (SM4350-AC) | Snapdragon 660 Mobile Platform | Snapdragon 662 Mobile Platform | Snapdragon 670 Mobile Platform | Snapdragon 680 4G Mobile Platform | Snapdragon 685 4G Mobile Platform (SM6225-AD) | Snapdragon 695 5G Mobile Platform | Snapdragon 710 Mobile Platform | Snapdragon 8 Gen 1 Mobile Platform | Snapdragon 8 Gen 2 Mobile Platform | Snapdragon 8 Gen 3 Mobile Platform | Snapdragon 8+ Gen 1 Mobile Platform | Snapdragon 8+ Gen 2 Mobile Platform | Snapdragon 820 Automotive Platform | Snapdragon 845 Mobile Platform | Snapdragon W5+ Gen 1 Wearable Platform | Snapdragon XR1 Platform | Snapdragon XR2 5G Platform | Snapdragon XR2+ Gen 1 Platform | SW5100 | SW5100P | SXR1120 | TalynPlus | WCD9326 | WCD9335 | WCD9340 | WCD9341 | WCD9370 | WCD9375 | WCD9378 | WCD9380 | WCD9385 | WCD9390 | WCD9395 | WCN3620 | WCN3660B | WCN3910 | WCN3950 | WCN3980 | WCN3988 | WCN3990 | WCN6450 | WCN6650 | WCN6740 | WCN6755 | WCN7750 | WCN7860 | WCN7861 | WCN7880 | WCN7881 | WSA8810 | WSA8815 | WSA8830 | WSA8832 | WSA8835 | WSA8840 | WSA8845 | WSA8845H
CWE
CWE-126, CWE-126 Buffer Over-read
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L
Published
2025-09-24T15:33:35.950Z
Updated
2025-09-24T15:33:35.950Z

AI Summary Analysis

Risk verdict

High risk: a remote, unauthenticated information-disclosure vulnerability in the Data Network Stack could expose memory contents via crafted RTP header padding; given the CVSS 3.1 score and network reach, it warrants urgent attention.

Why this matters

Exposed memory during RTP header decoding could leak tokens, session keys, or other sensitive data, potentially enabling cross-app data leakage or credential exposure. Qualcomm Snapdragon devices span mobile, IoT, wearables, and automotive segments, so the impact could be broad across fleets and supply chains.

Most likely attack path

An attacker on the same network can target RTP processing on a vulnerable device; no user interaction or privileges are required. The attacker would send crafted RTP packets (with padding bit set) to trigger the over-read, enabling data leakage without needing domain access or authenticated sessions. Lateral movement is unlikely from this vector alone, but data exfiltration could facilitate follow-on steps.

Who is most exposed

Devices with Snapdragon-based Data Network Stack handling RTP streams are at risk, including smartphones, wearables, IoT gateways, and automotive infotainment systems that routinely receive media or VoIP/RTP traffic.

Detection ideas

  • Monitor RTP traffic for unusual padding bit patterns or malformed headers.
  • Look for memory-access exceptions, crashes, or memory leakage in the network stack logs.
  • Detect spikes in RTP sessions or anomalous data reads shortly after streaming starts.
  • Correlate RTP session starts with abnormal host memory access events.
  • IDS/IPS rules targeting RTP header anomalies in vulnerable components.

Mitigation and prioritisation

  • Apply vendor security bulletin patches and update to fixed firmware immediately.
  • Implement network controls to restrict RTP stream exposure to trusted endpoints; segment media traffic from sensitive workloads.
  • If patching is delayed, deploy compensating controls and harden RTP processing where possible; perform thorough regression testing.
  • Track KEV and EPSS once published; treat as priority 1 if exploitation indicators are confirmed or EPSS is ≥ 0.5.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.