CVE Alert: CVE-2025-27032 – Qualcomm, Inc. – Snapdragon

CVE-2025-27032

HIGHNo exploitation known

memory corruption while loading a PIL authenticated VM, when authenticated VM image is loaded without maintaining cache coherency.

CVSS v3.1 (7.8)
AV LOCAL · AC LOW · PR LOW · UI NONE · S UNCHANGED
Vendor
Qualcomm, Inc.
Product
Snapdragon
Versions
AQT1000 | AR8035 | FastConnect 6200 | FastConnect 6700 | FastConnect 6800 | FastConnect 6900 | FastConnect 7800 | QAM8255P | QAM8295P | QAM8620P | QAM8650P | QAM8775P | QAMSRV1H | QAMSRV1M | QCA6174A | QCA6310 | QCA6335 | QCA6391 | QCA6420 | QCA6421 | QCA6426 | QCA6430 | QCA6431 | QCA6436 | QCA6564A | QCA6564AU | QCA6574 | QCA6574A | QCA6574AU | QCA6584AU | QCA6595 | QCA6595AU | QCA6678AQ | QCA6696 | QCA6698AQ | QCA6797AQ | QCA8081 | QCA8337 | QCA9377 | QCC710 | QCM5430 | QCM6490 | QCM8550 | QCN6224 | QCN6274 | QCN9274 | QCS5430 | QCS6490 | QCS8300 | QCS8550 | QCS9100 | QDU1000 | QDU1010 | QDU1110 | QDU1210 | QDX1010 | QDX1011 | QEP8111 | QFW7114 | QFW7124 | QMP1000 | QRU1032 | QRU1052 | QRU1062 | QSM8350 | Qualcomm Video Collaboration VC3 Platform | Robotics RB3 Platform | SA6145P | SA6155 | SA6155P | SA7255P | SA7775P | SA8150P | SA8155 | SA8155P | SA8255P | SA8295P | SA8540P | SA8620P | SA8650P | SA8770P | SA8775P | SA9000P | SC8380XP | SD 675 | SD 8 Gen1 5G | SD 8CX | SD670 | SD675 | SD855 | SD865 5G | SDX55 | SDX57M | SDX80M | SG8275P | SM6650 | SM7250P | SM7635 | SM7675 | SM7675P | SM8550P | SM8635 | SM8635P | SM8650Q | SM8735 | SM8750 | SM8750P | Snapdragon 670 Mobile Platform | Snapdragon 675 Mobile Platform | Snapdragon 678 Mobile Platform (SM6150-AC) | Snapdragon 765 5G Mobile Platform (SM7250-AA) | Snapdragon 765G 5G Mobile Platform (SM7250-AB) | Snapdragon 768G 5G Mobile Platform (SM7250-AC) | Snapdragon 8 Gen 1 Mobile Platform | Snapdragon 8 Gen 2 Mobile Platform | Snapdragon 8 Gen 3 Mobile Platform | Snapdragon 8+ Gen 2 Mobile Platform | Snapdragon 845 Mobile Platform | Snapdragon 850 Mobile Compute Platform | Snapdragon 855 Mobile Platform | Snapdragon 855+/860 Mobile Platform (SM8150-AC) | Snapdragon 865 5G Mobile Platform | Snapdragon 865+ 5G Mobile Platform (SM8250-AB) | Snapdragon 870 5G Mobile Platform (SM8250-AC) | Snapdragon 888 5G Mobile Platform | Snapdragon 888+ 5G Mobile Platform (SM8350-AC) | Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite" | Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite" | Snapdragon 8cx Compute Platform (SC8180X-AA, AB) | Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro" | Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro" | Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB) | Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB) | Snapdragon AR1 Gen 1 Platform | Snapdragon AR1 Gen 1 Platform "Luna1" | Snapdragon AR2 Gen 1 Platform | Snapdragon Auto 5G Modem-RF Gen 2 | Snapdragon X24 LTE Modem | Snapdragon X35 5G Modem-RF System | Snapdragon X50 5G Modem-RF System | Snapdragon X55 5G Modem-RF System | Snapdragon X62 5G Modem-RF System | Snapdragon X65 5G Modem-RF System | Snapdragon X72 5G Modem-RF System | Snapdragon X75 5G Modem-RF System | Snapdragon XR2 5G Platform | SRV1H | SRV1L | SRV1M | SSG2115P | SSG2125P | SXR1230P | SXR2130 | SXR2230P | SXR2250P | SXR2330P | Vision Intelligence 300 Platform | Vision Intelligence 400 Platform | WCD9326 | WCD9340 | WCD9341 | WCD9370 | WCD9375 | WCD9378 | WCD9380 | WCD9385 | WCD9390 | WCD9395 | WCN3950 | WCN3980 | WCN3990 | WCN6450 | WCN6650 | WCN6755 | WCN7750 | WCN7860 | WCN7861 | WCN7880 | WCN7881 | WSA8810 | WSA8815 | WSA8830 | WSA8832 | WSA8835 | WSA8840 | WSA8845 | WSA8845H
CWE
CWE-1257, CWE-1257: Improper Access Control Applied to Mirrored or Aliased Memory Regions
Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Published
2025-09-24T15:33:38.574Z
Updated
2025-09-24T15:33:38.574Z

AI Summary Analysis

Risk verdict

High risk: local attacker could trigger memory corruption in the hypervisor by loading an authenticated VM image without cache coherency; no evidence of active exploitation in this dataset.

Why this matters

The issue permits fundamental breaches of confidentiality, integrity and availability at the hypervisor level. With low-privilege, local access, an attacker could potentially escape to the host or threaten other VMs, impacting enterprise devices and vehicles relying on Qualcomm’s Snapdragon platforms.

Most likely attack path

Exploitation requires local access (AV:L) with low pre-existing privileges (PR:L) and no user interaction (UI:N). The unchanged scope means exploitation could compromise the hypervisor or neighbouring VMs without needing to breach the host’s trust boundary. A successful path enables memory corruption, potentially enabling code execution or VM isolation bypass.

Who is most exposed

Devices deploying Snapdragon-based hypervisor/VM capabilities—mobile, automotive, industrial IoT, and embedded systems—are at greatest risk, particularly where authenticated VM images are loaded dynamically without strict cache coherency checks.

Detection ideas

  • Hypervisor crash logs or kernel traces indicating memory corruption during VM image load.
  • Anomalous VM image load sequences lacking cache coherency validation.
  • Memory access异常 patterns or page-table/aliasing warnings in hypervisor logs.
  • Unusual VM-to-VM or host access events following VM image loading.
  • Firmware/hypervisor build diffs following the September 2025 bulletin.

Mitigation and prioritisation

  • Apply the latest Qualcomm security bulletin and vendor patches to all affected platforms.
  • Enforce strict cache coherency checks during VM image loading; block unauthenticated or non-compliant images.
  • Limit local access to devices with hypervisor exposure; implement least-privilege controls.
  • Validate and harden the hypervisor and memory management components; enable integrity monitoring and tamper detection.
  • Update change-management plans and perform staged patches across fleets; if KEV is true or EPSS ≥ 0.5, treat as priority 1.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.