CVE Alert: CVE-2025-27037 – Qualcomm, Inc. – Snapdragon

CVE-2025-27037

HIGHNo exploitation known

Memory corruption while processing config_dev IOCTL when camera kernel driver drops its reference to CPU buffers.

CVSS v3.1 (7.8)
AV LOCAL · AC LOW · PR LOW · UI NONE · S UNCHANGED
Vendor
Qualcomm, Inc.
Product
Snapdragon
Versions
FastConnect 6800 | FastConnect 6900 | FastConnect 7800 | QAM8295P | QCA6391 | QCA6426 | QCA6436 | QCA6574AU | QCA6696 | QCN9074 | SA6145P | SA6150P | SA6155P | SA8145P | SA8150P | SA8155P | SA8195P | SA8295P | SD865 5G | Snapdragon 8 Gen 1 Mobile Platform | Snapdragon 865 5G Mobile Platform | Snapdragon 865+ 5G Mobile Platform (SM8250-AB) | Snapdragon 870 5G Mobile Platform (SM8250-AC) | Snapdragon X55 5G Modem-RF System | Snapdragon XR2 5G Platform | SW5100 | SW5100P | SXR2130 | WCD9380 | WCN3660B | WCN3680B | WCN3980 | WCN3988 | WSA8810 | WSA8815 | WSA8830 | WSA8835
CWE
CWE-416, CWE-416 Use After Free
Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Published
2025-09-24T15:33:43.572Z
Updated
2025-09-24T15:33:43.572Z

AI Summary Analysis

Risk verdict

High risk: local attacker could trigger a camera-driver use-after-free via the config_dev IOCTL, with potential kernel-level impact; no public exploit confirmed, but remediation should be pursued promptly on vendor/firmware updates.

Why this matters

Memory corruption in the camera stack can expose or corrupt user data, degrade authentication and IO integrity, or crash the system. In practice, an attacker on the device could escalate privileges or disable video capture, affecting devices across consumer, automotive, and IoT deployments that rely on Qualcomm’s camera stack.

Most likely attack path

An attacker with local access and low privileges targets the camera IOCTL interface exposed by the Qualcomm camera driver. By misusing config_dev, they can provoke a use-after-free in kernel memory, potentially leading to a crash or kernel code execution. No user interaction is required beyond executing the IOCTL; the Scope remains unchanged, with the primary risk being kernel-level compromise rather than remote compromise.

Who is most exposed

Devices using Snapdragon with integrated camera subsystems are affected—typical in Android phones, tablets, wearables, automotive infotainment, and other IoT devices that expose the camera kernel interface to apps.

Detection ideas

  • Kernel oops/crashes linked to the camera driver during config_dev IOCTL usage.
  • Memory corruption warnings or use-after-free indicators in kernel logs.
  • Abnormal ref-count changes or buffer lifecycle anomalies around camera IOCTL calls.
  • Unusual or rare app activity invoking camera interfaces with atypical parameters.
  • Post-exploit indicators: privilege escalation attempts or unexpected kernel-level process privileges.

Mitigation and prioritisation

  • Apply vendor/OS updates containing the camera stack patch; coordinate with OEM for firmware rollout.
  • Restrict IOCTL surface exposure and enforce least privilege for camera apps; consider disabling untrusted IOCTL paths where feasible.
  • Enable kernel lockdown, secure boot, and module signing; restrict loading of camera driver modules.
  • Review and tighten app permissions for camera access; deploy runtime mitigations where supported.
  • Plan lab testing and staged production deployment; monitor for regression and kernel instability signals.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.