CVE Alert: CVE-2025-47317 – Qualcomm, Inc. – Snapdragon
CVE-2025-47317
Memory corruption due to global buffer overflow when a test command uses an invalid payload type.
AI Summary Analysis
Risk verdict
High risk of local exploitation causing memory corruption with potential full device impact; patching should be pursued promptly when vendor updates are available.
Why this matters
The vulnerability affects widely used Qualcomm BT controller components, including Snapdragon mobile and IoT platforms. An attacker with local access could exploit memory over-read to compromise confidentiality, integrity and availability, risking data exposure, device instability or service disruption on affected devices.
Most likely attack path
Attack requires local access to the device or an app/process able to invoke the BT controller test command with an invalid payload. With low privileges and no user interaction required, an opportunistic foothold on the device could be used to trigger the flaw, potentially enabling memory corruption and subsequent manipulation of BT-related subsystems or broader device stability. Exploitation would remain within the local scope unless broader code execution is achieved.
Who is most exposed
Devices using Qualcomm Snapdragon BT controllers are at risk, notably mobile phones, wearables and IoT devices with Bluetooth connectivity that rely on the affected chipsets.
Detection ideas
- Frequent BT controller crashes or resets logged in system or kernel logs.
- Memory fault or buffer over-read indications in BT stack or driver dumps.
- Unusual or automated attempts to issue test commands to the BT controller.
- Spike in device reboots or Bluetooth service outages without user action.
- Anomalous power/thermal events tied to Bluetooth activity.
Mitigation and prioritisation
- Apply vendor patch for the BT controller firmware/driver when released; verify device compatibility before rollout.
- Disable or tightly restrict exposure to test commands in production builds; enforce signed firmware updates.
- Implement compensating controls: restrict Bluetooth surface area, segment affected devices, and harden boot/firmware update workflows.
- Enhance monitoring for BT crashes, memory faults and related anomalies; review crash dumps for related patterns.
- Prioritisation: if KEV is confirmed or EPSS ≥ 0.5, treat as priority 1; otherwise escalate to high priority and plan a rapid patch window.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.