CVE Alert: CVE-2025-47360 – Qualcomm, Inc. – Snapdragon

CVE-2025-47360

HIGHNo exploitation known

Memory corruption while processing client message during device management.

CVSS v3.1 (7.8)
AV LOCAL · AC LOW · PR LOW · UI NONE · S UNCHANGED
Vendor
Qualcomm, Inc.
Product
Snapdragon
Versions
QAM8255P | QAM8295P | QAM8620P | QAM8650P | QAM8775P | QAMSRV1H | QAMSRV1M | QCA6574AU | QCA6595 | QCA6595AU | QCA6688AQ | QCA6696 | QCA6698AQ | QCA6797AQ | QCA8695AU | SA6145P | SA6150P | SA6155P | SA7255P | SA7775P | SA8145P | SA8150P | SA8155P | SA8195P | SA8255P | SA8295P | SA8540P | SA8620P | SA8650P | SA8770P | SA8775P | SA9000P | SRV1H | SRV1L | SRV1M
CWE
CWE-121, CWE-121 Stack-based Buffer Overflow
Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Published
2025-11-04T03:19:18.581Z
Updated
2025-11-04T03:19:18.581Z

AI Summary Analysis

Risk verdict

High risk of local memory corruption on Qualcomm Snapdragon Auto platforms running QNX, with potential for arbitrary code execution; patching should be treated as a priority when vendor updates are available.

Why this matters

An attacker with local access could crash or seize control of device-management components, compromising safety‑critical ECUs or serviceability. In automotive contexts, even transient exploitation can enable further manipulation of vehicle subsystems or degrade confidence in updates and fleet operations.

Most likely attack path

Exploitation requires local access and low privileges, with no user interaction. An attacker crafts malformed client messages to the device-management stack; if the memory corruption is triggered, code execution or a denial of service could follow, while scope remains within the affected component.

Who is most exposed

Vehicles using Qualcomm Snapdragon Auto with QNX-based management services and exposed maintenance/debug interfaces are most at risk, particularly in fleets or aftermarket environments where physical access or service port availability is higher.

Detection ideas

  • Crashes or watchdog resets during handling of client-management messages.
  • Stack traces or memory-corruption dumps in device-management processes.
  • Logs showing malformed or oversized client messages targeting the management interface.

Mitigation and prioritisation

  • Apply vendor patches as soon as released; test in a controlled environment before deployment.
  • Restrict access to device-management interfaces; disable unused debug ports; enforce strong authentication.
  • Implement strict input validation and memory-safety protections (stack canaries, bounds checks) in the management component.
  • Segment networks and enforce physical access controls to reduce local‑access risk.
  • If KEV is true or EPSS ≥ 0.5 becomes known, treat as priority 1; otherwise follow standard patch cadence with interim mitigations.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features