CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Tags
Description
Memory corruption while preprocessing IOCTL request in JPEG driver.
Analysis
Local privilege escalation via memory corruption in Qualcomm Snapdragon JPEG driver allows authenticated local users to achieve full system compromise (high confidentiality, integrity, and availability impact). The buffer overflow vulnerability (CWE-126) occurs during IOCTL request preprocessing, a common attack surface in kernel-mode device drivers. CVSS 7.8 indicates high severity with low attack complexity. No public exploit identified at time of analysis, and EPSS data not available in provided intelligence. Qualcomm's April 2026 security bulletin addresses this issue, indicating coordinated disclosure timeframe.
Technical Context
This vulnerability affects the JPEG hardware driver component in Qualcomm Snapdragon chipsets, which processes image encoding/decoding operations at the kernel level. IOCTL (Input/Output Control) interfaces are system calls that allow user-space applications to communicate with kernel drivers, making them critical attack surfaces. The root cause is CWE-126 (Buffer Over-read), where the driver reads data beyond allocated memory boundaries during IOCTL request validation or preprocessing. This class of memory corruption in kernel drivers is particularly dangerous because successful exploitation occurs in privileged kernel context, bypassing normal user-space security boundaries. The CPE identifier indicates broad impact across Qualcomm Snapdragon product lines, though specific affected chipset models and software versions are not detailed in the provided intelligence.
Affected Products
Qualcomm Snapdragon chipsets are affected across unspecified product versions (CPE: cpe:2.3:a:qualcomm,_inc.:snapdragon:*:*:*:*:*:*:*:*). The broad CPE wildcard indicates potential impact across multiple Snapdragon system-on-chip (SoC) generations used in Android smartphones, tablets, automotive systems, and IoT devices. Specific chipset models (e.g., Snapdragon 8-series, 7-series, 6-series) and firmware versions are not enumerated in available intelligence. Qualcomm's April 2026 Security Bulletin at https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2026-bulletin.html should contain detailed affected product listings and version ranges. Downstream impact extends to OEM device manufacturers (Samsung, Xiaomi, OnePlus, etc.) who integrate Qualcomm chipsets and must distribute patched firmware through their update channels.
Remediation
Apply security updates from Qualcomm's April 2026 Security Bulletin (https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2026-bulletin.html) which contains patches for this memory corruption vulnerability. Device manufacturers and OEMs should integrate the patched Qualcomm firmware into their Android security patch releases and distribute to affected devices through standard update mechanisms. End users should install OEM-provided system updates that incorporate the April 2026 Qualcomm patches when available. For enterprise mobile device management, prioritize patch deployment to devices with sensitive data or elevated access. No workarounds are documented in available intelligence; mitigation relies on vendor-supplied patches. Monitor Qualcomm and device manufacturer security bulletins for specific chipset/device model applicability and exact patched firmware versions.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-209225