CVE-2025-47391

| EUVD-2025-209227 HIGH
2026-04-06 qualcomm
7.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Apr 06, 2026 - 16:00 vuln.today
EUVD ID Assigned
Apr 06, 2026 - 16:00 euvd
EUVD-2025-209227
CVE Published
Apr 06, 2026 - 15:33 nvd
HIGH 7.8

Description

Memory corruption while processing a frame request from user.

Analysis

Local privilege escalation in Qualcomm Snapdragon allows authenticated users to execute arbitrary code through memory corruption when processing frame requests. This CWE-121 stack-based buffer overflow enables complete system compromise (high confidentiality, integrity, and availability impact). No public exploit identified at time of analysis, with CVSS 7.8 indicating high severity requiring low attack complexity and low privileges. Qualcomm's April 2026 security bulletin addresses this vulnerability.

Technical Context

This vulnerability stems from a CWE-121 stack-based buffer overflow occurring in Qualcomm Snapdragon's frame processing subsystem. When handling user-supplied frame requests, the affected code fails to properly validate buffer boundaries before copying data onto the stack, allowing memory corruption. Stack-based buffer overflows are particularly dangerous as they can overwrite return addresses and function pointers, enabling control-flow hijacking. The vulnerability affects Qualcomm Snapdragon products broadly (CPE: cpe:2.3:a:qualcomm,_inc.:snapdragon), which encompass mobile processors, automotive platforms, IoT chipsets, and embedded system-on-chip solutions used across billions of devices globally. The stack overflow classification indicates the corrupted memory resides in the call stack rather than heap, making exploitation techniques potentially more predictable but requiring precise payload crafting.

Affected Products

Qualcomm Snapdragon products are affected by this vulnerability across multiple product lines. The CPE identifier (cpe:2.3:a:qualcomm,_inc.:snapdragon) indicates broad impact across Qualcomm's Snapdragon family, which includes mobile application processors (Snapdragon 8-series, 7-series, 6-series, 4-series), automotive platforms (Snapdragon Ride, Snapdragon Digital Chassis), compute platforms (Snapdragon X-series), IoT solutions, and wearable processors. Specific affected version ranges are not provided in available data, requiring reference to Qualcomm's April 2026 Security Bulletin at https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2026-bulletin.html for complete product enumeration and version-specific impact details. Organizations should inventory all Qualcomm Snapdragon-powered devices including smartphones, tablets, automotive systems, IoT endpoints, and embedded devices to determine exposure scope.

Remediation

Organizations should immediately consult Qualcomm's April 2026 Security Bulletin (https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2026-bulletin.html) for device-specific patching guidance and firmware update availability. Remediation requires applying vendor-supplied firmware updates from device manufacturers (OEMs), as Qualcomm provides patches to OEM partners who integrate them into device-specific firmware releases. For mobile devices, apply security updates through standard OS update mechanisms when available from Samsung, Xiaomi, OnePlus, Motorola, and other Snapdragon device manufacturers. For automotive and IoT deployments, coordinate with equipment vendors for firmware update schedules and deployment procedures. Until patches are applied, implement defense-in-depth controls including restricting local access privileges, enforcing application sandboxing and permission models, deploying mobile device management (MDM) solutions to control application installation, and monitoring for unusual privilege escalation attempts. In high-security environments, consider isolating or replacing unpatched devices handling sensitive data if OEM updates are unavailable or delayed beyond acceptable risk windows.

Priority Score

39
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +39
POC: 0

Share

CVE-2025-47391 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy