CVSS Vector
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
Memory corruption when decoding corrupted satellite data files with invalid signature offsets.
Analysis
Memory corruption in Qualcomm Snapdragon chipsets allows adjacent network attackers to achieve arbitrary code execution without authentication when processing malformed satellite data files containing invalid signature offsets. The vulnerability stems from an integer overflow (CWE-190) that leads to buffer overflow conditions during satellite data decoding. With a CVSS score of 8.8 and adjacent network attack vector, this represents a significant risk for devices with satellite communication capabilities in proximity-based attack scenarios. No public exploit code or active exploitation (CISA KEV) has been identified at time of analysis.
Technical Context
This vulnerability affects Qualcomm Snapdragon chipsets' satellite data processing subsystem, specifically the decoder responsible for validating and parsing satellite communication files. The root cause is an integer overflow (CWE-190) when calculating memory offsets based on signature field values in satellite data structures. When a corrupted file contains abnormally large or negative signature offset values, integer wraparound occurs during buffer size calculations, resulting in undersized memory allocation. Subsequent decoding operations then trigger buffer overflow conditions, corrupting adjacent memory regions. The affected component appears to be part of Qualcomm's satellite communication firmware or baseband processor implementation present across multiple Snapdragon chipset generations. The CPE identifier indicates broad impact across the Snapdragon product line, though specific SoC model numbers are not detailed in available data.
Affected Products
Qualcomm Snapdragon chipsets are confirmed affected per CPE identifier cpe:2.3:a:qualcomm,_inc.:snapdragon. Specific Snapdragon SoC model numbers and firmware versions are detailed in Qualcomm's April 2026 Security Bulletin at https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2026-bulletin.html. The vulnerability impacts devices with satellite communication capabilities, likely including recent Snapdragon 8-series flagship processors and specialized IoT/automotive chipsets with satellite connectivity features. Affected products include smartphones, tablets, automotive systems, IoT devices, and industrial equipment integrating vulnerable Snapdragon firmware versions. Consult the vendor bulletin for complete model enumeration and firmware build identification.
Remediation
Apply security patches released in Qualcomm's April 2026 Security Bulletin available at https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2026-bulletin.html. Device manufacturers (OEMs) must integrate Qualcomm's patched chipset firmware into their respective device software updates and distribute to end users through standard update mechanisms. End users should install the latest security updates from their device manufacturer as soon as available. For enterprise deployments, prioritize patching devices with active satellite communication features and those operating in environments where adjacent network access by untrusted parties is possible. If immediate patching is not feasible, consider disabling satellite communication functionality if not operationally required, implementing network segmentation to limit adjacent network attack surface, and restricting physical access to areas where satellite-enabled devices operate. Monitor Qualcomm and device manufacturer security advisories for additional guidance and confirmation of patched firmware versions.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-209230