CVE-2025-21424

7.8 HIGH

📋 TL;DR

This CVE describes a use-after-free vulnerability (CWE-416) in Qualcomm NPU driver APIs that can be triggered through concurrent calls, leading to memory corruption. It affects devices with Qualcomm chipsets that use vulnerable NPU drivers. Successful exploitation could allow attackers to execute arbitrary code or cause denial of service.

💻 Affected Systems

Products:
  • Qualcomm chipsets with NPU (Neural Processing Unit) capabilities
Versions: Specific versions not detailed in reference; check Qualcomm March 2025 bulletin for exact affected versions
Operating Systems: Android, Linux-based systems using Qualcomm drivers
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices where NPU functionality is enabled; exact chipset models and firmware versions need verification from vendor advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with kernel privileges leading to complete system compromise, data theft, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation from user to kernel space, allowing attackers to bypass security controls and gain elevated access.

🟢

If Mitigated

Denial of service through system crashes or instability if exploitation attempts fail or are partially successful.

🌐 Internet-Facing: MEDIUM - Requires local access initially but could be chained with other vulnerabilities for remote exploitation.
🏢 Internal Only: HIGH - Local attackers or malicious applications can exploit this without network access to gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires concurrent API calls to trigger the use-after-free condition; exploitation likely requires local access and knowledge of driver internals.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Qualcomm March 2025 security bulletin for specific patched versions

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html

Restart Required: Yes

Instructions:

1. Check Qualcomm advisory for affected chipset models. 2. Obtain updated firmware/driver from device manufacturer. 3. Apply patch following manufacturer's instructions. 4. Reboot device to load patched driver.

🔧 Temporary Workarounds

Disable NPU functionality

linux

Temporarily disable Neural Processing Unit features if not required

echo 0 > /sys/class/npu/enable
modprobe -r qcom_npu_driver

Restrict NPU driver access

linux

Use SELinux/AppArmor to restrict which processes can access NPU driver

setenforce 1
Configure appropriate SELinux policies for NPU device nodes

🧯 If You Can't Patch

  • Implement strict application sandboxing to prevent untrusted apps from accessing NPU APIs
  • Monitor system logs for NPU driver crashes or unusual memory access patterns

🔍 How to Verify

Check if Vulnerable:

Check chipset model and driver version: 'cat /proc/cpuinfo | grep -i qualcomm' and 'lsmod | grep npu'

Check Version:

dmesg | grep -i npu && cat /sys/module/qcom_npu_driver/version

Verify Fix Applied:

Verify driver version matches patched version from Qualcomm advisory and test concurrent NPU API calls

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages related to NPU driver
  • Use-after-free warnings in kernel logs
  • Multiple concurrent NPU API calls from single process

Network Indicators:

  • None - this is a local driver vulnerability

SIEM Query:

source="kernel" AND ("NPU" OR "npu_driver") AND ("panic" OR "use-after-free" OR "corruption")

🔗 References

📤 Share & Export