CVE-2025-21427
📋 TL;DR
This vulnerability allows information disclosure when a User Equipment (UE) device receives RTP packets from the network. It affects mobile devices with Qualcomm chipsets that process RTP traffic. Attackers could potentially read sensitive data from memory.
💻 Affected Systems
- Qualcomm chipsets with RTP processing capabilities
📦 What is this software?
Smart Display 200 Platform Firmware by Qualcomm
View all CVEs affecting Smart Display 200 Platform Firmware →
Snapdragon 4 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 1 Mobile Firmware →
Snapdragon 4 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 2 Mobile Firmware →
Snapdragon 480 5g Mobile Firmware by Qualcomm
Snapdragon 480 5g Mobile Firmware by Qualcomm
Snapdragon 680 4g Mobile Firmware by Qualcomm
Snapdragon 685 4g Mobile Firmware by Qualcomm
Snapdragon 695 5g Mobile Firmware by Qualcomm
Snapdragon 720g Mobile Firmware by Qualcomm
Snapdragon 730g Mobile Firmware by Qualcomm
Snapdragon 732g Mobile Firmware by Qualcomm
Snapdragon 778g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Firmware →
Snapdragon 778g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Firmware →
Snapdragon 780g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 780g 5g Mobile Firmware →
Snapdragon 782g Mobile Firmware by Qualcomm
Snapdragon 7c\+ Gen 3 Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 7c\+ Gen 3 Compute Firmware →
Snapdragon 8 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Firmware →
Snapdragon 8 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Firmware →
Snapdragon 8 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Firmware →
Snapdragon 8 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Firmware →
Snapdragon 8 Gen 3 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Firmware →
Snapdragon 820 Automotive Firmware by Qualcomm
View all CVEs affecting Snapdragon 820 Automotive Firmware →
Snapdragon 835 Mobile Pc Firmware by Qualcomm
Snapdragon 865 5g Mobile Firmware by Qualcomm
Snapdragon 865 5g Mobile Firmware by Qualcomm
Snapdragon 870 5g Mobile Firmware by Qualcomm
Snapdragon 888 5g Mobile Firmware by Qualcomm
Snapdragon 888 5g Mobile Firmware by Qualcomm
Snapdragon W5\+ Gen 1 Wearable Firmware by Qualcomm
View all CVEs affecting Snapdragon W5\+ Gen 1 Wearable Firmware →
Snapdragon X50 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X50 5g Modem Rf Firmware →
Snapdragon X55 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf Firmware →
Snapdragon Xr2\+ Gen 1 Firmware by Qualcomm
Video Collaboration Vc1 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc1 Platform Firmware →
Video Collaboration Vc3 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc3 Platform Firmware →
Vision Intelligence 100 Firmware by Qualcomm
Vision Intelligence 200 Firmware by Qualcomm
Vision Intelligence 300 Firmware by Qualcomm
Vision Intelligence 400 Firmware by Qualcomm
⚠️ Risk & Real-World Impact
Worst Case
Attackers could read sensitive information from device memory, potentially exposing authentication credentials, personal data, or cryptographic keys.
Likely Case
Information leakage of non-critical data from RTP packet processing buffers, potentially revealing metadata about communications.
If Mitigated
Limited exposure of non-sensitive data with proper network segmentation and access controls in place.
🎯 Exploit Status
Requires sending specially crafted RTP packets to target device; network access needed
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Qualcomm July 2025 security bulletin for specific patch versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2025-bulletin.html
Restart Required: Yes
Instructions:
1. Check Qualcomm advisory for affected chipset versions. 2. Apply firmware updates from device manufacturer. 3. Reboot device after update.
🔧 Temporary Workarounds
Network filtering
allBlock or filter RTP traffic at network perimeter
Disable vulnerable services
allDisable RTP processing services if not required
🧯 If You Can't Patch
- Segment network to restrict RTP traffic to trusted sources only
- Implement network monitoring for anomalous RTP traffic patterns
🔍 How to Verify
Check if Vulnerable:
Check device chipset version and compare against Qualcomm advisory
Check Version:
Device-specific commands vary; typically in Settings > About Phone > Baseband version
Verify Fix Applied:
Verify firmware version has been updated to patched version
📡 Detection & Monitoring
Log Indicators:
- Unusual RTP packet processing errors
- Memory access violations in RTP stack
Network Indicators:
- Malformed RTP packets targeting devices
- Unexpected RTP traffic to mobile devices
SIEM Query:
Search for RTP protocol anomalies or memory access violations in device logs