CVE-2025-27073
📋 TL;DR
This vulnerability allows attackers to cause a Denial of Service (DoS) condition by exploiting a flaw in the Neighbor Discovery Protocol (NDP) instance creation process. It affects systems using Qualcomm chipsets with vulnerable NDP implementations. The attack can temporarily disrupt network connectivity on affected devices.
💻 Affected Systems
- Qualcomm chipsets with NDP implementation
📦 What is this software?
Immersive Home 214 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 214 Platform Firmware →
Immersive Home 216 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 216 Platform Firmware →
Immersive Home 316 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 316 Platform Firmware →
Immersive Home 318 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 318 Platform Firmware →
Snapdragon 8 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 3 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Platform Firmware →
Snapdragon 865 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 865 5g Mobile Platform Firmware →
Snapdragon 865\+ 5g Mobile Platform \(sm8250 Ab\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 865\+ 5g Mobile Platform \(sm8250 Ab\) Firmware →
Snapdragon 870 5g Mobile Platform \(sm8250 Ac\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 870 5g Mobile Platform \(sm8250 Ac\) Firmware →
Snapdragon Ar1 Gen 1 Platform \"luna1\" Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar1 Gen 1 Platform \"luna1\" Firmware →
Snapdragon Ar1 Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar1 Gen 1 Platform Firmware →
Snapdragon Ar2 Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar2 Gen 1 Platform Firmware →
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon X72 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X72 5g Modem Rf System Firmware →
Snapdragon X75 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X75 5g Modem Rf System Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Complete network service disruption on affected devices, requiring reboot to restore functionality.
Likely Case
Temporary network connectivity loss or degradation on targeted devices.
If Mitigated
Minimal impact with proper network segmentation and monitoring.
🎯 Exploit Status
Requires network access and specific timing during NDP instance creation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Qualcomm August 2025 security bulletin for specific chipset firmware versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2025-bulletin.html
Restart Required: Yes
Instructions:
1. Check Qualcomm advisory for affected chipset models. 2. Obtain firmware update from device manufacturer. 3. Apply firmware update following manufacturer instructions. 4. Reboot device.
🔧 Temporary Workarounds
Disable NDP if not needed
linuxTurn off Neighbor Discovery Protocol if not required for network operations
sysctl -w net.ipv6.conf.all.disable_ipv6=1
sysctl -w net.ipv6.conf.default.disable_ipv6=1
Network segmentation
allIsolate vulnerable devices in separate network segments
🧯 If You Can't Patch
- Implement strict network access controls to limit exposure
- Monitor network traffic for abnormal NDP patterns
🔍 How to Verify
Check if Vulnerable:
Check chipset model and firmware version against Qualcomm advisory
Check Version:
cat /proc/cpuinfo | grep -i qualcomm
Verify Fix Applied:
Verify firmware version matches patched version from Qualcomm bulletin
📡 Detection & Monitoring
Log Indicators:
- Multiple NDP instance creation failures
- Network interface resets
- System logs showing NDP protocol errors
Network Indicators:
- Abnormal NDP traffic patterns
- Sudden network connectivity loss on specific devices
SIEM Query:
source="network_logs" AND (NDP OR neighbor_discovery) AND (error OR failure OR reset)