CVE-2025-47321

7.8 HIGH

📋 TL;DR

This vulnerability involves memory corruption when copying packets from Unix domain socket clients, potentially allowing attackers to execute arbitrary code or cause denial of service. It affects systems using Qualcomm components that handle Unix domain socket communications. The CVSS score of 7.8 indicates high severity.

💻 Affected Systems

Products:
  • Qualcomm components handling Unix domain sockets
Versions: Specific versions not detailed in reference; check Qualcomm advisory
Operating Systems: Linux-based systems with Qualcomm components
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Unix domain socket functionality to be enabled and used

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with kernel privileges leading to complete system compromise

🟠

Likely Case

Denial of service through system crashes or privilege escalation

🟢

If Mitigated

Limited impact with proper network segmentation and minimal exposed services

🌐 Internet-Facing: LOW (Unix domain sockets are typically local IPC mechanisms)
🏢 Internal Only: HIGH (requires local access but can lead to privilege escalation)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to send crafted packets to Unix domain sockets; local access typically needed

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Qualcomm December 2025 security bulletin

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2025-bulletin.html

Restart Required: Yes

Instructions:

1. Review Qualcomm December 2025 security bulletin. 2. Identify affected components. 3. Apply vendor-provided patches. 4. Reboot system.

🔧 Temporary Workarounds

Restrict Unix domain socket access

linux

Limit which users/processes can access vulnerable Unix domain sockets

chmod 600 /path/to/socket
setfacl -m u:user:rw /path/to/socket

Disable unnecessary Unix socket services

linux

Stop services that use Unix domain sockets if not required

systemctl stop service-name
kill -9 $(lsof -t /path/to/socket)

🧯 If You Can't Patch

  • Implement strict access controls on Unix domain sockets
  • Monitor for unusual socket activity and process crashes

🔍 How to Verify

Check if Vulnerable:

Check Qualcomm component versions against December 2025 bulletin

Check Version:

Check vendor-specific commands for Qualcomm components

Verify Fix Applied:

Verify patched Qualcomm component versions and test socket functionality

📡 Detection & Monitoring

Log Indicators:

  • Kernel panics
  • Process crashes related to socket handling
  • Unusual socket connection attempts

Network Indicators:

  • Local socket connection spikes
  • Abnormal IPC traffic patterns

SIEM Query:

process:crash AND (socket OR unix) OR kernel:panic AND qualcomm

🔗 References

📤 Share & Export