CVE-2025-47321
📋 TL;DR
This vulnerability involves memory corruption when copying packets from Unix domain socket clients, potentially allowing attackers to execute arbitrary code or cause denial of service. It affects systems using Qualcomm components that handle Unix domain socket communications. The CVSS score of 7.8 indicates high severity.
💻 Affected Systems
- Qualcomm components handling Unix domain sockets
📦 What is this software?
Smart Audio 400 Platform Firmware by Qualcomm
Snapdragon 4 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 2 Mobile Platform Firmware →
Snapdragon 6 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 6 Gen 1 Mobile Platform Firmware →
Snapdragon 680 4g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 680 4g Mobile Platform Firmware →
Snapdragon 685 4g Mobile Platform \(sm6225 Ad\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 685 4g Mobile Platform \(sm6225 Ad\) Firmware →
Snapdragon 765 5g Mobile Platform \(sm7250 Aa\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 765 5g Mobile Platform \(sm7250 Aa\) Firmware →
Snapdragon 765g 5g Mobile Platform \(sm7250 Ab\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 765g 5g Mobile Platform \(sm7250 Ab\) Firmware →
Snapdragon 768g 5g Mobile Platform \(sm7250 Ac\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 768g 5g Mobile Platform \(sm7250 Ac\) Firmware →
Snapdragon Ar1 Gen 1 Platform \"luna1\" Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar1 Gen 1 Platform \"luna1\" Firmware →
Snapdragon Ar1 Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar1 Gen 1 Platform Firmware →
Snapdragon Ar2 Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar2 Gen 1 Platform Firmware →
Snapdragon W5\+ Gen 1 Wearable Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon W5\+ Gen 1 Wearable Platform Firmware →
Snapdragon X32 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X32 5g Modem Rf System Firmware →
Snapdragon X35 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X35 5g Modem Rf System Firmware →
Snapdragon X65 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf System Firmware →
Video Collaboration Vc1 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc1 Platform Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with kernel privileges leading to complete system compromise
Likely Case
Denial of service through system crashes or privilege escalation
If Mitigated
Limited impact with proper network segmentation and minimal exposed services
🎯 Exploit Status
Requires ability to send crafted packets to Unix domain sockets; local access typically needed
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Qualcomm December 2025 security bulletin
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2025-bulletin.html
Restart Required: Yes
Instructions:
1. Review Qualcomm December 2025 security bulletin. 2. Identify affected components. 3. Apply vendor-provided patches. 4. Reboot system.
🔧 Temporary Workarounds
Restrict Unix domain socket access
linuxLimit which users/processes can access vulnerable Unix domain sockets
chmod 600 /path/to/socket
setfacl -m u:user:rw /path/to/socket
Disable unnecessary Unix socket services
linuxStop services that use Unix domain sockets if not required
systemctl stop service-name
kill -9 $(lsof -t /path/to/socket)
🧯 If You Can't Patch
- Implement strict access controls on Unix domain sockets
- Monitor for unusual socket activity and process crashes
🔍 How to Verify
Check if Vulnerable:
Check Qualcomm component versions against December 2025 bulletin
Check Version:
Check vendor-specific commands for Qualcomm components
Verify Fix Applied:
Verify patched Qualcomm component versions and test socket functionality
📡 Detection & Monitoring
Log Indicators:
- Kernel panics
- Process crashes related to socket handling
- Unusual socket connection attempts
Network Indicators:
- Local socket connection spikes
- Abnormal IPC traffic patterns
SIEM Query:
process:crash AND (socket OR unix) OR kernel:panic AND qualcomm