CVE-2025-47323
📋 TL;DR
This vulnerability allows memory corruption when handling large GPR packets between user and root contexts in Qualcomm components. Attackers could potentially execute arbitrary code with elevated privileges. Affects devices using vulnerable Qualcomm chipsets.
💻 Affected Systems
- Qualcomm chipsets with GPR packet routing functionality
📦 What is this software?
Snapdragon 4 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 1 Mobile Platform Firmware →
Snapdragon 4 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 2 Mobile Platform Firmware →
Snapdragon 460 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 460 Mobile Platform Firmware →
Snapdragon 480 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 480 5g Mobile Platform Firmware →
Snapdragon 480\+ 5g Mobile Platform \(sm4350 Ac\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 480\+ 5g Mobile Platform \(sm4350 Ac\) Firmware →
Snapdragon 6 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 6 Gen 1 Mobile Platform Firmware →
Snapdragon 662 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 662 Mobile Platform Firmware →
Snapdragon 680 4g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 680 4g Mobile Platform Firmware →
Snapdragon 685 4g Mobile Platform \(sm6225 Ad\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 685 4g Mobile Platform \(sm6225 Ad\) Firmware →
Snapdragon 695 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 695 5g Mobile Platform Firmware →
Snapdragon 7 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 7 Gen 1 Mobile Platform Firmware →
Snapdragon 7\+ Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 7\+ Gen 2 Mobile Platform Firmware →
Snapdragon 778g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Platform Firmware →
Snapdragon 778g\+ 5g Mobile Platform \(sm7325 Ae\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g\+ 5g Mobile Platform \(sm7325 Ae\) Firmware →
Snapdragon 782g Mobile Platform \(sm7325 Af\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 782g Mobile Platform \(sm7325 Af\) Firmware →
Snapdragon 7c\+ Gen 3 Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 7c\+ Gen 3 Compute Firmware →
Snapdragon 8 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Platform Firmware →
Snapdragon 8 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 3 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Platform Firmware →
Snapdragon 888 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 888 5g Mobile Platform Firmware →
Snapdragon 888\+ 5g Mobile Platform \(sm8350 Ac\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 888\+ 5g Mobile Platform \(sm8350 Ac\) Firmware →
Snapdragon 8cx Gen 3 Compute Platform \(sc8280xp Ab\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 8cx Gen 3 Compute Platform \(sc8280xp Ab\) Firmware →
Snapdragon 8cx Gen 3 Compute Platform \(sc8280xp Bb\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 8cx Gen 3 Compute Platform \(sc8280xp Bb\) Firmware →
Snapdragon Ar1 Gen 1 Platform \"luna1\" Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar1 Gen 1 Platform \"luna1\" Firmware →
Snapdragon Ar1 Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar1 Gen 1 Platform Firmware →
Snapdragon Ar2 Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar2 Gen 1 Platform Firmware →
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon W5\+ Gen 1 Wearable Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon W5\+ Gen 1 Wearable Platform Firmware →
Snapdragon X32 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X32 5g Modem Rf System Firmware →
Snapdragon X35 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X35 5g Modem Rf System Firmware →
Snapdragon X65 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf System Firmware →
Snapdragon X70 Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X70 Modem Rf System Firmware →
Snapdragon X72 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X72 5g Modem Rf System Firmware →
Snapdragon X75 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X75 5g Modem Rf System Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with root privileges leading to complete device compromise
Likely Case
Local privilege escalation allowing attackers to gain root access
If Mitigated
Denial of service or limited information disclosure if exploit fails
🎯 Exploit Status
Requires ability to send crafted GPR packets; local access likely needed
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Qualcomm December 2025 security bulletin
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2025-bulletin.html
Restart Required: Yes
Instructions:
1. Check Qualcomm advisory for specific patch versions. 2. Apply firmware/OS updates from device manufacturer. 3. Reboot device after patching.
🔧 Temporary Workarounds
Disable GPR packet routing if not needed
linuxPrevents exploitation by disabling vulnerable functionality
Check device-specific configuration for GPR settings
Implement network segmentation
allRestrict access to systems using vulnerable Qualcomm components
🧯 If You Can't Patch
- Isolate affected devices from untrusted networks
- Implement strict access controls and monitoring for privilege escalation attempts
🔍 How to Verify
Check if Vulnerable:
Check Qualcomm chipset version and compare against advisory; examine system logs for GPR-related errors
Check Version:
Device-specific commands vary; typically 'cat /proc/cpuinfo' or manufacturer-specific tools
Verify Fix Applied:
Verify firmware/OS version matches patched versions in Qualcomm bulletin; test GPR packet handling
📡 Detection & Monitoring
Log Indicators:
- Kernel panics, memory corruption errors, unexpected process termination related to GPR packets
Network Indicators:
- Unusual GPR packet patterns, unexpected packet sizes
SIEM Query:
Search for 'GPR' AND ('memory corruption' OR 'segmentation fault' OR 'kernel panic') in system logs