CVE-2025-47323

7.8 HIGH

📋 TL;DR

This vulnerability allows memory corruption when handling large GPR packets between user and root contexts in Qualcomm components. Attackers could potentially execute arbitrary code with elevated privileges. Affects devices using vulnerable Qualcomm chipsets.

💻 Affected Systems

Products:
  • Qualcomm chipsets with GPR packet routing functionality
Versions: Specific versions not detailed in reference; check Qualcomm advisory
Operating Systems: Android, Linux-based systems using Qualcomm components
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where GPR packet routing is enabled between user and root contexts

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with root privileges leading to complete device compromise

🟠

Likely Case

Local privilege escalation allowing attackers to gain root access

🟢

If Mitigated

Denial of service or limited information disclosure if exploit fails

🌐 Internet-Facing: MEDIUM - Requires network access but may be exploitable via crafted packets
🏢 Internal Only: HIGH - Local attackers can exploit for privilege escalation

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to send crafted GPR packets; local access likely needed

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Qualcomm December 2025 security bulletin

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2025-bulletin.html

Restart Required: Yes

Instructions:

1. Check Qualcomm advisory for specific patch versions. 2. Apply firmware/OS updates from device manufacturer. 3. Reboot device after patching.

🔧 Temporary Workarounds

Disable GPR packet routing if not needed

linux

Prevents exploitation by disabling vulnerable functionality

Check device-specific configuration for GPR settings

Implement network segmentation

all

Restrict access to systems using vulnerable Qualcomm components

🧯 If You Can't Patch

  • Isolate affected devices from untrusted networks
  • Implement strict access controls and monitoring for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Qualcomm chipset version and compare against advisory; examine system logs for GPR-related errors

Check Version:

Device-specific commands vary; typically 'cat /proc/cpuinfo' or manufacturer-specific tools

Verify Fix Applied:

Verify firmware/OS version matches patched versions in Qualcomm bulletin; test GPR packet handling

📡 Detection & Monitoring

Log Indicators:

  • Kernel panics, memory corruption errors, unexpected process termination related to GPR packets

Network Indicators:

  • Unusual GPR packet patterns, unexpected packet sizes

SIEM Query:

Search for 'GPR' AND ('memory corruption' OR 'segmentation fault' OR 'kernel panic') in system logs

🔗 References

📤 Share & Export