CVE-2025-47344
📋 TL;DR
This CVE describes a memory corruption vulnerability in Qualcomm sensor utility operations that could allow attackers to execute arbitrary code or cause denial of service. The vulnerability affects devices using Qualcomm chipsets with vulnerable sensor drivers. This primarily impacts mobile devices, IoT devices, and embedded systems using affected Qualcomm hardware.
💻 Affected Systems
- Qualcomm chipsets with sensor processing units
📦 What is this software?
Snapdragon 4 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 1 Mobile Platform Firmware →
Snapdragon 4 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 2 Mobile Platform Firmware →
Snapdragon 480 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 480 5g Mobile Platform Firmware →
Snapdragon 480\+ 5g Mobile Platform \(sm4350 Ac\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 480\+ 5g Mobile Platform \(sm4350 Ac\) Firmware →
Snapdragon 662 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 662 Mobile Platform Firmware →
Snapdragon 680 4g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 680 4g Mobile Platform Firmware →
Snapdragon 685 4g Mobile Platform \(sm6225 Ad\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 685 4g Mobile Platform \(sm6225 Ad\) Firmware →
Snapdragon 695 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 695 5g Mobile Platform Firmware →
Snapdragon 8 Gen 3 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Platform Firmware →
Snapdragon Ar1 Gen 1 Platform \"luna1\" Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar1 Gen 1 Platform \"luna1\" Firmware →
Snapdragon Ar1 Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar1 Gen 1 Platform Firmware →
Snapdragon Ar2 Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar2 Gen 1 Platform Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with kernel privileges leading to complete device compromise, data theft, or persistent backdoor installation.
Likely Case
Local privilege escalation from user to kernel space, potentially allowing app sandbox escape and access to sensitive sensor data.
If Mitigated
Denial of service through system crash or reboot if memory corruption is triggered but exploitation fails.
🎯 Exploit Status
Requires local access or malicious app; memory corruption vulnerabilities often require specific conditions to achieve reliable exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check device manufacturer updates for specific firmware versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2026-bulletin.html
Restart Required: Yes
Instructions:
1. Check with device manufacturer for firmware updates 2. Apply Qualcomm-provided patches through OEM updates 3. Reboot device after update installation
🔧 Temporary Workarounds
Restrict sensor permissions
androidLimit which apps can access sensor data to reduce attack surface
adb shell pm revoke <package_name> android.permission.BODY_SENSORS
adb shell pm revoke <package_name> android.permission.ACTIVITY_RECOGNITION
Disable unnecessary sensors
allTurn off sensors not required for device operation
🧯 If You Can't Patch
- Implement strict app vetting and only install from trusted sources
- Use mobile device management (MDM) to enforce security policies and monitor for suspicious behavior
🔍 How to Verify
Check if Vulnerable:
Check device chipset model and firmware version against Qualcomm's affected products list
Check Version:
adb shell getprop ro.bootloader (Android) or cat /proc/cpuinfo (Linux)
Verify Fix Applied:
Verify firmware version has been updated to a version after the patch release date
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs
- Sensor service crashes
- Unexpected memory access violations in system logs
Network Indicators:
- Unusual sensor data exfiltration patterns
SIEM Query:
source="kernel" AND ("panic" OR "oops") AND "sensor"