CVE-2025-47346
📋 TL;DR
This vulnerability involves memory corruption in the trusted application's secure logging command processing, which could allow attackers to execute arbitrary code or cause denial of service. It affects systems using Qualcomm chipsets with vulnerable trusted applications, primarily impacting mobile devices and embedded systems.
💻 Affected Systems
- Qualcomm chipsets with vulnerable trusted applications
📦 What is this software?
Snapdragon 4 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 2 Mobile Platform Firmware →
Snapdragon 6 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 6 Gen 1 Mobile Platform Firmware →
Snapdragon 8 Gen 3 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Platform Firmware →
Snapdragon Ar1 Gen 1 Platform \"luna1\" Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar1 Gen 1 Platform \"luna1\" Firmware →
Snapdragon Ar1 Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar1 Gen 1 Platform Firmware →
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon X32 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X32 5g Modem Rf System Firmware →
Snapdragon X35 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X35 5g Modem Rf System Firmware →
Snapdragon X72 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X72 5g Modem Rf System Firmware →
Snapdragon X75 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X75 5g Modem Rf System Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the trusted execution environment, allowing persistent malware installation, credential theft, and device takeover.
Likely Case
Application crashes, denial of service, or limited information disclosure from the trusted environment.
If Mitigated
Isolated crashes in trusted applications without affecting the main operating system.
🎯 Exploit Status
Exploitation requires understanding of trusted application memory layout and secure logging mechanisms
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Qualcomm January 2026 security bulletin
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2026-bulletin.html
Restart Required: Yes
Instructions:
1. Check device manufacturer for firmware updates. 2. Apply Qualcomm-provided patches through OEM updates. 3. Reboot device after update installation.
🔧 Temporary Workarounds
Disable unnecessary trusted applications
allReduce attack surface by disabling non-essential trusted applications
Restrict trusted application access
allImplement strict access controls to trusted application interfaces
🧯 If You Can't Patch
- Isolate affected devices from critical networks
- Implement application allowlisting to prevent malicious app installation
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against Qualcomm security bulletin; examine trusted application logs for corruption indicators
Check Version:
Device-specific commands vary by manufacturer; typically in Settings > About Phone > Build Number
Verify Fix Applied:
Verify firmware version has been updated to patched version; test secure logging functionality
📡 Detection & Monitoring
Log Indicators:
- Trusted application crashes
- Secure logging failures
- Memory access violations in trusted environment
Network Indicators:
- Unusual trusted application communication patterns
SIEM Query:
Search for trusted application crash events or secure logging failures in device logs