CVE-2025-47357

8.0 HIGH

📋 TL;DR

This vulnerability allows information disclosure when user-level drivers perform QFPROM read/write operations on Fuse regions in Qualcomm chipsets. It affects devices using vulnerable Qualcomm hardware and drivers, potentially exposing sensitive hardware configuration data. The impact is limited to systems with vulnerable Qualcomm components and appropriate driver access.

💻 Affected Systems

Products:
  • Qualcomm chipsets with QFPROM functionality
Versions: Specific versions not publicly detailed; refer to Qualcomm November 2025 bulletin
Operating Systems: Android, Linux-based systems using Qualcomm drivers
Default Config Vulnerable: ⚠️ Yes
Notes: Requires vulnerable Qualcomm hardware/driver combination; exact chipset models not specified in public information.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could extract cryptographic keys, device identifiers, or secure boot secrets stored in QFPROM fuses, potentially compromising device security and enabling further attacks.

🟠

Likely Case

Local attackers with user-level driver access could read sensitive hardware configuration data, though writing to protected fuse regions may be restricted by hardware protections.

🟢

If Mitigated

With proper driver permissions and hardware protections, impact is limited to authorized processes only accessing non-sensitive fuse regions.

🌐 Internet-Facing: LOW - Requires local access to driver interfaces, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Local attackers with driver access could exploit, but requires specific privileges and vulnerable configuration.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and driver manipulation; hardware protections may limit impact.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Qualcomm November 2025 security bulletin for specific versions

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2025-bulletin.html

Restart Required: Yes

Instructions:

1. Check Qualcomm advisory for affected chipset/driver versions. 2. Obtain updated firmware/drivers from device manufacturer. 3. Apply updates following manufacturer instructions. 4. Reboot device to activate fixes.

🔧 Temporary Workarounds

Restrict driver permissions

linux

Limit access to QFPROM driver interfaces to trusted processes only

# Review and restrict /dev/qfprom* device permissions
# Use SELinux/AppArmor policies to limit access

🧯 If You Can't Patch

  • Implement strict access controls on driver interfaces
  • Monitor for unusual QFPROM access patterns in system logs

🔍 How to Verify

Check if Vulnerable:

Check Qualcomm chipset version and driver dates against November 2025 bulletin; examine /dev/qfprom* device permissions

Check Version:

# Check Qualcomm chipset: cat /proc/cpuinfo | grep -i qualcomm
# Check driver versions in /sys/class/misc/ or dmesg

Verify Fix Applied:

Verify updated firmware/driver versions match Qualcomm patched versions; confirm restricted device permissions

📡 Detection & Monitoring

Log Indicators:

  • Unusual QFPROM device access in kernel logs
  • Failed permission attempts on /dev/qfprom* devices

Network Indicators:

  • Not applicable - local vulnerability only

SIEM Query:

source="kernel" AND ("qfprom" OR "QFPROM") AND (access OR permission OR denied)

🔗 References

📤 Share & Export