CVE-2025-47361
📋 TL;DR
This vulnerability allows memory corruption when triggering a subsystem crash with an out-of-range identifier, potentially leading to arbitrary code execution or system crashes. It affects Qualcomm products and devices using vulnerable Qualcomm components. The vulnerability is exploitable by attackers with local access to the system.
💻 Affected Systems
- Qualcomm chipsets and devices using affected Qualcomm components
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with arbitrary code execution at kernel or system privilege level, potentially leading to complete device takeover.
Likely Case
Local privilege escalation allowing attackers to gain elevated privileges on the system, or denial of service through system crashes.
If Mitigated
Limited impact with proper access controls and isolation, potentially only causing application crashes rather than system compromise.
🎯 Exploit Status
Exploitation requires local access and knowledge of triggering the specific subsystem crash condition with out-of-range identifiers
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Qualcomm November 2025 security bulletin for specific patched versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2025-bulletin.html
Restart Required: Yes
Instructions:
1. Check Qualcomm security bulletin for affected chipset versions. 2. Contact device manufacturer for firmware updates. 3. Apply manufacturer-provided security patches. 4. Reboot device after patch installation.
🔧 Temporary Workarounds
Restrict local access
allLimit local user access and application permissions to reduce attack surface
Application sandboxing
allEnsure applications run with minimal privileges and proper sandboxing
🧯 If You Can't Patch
- Implement strict access controls to limit who has local system access
- Monitor for unusual system crashes or privilege escalation attempts
🔍 How to Verify
Check if Vulnerable:
Check device chipset version and firmware against Qualcomm security bulletin; device manufacturers should provide vulnerability status
Check Version:
Device-specific commands vary by manufacturer; typically in Settings > About Phone > Software Information
Verify Fix Applied:
Verify firmware version has been updated to a version listed as patched in Qualcomm security bulletin
📡 Detection & Monitoring
Log Indicators:
- Unexpected subsystem crashes
- Privilege escalation attempts
- Memory corruption errors in system logs
Network Indicators:
- Not applicable - local vulnerability
SIEM Query:
Search for: 'subsystem crash', 'memory corruption', 'out-of-range identifier' in system logs