CVE-2025-47361

7.8 HIGH

📋 TL;DR

This vulnerability allows memory corruption when triggering a subsystem crash with an out-of-range identifier, potentially leading to arbitrary code execution or system crashes. It affects Qualcomm products and devices using vulnerable Qualcomm components. The vulnerability is exploitable by attackers with local access to the system.

💻 Affected Systems

Products:
  • Qualcomm chipsets and devices using affected Qualcomm components
Versions: Specific versions not detailed in provided reference; check Qualcomm November 2025 security bulletin for exact affected versions
Operating Systems: Android and other operating systems using Qualcomm components
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with Qualcomm chipsets; exact device models depend on chipset implementation and firmware versions

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with arbitrary code execution at kernel or system privilege level, potentially leading to complete device takeover.

🟠

Likely Case

Local privilege escalation allowing attackers to gain elevated privileges on the system, or denial of service through system crashes.

🟢

If Mitigated

Limited impact with proper access controls and isolation, potentially only causing application crashes rather than system compromise.

🌐 Internet-Facing: LOW - This appears to be a local vulnerability requiring access to the system, not directly exploitable over the network.
🏢 Internal Only: HIGH - Attackers with local access (including malicious apps or compromised user accounts) could exploit this to escalate privileges or crash systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and knowledge of triggering the specific subsystem crash condition with out-of-range identifiers

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Qualcomm November 2025 security bulletin for specific patched versions

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2025-bulletin.html

Restart Required: Yes

Instructions:

1. Check Qualcomm security bulletin for affected chipset versions. 2. Contact device manufacturer for firmware updates. 3. Apply manufacturer-provided security patches. 4. Reboot device after patch installation.

🔧 Temporary Workarounds

Restrict local access

all

Limit local user access and application permissions to reduce attack surface

Application sandboxing

all

Ensure applications run with minimal privileges and proper sandboxing

🧯 If You Can't Patch

  • Implement strict access controls to limit who has local system access
  • Monitor for unusual system crashes or privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check device chipset version and firmware against Qualcomm security bulletin; device manufacturers should provide vulnerability status

Check Version:

Device-specific commands vary by manufacturer; typically in Settings > About Phone > Software Information

Verify Fix Applied:

Verify firmware version has been updated to a version listed as patched in Qualcomm security bulletin

📡 Detection & Monitoring

Log Indicators:

  • Unexpected subsystem crashes
  • Privilege escalation attempts
  • Memory corruption errors in system logs

Network Indicators:

  • Not applicable - local vulnerability

SIEM Query:

Search for: 'subsystem crash', 'memory corruption', 'out-of-range identifier' in system logs

🔗 References

📤 Share & Export