CVE-2025-47366
📋 TL;DR
A cryptographic vulnerability in Qualcomm's Trusted Zone when triggered by the High-Level Operating System (HLOS) providing incorrect input. This allows potential cryptographic bypass or manipulation affecting devices using Qualcomm chipsets with outdated firmware.
💻 Affected Systems
- Qualcomm chipsets with Trusted Zone implementation
📦 What is this software?
Snapdragon 4 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 1 Mobile Firmware →
Snapdragon 4 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 2 Mobile Firmware →
Snapdragon 480 5g Mobile Firmware by Qualcomm
Snapdragon 480 5g Mobile Firmware by Qualcomm
Snapdragon 6 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 6 Gen 1 Mobile Firmware →
Snapdragon 680 4g Mobile Firmware by Qualcomm
Snapdragon 685 4g Mobile Firmware by Qualcomm
Snapdragon 695 5g Mobile Firmware by Qualcomm
Snapdragon 7 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 7 Gen 1 Mobile Firmware →
Snapdragon 7\+ Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 7\+ Gen 2 Mobile Firmware →
Snapdragon 8 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Firmware →
Snapdragon 8 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Firmware →
Snapdragon 8 Gen 3 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Firmware →
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon W5\+ Gen 1 Wearable Firmware by Qualcomm
View all CVEs affecting Snapdragon W5\+ Gen 1 Wearable Firmware →
Snapdragon X32 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X32 5g Modem Rf Firmware →
Snapdragon X35 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X35 5g Modem Rf Firmware →
Snapdragon X72 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X72 5g Modem Rf Firmware →
Snapdragon X75 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X75 5g Modem Rf Firmware →
Video Collaboration Vc3 Firmware by Qualcomm
Video Collaboration Vc5 Firmware by Qualcomm
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of cryptographic protections, allowing decryption of sensitive data, authentication bypass, or execution of unauthorized code in secure contexts.
Likely Case
Partial cryptographic bypass enabling data leakage or integrity violations in secure applications.
If Mitigated
Limited impact with proper input validation and updated firmware preventing exploitation.
🎯 Exploit Status
Exploitation requires HLOS-level access and specific triggering conditions; no public exploits known as of reference date
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: February 2026 security updates from Qualcomm
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/february-2026-bulletin.html
Restart Required: Yes
Instructions:
1. Check device manufacturer for firmware updates. 2. Apply Qualcomm February 2026 security patches. 3. Reboot device after update. 4. Verify patch installation through version checks.
🔧 Temporary Workarounds
Input Validation Enhancement
allImplement strict input validation in HLOS to prevent malformed inputs from reaching Trusted Zone
Trusted Zone Access Restriction
allLimit HLOS access to Trusted Zone functionality to essential operations only
🧯 If You Can't Patch
- Implement network segmentation to isolate vulnerable devices
- Monitor for unusual cryptographic operations or Trusted Zone access patterns
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against Qualcomm's February 2026 security bulletin; devices with pre-February 2026 patches are likely vulnerable
Check Version:
Device-specific commands vary by manufacturer; typically 'getprop ro.build.version.security_patch' on Android devices
Verify Fix Applied:
Verify firmware version includes February 2026 security updates; check Qualcomm patch status through device settings or manufacturer tools
📡 Detection & Monitoring
Log Indicators:
- Unusual Trusted Zone access patterns
- Cryptographic operation failures
- HLOS-to-TrustedZone communication errors
Network Indicators:
- Anomalous secure communication patterns
- Unexpected cryptographic protocol usage
SIEM Query:
Search for Trusted Zone access logs with malformed input patterns or cryptographic exceptions