CVE-2025-47370
📋 TL;DR
This vulnerability allows a remote attacker to cause a denial of service (DoS) by sending invalid Bluetooth Low Energy (LE) connection requests during a connectable scan. It affects devices with Qualcomm Bluetooth chipsets that are performing LE scans. The attack disrupts Bluetooth functionality temporarily but doesn't compromise data or allow code execution.
💻 Affected Systems
- Qualcomm Bluetooth chipsets
📦 What is this software?
S3 Gen 2 Sound Platform Firmware by Qualcomm
S5 Gen 2 Sound Platform Firmware by Qualcomm
Snapdragon 778g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Platform Firmware →
Snapdragon 778g\+ 5g Mobile Platform \(sm7325 Ae\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g\+ 5g Mobile Platform \(sm7325 Ae\) Firmware →
Snapdragon 782g Mobile Platform \(sm7325 Af\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 782g Mobile Platform \(sm7325 Af\) Firmware →
Snapdragon 7c\+ Gen 3 Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 7c\+ Gen 3 Compute Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 3 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Platform Firmware →
Snapdragon Ar1 Gen 1 Platform \"luna1\" Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar1 Gen 1 Platform \"luna1\" Firmware →
Snapdragon Ar1 Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar1 Gen 1 Platform Firmware →
Snapdragon Ar2 Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar2 Gen 1 Platform Firmware →
Snapdragon Auto 4g Modem Firmware by Qualcomm
Snapdragon Auto 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Firmware →
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon X72 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X72 5g Modem Rf System Firmware →
Snapdragon X75 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X75 5g Modem Rf System Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Permanent Bluetooth radio failure requiring device reboot, disrupting all Bluetooth-dependent services including medical devices, payment systems, or industrial controls.
Likely Case
Temporary Bluetooth service disruption lasting seconds to minutes, causing dropped connections and requiring manual reconnection of paired devices.
If Mitigated
Minor service interruption with automatic recovery within seconds, minimal user impact.
🎯 Exploit Status
Requires attacker to be within Bluetooth range (typically <100m) and send malformed packets during specific scan windows. Timing is critical.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Qualcomm November 2025 security bulletin for specific firmware versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2025-bulletin.html
Restart Required: Yes
Instructions:
1. Check device manufacturer for firmware updates. 2. Apply Qualcomm-provided Bluetooth firmware patch. 3. Reboot device. 4. Verify Bluetooth functionality.
🔧 Temporary Workarounds
Disable Bluetooth LE scanning
allPrevents the vulnerable state by disabling connectable LE scans
# Android: adb shell settings put global bluetooth_le_scan_mode 0
# Linux: hciconfig hci0 noscan
Reduce Bluetooth visibility
allSet Bluetooth to non-discoverable mode to limit scan exposure
# Android: adb shell settings put global bluetooth_discoverability 0
# Linux: hciconfig hci0 piscan
🧯 If You Can't Patch
- Disable Bluetooth when not in use, especially in high-risk environments
- Implement physical security controls to limit Bluetooth range access
🔍 How to Verify
Check if Vulnerable:
Check if device uses Qualcomm Bluetooth and performs LE scans: 'hciconfig -a' on Linux or check Bluetooth settings on Android
Check Version:
# Linux: hciconfig -a | grep Firmware
# Android: getprop | grep bluetooth
Verify Fix Applied:
Verify Bluetooth firmware version matches patched version from Qualcomm bulletin and test LE scanning functionality
📡 Detection & Monitoring
Log Indicators:
- Bluetooth stack crashes
- LE scan failures
- Connection request errors in Bluetooth logs
Network Indicators:
- Unusual Bluetooth LE connection attempts from unknown MAC addresses
- Malformed Bluetooth packets
SIEM Query:
source="bluetooth_logs" AND ("LE scan failed" OR "connection request invalid")