CVE-2025-47371
📋 TL;DR
This vulnerability allows a denial-of-service (DoS) attack against LTE user equipment (UE) when it receives an RLC packet with an invalid transport block (TB). Mobile devices using affected Qualcomm chipsets are vulnerable to temporary service disruption.
💻 Affected Systems
- Qualcomm LTE modems/chipsets
📦 What is this software?
5g Fixed Wireless Access Platform Firmware by Qualcomm
View all CVEs affecting 5g Fixed Wireless Access Platform Firmware →
Orne Firmware by Qualcomm
Snapdragon 4 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 2 Mobile Platform Firmware →
Snapdragon 460 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 460 Mobile Platform Firmware →
Snapdragon 6 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 6 Gen 1 Mobile Platform Firmware →
Snapdragon 6 Gen 3 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 6 Gen 3 Mobile Platform Firmware →
Snapdragon 6 Gen 4 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 6 Gen 4 Mobile Platform Firmware →
Snapdragon 662 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 662 Mobile Platform Firmware →
Snapdragon 680 4g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 680 4g Mobile Platform Firmware →
Snapdragon 685 4g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 685 4g Mobile Platform Firmware →
Snapdragon 690 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 690 5g Mobile Platform Firmware →
Snapdragon 7 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 7 Gen 1 Mobile Platform Firmware →
Snapdragon 7\+ Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 7\+ Gen 2 Mobile Platform Firmware →
Snapdragon 7c Compute Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 7c Compute Platform Firmware →
Snapdragon 7c Gen 2 Compute Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 7c Gen 2 Compute Platform Firmware →
Snapdragon 7s Gen 3 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 7s Gen 3 Mobile Platform Firmware →
Snapdragon 8 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Platform Firmware →
Snapdragon 8 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 3 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Platform Firmware →
Snapdragon 865 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 865 5g Mobile Platform Firmware →
Snapdragon 865 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 865 5g Mobile Platform Firmware →
Snapdragon 870 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 870 5g Mobile Platform Firmware →
Snapdragon Auto 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Firmware →
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon X55 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf System Firmware →
Snapdragon X65 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf System Firmware →
Snapdragon X72 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X72 5g Modem Rf System Firmware →
Snapdragon X75 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X75 5g Modem Rf System Firmware →
⚠️ Risk & Real-World Impact
Worst Case
An attacker could cause persistent service disruption to mobile devices, preventing voice/data connectivity until device restart or network reattachment.
Likely Case
Temporary service interruption requiring device reboot or network reconnection to restore functionality.
If Mitigated
Minimal impact with proper network filtering and updated firmware preventing malicious packets from reaching devices.
🎯 Exploit Status
Exploitation requires sending specially crafted LTE RLC packets to target devices, typically requiring proximity or network access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Qualcomm March 2026 security bulletin
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2026-bulletin.html
Restart Required: Yes
Instructions:
1. Check device manufacturer for firmware updates. 2. Apply Qualcomm-provided patches via OEM updates. 3. Reboot device after update.
🔧 Temporary Workarounds
Network filtering
allImplement network-level filtering to block malicious LTE RLC packets
🧯 If You Can't Patch
- Restrict physical access to prevent local RF-based attacks
- Monitor for unusual service disruptions and investigate potential attacks
🔍 How to Verify
Check if Vulnerable:
Check device chipset version against Qualcomm advisory; no simple command available
Check Version:
Device-specific (e.g., Android: Settings > About phone > Baseband version)
Verify Fix Applied:
Verify firmware version matches patched version from manufacturer
📡 Detection & Monitoring
Log Indicators:
- Unexpected LTE RLC protocol errors
- Frequent radio link failures
Network Indicators:
- Unusual LTE control plane traffic patterns
SIEM Query:
Search for LTE RLC protocol anomalies or DoS events in mobile network logs