CVE-2025-47373
📋 TL;DR
This CVE describes a memory corruption vulnerability in Qualcomm Trusted Application (TA) invocation where accessing buffers with invalid length can lead to arbitrary code execution. It affects devices with Qualcomm chipsets that use the vulnerable TA implementation. Attackers could potentially exploit this to gain elevated privileges on affected systems.
💻 Affected Systems
- Qualcomm chipsets with Trusted Application (TA) functionality
📦 What is this software?
Orne Firmware by Qualcomm
Qualcomm Dragonwing Qru100 Platform Firmware by Qualcomm
View all CVEs affecting Qualcomm Dragonwing Qru100 Platform Firmware →
Qualcomm Dragonwing X100 Accelerator Card Firmware by Qualcomm
View all CVEs affecting Qualcomm Dragonwing X100 Accelerator Card Firmware →
Snapdragon 4 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 1 Mobile Platform Firmware →
Snapdragon 4 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 2 Mobile Platform Firmware →
Snapdragon 460 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 460 Mobile Platform Firmware →
Snapdragon 480 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 480 5g Mobile Platform Firmware →
Snapdragon 480 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 480 5g Mobile Platform Firmware →
Snapdragon 6 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 6 Gen 1 Mobile Platform Firmware →
Snapdragon 6 Gen 3 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 6 Gen 3 Mobile Platform Firmware →
Snapdragon 6 Gen 4 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 6 Gen 4 Mobile Platform Firmware →
Snapdragon 662 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 662 Mobile Platform Firmware →
Snapdragon 680 4g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 680 4g Mobile Platform Firmware →
Snapdragon 685 4g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 685 4g Mobile Platform Firmware →
Snapdragon 695 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 695 5g Mobile Platform Firmware →
Snapdragon 7 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 7 Gen 1 Mobile Platform Firmware →
Snapdragon 7\+ Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 7\+ Gen 2 Mobile Platform Firmware →
Snapdragon 7s Gen 3 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 7s Gen 3 Mobile Platform Firmware →
Snapdragon 8 Elite Gen 5 Firmware by Qualcomm
Snapdragon 8 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Platform Firmware →
Snapdragon 8 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 3 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Platform Firmware →
Snapdragon Ar1 Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar1 Gen 1 Platform Firmware →
Snapdragon Ar1 Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar1 Gen 1 Platform Firmware →
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon X32 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X32 5g Modem Rf System Firmware →
Snapdragon X35 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X35 5g Modem Rf System Firmware →
Snapdragon X72 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X72 5g Modem Rf System Firmware →
Snapdragon X75 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X75 5g Modem Rf System Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attackers to execute arbitrary code with kernel privileges, potentially leading to persistent backdoors, data theft, or device bricking.
Likely Case
Local privilege escalation allowing attackers to gain elevated system access from a lower-privileged context, potentially leading to data compromise or further system exploitation.
If Mitigated
Limited impact with proper access controls and isolation mechanisms in place, potentially contained within the TA execution environment.
🎯 Exploit Status
Exploitation requires local access and ability to invoke TA with crafted parameters; memory corruption vulnerabilities in TA environments can be challenging to exploit reliably
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patches included in March 2026 Qualcomm security bulletin
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2026-bulletin.html
Restart Required: Yes
Instructions:
1. Check device manufacturer for security updates. 2. Apply Qualcomm March 2026 security bulletin patches. 3. Update device firmware to latest version. 4. Reboot device after update.
🔧 Temporary Workarounds
Restrict TA invocation permissions
allLimit which applications can invoke Trusted Applications to reduce attack surface
Enable SELinux/security hardening
linuxImplement strict mandatory access controls to contain potential privilege escalation
🧯 If You Can't Patch
- Implement strict application sandboxing to limit TA invocation capabilities
- Deploy endpoint detection and response (EDR) solutions to monitor for suspicious TA activity
🔍 How to Verify
Check if Vulnerable:
Check device security patch level - if before March 2026 Qualcomm patches, likely vulnerable. Review Qualcomm chipset version and firmware.
Check Version:
On Android: 'getprop ro.build.version.security_patch' or 'getprop ro.boot.qfuse'
Verify Fix Applied:
Verify device has March 2026 or later security patches applied. Check Qualcomm security bulletin for specific chipset fixes.
📡 Detection & Monitoring
Log Indicators:
- Unusual TA invocation patterns
- Failed TA authentication attempts
- Memory access violations in TrustZone logs
Network Indicators:
- Not applicable - local vulnerability
SIEM Query:
Search for: 'TrustZone', 'TA invocation', 'memory corruption' in system logs with abnormal patterns