CVE-2025-47376
📋 TL;DR
This vulnerability allows memory corruption when multiple processes concurrently access a shared buffer during IOCTL calls in Qualcomm components. Attackers could potentially execute arbitrary code or cause system crashes. Affects systems using vulnerable Qualcomm hardware/drivers.
💻 Affected Systems
- Qualcomm chipsets with vulnerable drivers
📦 What is this software?
Flight Rb5 5g Platform Firmware by Qualcomm
Qualcomm 215 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Qualcomm 215 Mobile Platform Firmware →
Smart Audio 400 Platform Firmware by Qualcomm
Snapdragon 4 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 1 Mobile Platform Firmware →
Snapdragon 460 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 460 Mobile Platform Firmware →
Snapdragon 480 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 480 5g Mobile Platform Firmware →
Snapdragon 480 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 480 5g Mobile Platform Firmware →
Snapdragon 6 Gen 4 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 6 Gen 4 Mobile Platform Firmware →
Snapdragon 660 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 660 Mobile Platform Firmware →
Snapdragon 662 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 662 Mobile Platform Firmware →
Snapdragon 680 4g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 680 4g Mobile Platform Firmware →
Snapdragon 685 4g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 685 4g Mobile Platform Firmware →
Snapdragon 690 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 690 5g Mobile Platform Firmware →
Snapdragon 695 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 695 5g Mobile Platform Firmware →
Snapdragon 778g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Platform Firmware →
Snapdragon 778g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Platform Firmware →
Snapdragon 782g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 782g Mobile Platform Firmware →
Snapdragon 7c\+ Gen 3 Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 7c\+ Gen 3 Compute Firmware →
Snapdragon 7s Gen 3 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 7s Gen 3 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 3 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Platform Firmware →
Snapdragon 865 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 865 5g Mobile Platform Firmware →
Snapdragon 865 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 865 5g Mobile Platform Firmware →
Snapdragon 870 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 870 5g Mobile Platform Firmware →
Snapdragon 888 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 888 5g Mobile Platform Firmware →
Snapdragon 888 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 888 5g Mobile Platform Firmware →
Snapdragon Auto 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Firmware →
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon W5\+ Gen 1 Wearable Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon W5\+ Gen 1 Wearable Platform Firmware →
Snapdragon X12 Lte Modem Firmware by Qualcomm
Snapdragon X32 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X32 5g Modem Rf System Firmware →
Snapdragon X35 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X35 5g Modem Rf System Firmware →
Snapdragon X53 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X53 5g Modem Rf System Firmware →
Snapdragon X55 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf System Firmware →
Snapdragon X72 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X72 5g Modem Rf System Firmware →
Snapdragon X75 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X75 5g Modem Rf System Firmware →
Snapdragon Xr2 5g Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Xr2 5g Platform Firmware →
Snapdragon Xr2\+ Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Xr2\+ Gen 1 Platform Firmware →
Video Collaboration Vc1 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc1 Platform Firmware →
Video Collaboration Vc3 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc3 Platform Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Local privilege escalation to kernel mode, allowing complete system compromise and persistence.
Likely Case
System crash/denial of service or limited information disclosure from memory corruption.
If Mitigated
No impact if proper access controls prevent unauthorized users from making IOCTL calls.
🎯 Exploit Status
Requires local access and ability to trigger concurrent IOCTL calls. Race condition exploitation can be challenging.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Qualcomm March 2026 security bulletin for specific chipset firmware versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2026-bulletin.html
Restart Required: Yes
Instructions:
1. Check Qualcomm advisory for affected chipset models. 2. Obtain updated firmware/drivers from device manufacturer. 3. Apply patches following device-specific update procedures. 4. Reboot system.
🔧 Temporary Workarounds
Restrict IOCTL access
linuxLimit which users/groups can access device files that expose vulnerable IOCTL calls
chmod 600 /dev/qualcomm-device
setfacl -m u:root:rw /dev/qualcomm-device
Disable unnecessary drivers
linuxUnload vulnerable Qualcomm drivers if functionality is not required
rmmod vulnerable_driver_module
🧯 If You Can't Patch
- Implement strict access controls to prevent non-privileged users from accessing Qualcomm device interfaces
- Monitor for unusual IOCTL call patterns and system crashes that might indicate exploitation attempts
🔍 How to Verify
Check if Vulnerable:
Check Qualcomm chipset version and compare against advisory. Use: cat /proc/cpuinfo | grep -i qualcomm
Check Version:
dmesg | grep -i qualcomm OR cat /sys/class/qualcomm/version
Verify Fix Applied:
Verify driver/firmware version matches patched version from Qualcomm bulletin. Check system logs for successful driver updates.
📡 Detection & Monitoring
Log Indicators:
- Multiple concurrent IOCTL calls to Qualcomm devices
- System crashes with memory corruption errors
- Kernel panic messages
Network Indicators:
- Not network exploitable - focus on local system monitoring
SIEM Query:
EventID=6008 OR (Source="Kernel" AND Message="*corruption*" AND Process="*qualcomm*")