CVE-2025-47384
📋 TL;DR
This vulnerability allows a denial-of-service (DoS) condition in Qualcomm MAC (Media Access Control) components when an attacker configures a MAC configuration ID beyond the supported maximum value. This affects devices using vulnerable Qualcomm chipsets, primarily mobile devices, IoT devices, and networking equipment.
💻 Affected Systems
- Qualcomm chipsets with vulnerable MAC implementations
📦 What is this software?
5g Fixed Wireless Access Platform Firmware by Qualcomm
View all CVEs affecting 5g Fixed Wireless Access Platform Firmware →
Snapdragon 4 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 1 Mobile Platform Firmware →
Snapdragon 480 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 480 5g Mobile Platform Firmware →
Snapdragon 480 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 480 5g Mobile Platform Firmware →
Snapdragon 690 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 690 5g Mobile Platform Firmware →
Snapdragon 695 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 695 5g Mobile Platform Firmware →
Snapdragon 778g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Platform Firmware →
Snapdragon 778g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Platform Firmware →
Snapdragon 782g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 782g Mobile Platform Firmware →
Snapdragon 7c\+ Gen 3 Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 7c\+ Gen 3 Compute Firmware →
Snapdragon 865 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 865 5g Mobile Platform Firmware →
Snapdragon 865 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 865 5g Mobile Platform Firmware →
Snapdragon 870 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 870 5g Mobile Platform Firmware →
Snapdragon 888 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 888 5g Mobile Platform Firmware →
Snapdragon 888 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 888 5g Mobile Platform Firmware →
Snapdragon Auto 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Firmware →
Snapdragon X53 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X53 5g Modem Rf System Firmware →
Snapdragon X55 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf System Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Permanent device crash requiring hardware reset or reboot, disrupting critical services on affected devices.
Likely Case
Temporary service disruption (transient DoS) causing device instability or reboot, affecting functionality until system recovers.
If Mitigated
Minimal impact with proper input validation and boundary checking in place.
🎯 Exploit Status
Requires ability to send MAC configuration commands; likely requires some level of network/system access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Qualcomm March 2026 security bulletin for specific firmware versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2026-bulletin.html
Restart Required: Yes
Instructions:
1. Check Qualcomm bulletin for affected chipset models. 2. Obtain updated firmware from device manufacturer. 3. Apply firmware update following manufacturer instructions. 4. Reboot device.
🔧 Temporary Workarounds
Restrict MAC configuration access
linuxLimit network access to MAC configuration interfaces to trusted sources only
iptables -A INPUT -p tcp --dport [MAC_CONFIG_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [MAC_CONFIG_PORT] -j DROP
Input validation at application layer
allImplement boundary checking for MAC configuration IDs before passing to hardware
🧯 If You Can't Patch
- Segment network to isolate devices with vulnerable MAC interfaces
- Implement strict access controls and monitoring for MAC configuration traffic
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against Qualcomm bulletin; test by attempting to configure MAC with ID beyond documented maximum (caution: may cause DoS)
Check Version:
cat /proc/version | grep -i qualcomm OR check device firmware settings
Verify Fix Applied:
Verify firmware version matches patched version from bulletin; test MAC configuration boundary validation
📡 Detection & Monitoring
Log Indicators:
- MAC configuration errors
- System crashes/reboots following MAC config changes
- Out-of-bounds configuration attempts
Network Indicators:
- Unusual MAC configuration traffic
- Traffic to MAC management ports from untrusted sources
SIEM Query:
source="network_logs" AND (dest_port="[MAC_CONFIG_PORT]" OR protocol="MAC_CONFIG") AND config_id>MAX_VALUE