Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Security Vulnerabilities329568
CVE-2025-10501
Assigner-Chrome
ShareView Details
Assigner-Chrome
CVSS Score-8.8||HIGH
EPSS-0.13% / 32.63%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 16:17
Updated-25 Sep, 2025 | 15:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use after free in WebRTC in Google Chrome prior to 140.0.7339.185 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Action-Not Available
Vendor-Apple Inc.Linux Kernel Organization, IncGoogle LLCMicrosoft Corporation
Product-chromelinux_kernelmacoswindowsChrome
CWE ID-CWE-416
Use After Free
CVE-2025-10500
Assigner-Chrome
ShareView Details
Assigner-Chrome
CVSS Score-8.8||HIGH
EPSS-0.14% / 34.18%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 16:17
Updated-25 Sep, 2025 | 15:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use after free in Dawn in Google Chrome prior to 140.0.7339.185 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Action-Not Available
Vendor-Apple Inc.Linux Kernel Organization, IncGoogle LLCMicrosoft Corporation
Product-chromelinux_kernelmacoswindowsChrome
CWE ID-CWE-416
Use After Free
CVE-2025-10585
Assigner-Chrome
ShareView Details
Assigner-Chrome
CVSS Score-8.8||HIGH
EPSS-0.70% / 71.46%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 16:17
Updated-30 Oct, 2025 | 15:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2025-10-14||Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Type confusion in V8 in Google Chrome prior to 140.0.7339.185 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Action-Not Available
Vendor-Google LLCLinux Kernel Organization, IncMicrosoft CorporationApple Inc.
Product-macoslinux_kernelwindowschromeChromeChromium V8
CWE ID-CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
CVE-2025-10360
Assigner-Perforce
ShareView Details
Assigner-Perforce
CVSS Score-6.9||MEDIUM
EPSS-0.03% / 8.25%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 15:49
Updated-24 Sep, 2025 | 18:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insufficiently Protected Credentials in Puppet Enterprise 2025.4 and 2025.5

In Puppet Enterprise versions 2025.4.0 and 2025.5, the encryption key used for encrypting content in the Infra Assistant database was not excluded from the files gathered by Puppet backup. The key is only present on the system if the user has a Puppet Enterprise Advanced license and has enabled the Infra Assistant feature. The key is used for encrypting one particular bit of data in the Infra Assistant database: the API key for their AI provider account. This has been fixed in Puppet Enterprise version 2025.6, and release notes for 2025.6 have remediation steps for users of affected versions who can't update to the latest version.

Action-Not Available
Vendor-Perforce Software, Inc.
Product-Puppet Enterprise
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2025-47329
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 15:33
Updated-25 Sep, 2025 | 18:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Release of Invalid Pointer or Reference in Android Core

Memory corruption while handling invalid inputs in application info setup.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6574_firmwareqcs6690sw5100wcd9390sa8255psa8775p_firmwareqca6696_firmwarewsa8832_firmwareqcs6690_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwareqam8255pwsa8830_firmwarefastconnect_7800wcn6755wcd9380_firmwaresnapdragon_w5\+_gen_1_wearable_platformsa8770psa8155pqca6595_firmwarewsa8845hwsa8830wcd9390_firmwaresa8195p_firmwaresnapdragon_ar1_gen_1_platformwsa8840_firmwareqca6696qca6574asa8195pwsa8840qca6595au_firmwareqca6574au_firmwaresa9000p_firmwaresa6155p_firmwareqcm6690sw5100pwsa8845h_firmwarewcn7881_firmwarewcd9395wcn6450sa8775pqam8255p_firmwarewcd9380qca6574ausa8770p_firmwareqca6574wcn7861qam8775p_firmwaresnapdragon_8_gen_3_mobile_platform_firmwaresa8255p_firmwarewcd9385_firmwareqam8775pwsa8835sw5100p_firmwarewcn6450_firmwaresa6155pwcd9385qcm6690_firmwarewcn7881qca6595ausa9000pwcn6755_firmwarewsa8845_firmwarewsa8835_firmwarewcn7861_firmwarewsa8832wcd9395_firmwareqca6595snapdragon_ar1_gen_1_platform_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"sw5100_firmwarefastconnect_7800_firmwaresnapdragon_8_gen_3_mobile_platformsa8155p_firmwareqca6574a_firmwarewsa8845Snapdragon
CWE ID-CWE-763
Release of Invalid Pointer or Reference
CVE-2025-47328
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.06% / 17.44%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 15:33
Updated-25 Sep, 2025 | 18:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in WLAN HAL

Transient DOS while processing power control requests with invalid antenna or stream values.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcc710_firmwareqfw7124sm8735_firmwaresm8750p_firmwarewcn7880_firmwareimmersive_home_3210_platformsnapdragon_x75_5g_modem-rf_system_firmwareqfw7114qca8080wcn7880qcf8000qcn6224_firmwareqcn9074_firmwarefastconnect_7800snapdragon_x72_5g_modem-rf_systemipq9554wsa8845hqca8081_firmwareqcf8000_firmwareipq9554_firmwareqca8101wsa8840_firmwarewcd9340wcd9378_firmwarewsa8840qcn9024_firmwareipq9574_firmwarewsa8845h_firmwareqca8080_firmwarewcn7881_firmwareqcf8001_firmwareipq5300_firmwarewcn7860qca8085qca8084_firmwaresnapdragon_x72_5g_modem-rf_system_firmwareqca8084qmp1000qcn9074ipq9570_firmwareipq5424_firmwareqxm8083ipq5332qmp1000_firmwarewcn7750_firmwareqcn9274_firmwarewsa8835wcn7881qcn6412_firmwarewsa8835_firmwareqcn6402ipq9570qcn6274_firmwarewsa8832sm8750qcn6402_firmwarewcd9395_firmwareqcn9000_firmwarewcn7750ipq5302qca8075qcf8001ipq9008fastconnect_7800_firmwareqca8384_firmwareqca8102immersive_home_326_platform_firmwareqcn9160qca8082_firmwareqcn6224qca8082wcd9340_firmwareqcn6274wsa8832_firmwareqca8111_firmwareipq5312_firmwareqcn9012wsa8830_firmwareqca8386_firmwareqca8384qcn9000qca8075_firmwareqcn6422qca0000_firmwarewsa8830ipq9048qfw7124_firmwareipq5332_firmwareqca8081wcn7860_firmwareqxm8083_firmwareqcn6432_firmwaresm8750_firmwareqcn5124_firmwareqca8085_firmwareqcn6422_firmwareqcn9012_firmwareqca0000wcd9395qcn6432ipq9008_firmwareqcc710ipq9048_firmwareqca8101_firmwareqca8112_firmwareqcn5224ipq5424qfw7114_firmwareipq5300wcn7861ipq5312immersive_home_3210_platform_firmwareqcn9160_firmwareipq9574qcn9024qca8112qca8386qcn5224_firmwareqcn6412wcd9378qca8111wsa8845_firmwareqcn5124qca8102_firmwaresm8735wcn7861_firmwareqca8385sm8750pqca8385_firmwareqcn9274snapdragon_x75_5g_modem-rf_systemimmersive_home_326_platformipq5302_firmwarewsa8845Snapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2025-47327
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 15:33
Updated-25 Sep, 2025 | 18:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Camera

Memory corruption while encoding the image data.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcs5430snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)_firmwarewcd9340_firmwareqca6430_firmwarefastconnect_6900snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_8c_compute_platform_\(sc8180x-ad\)wcd9370_firmwarevideo_collaboration_vc3_platformwsa8830_firmwareqcs5430_firmwarefastconnect_7800snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)wcd9380_firmwarewsa8845hwsa8830aqt1000wcd9375_firmwarewsa8840_firmwarefastconnect_6700qca6391wcd9340wsa8840qca6391_firmwaresnapdragon_8c_compute_platform_\(sc8180xp-ad\)qcm5430_firmwarewcd9370snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-af\)_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-ac\)_firmwarewsa8845h_firmwarefastconnect_6200fastconnect_6800qca6430aqt1000_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)wsa8810_firmwareqcm6490snapdragon_8cx_compute_platform_\(sc8180x-aa\)_firmwareqca6420snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)_firmwarefastconnect_6700_firmwarewcd9380wcd9341snapdragon_8cx_compute_platform_\(sc8180x-ab\)snapdragon_7c\+_gen_3_compute_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwaresc8380xp_firmwarewsa8815snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)video_collaboration_vc3_platform_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-ac\)snapdragon_8cx_compute_platform_\(sc8180xp-af\)wcd9341_firmwarewcd9385_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)wsa8835snapdragon_8cx_compute_platform_\(sc8180x-ab\)_firmwarewcd9385wcd9375snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwarewsa8845_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-aa\)wsa8835_firmwarefastconnect_6200_firmwareqcm5430qcm6490_firmwarewsa8815_firmwaresnapdragon_8c_compute_platform_\(sc8180xp-ad\)_firmwareqcs6490_firmwarefastconnect_6900_firmwarefastconnect_6800_firmwaresnapdragon_8c_compute_platform_\(sc8180x-ad\)_firmwareqcs6490wsa8810snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)fastconnect_7800_firmwaresc8380xpwsa8845qca6420_firmwareSnapdragon
CWE ID-CWE-416
Use After Free
CVE-2025-47326
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.06% / 17.44%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 15:33
Updated-25 Sep, 2025 | 18:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in WLAN HAL

Transient DOS while handling command data during power control processing.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcc710_firmwareqfw7124ipq8071a_firmwaresm8735_firmwaresm7635p_firmwaresdx55sm8750p_firmwareipq8071aimmersive_home_3210_platformsnapdragon_x75_5g_modem-rf_system_firmwarewcn7880_firmwareipq8173_firmwareqfw7114qca8080wcn6650fastconnect_6900ipq8078a_firmwareipq8072awcn7880qcf8000qca9888_firmwareqcn6224_firmwareqcn9074_firmwarefastconnect_7800sm7635pwcn6755qcn9072_firmwareipq5028_firmwareipq9554qcn6023snapdragon_x72_5g_modem-rf_systemwsa8845hqcn5024qca8081_firmwareqcf8000_firmwareipq9554_firmwareqca8101wsa8840_firmwarewcd9340wcd9378_firmwarewsa8840qcn6132_firmwareipq8074a_firmwareqca8337qcn5052_firmwareqcn9024_firmwareipq9574_firmwarewsa8845h_firmwareipq8076aqca8080_firmwarewcn7881_firmwaresm6650p_firmwareqcf8001_firmwareipq5300_firmwareipq5010_firmwareqcn5152sm6650wcn7860qcn5024_firmwareipq6028_firmwareqca8085qca8084_firmwareipq8070a_firmwaresnapdragon_x72_5g_modem-rf_system_firmwareqca4024immersive_home_216_platform_firmwareimmersive_home_316_platform_firmwareqca8084qmp1000qcn9070_firmwareqcn9072ipq8076qcn9074qcn5022_firmwareimmersive_home_216_platformipq9570_firmwareipq5010ipq5028qcn5164_firmwareipq5424_firmwareqxm8083qcn5022ipq5332qcn6024_firmwareqmp1000_firmwarewcn7750_firmwareqcn9274_firmwarewsa8835qcn5122_firmwareqca9889_firmwarewcn7881sdx65m_firmwareqcn6412_firmwarewsa8835_firmwareqcn6402ipq9570sm6650pqcn6112_firmwareqcn6274_firmwaresnapdragon_x65_5g_modem-rf_system_firmwarewsa8832sm8750qcn6402_firmwarewcd9395_firmwareqcn9000_firmwaresm6650_firmwarewcn7750ipq5302qca8075qcf8001ipq9008fastconnect_7800_firmwareqcn6023_firmwareipq6010qcn5122qca8384_firmwareqca8102qcn6122immersive_home_326_platform_firmwarear8035ipq8173qcn9100qcn9160qca8082_firmwareimmersive_home_318_platformqca8082qcn6224sm7635_firmwarewcd9340_firmwarecsr8811qcn6274wsa8832_firmwareqca8111_firmwareipq5312_firmwareqcn9012ipq8078_firmwareqcf8000sfp_firmwarewsa8830_firmwareqca8386_firmwareqca8384qcn9000qca8075_firmwareqcn5164ipq8078aqcn6422qca0000_firmwareqcn5052wsa8830ipq9048qcn6112qfw7124_firmwareipq8078qcn6024ipq5332_firmwareimmersive_home_316_platformqca8081snapdragon_x65_5g_modem-rf_systemqcn5154_firmwareqcn9100_firmwarewcn7860_firmwareqxm8083_firmwareqcn6432_firmwareipq6000_firmwaresm8750_firmwareipq8076_firmwareqcn5124_firmwareqcn9022_firmwareqca8085_firmwareqcn6422_firmwareqca8337_firmwareipq8074aqcn9012_firmwareqca0000wcd9395immersive_home_214_platform_firmwaresm7635qcn6432ipq6018ipq9008_firmwareipq6000qcc710ipq9048_firmwareqca8101_firmwareqca8112_firmwareqcn5224immersive_home_214_platformipq5424ipq8076a_firmwareqfw7114_firmwareipq5300wcn7861ipq5312ipq6028qcn5152_firmwareimmersive_home_3210_platform_firmwareqcn9160_firmwarecsr8811_firmwareipq9574qcn6122_firmwareipq8174_firmwareqcn9024qca8112qcn5154ipq8174qca8386qcn5224_firmwareqcn6412qca9889sdx65mqcn6132qca8111qcn9070wcd9378immersive_home_318_platform_firmwarewcn6755_firmwarewsa8845_firmwareqcn5124sdx55_firmwareqca8102_firmwaresm8735wcn7861_firmwareipq6018_firmwareipq8070afastconnect_6900_firmwareqca8385qcn9022qcf8000sfpar8035_firmwaresm8750pwcn6650_firmwareqca8385_firmwareipq8072a_firmwareqcn9274qca9888snapdragon_x75_5g_modem-rf_systemimmersive_home_326_platformipq5302_firmwarewsa8845ipq6010_firmwareqca4024_firmwareSnapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2025-47318
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.07% / 22.02%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 15:33
Updated-28 Nov, 2025 | 16:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in BT Controller

Transient DOS while parsing the EPTM test control message to get the test pattern.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcn9000_firmwarewcd9380smart_audio_400_platform_firmwaresnapdragon_888_5g_mobile_platform_firmwaresdx55snapdragon_8cx_compute_platform_\(sc8180x-ab\)_firmwarewcd9340_firmwareqca6688aqqam8650pqca6420_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqca1062_firmwaresnapdragon_x72_5g_modem-rf_systemqcn9002sa6155psnapdragon_870_5g_mobile_platform_\(sm8250-ac\)qcn9001_firmwareqamsrv1m_firmwaresnapdragon_7c\+_gen_3_compute_firmwaresnapdragon_8\+_gen_2_mobile_platformsnapdragon_x5_lte_modemar8031qfw7124_firmwaresnapdragon_820_automotive_platform_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwareqcc2073home_hub_100_platform_firmwaresdx61aqt1000snapdragon_8cx_compute_platform_\(sc8180x-ab\)snapdragon_8_gen_2_mobile_platform_firmwaresm7325p_firmwareqcn9003_firmwareqcn9022_firmwareqam8255p_firmwaresdx61_firmwaresa8150p_firmwareqca2066_firmwaresnapdragon_w5\+_gen_1_wearable_platformqamsrv1h_firmwares3_gen_2_sound_platformsnapdragon_auto_4g_modemwcd9341_firmwaresnapdragon_auto_5g_modem-rf_gen_2qca6584_firmwaresd_8_gen1_5gsnapdragon_xr2\+_gen_1_platform_firmwareqcn6112wcd9360_firmwareqam8295pssg2115pwcd9385_firmwaresa7255p_firmwareqcn9072qca6391qcc5161_firmwaresa8295p_firmwareqca6584au_firmwaresnapdragon_x72_5g_modem-rf_system_firmwareqcc7226wsa8810snapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)_firmwareqcn9024wsa8815srv1hvideo_collaboration_vc5_platformsnapdragon_xr2\+_gen_1_platformwcd9326_firmwaresnapdragon_778g_5g_mobile_platform_firmwaremdm9628_firmwarevideo_collaboration_vc5_platform_firmwareimmersive_home_214_platformqcc5161sm8550p_firmwareqca6574au_firmwaresd_8_gen1_5g_firmwareqcn6102snapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-aa\)qca6595au_firmwaresnapdragon_8_gen_2_mobile_platformqcc7225_firmwareqcs8250_firmwareqcn7605csra6620qca6584auwcn3980qca1064_firmwarewcn7880_firmwareqcn6274snapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)sa8150psnapdragon_ar1_gen_1_platform_\"luna1\"_firmwaresa8145p_firmwareqca6797aqqam8650p_firmwareqcn6224_firmwaresm8750_firmwareqca6564asmart_audio_400_platformsa8155pqcm6125snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)sw5100_firmwarewcd9385qca4024_firmwarewcd9380_firmwareimmersive_home_316_platform_firmwareqcn6024sm8750pqca6574awcd9340snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)wcn7880mdm9628wsa8845_firmwareqrb5165n_firmwarewcd9341sa7255pfastconnect_6200sg8275p_firmwareqca8337_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-aa\)_firmwarecsra6640_firmwareqca6698aqqca6554a_firmwaresnapdragon_8c_compute_platform_\(sc8180x-ad\)_firmwarewsa8832qcc7225aqt1000_firmwaresnapdragon_ar1_gen_1_platform_firmwareqcn6224qcc2076snapdragon_7c\+_gen_3_computesnapdragon_ar1_gen_1_platformwcd9370qca8081_firmwareqcc710_firmwareqca6698aq_firmwarecsra6640apq8064au_firmwarefastconnect_6800qca6574a_firmwarewsa8832_firmwaresa8650psw5100psa4150psxr2230p_firmwarewcn7860qcc2076_firmwareqca6678aq_firmwareqcn9070immersive_home_216_platform_firmwaresm8550pmdm9640wcn7881_firmwareqcn9274_firmwareqcn6023_firmwareqcn9003qcn6102_firmwaressg2115p_firmwaresa8145pwsa8845h_firmwarewcd9395_firmwareapq8064auqca6678aqfastconnect_6900_firmwaresa8195pwsa8835_firmwaresa9000psa8295pipq5028wcd9390qcn9072_firmwarear8035snapdragon_888_5g_mobile_platformqcn6122sa8775p_firmwaresdx55_firmwareqcn7606_firmwareqam8775pqca6696_firmwareimmersive_home_214_platform_firmwareqca6797aq_firmwaresnapdragon_x55_5g_modem-rf_system_firmwareqcs8250qca6564au_firmwareapq8017sa8650p_firmwaresg8275_firmwareqcc711mdm9640_firmwareqcn9011_firmwaresxr2250p_firmwarewcn7881qca1062srv1mqcn9012_firmwarecsra6620_firmwarewcd9395qcn9012sxr2250pwsa8810_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareqcc7226_firmwarewcd9360qcn9002_firmwareqca6554awsa8840snapdragon_778g_5g_mobile_platformsxr1230pqcc7228_firmwareqcn7605_firmwarewcn7861_firmwarewsa8840_firmwareqcn7606snapdragon_8\+_gen_2_mobile_platform_firmwarefastconnect_6700_firmwareqcc711_firmwaresa8155_firmwaresg8275snapdragon_782g_mobile_platform_\(sm7325-af\)_firmwares3_sound_platformfastconnect_6700qca6696wcn3950_firmwarewcn3980_firmwarewsa8845hqcn6100_firmwareqrb5165mrobotics_rb5_platformqcn6100sa4155p_firmwareqcn9100_firmwaresnapdragon_auto_5g_modem-rf_firmwareqcn9074s5_sound_platform_firmwareqcn9011ssg2125p_firmwaresnapdragon_x5_lte_modem_firmwareqcn9274snapdragon_865_5g_mobile_platformqam8295p_firmwaresm7325pqcn6024_firmwareqfw7114wcd9326snapdragon_x55_5g_modem-rf_systemwcd9370_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)snapdragon_870_5g_mobile_platform_\(sm8250-ac\)_firmwaresnapdragon_8_gen_1_mobile_platformar8035_firmwareqcn9000qcn9100wsa8845qcn6132snapdragon_865_5g_mobile_platform_firmwaremsm8996ausa8155wcn7860_firmwareqamsrv1hs5_gen_2_sound_platform_firmwareqcn9022sm8750qcm6125_firmwareqca6574snapdragon_xr2_5g_platformipq5010_firmwarewcn6740_firmwaresa6150p_firmwares5_sound_platformsa8255p_firmwareqcs7230_firmwaresm8750p_firmwaresxr1230p_firmwaresa6155snapdragon_782g_mobile_platform_\(sm7325-af\)sg8275ps3_sound_platform_firmwarerobotics_rb5_platform_firmwareqcn6122_firmwarevideo_collaboration_vc1_platform_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"fastconnect_7800_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwaresa7775pqca6584sxr2230psnapdragon_820_automotive_platformsa8620p_firmwarevideo_collaboration_vc1_platformsnapdragon_ar2_gen_1_platformqcs7230qca6175ahome_hub_100_platformsnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)sa8770pqrb5165nsrv1m_firmwarewcd9375qca6574_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareflight_rb5_5g_platform_firmwaresa8620psnapdragon_auto_5g_modem-rfapq8017_firmwareqcc7228sa6145p_firmwaresnapdragon_x75_5g_modem-rf_system_firmwareqrb5165m_firmwareqca6430qcn9001qca6595_firmwareqam8775p_firmwareqca6391_firmwaresa8195p_firmwaresnapdragon_x65_5g_modem-rf_systemqca1064wcn6740qca8081qca6688aq_firmwarewcd9335_firmwaresw5100p_firmwaresa6155_firmwareqcn6112_firmwarecsrb31024_firmwaresa7775p_firmwareimmersive_home_318_platformsnapdragon_x75_5g_modem-rf_systemwcn7861wcd9335sa8775pwsa8815_firmwaresa9000p_firmwaresnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)wcd9390_firmwaremsm8996au_firmwarefastconnect_6900qam8255pqcn6274_firmwaresnapdragon_8c_compute_platform_\(sc8180x-ad\)fastconnect_6200_firmwarewsa8835sd865_5gfastconnect_6800_firmwareqca6175a_firmwarewcd9375_firmwareimmersive_home_318_platform_firmwareqca6564auqcn9074_firmwareflight_rb5_5g_platformsa6150pqca6595aus3_gen_2_sound_platform_firmwareqcc710ar8031_firmwareqcn9070_firmwaresnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)_firmwareimmersive_home_316_platformqcn9024_firmwaresa6155p_firmwaressg2125pqamsrv1mqca4024wcn3950sa4155psrv1h_firmwarefastconnect_7800qcs6125_firmwareqfw7124qcs6125sa6145psnapdragon_ar2_gen_1_platform_firmwareqfw7114_firmwares5_gen_2_sound_platformqcc2073_firmwareqca6174a_firmwareqca6564a_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)_firmwareqca6174asnapdragon_w5\+_gen_1_wearable_platform_firmwaresa4150p_firmwareqca8337sw5100snapdragon_auto_4g_modem_firmwareqcn6132_firmwarewsa8830csrb31024wsa8830_firmwareqca6574auqcn6023qca6430_firmwaresa8155p_firmwareipq5028_firmwareqca2066immersive_home_216_platformipq5010sa8770p_firmwareqca6420snapdragon_xr2_5g_platform_firmwareqca6595sd865_5g_firmwaresa8255pSnapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2025-47317
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 15:33
Updated-25 Sep, 2025 | 16:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in BT Controller

Memory corruption due to global buffer overflow when a test command uses an invalid payload type.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcc710_firmwares5_sound_platformwcn3988_firmwaresm8735_firmwaresm7635p_firmwaresm8750p_firmwarewcn7880_firmwarewcd9390s3_gen_2_sound_platformsm7635_firmwarewcn6650s5_gen_2_sound_platform_firmwarewcd9370_firmwarewsa8832_firmwarewcn7880sm7675_firmwareqcc7225_firmwaresm6475wsa8830_firmwaresm8635_firmwaresm7635pfastconnect_7800wcd9371_firmwarewcn6755wsa8845hwsa8830wcd9390_firmwareqcc7225sm7550p_firmwarewcd9375_firmwares3_gen_2_sound_platform_firmwarewsa8840_firmwarefastconnect_6700wcn7860_firmwarewcd9378_firmwarewsa8840s5_sound_platform_firmwaresm8750_firmwarewcd9370snapdragon_6_gen_1_mobile_platformwsa8845h_firmwaresm6475_firmwarefastconnect_6200wcn7881_firmwaresm6650p_firmwarewcd9395sm7675ps3_sound_platformsm7635sm6650wsa8810_firmwarewcn7860fastconnect_6700_firmwaresm8635p_firmwareqcc710qcc711_firmwaresm7550psm8635psm7550qmp1000sm7675wcd9371wsa8815sm7550_firmwares5_gen_2_sound_platformwcn7861qcc5161_firmwarewcd9385_firmwareqmp1000_firmwarewcn7750_firmwarewsa8835s3_sound_platform_firmwarewcd9385sm7435wcn7881wcd9375wcd9378wcn6755_firmwarewsa8845_firmwaresm7435_firmwareqcc5161wsa8835_firmwarefastconnect_6200_firmwaresm8735wsa8815_firmwarewcn7861_firmwareqcc7226_firmwaresm6650pwcn3988sm8635wsa8832sm8750wcd9395_firmwaresm8750pwsa8810qcc7226qcc7228sm6650_firmwarewcn7750wcn6650_firmwareqcc7228_firmwarefastconnect_7800_firmwareqcc711snapdragon_6_gen_1_mobile_platform_firmwaresm7675p_firmwarewsa8845Snapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2025-47316
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 15:33
Updated-25 Sep, 2025 | 16:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Double Free in Video

Memory corruption due to double free when multiple threads race to set the timestamp store.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380wcd9341snapdragon_8cx_compute_platform_\(sc8180x-ab\)wcd9340_firmwaresnapdragon_7c\+_gen_3_compute_firmwaresc8380xp_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)qca6430_firmwarefastconnect_6900snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_8c_compute_platform_\(sc8180x-ad\)wcd9341_firmwarewcd9385_firmwarewsa8830_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-ab\)_firmwarewsa8835wsa8845fastconnect_7800snapdragon_8cx_compute_platform_\(sc8180x-aa\)_firmwarewcd9385wcd9380_firmwarewsa8845hwsa8830snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwarewsa8845_firmwareaqt1000snapdragon_8cx_compute_platform_\(sc8180x-aa\)fastconnect_6200_firmwarewsa8835_firmwarefastconnect_6700qca6391wsa8840_firmwarewsa8815_firmwarewcd9340wsa8840qca6391_firmwarefastconnect_6900_firmwarefastconnect_6800_firmwaresnapdragon_8c_compute_platform_\(sc8180x-ad\)_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)_firmwarewsa8810wsa8845h_firmwarefastconnect_6200fastconnect_6800qca6430aqt1000_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)fastconnect_7800_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)wsa8810_firmwareqca6420sc8380xpfastconnect_6700_firmwarewsa8815qca6420_firmwareSnapdragon
CWE ID-CWE-415
Double Free
CVE-2025-47315
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 15:33
Updated-25 Sep, 2025 | 16:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Automotive Software platform based on QNX

Memory corruption while handling repeated memory unmap requests from guest VM.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6698aqsrv1h_firmwaresa8540p_firmwaresa8650p_firmwaresa8255pqamsrv1m_firmwareqca6574ausa8775p_firmwaresrv1m_firmwareqam8620p_firmwaresa8770p_firmwareqamsrv1h_firmwareqam8255p_firmwaresa8295pqca6696_firmwareqca6797aq_firmwareqam8775p_firmwaresa8255p_firmwareqam8255pqam8775pqam8295p_firmwaresa7255p_firmwaresa7775psrv1msa8540psa8770pqca6688aq_firmwareqca6595_firmwareqam8295pqca6595ausa9000psa8620p_firmwaresa8650pqca6797aqqamsrv1mqca6696qam8620psa8295p_firmwaresrv1l_firmwaresrv1hqca6688aqqca6595au_firmwareqca6574au_firmwareqam8650p_firmwaresa9000p_firmwaresa7775p_firmwaresrv1lqca6595qam8650psa7255psa8620pqca6698aq_firmwaresa8775pqamsrv1hSnapdragon
CWE ID-CWE-416
Use After Free
CVE-2025-47314
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.43%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 15:33
Updated-25 Sep, 2025 | 16:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in Automotive Software platform based on QNX

Memory corruption while processing data sent by FE driver.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6698aqsrv1h_firmwaresa8540p_firmwaresa8650p_firmwaresa8255pqamsrv1m_firmwareqca6574ausa8775p_firmwaresrv1m_firmwareqam8620p_firmwaresa8770p_firmwareqamsrv1h_firmwareqam8255p_firmwaresa8295pqca6696_firmwareqca6797aq_firmwareqam8775p_firmwaresa8255p_firmwareqam8255pqam8775pqam8295p_firmwaresa7255p_firmwaresa6155psa7775psrv1msa8540psa8770pqca6688aq_firmwareqca6595_firmwareqam8295pqca6595ausa8155psa9000psa8620p_firmwaresa8195p_firmwaresa8650pqca6797aqqamsrv1mqca6696qam8620psa8195psa8295p_firmwaresrv1hsrv1l_firmwareqca6688aqqca6595au_firmwareqca6574au_firmwareqam8650p_firmwaresa9000p_firmwaresa7775p_firmwaresa6155p_firmwaresrv1lqca6595qam8650psa7255psa8620psa8155p_firmwareqca6698aq_firmwaresa8775pqamsrv1hSnapdragon
CWE ID-CWE-20
Improper Input Validation
CVE-2025-27077
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 15:33
Updated-25 Sep, 2025 | 16:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Automotive Software platform based on QNX

Memory corruption while processing message in guest VM.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6698aqsrv1h_firmwaresa8540p_firmwaresa8650p_firmwaresa8255pqamsrv1m_firmwareqca6574ausa8775p_firmwaresrv1m_firmwareqam8620p_firmwaresa8770p_firmwareqamsrv1h_firmwareqam8255p_firmwaresa8295pqca6696_firmwareqca6797aq_firmwareqam8775p_firmwaresa8255p_firmwareqam8255pqam8775pqam8295p_firmwaresa7255p_firmwaresa7775psrv1msa8540psa8770pqca6688aq_firmwareqca6595_firmwareqam8295pqca6595ausa9000psa8620p_firmwaresa8650pqca6797aqqamsrv1mqca6696qam8620psa8295p_firmwaresrv1l_firmwaresrv1hqca6688aqqca6595au_firmwareqca6574au_firmwareqam8650p_firmwaresa9000p_firmwaresa7775p_firmwaresrv1lqca6595qam8650psa7255psa8620pqca6698aq_firmwaresa8775pqamsrv1hSnapdragon
CWE ID-CWE-416
Use After Free
CVE-2025-27037
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 15:33
Updated-25 Sep, 2025 | 16:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Camera Driver

Memory corruption while processing config_dev IOCTL when camera kernel driver drops its reference to CPU buffers.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3988_firmwaresw5100snapdragon_xr2_5g_platformfastconnect_6900wcn3680bqca6696_firmwaresnapdragon_x55_5g_modem-rf_systemqca6436wsa8830_firmwaresnapdragon_870_5g_mobile_platform_\(sm8250-ac\)qcn9074_firmwarefastconnect_7800sa8145pwcd9380_firmwaresa8155pwsa8830sa8195p_firmwaresd865_5g_firmwareqca6391qca6696sa8195psa8295p_firmwareqca6391_firmwaresnapdragon_xr2_5g_platform_firmwareqca6574au_firmwaresa8145p_firmwaresa6150p_firmwaresa6155p_firmwaresw5100pfastconnect_6800qca6426wsa8810_firmwarewcd9380snapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)snapdragon_x55_5g_modem-rf_system_firmwareqca6574auqcn9074wcn3980_firmwaresnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)_firmwaresa8295pwcn3680b_firmwaresa8150p_firmwaresnapdragon_8_gen_1_mobile_platform_firmwaresnapdragon_865_5g_mobile_platformsa8150pwsa8835sw5100p_firmwareqam8295p_firmwareqca6426_firmwaresa6145psa6155psa6145p_firmwareqam8295pwsa8835_firmwarewcn3660b_firmwarewsa8815_firmwaresd865_5gfastconnect_6900_firmwarefastconnect_6800_firmwaresxr2130_firmwarewcn3988wsa8810snapdragon_870_5g_mobile_platform_\(sm8250-ac\)_firmwaresnapdragon_865_5g_mobile_platform_firmwarewcn3980sxr2130sa6150pqca6436_firmwaresnapdragon_8_gen_1_mobile_platformsw5100_firmwarefastconnect_7800_firmwaresa8155p_firmwarewcn3660bwsa8815Snapdragon
CWE ID-CWE-416
Use After Free
CVE-2025-27036
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 2.18%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 15:33
Updated-25 Sep, 2025 | 16:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in Video

Information disclosure when Video engine escape input data is less than expected minimum size.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380qcs5430snapdragon_7c\+_gen_3_compute_firmwaresc8380xp_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)fastconnect_6900snapdragon_7c\+_gen_3_computevideo_collaboration_vc3_platform_firmwarewcd9370_firmwarevideo_collaboration_vc3_platformwcd9385_firmwarewsa8830_firmwarewsa8835qcs5430_firmwarefastconnect_7800wcd9385wcd9380_firmwarewsa8845hwcd9375wsa8830snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwarewsa8845_firmwarewcd9375_firmwareqcm5430wsa8835_firmwarefastconnect_6700wsa8840_firmwareqcm6490_firmwarewsa8840qcs6490_firmwarefastconnect_6900_firmwareqcm5430_firmwarewcd9370qcs6490wsa8845h_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)fastconnect_7800_firmwareqcm6490sc8380xpfastconnect_6700_firmwarewsa8845Snapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2025-27034
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.05% / 15.73%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 15:33
Updated-07 Jan, 2026 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Validation of Array Index in Multi-Mode Call Processor

Memory corruption while selecting the PLMN from SOR failed list.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9360wcd9380315_5g_iot_modem_firmwareqcs6490_firmwarewsa8840sdx80msdx55snapdragon_778g_5g_mobile_platformsnapdragon_888_5g_mobile_platform_firmwarewcd9340_firmwarewcn7861_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_x72_5g_modem-rf_systemwsa8840_firmwarefastconnect_6700_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwaresnapdragon_870_5g_mobile_platform_\(sm8250-ac\)snapdragon_782g_mobile_platform_\(sm7325-af\)_firmwaresnapdragon_7c\+_gen_3_compute_firmwarefastconnect_6700snapdragon_8\+_gen_2_mobile_platformqca6696sm7250p_firmwarewcn3950_firmwareqcm5430_firmwareqcs8550qfw7124_firmwareqcs8550_firmwaresdx61wsa8845hqep8111_firmwaresnapdragon_8_gen_2_mobile_platform_firmwaresm7325p_firmwaresnapdragon_auto_5g_modem-rf_firmwaresdx61_firmwareqcm8550_firmwaresnapdragon_780g_5g_mobile_platform_firmwaresm4635_firmwaresdx57mwcd9341_firmwaresnapdragon_8\+_gen_1_mobile_platformsnapdragon_auto_5g_modem-rf_gen_2sd_8_gen1_5gwcd9360_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)_firmwaresnapdragon_865_5g_mobile_platformsm7675wcd9385_firmwareqcm6490_firmwaresm7635_firmwareqep8111snapdragon_x62_5g_modem-rf_systemqca6391sm7325pqca6584au_firmwareqcn6024_firmwareqfw7114qcs6490snapdragon_480_5g_mobile_platformsnapdragon_690_5g_mobile_platformsnapdragon_x62_5g_modem-rf_system_firmwaresnapdragon_x55_5g_modem-rf_systemsnapdragon_x72_5g_modem-rf_system_firmwaresm8635p_firmwaresm8650q_firmwaresnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmwareqcm8550wcd9370_firmwareqcn9024wsa8810wsa8815qcm4490_firmwaresnapdragon_870_5g_mobile_platform_\(sm8250-ac\)_firmwaresnapdragon_8_gen_1_mobile_platformar8035_firmwaresnapdragon_778g_5g_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwarewsa8845sdx80m_firmwaresnapdragon_865_5g_mobile_platform_firmwaresnapdragon_695_5g_mobile_platform_firmwaresm8550p_firmwarewcn7860_firmwarevideo_collaboration_vc3_platform_firmwaresd_8_gen1_5g_firmwarewcd9378sdx71m_firmwaresm8750snapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)_firmwarewcn6740_firmwareqca6595au_firmwaresm8750p_firmwaresnapdragon_8_gen_2_mobile_platformsnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmwaresnapdragon_782g_mobile_platform_\(sm7325-af\)snapdragon_4_gen_1_mobile_platform_firmwaresg8275pqca6584ausdx71msnapdragon_8\+_gen_1_mobile_platform_firmwarewcn7880_firmwareqcn6274snapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)fastconnect_7800_firmwaresnapdragon_765_5g_mobile_platform_\(sm7250-aa\)snapdragon_x70_modem-rf_system_firmwareqcn6224_firmwaresm8750_firmwaresnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)_firmwarewsa8810_firmwaresnapdragon_695_5g_mobile_platformsnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)wcd9385wcd9380_firmwarewcd9375qcn6024snapdragon_8_gen_1_mobile_platform_firmwaresm8750pwcn6450qcs4490wcn6450_firmwareqca6574asnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)snapdragon_auto_5g_modem-rfwcd9340snapdragon_x75_5g_modem-rf_system_firmwarewcn7880wsa8845_firmwarewcd9341qca6391_firmwarewcn6755fastconnect_6200snapdragon_x65_5g_modem-rf_systemsg8275p_firmwareqca8337_firmwaresnapdragon_x35_5g_modem-rf_systemwcn6740wcn3988_firmwareqca8081sm7635snapdragon_8_gen_3_mobile_platformsnapdragon_765_5g_mobile_platform_\(sm7250-aa\)_firmwareqca6698aqsm8635wsa8832snapdragon_x70_modem-rf_systemqcn6224snapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)snapdragon_7c\+_gen_3_computesnapdragon_x75_5g_modem-rf_systemwcn7861sdx57m_firmwarewcd9370wsa8815_firmwarewcn6650_firmwaresnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)wcd9390_firmwaresm7675pqca8081_firmwarefastconnect_6900qcc710_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)qca6698aq_firmwarevideo_collaboration_vc3_platformqcn6274_firmwarefastconnect_6200_firmwarefastconnect_6800wsa8835qca6574a_firmwarefastconnect_6800_firmwarewcd9375_firmwarewsa8832_firmwareqca6595ausnapdragon_690_5g_mobile_platform_firmwarewcn7860sm7250psm8550pqcc710snapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)_firmwarewcd9378_firmwareqcn9024_firmwarewcn7881_firmwaresm6650qcs5430wcn3950sm6650_firmwarefastconnect_7800qfw7124wsa8845h_firmwarewcd9395_firmwaresnapdragon_x35_5g_modem-rf_system_firmwarefastconnect_6900_firmwarewsa8835_firmwareqcm5430qfw7114_firmwaresnapdragon_4_gen_1_mobile_platformsnapdragon_888_5g_mobile_platformwcd9390ar8035sm8635psm8650qsdx55_firmwaresm4635qca6174a_firmwaresm7675p_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewcn3988qca6174aqca8337qca6696_firmware315_5g_iot_modemwsa8830snapdragon_x55_5g_modem-rf_system_firmwarewsa8830_firmwareqcs5430_firmwareqcs4490_firmwaresm7675_firmwarewcn7881qcm6490snapdragon_780g_5g_mobile_platformwcd9395qcm4490wcn6755_firmwaresnapdragon_x65_5g_modem-rf_system_firmwarewcn6650sm8635_firmwareSnapdragon
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2025-27033
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 2.18%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 15:33
Updated-25 Sep, 2025 | 16:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in Video

Information disclosure while running video usecase having rogue firmware.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcm8550_firmwareqcs5430sm8750p_firmwarewcn7880_firmwaresm7635_firmwarewcn7850_firmwaresm8650p_firmwarewcn6650wcn7880sm7675_firmwaresm8635_firmwareqcs5430_firmwarewcn6755wcn6750_firmwareqcm8550sm8650_firmwareqcs9100_firmwaresm8650q_firmwarewcn7860_firmwarewcn7850qcm5430_firmwaresm8750_firmwareqcs615wcn7851wcn7851_firmwarewcn7881_firmwaresm7675psm7635sm6650qcm6490wcn7860sm8635p_firmwareqca6698aqsm8635psxr2330pqcs9100sm7675wcn6750qcs8550_firmwarewcn6856_firmwaresm8650wcn7861qcn9274_firmwarewcn7881sm8650qwcn6755_firmwareqcm5430qcs615_firmwareqcm6490_firmwarewcn7861_firmwareqcs6490_firmwareqcs8550wcn6856sm8635sm8750pqcs6490sm8750wcn6650_firmwaresm6650_firmwareqcn9274sm7675p_firmwaresxr2330p_firmwaresm8650pqca6698aq_firmwareSnapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2025-27032
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 2.58%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 15:33
Updated-28 Nov, 2025 | 15:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Access Control Applied to Mirrored or Aliased Memory Regions in Hypervisor

memory corruption while loading a PIL authenticated VM, when authenticated VM image is loaded without maintaining cache coherency.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380qcs6490_firmwaresdx80msdx55wcn7750_firmwaresnapdragon_888_5g_mobile_platform_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-ab\)_firmwareqca6310_firmwareqam8650pwcd9340_firmwareqca6420_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresd670_firmwaresnapdragon_x72_5g_modem-rf_systemsa6155psnapdragon_870_5g_mobile_platform_\(sm8250-ac\)qamsrv1m_firmwaresnapdragon_8\+_gen_2_mobile_platformsnapdragon_8cx_compute_platform_\(sc8180xp-ac\)_firmwareqfw7124_firmwareqcs8550snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwareaqt1000qdx1011snapdragon_8cx_compute_platform_\(sc8180x-ab\)qep8111_firmwaresnapdragon_8_gen_2_mobile_platform_firmwareqam8255p_firmwaresrv1l_firmwarevision_intelligence_400_platformsnapdragon_x50_5g_modem-rf_systemsa8150p_firmwareqcm8550_firmwareqamsrv1h_firmwarewcd9341_firmwaresd855snapdragon_auto_5g_modem-rf_gen_2sd_8_gen1_5gsnapdragon_845_mobile_platformsnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)_firmwareqam8295pssg2115psm7675wcd9385_firmwareqcm6490_firmwaresa7255p_firmwaresnapdragon_x62_5g_modem-rf_systemqep8111qca6391sa8295p_firmwareqca6335_firmwareqca6584au_firmwareqcs6490snapdragon_x72_5g_modem-rf_system_firmwaresd_675_firmwaresnapdragon_x62_5g_modem-rf_system_firmwarewsa8810sm8635p_firmwaresm8650q_firmwaresc8380xp_firmwareqcm8550qcs8300wsa8815snapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)_firmwaresrv1hsnapdragon_855_mobile_platformqdu1010_firmwarewcd9326_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)qca6421_firmwaresm8550p_firmwareqru1062_firmwarevideo_collaboration_vc3_platform_firmwareqca6574au_firmwaresd_8_gen1_5g_firmwarewcd9378snapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-aa\)qcs8300_firmwareqca6595au_firmwaresnapdragon_8_gen_2_mobile_platformqdx1010wcn3980qca6584auwcn7880_firmwareqcn6274vision_intelligence_300_platform_firmwaresa8150psnapdragon_ar1_gen_1_platform_\"luna1\"_firmwareqca6797aqqam8650p_firmwareqcn6224_firmwaresm8750_firmwareqca6564asa8155psnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)sa8540p_firmwarewcd9385wcd9380_firmwareqca9377_firmwaresm8750pwcn6450sm8735_firmwareqca6574asnapdragon_675_mobile_platformsnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)wcd9340wcn7880qca6436wsa8845_firmwarewcd9341sa7255pqca6426_firmwarefastconnect_6200sg8275p_firmwareqca8337_firmwaresnapdragon_x35_5g_modem-rf_systemsnapdragon_675_mobile_platform_firmwaresnapdragon_765_5g_mobile_platform_\(sm7250-aa\)_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-aa\)_firmwareqca6698aqsnapdragon_8c_compute_platform_\(sc8180x-ad\)_firmwarewsa8832aqt1000_firmwareqdu1210snapdragon_ar1_gen_1_platform_firmwaresd675_firmwareqsm8350_firmwareqcn6224snapdragon_ar1_gen_1_platformsnapdragon_670_mobile_platform_firmwaresdx57m_firmwaresnapdragon_x24_lte_modemwcd9370sm7675pqca8081_firmwareqcc710_firmwareqca6698aq_firmwarefastconnect_6800qca6574a_firmwarewsa8832_firmwaresa8650psxr2230p_firmwarewcn7860qsm8350qca6678aq_firmwaresm7250psm8550pwcd9378_firmwarewcn7881_firmwareqca6431_firmwareqcn9274_firmwaresm6650qcs5430ssg2115p_firmwarewsa8845h_firmwarewcd9395_firmwaresd670snapdragon_x35_5g_modem-rf_system_firmwarefastconnect_6900_firmwareqca6678aqsa9000pwsa8835_firmwaresa8295psnapdragon_888_5g_mobile_platformwcd9390ar8035sc8380xpqdx1011_firmwaresa8775p_firmwaresdx55_firmwaresm7675p_firmwareqam8775psa8540pqca6696_firmwarevision_intelligence_300_platformvision_intelligence_400_platform_firmwareqca6797aq_firmwaresnapdragon_8c_compute_platform_\(sc8180xp-ad\)_firmwaresnapdragon_x55_5g_modem-rf_system_firmwareqca6564au_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)_firmwaresa8650p_firmwaresnapdragon_678_mobile_platform_\(sm6150-ac\)robotics_rb3_platform_firmwaresm7675_firmwarewcn7881sxr2250p_firmwaresrv1mwcd9395sxr2250pqru1052wcn6755_firmwaresxr2330p_firmwaresnapdragon_x65_5g_modem-rf_system_firmwarewsa8810_firmwarewcn6650snapdragon_768g_5g_mobile_platform_\(sm7250-ac\)_firmwareqdu1210_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-af\)qdu1110_firmwarewsa8840sxr1230pwcn7861_firmwareqdu1110qca9377wsa8840_firmwarefastconnect_6700_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwaresa8155_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-af\)_firmwareqdu1000fastconnect_6700sm7250p_firmwarewcn3950_firmwarewcn3980_firmwareqca6696qcm5430_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-ac\)sxr2330pqcs8550_firmwarewsa8845hqca6426qdx1010_firmwareqca6310sdx57mssg2125p_firmwareqcn9274snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)snapdragon_865_5g_mobile_platformqam8295p_firmwaresm7635_firmwareqfw7114qcs9100wcd9326snapdragon_x55_5g_modem-rf_systemqca6421wcd9370_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)snapdragon_855_mobile_platform_firmwaresnapdragon_870_5g_mobile_platform_\(sm8250-ac\)_firmwaresnapdragon_8_gen_1_mobile_platformar8035_firmwaresrv1lwsa8845qdu1010sdx80m_firmwaresnapdragon_865_5g_mobile_platform_firmwaresa8155wcn7860_firmwareqru1062qamsrv1hsnapdragon_845_mobile_platform_firmwaresm8750qca6574snapdragon_xr2_5g_platformsa8255p_firmwaresa6155sm8750p_firmwaresxr1230p_firmwaresd855_firmwaresg8275psnapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"fastconnect_7800_firmwaresnapdragon_765_5g_mobile_platform_\(sm7250-aa\)qru1052_firmwaresd675snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwaresa7775psnapdragon_8c_compute_platform_\(sc8180xp-ad\)sxr2230psa8620p_firmwaresnapdragon_ar2_gen_1_platformsnapdragon_850_mobile_compute_platform_firmwaresnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)sa8770psrv1m_firmwarewcd9375qca6574_firmwaresnapdragon_x24_lte_modem_firmwaresnapdragon_8_gen_1_mobile_platform_firmwarewcn6450_firmwaresa8620psnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)sa6145p_firmwaresnapdragon_x75_5g_modem-rf_system_firmwareqca6430qca6595_firmwareqam8775p_firmwareqca6391_firmwareqdu1000_firmwarewcn6755snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)_firmwaresd_8cx_firmwaresnapdragon_x65_5g_modem-rf_systemqca8081sm7635snapdragon_8_gen_3_mobile_platformqmp1000sm8635snapdragon_850_mobile_compute_platformsa6155_firmwaresa7775p_firmwaresnapdragon_x75_5g_modem-rf_systemwcn7861sa8775pwsa8815_firmwaresa9000p_firmwarewcn6650_firmwaresnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)wcd9390_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)fastconnect_6900qam8255pvideo_collaboration_vc3_platformqcn6274_firmwaresnapdragon_8c_compute_platform_\(sc8180x-ad\)qca6431fastconnect_6200_firmwarewsa8835sd_8cxsd865_5gfastconnect_6800_firmwarewcd9375_firmwarerobotics_rb3_platformqca6564auqmp1000_firmwareqam8620pqca6595auqcc710sa6155p_firmwaressg2125pqamsrv1mwcn3950sxr2130_firmwaresrv1h_firmwaresm6650_firmwarefastconnect_7800qfw7124sd_675sa6145psnapdragon_ar2_gen_1_platform_firmwareqcm5430qfw7114_firmwareqru1032_firmwaresm8635psnapdragon_670_mobile_platformsm8650qsnapdragon_x50_5g_modem-rf_system_firmwareqcs9100_firmwaresnapdragon_8_gen_3_mobile_platform_firmwareqca6174a_firmwareqca6564a_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)_firmwareqca6174aqca6335qru1032qca8337snapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)wcn3990_firmwareqam8620p_firmwarewsa8830wcn3990wsa8830_firmwareqca6574auqca6430_firmwaresa8155p_firmwareqcs5430_firmwaresa8770p_firmwaresnapdragon_678_mobile_platform_\(sm6150-ac\)_firmwaresm8735qcm6490wcn7750qca6420snapdragon_xr2_5g_platform_firmwareqca6436_firmwareqca6595sd865_5g_firmwaresxr2130sa8255psm8635_firmwareSnapdragon
CWE ID-CWE-1257
Improper Access Control Applied to Mirrored or Aliased Memory Regions
CVE-2025-27030
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 2.18%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 15:33
Updated-25 Sep, 2025 | 16:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in Audio

information disclosure while invoking calibration data from user space to update firmware size.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarewcn3988_firmwaresw5100sdx55qca6584au_firmwarewcn3680bqca6696_firmwarewcd9370_firmwarevideo_collaboration_vc3_platformwsa8830_firmwareqcn9074_firmwaresa8145psa8540psa8155pwsa8830sa8195p_firmwareqsm8250c-v2x_9150_firmwareqca6696sa8530p_firmwaresa8195psa8295p_firmwaresnapdragon_auto_5g_modem-rf_gen_2wcn3950qca6574au_firmwaresa9000p_firmwarewcd9370sa8145p_firmwaresa6150p_firmwaresa6155p_firmwaresa8530psw5100pqcs410c-v2x_9150wsa8810_firmwareqcs610qca6698aqsa8540p_firmwarewcd9341qca6574auqsm8250_firmwareqcn9074qca6584auwcn3980_firmwaresa8295pwcn3680b_firmwarewcn3950_firmwarevideo_collaboration_vc3_platform_firmwaresa8150p_firmwarewcd9341_firmwareqca9367_firmwarewsa8835qca9367sa8150psw5100p_firmwaresnapdragon_auto_5g_modem-rf_firmwareqca9377qam8295p_firmwaresa6145psa6155pvideo_collaboration_vc1_platformsa6145p_firmwareqam8295psa9000pvideo_collaboration_vc1_platform_firmwarewsa8835_firmwaresdx55_firmwarewcn3660b_firmwarewsa8815_firmwareqcs610_firmwaresa8155p_firmwarewcn3988wsa8810wcn3980snapdragon_auto_5g_modem-rfsa6150psnapdragon_auto_5g_modem-rf_gen_2_firmwaresw5100_firmwareqcs410_firmwareqca6698aq_firmwarewcn3660bwsa8815Snapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2025-21488
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-8.2||HIGH
EPSS-0.05% / 15.29%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 15:33
Updated-28 Nov, 2025 | 15:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in Data Network Stack & Connectivity

Information disclosure while decoding this RTP packet headers received by UE from the network when the padding bit is set.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380snapdragon_xr1_platformsd660qca6564sdm429w_firmwarewcn7750_firmwarewsa8840sm4125wcd9340_firmwarewcn7861_firmwaresd670_firmwarewsa8840_firmwarefastconnect_6700_firmwaresnapdragon_460_mobile_platform_firmwaresa6155psnapdragon_8\+_gen_2_mobile_platform_firmwaresa8155_firmwaresnapdragon_685_4g_mobile_platform_\(sm6225-ad\)fastconnect_6700snapdragon_8\+_gen_2_mobile_platformqca6696wcn3620_firmwarewcn3950_firmwaresnapdragon_820_automotive_platform_firmwaresxr1120wcn3980_firmwarewsa8845hwcn3620snapdragon_8_gen_2_mobile_platform_firmwaresnapdragon_w5\+_gen_1_wearable_platformsm4635_firmwarewcd9341_firmwaresnapdragon_8\+_gen_1_mobile_platformsd_8_gen1_5gsnapdragon_xr2\+_gen_1_platform_firmwaresnapdragon_845_mobile_platformsxr1120_firmwaresm7675wcd9385_firmwarewcn3910sm7635_firmwarewcd9326snapdragon_4_gen_2_mobile_platformsnapdragon_480_5g_mobile_platformwsa8810qcs610sm8635p_firmwaresm8650q_firmwarewcd9370_firmwarewsa8815wcn3660bqcm4490_firmwaresnapdragon_xr2\+_gen_1_platformsnapdragon_8_gen_1_mobile_platformwcd9326_firmwaresnapdragon_480_5g_mobile_platform_firmwaresg4150pwsa8845msm8996ausa8155snapdragon_695_5g_mobile_platform_firmwaresm8550p_firmwarewcn7860_firmwarevideo_collaboration_vc3_platform_firmwaresnapdragon_710_mobile_platform_firmwaresnapdragon_4_gen_2_mobile_platform_firmwareqca6574au_firmwaresd_8_gen1_5g_firmwaresm6370snapdragon_845_mobile_platform_firmwarewcd9378qca6574sm8750snapdragon_xr2_5g_platformwcn6740_firmwaresg4150p_firmwaresnapdragon_662_mobile_platform_firmwareqca6595au_firmwarewcn3910_firmwaresnapdragon_460_mobile_platformsa6155sm8750p_firmwaresnapdragon_8_gen_2_mobile_platformsnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmwaresnapdragon_4_gen_1_mobile_platform_firmwarewcn3980snapdragon_8\+_gen_1_mobile_platform_firmwarewcn7880_firmwarevideo_collaboration_vc1_platform_firmwarefastconnect_7800_firmwareqcs610_firmwaresnapdragon_660_mobile_platformsm8750_firmwareqca6564avideo_collaboration_vc1_platformsa8155psnapdragon_820_automotive_platformsw5100_firmwaresnapdragon_695_5g_mobile_platformwcd9385qcs410wcd9380_firmwarewcd9375qca6574_firmwaresnapdragon_8_gen_1_mobile_platform_firmwaresm8750pwcn6450qcs4490sm8735_firmwaresnapdragon_680_4g_mobile_platformqca6574asdm429wwcn6450_firmwaresa6145p_firmwareqca6564_firmwaresm6370_firmwarewcd9340wcn7880wsa8845_firmwarewcd9341snapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmwarewcn6755fastconnect_6200wcn6740wcn3988_firmwaresm7635snapdragon_8_gen_3_mobile_platformqmp1000wcd9335_firmwaresm8635sw5100p_firmwarewsa8832snapdragon_429_mobile_platform_firmwaresnapdragon_660_mobile_platform_firmwaresa6155_firmwaresnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)snapdragon_670_mobile_platform_firmwarewcd9335wcn7861wcd9370wsa8815_firmwarewcn6650_firmwarewcd9390_firmwaresm7675pmsm8996au_firmwarefastconnect_6900video_collaboration_vc3_platformfastconnect_6200_firmwarewsa8835sd865_5gqca6574a_firmwarewcd9375_firmwarewsa8832_firmwarewcn3660b_firmwareqca6564auqmp1000_firmwaresw5100pqca6595auwcn7860snapdragon_680_4g_mobile_platform_firmwaresm8550psm4125_firmwarewcd9378_firmwarewcn7881_firmwaresa6155p_firmwaresm6650wcn3950sm6650_firmwaresnapdragon_710_mobile_platformfastconnect_7800wsa8845h_firmwarewcd9395_firmwaresd670fastconnect_6900_firmwaresa6145pwsa8835_firmwaresnapdragon_4_gen_1_mobile_platformtalynpluswcd9390sm8635psm8650qsnapdragon_670_mobile_platformsm4635qca6564a_firmwaresm7675p_firmwaresnapdragon_8_gen_3_mobile_platform_firmwaresnapdragon_xr1_platform_firmwarewcn3988snapdragon_w5\+_gen_1_wearable_platform_firmwaresw5100qca6696_firmwarewcn3990_firmwaretalynplus_firmwaresd660_firmwarewcn3990wsa8830qca6574auwsa8830_firmwareqca6564au_firmwaresnapdragon_429_mobile_platformsa8155p_firmwareqcs4490_firmwaresm7675_firmwaresm8735wcn7881wcn7750wcd9395qcs410_firmwaresnapdragon_662_mobile_platformqcm4490sd865_5g_firmwaresnapdragon_xr2_5g_platform_firmwarewcn6755_firmwarewsa8810_firmwarewcn6650sm8635_firmwareSnapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2025-21487
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-8.2||HIGH
EPSS-0.05% / 15.29%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 15:33
Updated-28 Nov, 2025 | 16:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in Data Network Stack & Connectivity

Information disclosure while decoding RTP packet received by UE from the network, when payload length mentioned is greater than the available buffer length.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380snapdragon_xr1_platformqca6564qcs6490_firmwaresnapdragon_888_5g_mobile_platform_firmwaresdx55sm4125wcn7750_firmwareqca6310_firmwareqca6688aqqam8650pqca6420_firmwarewcd9340_firmwaresd670_firmwaresa6155psnapdragon_870_5g_mobile_platform_\(sm8250-ac\)wcn3680bqamsrv1m_firmwaresnapdragon_720g_mobile_platformsnapdragon_7c\+_gen_3_compute_firmwaresnapdragon_730g_mobile_platform_\(sm7150-ab\)snapdragon_8\+_gen_2_mobile_platformsnapdragon_820_automotive_platform_firmwaresxr1120qcs8550qcm2150_firmwareaqt1000wcn3620snapdragon_8_gen_2_mobile_platform_firmwaresm7325p_firmwareqam8255p_firmwaresrv1l_firmwaresnapdragon_x50_5g_modem-rf_systemsnapdragon_625_mobile_platformsa8150p_firmwareqcm8550_firmwareqamsrv1h_firmwaresnapdragon_w5\+_gen_1_wearable_platformsm4635_firmwarewcd9341_firmwaresd855sd_8_gen1_5gsnapdragon_xr2\+_gen_1_platform_firmwaresnapdragon_845_mobile_platformsnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)_firmwareqam8295pvision_intelligence_200_platform_\(apq8053-ac\)_firmwaresm7675wcd9385_firmwareqcm6490_firmwaresa7255p_firmwareqca6391qcs4290sa8295p_firmwareqca6335_firmwareqcs4290_firmwaresnapdragon_210_processorsnapdragon_480_5g_mobile_platformqcs6490sd_675_firmwarewsa8810sm8635p_firmwaresm8650q_firmwaresnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmwareqcm8550qcs8300wsa8815sm7315qcs610snapdragon_835_mobile_pc_platformsrv1hsd626_firmwareqcm4490_firmwaresnapdragon_855_mobile_platformsmart_display_200_platform_\(apq5053-aa\)snapdragon_xr2\+_gen_1_platformwcd9326_firmwaresnapdragon_778g_5g_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwarevision_intelligence_100_platform_\(apq8053-aa\)_firmwaresg4150pqcm2150sm8550p_firmwarevideo_collaboration_vc3_platform_firmwaresnapdragon_4_gen_2_mobile_platform_firmwareqca6574au_firmwaresm6370sd_8_gen1_5g_firmwarewcd9378snapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)_firmwareqcm4290_firmwaresnapdragon_662_mobile_platform_firmwarewcn3680_firmwareqca6595au_firmwareqcs8300_firmwaresnapdragon_460_mobile_platformsnapdragon_8_gen_2_mobile_platformwcn3680b_firmwaresnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmwarewcn3980wcn7880_firmwaresnapdragon_730g_mobile_platform_\(sm7150-ab\)_firmwaresnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)sa8150pqcs610_firmwaresnapdragon_660_mobile_platformsa8145p_firmwaresnapdragon_626_mobile_platform_firmwareqca6797aqqam8650p_firmwarewcn3615_firmwareqcm2290sm8750_firmwareqca6564asa8155pqcm6125snapdragon_632_mobile_platformsw5100_firmwarewcd9385wcd9380_firmwareqcs410sm8750pwcn6450sm8735_firmwaresnapdragon_680_4g_mobile_platformqca6574asnapdragon_675_mobile_platformwcd9340qca6564_firmwarewcn7880qca6436wsa8845_firmwarewcd9341sa7255pqca6426_firmwaresnapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmwarefastconnect_6200snapdragon_626_mobile_platformsd888wcn3988_firmwaresnapdragon_675_mobile_platform_firmwaresnapdragon_765_5g_mobile_platform_\(sm7250-aa\)_firmware205_mobile_platformqca6698aqwsa8832snapdragon_660_mobile_platform_firmwareaqt1000_firmwaresd675_firmwaresnapdragon_429_mobile_platform_firmwarewcn3680snapdragon_7c\+_gen_3_computesnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)snapdragon_670_mobile_platform_firmwareqcs2290snapdragon_425_mobile_platformwcd9370sm7675psm6250qca6698aq_firmwareapq8064au_firmwarefastconnect_6800qca6574a_firmwaresnapdragon_632_mobile_platform_firmwarewsa8832_firmwaresnapdragon_439_mobile_platform_firmwaresa8650psw5100psa4150psnapdragon_690_5g_mobile_platform_firmwarewcn7860snapdragon_636_mobile_platform_firmwareqca6678aq_firmware215_mobile_platformsm6250_firmwaresnapdragon_680_4g_mobile_platform_firmwaresm8550psm7250pwcd9378_firmwarewcn7881_firmwarewcn3615qcn9274_firmwaresm6650qcs5430qcs2290_firmwaresm7315_firmwareqcs615sa8145pwsa8845h_firmwarewcd9371wcd9395_firmwareapq8064ausd670fastconnect_6900_firmwareqca6678aqsa8195pwsa8835_firmwaresa9000psa8295psnapdragon_4_gen_1_mobile_platformsnapdragon_888_5g_mobile_platformwcd9390sa8775p_firmwaresnapdragon_212_mobile_platform_firmwaresdx55_firmwaresnapdragon_xr1_platform_firmwaresd730sm7675p_firmwarewcn3988qam8775pqcm2290_firmwareqca6696_firmwareqca6320sd660_firmwareqca6320_firmwareqca6797aq_firmwaresnapdragon_x55_5g_modem-rf_system_firmwareqca6564au_firmwaresnapdragon_730_mobile_platform_\(sm7150-aa\)apq8017snapdragon_429_mobile_platformsa8650p_firmwaresnapdragon_678_mobile_platform_\(sm6150-ac\)robotics_rb3_platform_firmwareqcs4490_firmwaresm7675_firmwarewcn7881snapdragon_780g_5g_mobile_platformsrv1mwcd9395snapdragon_662_mobile_platformqcs410_firmwareqcm4490wcn6755_firmwaresd835wsa8810_firmwarewcn6650snapdragon_768g_5g_mobile_platform_\(sm7250-ac\)_firmwaresd660qcm4325wsa8840sdm429w_firmwaresnapdragon_778g_5g_mobile_platformwcn7861_firmwarewsa8840_firmwaresnapdragon_460_mobile_platform_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwaresnapdragon_636_mobile_platformfastconnect_6700_firmwaresnapdragon_630_mobile_platform_firmwaresnapdragon_685_4g_mobile_platform_\(sm6225-ad\)sa8155_firmwaresnapdragon_782g_mobile_platform_\(sm7325-af\)_firmwarevision_intelligence_100_platform_\(apq8053-aa\)fastconnect_6700snapdragon_730_mobile_platform_\(sm7150-aa\)_firmwaresm7250p_firmwarewcn3950_firmwareqca6696wcn3620_firmwarewcn3980_firmwareqcm5430_firmwarewcn3610qcs8550_firmwarewsa8845hqca6426sa4155p_firmwaresnapdragon_625_mobile_platform_firmwareqca6310snapdragon_780g_5g_mobile_platform_firmwaresnapdragon_8\+_gen_1_mobile_platformsxr1120_firmwaresnapdragon_720g_mobile_platform_firmwaresnapdragon_865_5g_mobile_platformqcn9274qam8295p_firmwarewcn3910sm7635_firmwaresm7325pqcm4290sd626qcs9100snapdragon_690_5g_mobile_platformwcd9326snapdragon_4_gen_2_mobile_platformsnapdragon_x55_5g_modem-rf_systemwcd9370_firmware205_mobile_platform_firmwaresnapdragon_855_mobile_platform_firmwarewcn3660bsnapdragon_870_5g_mobile_platform_\(sm8250-ac\)_firmwaresnapdragon_8_gen_1_mobile_platformsrv1lwsa8845snapdragon_865_5g_mobile_platform_firmwaremsm8996ausnapdragon_695_5g_mobile_platform_firmwaresa8155wcn7860_firmwareqamsrv1hsnapdragon_710_mobile_platform_firmwaresnapdragon_845_mobile_platform_firmwaresm8750qca6574qcm6125_firmwaresnapdragon_xr2_5g_platformwcn6740_firmwaresa6150p_firmwaresa8255p_firmwaresg4150p_firmwaresnapdragon_425_mobile_platform_firmwarewcn3910_firmwarevision_intelligence_200_platform_\(apq8053-ac\)sa6155sm8750p_firmwareqcs615_firmwaresd855_firmwaresnapdragon_210_processor_firmwaresnapdragon_212_mobile_platformsnapdragon_782g_mobile_platform_\(sm7325-af\)snapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_8\+_gen_1_mobile_platform_firmwaresd835_firmwaresnapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)_firmwarevideo_collaboration_vc1_platform_firmwarefastconnect_7800_firmwaresnapdragon_765_5g_mobile_platform_\(sm7250-aa\)sd675sa7775psnapdragon_820_automotive_platformsa8620p_firmwarevideo_collaboration_vc1_platformsnapdragon_695_5g_mobile_platformsnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)sa8770psrv1m_firmwarewcd9375qca6574_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareqcs4490wcn6450_firmwaresa8620psdm429wsnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)apq8017_firmwaresa6145p_firmwaresm6370_firmwaresnapdragon_630_mobile_platformsnapdragon_439_mobile_platformqca6430qca6595_firmwareqam8775p_firmwareqca6391_firmwarewcn6755sa8195p_firmwaresnapdragon_835_mobile_pc_platform_firmwarewcn6740sm7635snapdragon_8_gen_3_mobile_platformqca6688aq_firmwareqmp1000qcm4325_firmwarewcd9335_firmwaresnapdragon_732g_mobile_platform_\(sm7150-ac\)sd888_firmwaresm8635sw5100p_firmwaresa6155_firmwaresa7775p_firmwaresnapdragon_750g_5g_mobile_platform_firmwarewcd9335wcn7861sa8775pwsa8815_firmwaresa9000p_firmwarewcn6650_firmwaresnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)wcd9390_firmwaremsm8996au_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)fastconnect_6900qam8255pvideo_collaboration_vc3_platformfastconnect_6200_firmwarewsa8835sd865_5gfastconnect_6800_firmwarewcd9375_firmwarerobotics_rb3_platformwcn3660b_firmwareqca6564auqmp1000_firmwaresa6150pqam8620pqca6595ausnapdragon_732g_mobile_platform_\(sm7150-ac\)_firmwaresm4125_firmwaresnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)_firmwaresa6155p_firmwareqamsrv1mwcn3950sa4155psxr2130_firmwaresrv1h_firmwaresm6650_firmwaresnapdragon_710_mobile_platformfastconnect_7800qcs6125_firmwaresd_675qcs6125215_mobile_platform_firmwaresa6145pqcm5430talynplussm8635psnapdragon_670_mobile_platformsm8650qsnapdragon_x50_5g_modem-rf_system_firmwareqcs9100_firmwaresnapdragon_8_gen_3_mobile_platform_firmwareqca6564a_firmwaresm4635sd730_firmwareqca6335snapdragon_w5\+_gen_1_wearable_platform_firmwaresa4150p_firmwarewcn3610_firmwaresnapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)sw5100wcn3990_firmwaretalynplus_firmwareqam8620p_firmwarewcd9371_firmwarewsa8830wcn3990wsa8830_firmwareqca6574auqca6430_firmwaresa8155p_firmwareqcs5430_firmwaresa8770p_firmwaresnapdragon_678_mobile_platform_\(sm6150-ac\)_firmwaresm8735qcm6490wcn7750qca6420snapdragon_xr2_5g_platform_firmwareqca6436_firmwareqca6595sd865_5g_firmwaresxr2130sa8255psmart_display_200_platform_\(apq5053-aa\)_firmwaresnapdragon_750g_5g_mobile_platformsm8635_firmwareSnapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2025-21484
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-8.2||HIGH
EPSS-0.05% / 15.29%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 15:33
Updated-25 Nov, 2025 | 20:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in Data Network Stack & Connectivity

Information disclosure when UE receives the RTP packet from the network, while decoding and reassembling the fragments from RTP packet.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcs6490wcn3990wcd9380wcn7881_firmwarequalcomm_215_mobile_platform_firmwaresnapdragon_695_5g_mobile_platformsm6370snapdragon_480_5g_mobile_platformsm8750sa7775pwcn7861_firmwareqam8295psd865_5g_firmwaresnapdragon_660_mobile_platform_firmwaresnapdragon_210_processor_firmwarequalcomm_215_mobile_platformfastconnect_6700_firmwareqca6688aqvision_intelligence_400_platformmsm8108_firmwareqca6574qca6696wcn3980_firmwareqca6310_firmwaresnapdragon_208_processorqcs6125vision_intelligence_100_platform_\(apq8053-aa\)wcd9390sa8255p_firmwarewsa8845hsa6150p_firmwareqcs610sa4155p_firmwarewcd9380_firmwaresnapdragon_xr2\+_gen_1_platformsnapdragon_x50_5g_modem-rf_systemsm8750_firmwarewsa8845qcs6125_firmwaresnapdragon_4_gen_1_mobile_platformqca6436_firmwarewcn7880_firmwaresa6145p_firmwaresnapdragon_685_4g_mobile_platform_\(sm6225-ad\)qcs5430_firmwareqca6391_firmwarevideo_collaboration_vc3_platform_firmwaresdx55_firmwaresnapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)sw5100_firmwaresxr1120wcd9375qca6698aqfastconnect_7800snapdragon_720g_mobile_platform_firmwareqca6430_firmwareqca6564a_firmwarevision_intelligence_200_platform_\(apq8053-ac\)_firmwaresnapdragon_730_mobile_platform_\(sm7150-aa\)snapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmwaresa8155_firmwareqca6688aq_firmwareqcm4490_firmwaresnapdragon_212_mobile_platformsd835qualcomm_205_mobile_platform_firmwaresa8255pqam8775p_firmwarewcd9335snapdragon_208_processor_firmwarefastconnect_6200_firmwaresnapdragon_460_mobile_platform_firmwarewcn3680b_firmwaresw5100p_firmwarewcn3988sd855video_collaboration_vc1_platform_firmwaresnapdragon_678_mobile_platform_\(sm6150-ac\)_firmwaresnapdragon_690_5g_mobile_platformsw5100sm6370_firmwaresnapdragon_732g_mobile_platform_\(sm7150-ac\)qca6335_firmwaresmart_display_200_platform_\(apq5053-aa\)_firmwarevideo_collaboration_vc3_platformsnapdragon_x55_5g_modem-rf_systemwsa8810wcn3980sa6150papq8064auwsa8845_firmwaresm8850psnapdragon_429_mobile_platform_firmwaresa7255psa8770p_firmwareqcm6490wcn3950_firmwaresa8145p_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwarewsa8815sa8650p_firmwaresnapdragon_8\+_gen_1_mobile_platform_firmwaresd855_firmwareqcm5430_firmwarerobotics_rb3_platformsnapdragon_732g_mobile_platform_\(sm7150-ac\)_firmwaresmart_audio_200_platformsnapdragon_429_mobile_platformwcn3988_firmwaresnapdragon_690_5g_mobile_platform_firmwareqcs6490_firmwaresa7255p_firmwarevision_intelligence_200_platform_\(apq8053-ac\)snapdragon_768g_5g_mobile_platform_\(sm7250-ac\)snapdragon_662_mobile_platform_firmwareqca6574au_firmwaresmart_audio_200_platform_firmwaresnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)_firmwaresdx55sm7250p_firmwaresnapdragon_695_5g_mobile_platform_firmwaresm4125_firmwaresa8770psnapdragon_750g_5g_mobile_platformwcn3990_firmwarewcd9341msm8996ausnapdragon_845_mobile_platformsa8150p_firmwarefastconnect_6900snapdragon_835_mobile_pc_platformvision_intelligence_400_platform_firmwaresm4125snapdragon_xr2_5g_platformwcd9340snapdragon_626_mobile_platformqam8775psa4150p_firmwaresnapdragon_865_5g_mobile_platform_firmwarewcd9340_firmwaresa4150psa8155wcn7881qca6698au_firmwaresa8775p_firmwaresm7250pwsa8815_firmwaresnapdragon_x55_5g_modem-rf_system_firmwareqca6564vision_intelligence_300_platform_firmwaresnapdragon_730g_mobile_platform_\(sm7150-ab\)wsa8840_firmwaresd660video_collaboration_vc1_platformsnapdragon_720g_mobile_platformwcd9385snapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)sa8775pwcn3950sd835_firmwareqam8295p_firmwaresnapdragon_820_automotive_platformsd865_5gfastconnect_6700sa7775p_firmwarewsa8832_firmwaresd660_firmwaresnapdragon_w5\+_gen_1_wearable_platformsm8850_firmwarewsa8845h_firmwaresnapdragon_865_5g_mobile_platformqca6430sdm429w_firmwarewcd9341_firmwareqca6420sa9000pqam8650p_firmwarewcn7861wcn3620_firmwaresnapdragon_855_mobile_platformsa6155qca6420_firmwaresa8195psm6250_firmwareqca6595au_firmwareaqt1000sxr1120_firmwaresnapdragon_212_mobile_platform_firmwarewcd9326_firmwarewcn3660b_firmwareqcs410_firmwareqca6797aq_firmwarewcn3620wcn3615msm8608snapdragon_820_automotive_platform_firmwaresnapdragon_750g_5g_mobile_platform_firmwaresxr2130snapdragon_855_mobile_platform_firmwarewsa8840qca6797aqwcn7860_firmwaresnapdragon_765_5g_mobile_platform_\(sm7250-aa\)_firmwaresa8620p_firmwareqca6595auwsa8832qcs5430wcd9395wcd9395_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)smart_display_200_platform_\(apq5053-aa\)qca6564au_firmwareqca6564_firmwarewcn3680bsnapdragon_4_gen_1_mobile_platform_firmwarewcd9385_firmwaresa9000p_firmwaresa8150psw5100pwcn3910_firmwaresnapdragon_626_mobile_platform_firmwarewcn3660bqcs610_firmwareqca6426sm6250qcs4490_firmwaresnapdragon_678_mobile_platform_\(sm6150-ac\)sd730sa8155p_firmwarefastconnect_7800_firmwarewsa8830_firmwaresa4155pqcm6125sa8295psnapdragon_730_mobile_platform_\(sm7150-aa\)_firmwarerobotics_rb3_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwaresg4150p_firmwarewsa8835fastconnect_6800_firmwarewcn3615_firmwaresnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)qcm6125_firmwaresm8850p_firmwaresdm429wqca6564ausnapdragon_870_5g_mobile_platform_\(sm8250-ac\)_firmwaresnapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)_firmwareqcs4490sa8620psd730_firmwarevision_intelligence_100_platform_\(apq8053-aa\)_firmwareqca6426_firmwaresnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)_firmwaresnapdragon_625_mobile_platform_firmwaresnapdragon_675_mobile_platform_firmwarewcn3910sm8750p_firmwaresa6145psa8195p_firmwareqcm4490snapdragon_8\+_gen_1_mobile_platformwcd9370_firmwareqca6698aq_firmwareqca6436snapdragon_662_mobile_platformwcn7880snapdragon_660_mobile_platformqca6698auapq8064au_firmwareqca6564aaqt1000_firmwaresd626_firmwareqca6574aqualcomm_205_mobile_platformwcd9335_firmwareqca6335qcm6490_firmwareqca6391sa8295p_firmwareqcs410sg4150pwcd9370wcd9326sa8155pfastconnect_6800qca6320qca6574_firmwaresa8145pqca6320_firmwaremsm8608_firmwaresa6155pwcn3610_firmwarewcn3610qam8255p_firmwarewsa8810_firmwaresnapdragon_730g_mobile_platform_\(sm7150-ab\)_firmwarewcn7860snapdragon_845_mobile_platform_firmwaremsm8996au_firmwareqca6595_firmwarefastconnect_6200qca6595snapdragon_xr1_platform_firmwaresnapdragon_8_gen_3_mobile_platform_firmwareqca6574ausnapdragon_680_4g_mobile_platform_firmwareqca6678aqsnapdragon_210_processorwsa8830qca6574a_firmwaresa6155p_firmwareqam8650pwsa8835_firmwaremsm8209snapdragon_835_mobile_pc_platform_firmwareqca6678aq_firmwarevision_intelligence_300_platformsnapdragon_8_gen_3_mobile_platformmsm8209_firmwareqcm5430snapdragon_xr2\+_gen_1_platform_firmwaresnapdragon_xr1_platformqca6696_firmwarewcd9375_firmwaremsm8108snapdragon_870_5g_mobile_platform_\(sm8250-ac\)sd626fastconnect_6900_firmwaresnapdragon_xr2_5g_platform_firmwaresnapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmwarewcd9390_firmwaresm8750psnapdragon_675_mobile_platformsnapdragon_625_mobile_platformqam8255psxr2130_firmwaresnapdragon_765_5g_mobile_platform_\(sm7250-aa\)sm8850snapdragon_680_4g_mobile_platformsa8650psnapdragon_x50_5g_modem-rf_system_firmwareqca6310sa6155_firmwaresnapdragon_460_mobile_platformSnapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2025-21483
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.05% / 15.73%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 15:33
Updated-28 Nov, 2025 | 16:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Restriction of Operations within the Bounds of a Memory Buffer in Data Network Stack & Connectivity

Memory corruption when the UE receives an RTP packet from the network, during the reassembly of NALUs.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380snapdragon_xr1_platformqca6564qcs6490_firmwaresnapdragon_888_5g_mobile_platform_firmwaresdx55sm4125wcn7750_firmwareqca6310_firmwareqca6688aqqam8650pqca6420_firmwarewcd9340_firmwaresd670_firmwaresa6155psnapdragon_870_5g_mobile_platform_\(sm8250-ac\)wcn3680bqamsrv1m_firmwarequalcomm_215_mobile_platform_firmwaresnapdragon_720g_mobile_platformsnapdragon_7c\+_gen_3_compute_firmwaresnapdragon_730g_mobile_platform_\(sm7150-ab\)snapdragon_8\+_gen_2_mobile_platformqcs8550sxr1120snapdragon_820_automotive_platform_firmwareqcm2150_firmwareaqt1000wcn3620snapdragon_8_gen_2_mobile_platform_firmwaresm7325p_firmwareqam8255p_firmwaresrv1l_firmwaresnapdragon_x50_5g_modem-rf_systemsa8150p_firmwaresnapdragon_625_mobile_platformqcm8550_firmwareqamsrv1h_firmwaresnapdragon_w5\+_gen_1_wearable_platformsm4635_firmwarewcd9341_firmwaresd855sd_8_gen1_5gsnapdragon_xr2\+_gen_1_platform_firmwaresnapdragon_845_mobile_platformsnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)_firmwareqam8295pvision_intelligence_200_platform_\(apq8053-ac\)_firmwaresm7675wcd9385_firmwareqcm6490_firmwaresa7255p_firmwareqca6391qcs4290sa8295p_firmwareqca6335_firmwareqcs4290_firmwaresnapdragon_210_processorsnapdragon_480_5g_mobile_platformqcs6490sd_675_firmwarewsa8810sm8635p_firmwaresm8650q_firmwaresnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmwareqcm8550qcs8300wsa8815sm7315qcs610smart_display_200_platform_\(apq5053-aa\)srv1hsd626_firmwareqcm4490_firmwaresnapdragon_855_mobile_platformsnapdragon_835_mobile_pc_platformsnapdragon_xr2\+_gen_1_platformwcd9326_firmwaresnapdragon_778g_5g_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwarevision_intelligence_100_platform_\(apq8053-aa\)_firmwaresg4150pqcm2150sm8550p_firmwarevideo_collaboration_vc3_platform_firmwaresnapdragon_4_gen_2_mobile_platform_firmwareqca6574au_firmwaresm6370sd_8_gen1_5g_firmwarewcd9378snapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)_firmwareqcm4290_firmwaresnapdragon_662_mobile_platform_firmwarewcn3680_firmwareqca6595au_firmwareqcs8300_firmwaresnapdragon_460_mobile_platformsnapdragon_8_gen_2_mobile_platformwcn3680b_firmwaresnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmwarewcn3980wcn7880_firmwaresnapdragon_730g_mobile_platform_\(sm7150-ab\)_firmwaresnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)sa8150pqualcomm_205_mobile_platform_firmwareqcs610_firmwaresnapdragon_660_mobile_platformsa8145p_firmwareqca6797aqsnapdragon_626_mobile_platform_firmwareqam8650p_firmwarewcn3615_firmwareqcm2290sm8750_firmwareqca6564asa8155pqcm6125snapdragon_632_mobile_platformsw5100_firmwarewcd9385wcd9380_firmwareqcs410sm8750pwcn6450sm8735_firmwaresnapdragon_680_4g_mobile_platformqca6574asnapdragon_675_mobile_platformwcd9340qca6564_firmwarewcn7880qca6436wsa8845_firmwarewcd9341sa7255pqca6426_firmwaresnapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmwarefastconnect_6200snapdragon_626_mobile_platformsd888wcn3988_firmwaresnapdragon_675_mobile_platform_firmwaresnapdragon_765_5g_mobile_platform_\(sm7250-aa\)_firmwareqca6698aqwsa8832snapdragon_429_mobile_platform_firmwareaqt1000_firmwaresd675_firmwaresnapdragon_660_mobile_platform_firmwarewcn3680qualcomm_205_mobile_platformsnapdragon_7c\+_gen_3_computesnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)snapdragon_670_mobile_platform_firmwareqcs2290snapdragon_425_mobile_platformwcd9370sm7675psm6250qca6698aq_firmwareapq8064au_firmwarefastconnect_6800qca6574a_firmwaresnapdragon_632_mobile_platform_firmwarewsa8832_firmwaresnapdragon_439_mobile_platform_firmwaresa8650psw5100psa4150psnapdragon_690_5g_mobile_platform_firmwarewcn7860qca6678aq_firmwaresm6250_firmwaresnapdragon_636_mobile_platform_firmwarequalcomm_215_mobile_platformsnapdragon_680_4g_mobile_platform_firmwaresm8550psm7250pwcd9378_firmwarewcn7881_firmwarewcn3615qcn9274_firmwaresm6650qcs5430qcs2290_firmwaresm7315_firmwareqcs615sa8145pwsa8845h_firmwarewcd9371wcd9395_firmwareapq8064ausd670fastconnect_6900_firmwareqca6678aqsa8195pwsa8835_firmwaresa9000psa8295psnapdragon_4_gen_1_mobile_platformsnapdragon_888_5g_mobile_platformwcd9390sa8775p_firmwaresnapdragon_212_mobile_platform_firmwaresdx55_firmwaresnapdragon_xr1_platform_firmwaresd730sm7675p_firmwarewcn3988qam8775pqcm2290_firmwareqca6696_firmwareqca6320sd660_firmwareqca6320_firmwareqca6797aq_firmwaresnapdragon_x55_5g_modem-rf_system_firmwareqca6564au_firmwaresnapdragon_429_mobile_platformapq8017snapdragon_730_mobile_platform_\(sm7150-aa\)sa8650p_firmwaresnapdragon_678_mobile_platform_\(sm6150-ac\)robotics_rb3_platform_firmwareqcs4490_firmwaresm7675_firmwarewcn7881snapdragon_780g_5g_mobile_platformsrv1mwcd9395snapdragon_662_mobile_platformqcs410_firmwareqcm4490wcn6755_firmwaresd835wsa8810_firmwarewcn6650snapdragon_768g_5g_mobile_platform_\(sm7250-ac\)_firmwaresd660qcm4325wsa8840sdm429w_firmwaresnapdragon_778g_5g_mobile_platformwcn7861_firmwarewsa8840_firmwaresnapdragon_460_mobile_platform_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwaresnapdragon_636_mobile_platformfastconnect_6700_firmwaresnapdragon_630_mobile_platform_firmwaresa8155_firmwaresnapdragon_685_4g_mobile_platform_\(sm6225-ad\)snapdragon_782g_mobile_platform_\(sm7325-af\)_firmwarevision_intelligence_100_platform_\(apq8053-aa\)fastconnect_6700snapdragon_730_mobile_platform_\(sm7150-aa\)_firmwaresm7250p_firmwarewcn3950_firmwareqca6696wcn3620_firmwarewcn3980_firmwareqcm5430_firmwarewcn3610qcs8550_firmwarewsa8845hqca6426sa4155p_firmwaresnapdragon_625_mobile_platform_firmwareqca6310snapdragon_780g_5g_mobile_platform_firmwaresnapdragon_8\+_gen_1_mobile_platformsxr1120_firmwaresnapdragon_720g_mobile_platform_firmwaresnapdragon_865_5g_mobile_platformqcn9274qam8295p_firmwarewcn3910sm7635_firmwaresm7325pqcm4290sd626qcs9100wcd9326snapdragon_4_gen_2_mobile_platformsnapdragon_690_5g_mobile_platformsnapdragon_x55_5g_modem-rf_systemwcd9370_firmwaresnapdragon_855_mobile_platform_firmwarewcn3660bsnapdragon_870_5g_mobile_platform_\(sm8250-ac\)_firmwaresnapdragon_8_gen_1_mobile_platformsrv1lwsa8845snapdragon_865_5g_mobile_platform_firmwaremsm8996ausa8155snapdragon_695_5g_mobile_platform_firmwarewcn7860_firmwareqamsrv1hsnapdragon_710_mobile_platform_firmwaresnapdragon_845_mobile_platform_firmwaresm8750qca6574qcm6125_firmwaresnapdragon_xr2_5g_platformwcn6740_firmwaresa6150p_firmwaresa8255p_firmwaresg4150p_firmwaresnapdragon_425_mobile_platform_firmwarewcn3910_firmwarevision_intelligence_200_platform_\(apq8053-ac\)sa6155sm8750p_firmwareqcs615_firmwaresd855_firmwaresnapdragon_210_processor_firmwaresnapdragon_212_mobile_platformsnapdragon_782g_mobile_platform_\(sm7325-af\)snapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_8\+_gen_1_mobile_platform_firmwaresd835_firmwaresnapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)_firmwarevideo_collaboration_vc1_platform_firmwarefastconnect_7800_firmwaresnapdragon_765_5g_mobile_platform_\(sm7250-aa\)sd675sa7775psnapdragon_820_automotive_platformsa8620p_firmwarevideo_collaboration_vc1_platformsnapdragon_695_5g_mobile_platformsnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)sa8770psrv1m_firmwarewcd9375qca6574_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareqcs4490wcn6450_firmwaresa8620psdm429wsnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)apq8017_firmwaresa6145p_firmwaresm6370_firmwaresnapdragon_439_mobile_platformsnapdragon_630_mobile_platformqca6430qca6595_firmwareqam8775p_firmwareqca6391_firmwarewcn6755sa8195p_firmwaresnapdragon_835_mobile_pc_platform_firmwarewcn6740sm7635snapdragon_8_gen_3_mobile_platformqca6688aq_firmwareqmp1000qcm4325_firmwarewcd9335_firmwaresnapdragon_732g_mobile_platform_\(sm7150-ac\)sd888_firmwaresm8635sw5100p_firmwaresa6155_firmwaresa7775p_firmwaresnapdragon_750g_5g_mobile_platform_firmwarewcd9335wcn7861sa8775pwsa8815_firmwaresa9000p_firmwarewcn6650_firmwaresnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)wcd9390_firmwaremsm8996au_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)fastconnect_6900qam8255pvideo_collaboration_vc3_platformfastconnect_6200_firmwarewsa8835sd865_5gfastconnect_6800_firmwarewcd9375_firmwarerobotics_rb3_platformwcn3660b_firmwareqca6564auqmp1000_firmwaresa6150pqam8620pqca6595ausnapdragon_732g_mobile_platform_\(sm7150-ac\)_firmwaresm4125_firmwaresnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)_firmwaresa6155p_firmwareqamsrv1mwcn3950sa4155psxr2130_firmwaresrv1h_firmwaresm6650_firmwaresnapdragon_710_mobile_platformfastconnect_7800qcs6125_firmwaresd_675qcs6125sa6145pqcm5430talynplussm8635psnapdragon_670_mobile_platformsm8650qsnapdragon_x50_5g_modem-rf_system_firmwareqcs9100_firmwaresm4635qca6564a_firmwaresnapdragon_8_gen_3_mobile_platform_firmwaresd730_firmwareqca6335snapdragon_w5\+_gen_1_wearable_platform_firmwaresa4150p_firmwarewcn3610_firmwaresnapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)sw5100wcn3990_firmwaretalynplus_firmwareqam8620p_firmwarewcd9371_firmwarewsa8830wcn3990wsa8830_firmwareqca6574auqca6430_firmwaresa8155p_firmwareqcs5430_firmwaresa8770p_firmwaresnapdragon_678_mobile_platform_\(sm6150-ac\)_firmwaresm8735qcm6490wcn7750qca6420snapdragon_xr2_5g_platform_firmwareqca6436_firmwareqca6595sd865_5g_firmwaresxr2130sa8255psmart_display_200_platform_\(apq5053-aa\)_firmwaresnapdragon_750g_5g_mobile_platformsm8635_firmwareSnapdragon
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2025-21482
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.1||HIGH
EPSS-0.01% / 1.87%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 15:33
Updated-02 Dec, 2025 | 16:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cryptographic Issues in Core

Cryptographic issue while performing RSA PKCS padding decoding.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-mdm9250_firmwareipq8076awcn7860_firmwaresd821ipq6000_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-af\)smart_display_200_platform_\(apq5053-aa\)sa7775p_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwarewcn3980sd730_firmwaresd_675_firmwaresa9000pmdm8207_firmwarevision_intelligence_200_platform_\(apq8053-ac\)_firmwarevision_intelligence_300_platformrobotics_rb2_platform_firmwaresd660ipq8072sd865_5gsm7325pipq8078_firmwaresa8150papq8037_firmwarefsm9905snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)apq8092_firmwarefastconnect_6200_firmwaretalynplus_firmwaresdx57mcsr8811sdx71mipq9008_firmware9206_lte_modem_firmwarepmp8074snapdragon_8c_compute_platform_\(sc8180x-ad\)_firmwarerobotics_rb5_platform_firmwaresm8650q_firmwaresdx20m_firmwarewsa8810snapdragon_auto_5g_modem-rffastconnect_6700snapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmwaresm8635_firmwarewcd9340_firmwareipq6018sm8750pwcd9341_firmwaresm7325p_firmwarewsa8845sa6145p_firmwaresnapdragon_ar2_gen_1_platform_firmwarec-v2x_9150fsm9916_firmwarerobotics_rb3_platform_firmwaressg2125p_firmwaremsm8996auwsa8815sa8620p_firmwarefastconnect_6700_firmwaresxr2230p_firmwaresxr2250psnapdragon_x65_5g_modem-rf_system_firmwaresd888sa8255p_firmwaresnapdragon_xr2\+_gen_1_platform_firmwaresnapdragon_ar2_gen_1_platformsw5100_firmwaresm7635fsm9900_firmwaresnapdragon_x72_5g_modem-rf_systemsdx65msm4125sa8255psm6650_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-ab\)wcn3910ipq5302_firmwaremdm9205s_firmwareipq9570csr8811_firmwaresnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)sm8635sd_8_gen1_5gsa6155_firmwarequalcomm_215_mobile_platform_firmwaresa4155probotics_rb5_platformar3012immersive_home_214_platform_firmwarewcn3660b_firmwaresd835_firmwareipq8071ipq4019_firmwaresa8295p_firmwarewcn3988_firmwaresdx71m_firmwaresxr2330par3012_firmwarear9380315_5g_iot_modem_firmwaressg2115p_firmwarecsra6620wcn3999_firmwaresdx55mdm9650wcn3610_firmwareipq8071asa8195pwcn6650_firmwaresnapdragon_1100_wearable_platformsnapdragon_x20_lte_modem_firmwaresm8750sa8195p_firmwareipq8070_firmwaresa8650p_firmwarewcn3615_firmwaresnapdragon_8c_compute_platform_\(sc8180xp-ad\)sm4125_firmwaresa2150p_firmwaresnapdragon_w5\+_gen_1_wearable_platformwsa8835_firmwareipq6028_firmwaresw5100wcd9375_firmwaresm6650ipq8070awcd9395_firmwaresnapdragon_430_mobile_platform_firmwaresdx61wcd9326_firmwaresnapdragon_ar1_gen_1_platform_firmwareipq9574_firmwaresnapdragon_439_mobile_platform_firmwarewcd9375ipq6010_firmwaresrv1h_firmwaresd820wsa8832_firmwarewcn3680bsnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)sdx20msa8770p_firmwaresm6250_firmwaremdm9640_firmwarewsa8845h_firmwaresm6370_firmwaresa8150p_firmwarevideo_collaboration_vc1_platformwcn7750_firmwaresdx57m_firmwarevision_intelligence_300_platform_firmwaresnapdragon_888_5g_mobile_platformwcn7860ipq6000sa8155_firmwarefsm9915_firmwareipq8066_firmwareipq8078wsa8840snapdragon_xr2_5g_platform_firmwaresxr1230pfsm9905_firmwaresdx61_firmwaresnapdragon_x55_5g_modem-rf_systemsw5100p_firmwaresnapdragon_x20_lte_modemsm8550p_firmwaresnapdragon_1100_wearable_platform_firmwareipq8069sd660_firmwaresm7250p_firmwaresnapdragon_x12_lte_modem_firmwaresm8735ipq8072_firmwaresd460ipq8074a_firmwaresxr2330p_firmwarepm8937mdm9650_firmwareipq8076a_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwarewcn6740_firmwaresm7675sm6250p_firmwaresd835snapdragon_xr2_5g_platformipq9554ipq8065_firmwaresa8155pipq8173ipq8072awcn3990_firmwarewcn7750sd_8cx9207_lte_modemflight_rb5_5g_platformwcd9390_firmwarewcn7881snapdragon_wear_1300_platform_firmwarecsrb31024_firmwaresnapdragon_8c_compute_platform_\(sc8180xp-ad\)_firmwarewcn6450_firmwareapq8094sa6155p_firmwareimmersive_home_3210_platformapq8017sdm429wipq8064fsm9950_firmwaresnapdragon_427_mobile_platform_firmwarefsm9955_firmwareipq8074_firmwaresc8180x\+sdx55mdm9205ssxr1120snapdragon_8cx_compute_platform_\(sc8180x-aa\)snapdragon_wear_4100\+_platform_firmwarewcn3999sm7675ptalynplushome_hub_100_platform_firmwareqxm8083ipq9048_firmwaresnapdragon_ar1_gen_1_platformsxr2230pfsm9955snapdragon_auto_5g_modem-rf_firmwarefsm9910ipq8072a_firmwareipq8070sa6150psnapdragon_8cx_compute_platform_\(sc8180xp-ac\)robotics_rb2_platformipq8078awcn3660bcsra6640_firmwarevision_intelligence_400_platform_firmwarewcd9306_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)_firmware9207_lte_modem_firmwarevideo_collaboration_vc1_platform_firmwaresnapdragon_x75_5g_modem-rf_system_firmwareimmersive_home_318_platform_firmwaremdm8207snapdragon_425_mobile_platformsnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_x24_lte_modemfsm9916sa8770pipq5010wcn3990wcd9341snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)_firmwareipq6028ar7420_firmwaresa8295pflight_rb5_5g_platform_firmwaresdx65m_firmwaresa9000p_firmwaresnapdragon_xr1_platform_firmwaresa8540pipq5312_firmwarewcd9385_firmwareapq8037snapdragon_wear_1300_platformsm7675_firmwaresnapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)_firmwaresrv1hfastconnect_6200snapdragon_870_5g_mobile_platform_\(sm8250-ac\)wcd93719206_lte_modemipq5300snapdragon_x5_lte_modem_firmwarehome_hub_100_platformwcd9326sm7250psnapdragon_8cx_compute_platform_\(sc8180x-aa\)_firmwaresnapdragon_wear_4100\+_platformapq8094_firmwareipq8070a_firmwaremdm9645_firmwaresm7315_firmwareipq8062ipq4019snapdragon_425_mobile_platform_firmwaresnapdragon_8c_compute_platform_\(sc8180x-ad\)wcn3660_firmwarewcn3680snapdragon_435_mobile_platformfastconnect_6800_firmwareaqt1000wcn3660ipq8076video_collaboration_vc3_platform_firmwaresmart_audio_400_platform_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)_firmwaresd675smart_audio_400_platformsa8530psd865_5g_firmwaresrv1l_firmwarewcd9335snapdragon_x24_lte_modem_firmwaresa8775pipq9570_firmwarewsa8810_firmwaresxr2130sd_8cx_firmwarewcn3980_firmwarewcd9335_firmwareimmersive_home_214_platformsd626_firmwaressg2115psdx55_firmwaresd_8_gen1_5g_firmwareipq6005ar8035snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)wsa8830wsa8815_firmwareipq8074snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)_firmwaresc8380xp_firmwarevision_intelligence_100_platform_\(apq8053-aa\)_firmwaresnapdragon_427_mobile_platformsd855_firmwarewcn7880sm8735_firmwaresa4155p_firmwaresmart_display_200_platform_\(apq5053-aa\)_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-ac\)_firmwarefastconnect_6800mdm9640sm8635pwcn3620_firmwarewcd9306sm4635snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)sc8380xpsa6150p_firmwaresnapdragon_auto_5g_modem-rf_gen_2ipq8078a_firmwaremsm8996au_firmwarewcd9390immersive_home_316_platformsnapdragon_x5_lte_modemsnapdragon_855_mobile_platform_firmwaresm8750p_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)sd662qxm8083_firmwareipq9554_firmware9205_lte_modemsnapdragon_x70_modem-rf_system_firmwaresa8650psa8620pwcd9360snapdragon_865_5g_mobile_platformsm7315sa7775psg4150p_firmwaresd670ipq9048csra6620_firmwaresa8775p_firmwaresnapdragon_450_mobile_platform_firmwaresw5100psa4150p_firmwarewcn6755immersive_home_326_platformwcd9371_firmwaresnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)_firmwaresxr1120_firmwarewcd9378snapdragon_8cx_compute_platform_\(sc8180xp-af\)_firmwareipq5312snapdragon_865_5g_mobile_platform_firmwarewcd9380_firmwaresm8650qsa7255p_firmwaresd730sa8145psnapdragon_4_gen_2_mobile_platform_firmwarefsm9900snapdragon_1200_wearable_platformwcn3950sm7675p_firmwareimmersive_home_3210_platform_firmwaresm7635_firmwarevideo_collaboration_vc5_platformcsrb31024pm8937_firmwarewcn7861snapdragon_x62_5g_modem-rf_systemsnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)ipq4028_firmwareipq6018_firmwaresg4150psnapdragon_888_5g_mobile_platform_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)vision_intelligence_400_platformsnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwaresa8540p_firmwarewcn7861_firmwarefastconnect_7800_firmwaresm8750_firmwarewcn6650ipq8068_firmwaresnapdragon_auto_4g_modemwsa8845himmersive_home_216_platformwcn7880_firmwaresd_455_firmwareimmersive_home_216_platform_firmwaresnapdragon_x50_5g_modem-rf_systemsm8550psm6370ipq6005_firmwarewcn3950_firmwarewcn3988wcd9380ipq8074asnapdragon_x70_modem-rf_systemsg8275pfsm9910_firmwaresd662_firmwaresxr1230p_firmwareapq8092ipq8076_firmwarewsa8830_firmwareipq4028sxr2130_firmwarewcd9340snapdragon_x12_lte_modemsd855snapdragon_xr2\+_gen_1_platformsnapdragon_x65_5g_modem-rf_systemvision_intelligence_200_platform_\(apq8053-ac\)sa4150psd888_firmwarewcn7881_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-ab\)_firmwaresnapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)fsm9950wcd9360_firmwaresnapdragon_x55_5g_modem-rf_system_firmwareipq8071_firmwarewcd9378_firmwarepmp8074_firmwarewcd9370_firmwaresd_455snapdragon_x35_5g_modem-rf_system_firmwaresnapdragon_x62_5g_modem-rf_system_firmwarefastconnect_7800sa8530p_firmwarewsa8845_firmwareimmersive_home_318_platformwcd9385sdm429w_firmwarear9380_firmwaresd670_firmwarewcd9370ipq8062_firmwaresd460_firmwarefastconnect_6900_firmwareipq8064_firmwareipq5302wcn3680b_firmwareipq5010_firmwaresnapdragon_auto_4g_modem_firmwareipq5028sc8180x\+sdx55_firmwaresa8155sdx80m_firmwaresm6250psnapdragon_429_mobile_platformsxr2250p_firmwarewsa8835wcd9330sa8145p_firmwarewsa8832snapdragon_auto_5g_modem-rf_gen_2_firmwarewcn3910_firmwareaqt1000_firmwaresnapdragon_4_gen_1_mobile_platformsnapdragon_439_mobile_platformwcn6450sm8635p_firmwarear8031snapdragon_x72_5g_modem-rf_system_firmwaresnapdragon_1200_wearable_platform_firmwarequalcomm_215_mobile_platformsd675_firmwareipq5332_firmwareapq8064auipq8071a_firmwaresm4635_firmwaresnapdragon_430_mobile_platformsnapdragon_450_mobile_platformsd626robotics_rb3_platformsnapdragon_xr1_platformvideo_collaboration_vc5_platform_firmwareipq9574immersive_home_316_platform_firmwaresnapdragon_x50_5g_modem-rf_system_firmwareipq8174sa2150psg8275p_firmwaresa6155p315_5g_iot_modemipq4029_firmwareipq4018mdm9250ar8035_firmwarear7420ipq5300_firmwareipq8173_firmwarevision_intelligence_100_platform_\(apq8053-aa\)sa7255pssg2125psrv1msnapdragon_x75_5g_modem-rf_systemsa6145pcsra6640sd_675wcn6740apq8064au_firmwaremdm9628_firmwaremdm9628mdm9645wcd9395apq8017_firmwaresnapdragon_435_mobile_platform_firmwareipq5332ipq8068ipq8069_firmwareipq8174_firmwaresd821_firmwaresrv1lipq4018_firmwareipq4029sm6250video_collaboration_vc3_platformwcn3610sd820_firmwareipq5028_firmwareimmersive_home_326_platform_firmwarewsa8840_firmwarefastconnect_6900snapdragon_x35_5g_modem-rf_systemwcd9330_firmwaresnapdragon_870_5g_mobile_platform_\(sm8250-ac\)_firmwarewcn6755_firmwarefsm9915wcn3620snapdragon_855_mobile_platformwcn3615ipq6010ipq90089205_lte_modem_firmwaresnapdragon_4_gen_2_mobile_platformipq8065ipq8066ar8031_firmwarewcn3680_firmwaresnapdragon_429_mobile_platform_firmwaresa8155p_firmwarec-v2x_9150_firmwaresa6155srv1m_firmwaresdx80mSnapdragon
CVE-2025-21481
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.93%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 15:33
Updated-07 Jan, 2026 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in HLOS

Memory corruption while performing private key encryption in trusted application.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcm8550_firmwareqfw7124srv1h_firmwaresm8735_firmwaresdx55wcn7880_firmwaresnapdragon_x75_5g_modem-rf_system_firmwareqcs6125_firmwaresnapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)snapdragon_xr2_5g_platformqrb5165m_firmwaresnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)qfw7114snapdragon_778g_5g_mobile_platform_firmwaresg4150psnapdragon_765_5g_mobile_platform_\(sm7250-aa\)_firmwaresnapdragon_675_mobile_platformqcm6125_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwaresnapdragon_750g_5g_mobile_platform_firmwaresa8145psnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)snapdragon_x72_5g_modem-rf_systemsnapdragon_w5\+_gen_1_wearable_platformqru1032snapdragon_680_4g_mobile_platform_firmwareqca8081_firmwarewcd9335sa8650psd865_5g_firmwareqca6797aqwsa8840_firmwareqca6696srv1l_firmwaresa8195psnapdragon_710_mobile_platformsnapdragon_7c_compute_platform_\(sc7180-ac\)_firmwareqca6574au_firmwareqcn9024_firmwareqca8337wcd9370snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)_firmwaresa8145p_firmwaresrv1lwsa8845h_firmwaresnapdragon_780g_5g_mobile_platformwcn7881_firmwaresnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)_firmwaresa4155psnapdragon_480_5g_mobile_platform_firmwareqcs6125sd670_firmwaresa8620psnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)sm6650wcn7860snapdragon_8cx_compute_platform_\(sc8180x-aa\)_firmwaresd_8_gen1_5gsnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)wcd9380qcs8300_firmwaresa8540p_firmwaresnapdragon_x72_5g_modem-rf_system_firmwaresnapdragon_765_5g_mobile_platform_\(sm7250-aa\)qep8111sxr2330psnapdragon_662_mobile_platform_firmwaresm7675qmp1000qcs8550_firmwareqca6574ausnapdragon_7c\+_gen_3_compute_firmwaresa8770p_firmwaresd670sa8155_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-ac\)qca6797aq_firmwaresnapdragon_xr1_platform_firmwarewcd9341_firmwaresxr1120snapdragon_8_gen_3_mobile_platform_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareqcn6024_firmwareqam8775pqcn9274_firmwarewsa8835snapdragon_auto_5g_modem-rf_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)snapdragon_690_5g_mobile_platform_firmwaresa6155psa6145pvideo_collaboration_vc1_platformqsm8350_firmwareqam8295pqcs8300snapdragon_7c_compute_platform_\(sc7180-ac\)qca6678aq_firmwaresnapdragon_x50_5g_modem-rf_system_firmwareflight_rb5_5g_platform_firmwarewcn3999wsa8835_firmwareqamsrv1msdx61qdu1010_firmwareqam8620psnapdragon_732g_mobile_platform_\(sm7150-ac\)qdu1000wcn3988sm8635snapdragon_x65_5g_modem-rf_system_firmwarerobotics_rb2wcd9395_firmwaresm8750snapdragon_870_5g_mobile_platform_\(sm8250-ac\)_firmwaresm6650_firmwarewcn7750snapdragon_865_5g_mobile_platform_firmwareqca6595sd855sa6155_firmwareqca6436_firmwaresnapdragon_782g_mobile_platform_\(sm7325-af\)snapdragon_8_gen_1_mobile_platformsw5100_firmwarewcn3999_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)sa2150p_firmwarefastconnect_7800_firmwaresm7675p_firmwareqca6698aq_firmwaresc8380xpsnapdragon_8_gen_3_mobile_platformwsa8815snapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmwarear8035snapdragon_7c_gen_2_compute_platform_\(sc7180-ad\)_\"rennell_pro\"_firmwareqru1062_firmwaresm7325pqcn6224snapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)_firmwaresnapdragon_720g_mobile_platformwcd9340_firmwarewcn6740_firmwareqamsrv1h_firmwareqca6584au_firmwareqcn6274sxr1120_firmwareqca6430_firmwareqdu1210_firmwaresdx61_firmwareqcs2290_firmwarewcd9370_firmwarewsa8832_firmwaresd888sm7675_firmwareqca6436wcd9326_firmwaresm8635_firmwaresnapdragon_870_5g_mobile_platform_\(sm8250-ac\)snapdragon_670_mobile_platform_firmwaresnapdragon_7c_gen_2_compute_platform_\(sc7180-ad\)_\"rennell_pro\"qca6421srv1msa8540pwsa8830qcm8550qru1062snapdragon_x65_5g_modem-rf_systemc-v2x_9150_firmwareqca8081fastconnect_6700qca6391snapdragon_4_gen_1_mobile_platform_firmwareqcs9100_firmwareqca6391_firmwaresnapdragon_730g_mobile_platform_\(sm7150-ab\)_firmwareqca6688aqqrb5165nwcn3950sa9000p_firmwarewcn3990_firmwareqam8650pqcs410sm7675psnapdragon_665_mobile_platform_firmwarewcn6450aqt1000_firmwarec-v2x_9150sm4635qdu1110qcs610sa8775psm8635p_firmwareqrb5165mqamsrv1hqca6698aqsnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)snapdragon_678_mobile_platform_\(sm6150-ac\)315_5g_iot_modemsnapdragon_680_4g_mobile_platformflight_rb5_5g_platformqfw7114_firmwarewcn6740sm6250_firmwaresnapdragon_695_5g_mobile_platformsnapdragon_x50_5g_modem-rf_systemsd_8_gen1_5g_firmwaresd855_firmwareqca6574robotics_rb2_firmwarewcd9335_firmwaresnapdragon_662_mobile_platformsnapdragon_8cx_compute_platform_\(sc8180xp-af\)sa8255p_firmwaresnapdragon_865_5g_mobile_platform315_5g_iot_modem_firmwaresw5100p_firmwaresg4150p_firmwareqam8295p_firmwareqca6426_firmwarear8031_firmwaresd730_firmwaresnapdragon_778g_5g_mobile_platformqru1052_firmwaresm8650qsa6145p_firmwarewcd9375wcd9378video_collaboration_vc1_platform_firmwarewcn6755_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwarewsa8845_firmwareqdx1011qcn7606sa8620p_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-aa\)snapdragon_665_mobile_platformrobotics_rb5qca6421_firmwaresdx55_firmwaresm8735wcn7861_firmwareqcs610_firmwaresnapdragon_8c_compute_platform_\(sc8180xp-ad\)_firmwaresd865_5gsrv1hqcs6490_firmwareqcs8550fastconnect_6900_firmwarefastconnect_6800_firmwaresa8155p_firmwareqam8650p_firmwarear8035_firmwaresm8750psnapdragon_8c_compute_platform_\(sc8180x-ad\)_firmwareqcs6490qcn9274snapdragon_x75_5g_modem-rf_systemqca6431smart_audio_400_platformwsa8845qca6420_firmwaresnapdragon_780g_5g_mobile_platform_firmwareqcc710_firmwarewcn3988_firmwaresm4125_firmwaresw5100smart_audio_400_platform_firmwaresm8750p_firmwaresnapdragon_678_mobile_platform_\(sm6150-ac\)_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)_firmwarewcd9390sa8255psa8775p_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)_firmwareqru1052sd_675_firmwaresnapdragon_690_5g_mobile_platformwcn6650fastconnect_6900sm4635_firmwaresa2150psnapdragon_8c_compute_platform_\(sc8180x-ad\)wcn7880snapdragon_x55_5g_modem-rf_systemsa4155p_firmwareqdu1010video_collaboration_vc3_platformqep8111_firmwareqam8255psd_675qcm2290_firmwaresnapdragon_670_mobile_platformqcn9074_firmwareqcn6224_firmwarefastconnect_7800sa7775psm6370_firmwaresa7255p_firmwarewcd9371_firmwarewcn6755sa8770psa8155pwsa8845hwcd9390_firmwaresnapdragon_750g_5g_mobile_platformsa8195p_firmwareqsm8250sm8650q_firmwarewcd9340sa8295p_firmwaresd675_firmwarewsa8840wcd9378_firmwaresd675snapdragon_4_gen_1_mobile_platformsnapdragon_730g_mobile_platform_\(sm7150-ab\)sa6155sa6150p_firmwaresa8530pqcm4290_firmwareqdu1210qca6174a_firmwarefastconnect_6200snapdragon_x35_5g_modem-rf_system_firmwarecsra6620_firmwareqca6426wsa8810_firmwareqcm6490qca6420snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)_firmwaresnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmwarefastconnect_6700_firmwareqca6174asm8635psa4150p_firmwaresa8650p_firmwareqcs9100robotics_rb5_firmwarewcd9371snapdragon_8cx_compute_platform_\(sc8180x-ab\)snapdragon_720g_mobile_platform_firmwareqcs4290_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwareqcn9074csra6640snapdragon_x62_5g_modem-rf_systemwcn3980_firmwareqcm4290wcd9326sm6250qdx1010_firmwarewcd9385_firmwarewcd9360_firmwareqmp1000_firmwarewcn7750_firmwareqca6678aqwcd9385snapdragon_xr1_platformwcn7881qca6595ausa9000psnapdragon_732g_mobile_platform_\(sm7150-ac\)_firmwarewcn3910_firmwareqcm6490_firmwarewsa8815_firmwaresnapdragon_x62_5g_modem-rf_system_firmwaresnapdragon_685_4g_mobile_platform_\(sm6225-ad\)snapdragon_888_5g_mobile_platform_firmwaresxr2130_firmwareqcn6274_firmwarewsa8832sm7315sc8180x\+sdx55wsa8810qdu1110_firmwareqsm8350wcn3980sa7255psxr2130snapdragon_auto_5g_modem-rf_gen_2_firmwaresxr2330p_firmwareqca6431_firmwareqca6574a_firmwaresnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)_firmwaresm7250psc8180x\+sdx55_firmwareqca6574_firmwareqrb5165n_firmwareqcs5430snapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)qamsrv1m_firmwaresnapdragon_730_mobile_platform_\(sm7150-aa\)srv1m_firmwaresm7635_firmwareqam8620p_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)_firmwareqca6696_firmwaresm7315_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_auto_4g_modem_firmwaresnapdragon_695_5g_mobile_platform_firmwareqdx1010wsa8830_firmwaresnapdragon_855_mobile_platformqcs5430_firmwareqcm2290qcs4290snapdragon_782g_mobile_platform_\(sm7325-af\)_firmwaresm7325p_firmwaresnapdragon_auto_4g_modemwcd9380_firmwareqca6688aq_firmwareqca6595_firmwaresm6250p_firmwaresd888_firmwareaqt1000qfw7124_firmwareqcn6024wcd9375_firmwaresnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)wcn7860_firmwaresa8530p_firmwareqca6574awcn3990snapdragon_8c_compute_platform_\(sc8180xp-ad\)qcn7606_firmwareqca6595au_firmwaresnapdragon_xr2_5g_platform_firmwaresnapdragon_auto_5g_modem-rf_gen_2qcm5430_firmwaresm8750_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-af\)_firmwaresa7775p_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-ac\)_firmwarecsra6640_firmwaresw5100psa6155p_firmwareqca8337_firmwaresnapdragon_460_mobile_platformwcd9395fastconnect_6800qca6430sm7635snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)snapdragon_675_mobile_platform_firmwaresm6250pqdu1000_firmwareqam8255p_firmwareqcc710wcn3910wcd9341snapdragon_x55_5g_modem-rf_system_firmwareqsm8250_firmwareqcs2290sc8380xp_firmwareqca6584ausnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)snapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)_firmwaresnapdragon_888_5g_mobile_platformsa8295pwcn3950_firmwarewcn7861video_collaboration_vc3_platform_firmwaresnapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmwaresa8150p_firmwarewcd9360qam8775p_firmwaresa4150psnapdragon_8cx_compute_platform_\(sc8180x-ab\)_firmwaresa8150pqcn9024wcn6450_firmwaresm4125sm6370snapdragon_x35_5g_modem-rf_systemsa8155sm7250p_firmwaresnapdragon_xr2\+_gen_1_platformar8031snapdragon_730_mobile_platform_\(sm7150-aa\)_firmwareqdx1011_firmwareqcm5430snapdragon_460_mobile_platform_firmwarefastconnect_6200_firmwareqcm6125snapdragon_855_mobile_platform_firmwarewcn6650_firmwareqru1032_firmwaresnapdragon_710_mobile_platform_firmwarecsra6620snapdragon_xr2\+_gen_1_platform_firmwaresnapdragon_480_5g_mobile_platformsnapdragon_auto_5g_modem-rfsa6150pqcs410_firmwaresd730snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)Snapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-21476
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 15:33
Updated-07 Jan, 2026 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in Computer Vision

Memory corruption when passing parameters to the Trusted Virtual Machine during the handshake.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcm8550_firmwaresm8750p_firmwarewcn7880_firmwareqcs5430sm7635_firmwarewcn7850_firmwaresm8650p_firmwarewcn6650sm8550p_firmwarewcn7880sm7675_firmwaresm8550psm8550_firmwareqcn9012sm8635_firmwareqcs5430_firmwarewcn6755sg8275_firmwarewcn6750_firmwareqcm8550sm8650_firmwareqcs9100_firmwareqca6391sm8650q_firmwarewcn7860_firmwareqca6391_firmwarewcn7850wcn3950qcm5430_firmwaresm8750_firmwareqcs615wcn7851wcn7851_firmwarewcn7881_firmwareqcn9012_firmwaresm7675psm7635sm6650qcm6490wcn7860wcn6855sm8635p_firmwarewcn3910qca6698aqsm8635psxr2330pqcs9100sm7675wcn6750qcs8550_firmwarewcn6856_firmwaresg8275psm8650wcn3950_firmwarewcn7861wcn6855_firmwareqcn9274_firmwaresg8275wcn7881sm8650qwcn6755_firmwareqcs615_firmwarewcn3910_firmwareqcm5430qcm6490_firmwarewcn7861_firmwaresm8550qcs8550qcs6490_firmwaresg8275p_firmwarewcn6856sm8635sm8750psm8750qcs6490wcn6650_firmwaresm6650_firmwaresm7675p_firmwareqcn9011qcn9274sxr2330p_firmwaresm8650pqca6698aq_firmwareqcn9011_firmwareSnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-8869
Assigner-Python Software Foundation
ShareView Details
Assigner-Python Software Foundation
CVSS Score-5.9||MEDIUM
EPSS-0.02% / 4.49%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 14:56
Updated-03 Nov, 2025 | 18:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Fallback tar extraction in pip doesn't check symbolic links point to extraction directory

When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a "fixed" version for this vulnerability doesn't fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706. Note that this is a vulnerability in pip's fallback implementation of tar extraction for Python versions that don't implement PEP 706 and therefore are not secure to all vulnerabilities in the Python 'tarfile' module. If you're using a Python version that implements PEP 706 then pip doesn't use the "vulnerable" fallback code. Mitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.

Action-Not Available
Vendor-Python Packaging Authority
Product-pip
CVE-2025-48868
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-7.2||HIGH
EPSS-0.64% / 70.13%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 13:51
Updated-29 Sep, 2025 | 14:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Horilla vulnerable to authenticated RCE via eval() in project_bulk_archive

Horilla is a free and open source Human Resource Management System (HRMS). An authenticated Remote Code Execution (RCE) vulnerability exists in Horilla 1.3.0 due to the unsafe use of Python’s eval() function on a user-controlled query parameter in the project_bulk_archive view. This allows privileged users (e.g., administrators) to execute arbitrary system commands on the server. While having Django’s DEBUG=True makes exploitation visibly easier by returning command output in the HTTP response, this is not required. The vulnerability can still be exploited in DEBUG=False mode by using blind payloads such as a reverse shell, leading to full remote code execution. This issue has been patched in version 1.3.1.

Action-Not Available
Vendor-horillahorilla-opensource
Product-horillahorilla
CWE ID-CWE-95
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
CVE-2025-23354
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.22%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 13:14
Updated-10 Oct, 2025 | 18:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA Megatron-LM for all platforms contains a vulnerability in the ensemble_classifer script where malicious data created by an attacker may cause an injection. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, Information disclosure, and data tampering.

Action-Not Available
Vendor-NVIDIA Corporation
Product-megatron-lmMegatron-LM
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2025-23353
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.22%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 13:14
Updated-10 Oct, 2025 | 18:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA Megatron-LM for all platforms contains a vulnerability in the msdp preprocessing script where malicious data created by an attacker may cause an injection. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, Information disclosure, and data tampering.

Action-Not Available
Vendor-NVIDIA Corporation
Product-megatron-lmMegatron-LM
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2025-23349
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.22%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 13:13
Updated-10 Oct, 2025 | 18:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA Megatron-LM for all platforms contains a vulnerability in the tasks/orqa/unsupervised/nq.py component, where an attacker may cause a code injection. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, information disclosure, and data tampering.

Action-Not Available
Vendor-NVIDIA Corporation
Product-megatron-lmMegatron-LM
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2025-23348
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.22%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 13:13
Updated-10 Oct, 2025 | 18:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA Megatron-LM for all platforms contains a vulnerability in the pretrain_gpt script, where malicious data created by an attacker may cause a code injection issue. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, information disclosure, and data tampering.

Action-Not Available
Vendor-NVIDIA Corporation
Product-megatron-lmMegatron-LM
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2025-23346
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-3.3||LOW
EPSS-0.02% / 2.81%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 13:13
Updated-24 Sep, 2025 | 18:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA CUDA Toolkit contains a vulnerability in cuobjdump, where an unprivileged user can cause a NULL pointer dereference. A successful exploit of this vulnerability may lead to a limited denial of service.

Action-Not Available
Vendor-NVIDIA Corporation
Product-NVIDIA CUDA Toolkit
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2025-23340
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-3.3||LOW
EPSS-0.02% / 3.32%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 13:13
Updated-03 Nov, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA CUDA Toolkit for all platforms contains a vulnerability in the nvdisasm binary where a user may cause an out-of-bounds read by passing a malformed ELF file to nvdisasm. A successful exploit of this vulnerability may lead to a partial denial of service.

Action-Not Available
Vendor-NVIDIA CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-cuda_toolkitlinux_kernelwindowsNVIDIA CUDA Toolkit
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-23339
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-3.3||LOW
EPSS-0.02% / 2.74%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 13:13
Updated-03 Nov, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA CUDA Toolkit for all platforms contains a vulnerability in cuobjdump where an attacker may cause a stack-based buffer overflow by getting the user to run cuobjdump on a malicious ELF file. A successful exploit of this vulnerability may lead to arbitrary code execution at the privilege level of the user running cuobjdump.

Action-Not Available
Vendor-NVIDIA CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-cuda_toolkitlinux_kernelwindowsNVIDIA CUDA Toolkit
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-23338
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-3.3||LOW
EPSS-0.02% / 4.33%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 13:12
Updated-03 Nov, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA CUDA Toolkit for all platforms contains a vulnerability in nvdisasm where a user may cause an out-of-bounds write by running nvdisasm on a malicious ELF file. A successful exploit of this vulnerability may lead to denial of service.

Action-Not Available
Vendor-NVIDIA CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-cuda_toolkitlinux_kernelwindowsNVIDIA CUDA Toolkit
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2025-23308
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-3.3||LOW
EPSS-0.02% / 2.74%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 13:12
Updated-03 Nov, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA CUDA Toolkit for all platforms contains a vulnerability in nvdisasm where an attacker may cause a heap-based buffer overflow by getting the user to run nvdisasm on a malicious ELF file. A successful exploit of this vulnerability may lead to arbitrary code execution at the privilege level of the user running nvdisasm.

Action-Not Available
Vendor-NVIDIA CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-cuda_toolkitlinux_kernelwindowsNVIDIA CUDA Toolkit
CWE ID-CWE-122
Heap-based Buffer Overflow
CVE-2025-23275
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-4.2||MEDIUM
EPSS-0.02% / 3.94%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 13:12
Updated-24 Sep, 2025 | 18:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA CUDA Toolkit for all platforms contains a vulnerability in nvJPEG where a local authenticated user may cause a GPU out-of-bounds write by providing certain image dimensions. A successful exploit of this vulnerability may lead to denial of service and information disclosure.

Action-Not Available
Vendor-NVIDIA Corporation
Product-NVIDIA CUDA ToolkitnvJPEG
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-23274
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-4.5||MEDIUM
EPSS-0.02% / 3.51%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 13:12
Updated-24 Sep, 2025 | 18:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA nvJPEG contains a vulnerability in jpeg encoding where a user may cause an out-of-bounds read by providing a maliciously crafted input image with dimensions that cause integer overflows in array index calculations. A successful exploit of this vulnerability may lead to denial of service.

Action-Not Available
Vendor-NVIDIA Corporation
Product-NVIDIA CUDA ToolkitnvJPEG
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-23273
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-2.5||LOW
EPSS-0.02% / 3.37%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 13:12
Updated-24 Sep, 2025 | 18:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA CUDA Toolkit for all platforms contains a vulnerability in nvJPEG where a local authenticated user may cause a divide by zero error by submitting a specially crafted JPEG file. A successful exploit of this vulnerability may lead to denial of service.

Action-Not Available
Vendor-NVIDIA Corporation
Product-NVIDIA CUDA ToolkitnvJPEG
CWE ID-CWE-369
Divide By Zero
CVE-2025-23272
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-5.7||MEDIUM
EPSS-0.02% / 3.45%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 13:11
Updated-24 Sep, 2025 | 18:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA nvJPEG library contains a vulnerability where an attacker can cause an out-of-bounds read by means of a specially crafted JPEG file. A successful exploit of this vulnerability might lead to information disclosure or denial of service.

Action-Not Available
Vendor-NVIDIA Corporation
Product-NVIDIA CUDA ToolkitnvJPEG
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-23271
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-3.3||LOW
EPSS-0.02% / 3.32%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 13:11
Updated-03 Nov, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA CUDA Toolkit for all platforms contains a vulnerability in the nvdisasm binary where a user may cause an out-of-bounds read by passing a malformed ELF file to nvdisasm. A successful exploit of this vulnerability may lead to a partial denial of service.

Action-Not Available
Vendor-NVIDIA CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-cuda_toolkitlinux_kernelwindowsNVIDIA CUDA Toolkit
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-23255
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-3.3||LOW
EPSS-0.02% / 2.81%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 13:11
Updated-24 Sep, 2025 | 18:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA CUDA Toolkit for all platforms contains a vulnerability in the cuobjdump binary where a user may cause an out-of-bounds read by passing a malformed ELF file to cuobjdump. A successful exploit of this vulnerability may lead to a partial denial of service.

Action-Not Available
Vendor-NVIDIA Corporation
Product-NVIDIA CUDA Toolkit
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-23248
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-3.3||LOW
EPSS-0.02% / 2.81%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 13:11
Updated-06 Oct, 2025 | 14:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA CUDA Toolkit for all platforms contains a vulnerability in the nvdisasm binary where a user may cause an out-of-bounds read by passing a malformed ELF file to nvdisasm. A successful exploit of this vulnerability may lead to a partial denial of service.

Action-Not Available
Vendor-NVIDIA CorporationMicrosoft CorporationLinux Kernel Organization, Inc
Product-linux_kernelcuda_toolkitwindowsNVIDIA CUDA Toolkit
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-10906
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-8.6||HIGH
EPSS-0.03% / 7.84%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 13:02
Updated-24 Sep, 2025 | 18:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Magnetism Studios Endurance NSXPC com.MagnetismStudios.endurance.helper loadModuleNamed:WithReply missing authentication

A flaw has been found in Magnetism Studios Endurance up to 3.3.0 on macOS. This affects the function loadModuleNamed:WithReply of the file /Applications/Endurance.app/Contents/Library/LaunchServices/com.MagnetismStudios.endurance.helper of the component NSXPC Interface. Executing manipulation can lead to missing authentication. The attack needs to be launched locally. The exploit has been published and may be used.

Action-Not Available
Vendor-Magnetism Studios
Product-Endurance
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-9353
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-6.4||MEDIUM
EPSS-0.05% / 17.09%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 12:27
Updated-24 Sep, 2025 | 18:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Themify Builder <= 7.6.9 - Authenticated (Contributor+) Stored Cross-Site Scripting

The Themify Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several parameters in all versions up to, and including, 7.6.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The vulnerability was partially patched in version 7.6.9.

Action-Not Available
Vendor-themifyme
Product-Themify Builder
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-9054
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-0.15% / 35.51%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 11:18
Updated-24 Sep, 2025 | 18:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MultiLoca - WooCommerce Multi Locations Inventory Management <= 4.2.8 - Missing Authorization to Unauthenticated Arbitrary Options Update via 'wcmlim_settings_ajax_handler'

The MultiLoca - WooCommerce Multi Locations Inventory Management plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the 'wcmlim_settings_ajax_handler' function in all versions up to, and including, 4.2.8. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.

Action-Not Available
Vendor-Techspawn
Product-MultiLoca - WooCommerce Multi Locations Inventory Management
CWE ID-CWE-862
Missing Authorization
CVE-2025-39890
Assigner-kernel.org
ShareView Details
Assigner-kernel.org
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 3.34%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 11:02
Updated-14 Jan, 2026 | 18:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
wifi: ath12k: fix memory leak in ath12k_service_ready_ext_event

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix memory leak in ath12k_service_ready_ext_event Currently, in ath12k_service_ready_ext_event(), svc_rdy_ext.mac_phy_caps is not freed in the failure case, causing a memory leak. The following trace is observed in kmemleak: unreferenced object 0xffff8b3eb5789c00 (size 1024): comm "softirq", pid 0, jiffies 4294942577 hex dump (first 32 bytes): 00 00 00 00 01 00 00 00 00 00 00 00 7b 00 00 10 ............{... 01 00 00 00 00 00 00 00 01 00 00 00 1f 38 00 00 .............8.. backtrace (crc 44e1c357): __kmalloc_noprof+0x30b/0x410 ath12k_wmi_mac_phy_caps_parse+0x84/0x100 [ath12k] ath12k_wmi_tlv_iter+0x5e/0x140 [ath12k] ath12k_wmi_svc_rdy_ext_parse+0x308/0x4c0 [ath12k] ath12k_wmi_tlv_iter+0x5e/0x140 [ath12k] ath12k_service_ready_ext_event.isra.0+0x44/0xd0 [ath12k] ath12k_wmi_op_rx+0x2eb/0xd70 [ath12k] ath12k_htc_rx_completion_handler+0x1f4/0x330 [ath12k] ath12k_ce_recv_process_cb+0x218/0x300 [ath12k] ath12k_pci_ce_workqueue+0x1b/0x30 [ath12k] process_one_work+0x219/0x680 bh_worker+0x198/0x1f0 tasklet_action+0x13/0x30 handle_softirqs+0xca/0x460 __irq_exit_rcu+0xbe/0x110 irq_exit_rcu+0x9/0x30 Free svc_rdy_ext.mac_phy_caps in the error case to fix this memory leak. Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.4.1-00199-QCAHKSWPL_SILICONZ-1

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-401
Missing Release of Memory after Effective Lifetime
CVE-2025-39889
Assigner-kernel.org
ShareView Details
Assigner-kernel.org
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 0.18%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 11:02
Updated-14 Jan, 2026 | 18:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Bluetooth: l2cap: Check encryption key size on incoming connection

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: l2cap: Check encryption key size on incoming connection This is required for passing GAP/SEC/SEM/BI-04-C PTS test case: Security Mode 4 Level 4, Responder - Invalid Encryption Key Size - 128 bit This tests the security key with size from 1 to 15 bytes while the Security Mode 4 Level 4 requests 16 bytes key size. Currently PTS fails with the following logs: - expected:Connection Response: Code: [3 (0x03)] Code Identifier: (lt)WildCard: Exists(gt) Length: [8 (0x0008)] Destination CID: (lt)WildCard: Exists(gt) Source CID: [64 (0x0040)] Result: [3 (0x0003)] Connection refused - Security block Status: (lt)WildCard: Exists(gt), but received:Connection Response: Code: [3 (0x03)] Code Identifier: [1 (0x01)] Length: [8 (0x0008)] Destination CID: [64 (0x0040)] Source CID: [64 (0x0040)] Result: [0 (0x0000)] Connection Successful Status: [0 (0x0000)] No further information available And HCI logs: < HCI Command: Read Encrypti.. (0x05|0x0008) plen 2 Handle: 14 Address: 00:1B:DC:F2:24:10 (Vencer Co., Ltd.) > HCI Event: Command Complete (0x0e) plen 7 Read Encryption Key Size (0x05|0x0008) ncmd 1 Status: Success (0x00) Handle: 14 Address: 00:1B:DC:F2:24:10 (Vencer Co., Ltd.) Key size: 7 > ACL Data RX: Handle 14 flags 0x02 dlen 12 L2CAP: Connection Request (0x02) ident 1 len 4 PSM: 4097 (0x1001) Source CID: 64 < ACL Data TX: Handle 14 flags 0x00 dlen 16 L2CAP: Connection Response (0x03) ident 1 len 8 Destination CID: 64 Source CID: 64 Result: Connection successful (0x0000) Status: No further information available (0x0000)

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2024-58241
Assigner-kernel.org
ShareView Details
Assigner-kernel.org
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 4.15%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 11:02
Updated-14 Jan, 2026 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Bluetooth: hci_core: Disable works on hci_unregister_dev

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_core: Disable works on hci_unregister_dev This make use of disable_work_* on hci_unregister_dev since the hci_dev is about to be freed new submissions are not disarable.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
  • Previous
  • 1
  • 2
  • ...
  • 340
  • 341
  • 342
  • ...
  • 6591
  • 6592
  • Next