Memory Corruption Vulnerability in Qualcomm Products
CVE-2025-21437

7.8HIGH

Key Information:

Vendor
Qualcomm
Vendor
CVE Published:
7 April 2025

What is CVE-2025-21437?

CVE-2025-21437 is a vulnerability affecting Qualcomm products, characterized by a memory corruption issue. The flaw arises during the processing of memory map or unmap IOCTL operations occurring simultaneously. This vulnerability poses a significant risk to organizations utilizing Qualcomm technologies, as it may lead to unpredictable behavior of devices, including system crashes or unauthorized access, ultimately compromising the integrity and security of systems reliant on Qualcomm functionality.

Technical Details

The vulnerability involves memory corruption due to the overlapping execution of input/output control (IOCTL) operations that manage memory mapping. Such degradation in memory handling can lead to various issues, including potential denial of service or unauthorized memory access, depending on the specifics of the exploitation scenario. Proper handling of concurrent operations is critical to maintaining system stability and security in Qualcomm products.

Potential Impact of CVE-2025-21437

  1. System Instability: Organizations may experience application crashes, device failures, or other erratic behaviors due to memory corruption, leading to service disruptions and operational inefficiencies.

  2. Data Compromise: Unchecked memory access may allow attackers to read or modify sensitive data, resulting in data breaches and loss of confidentiality for critical information managed within Qualcomm-integrated devices.

  3. Increased Attack Surface: The presence of this vulnerability could open pathways for more sophisticated cyberattacks, including the installation of malware, as attackers exploit the weaknesses in memory management to gain deeper access to affected systems.

Affected Version(s)

Snapdragon Snapdragon Auto QAM8255P

Snapdragon Snapdragon Auto QAM8295P

Snapdragon Snapdragon Auto QAM8620P

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.