Memory Corruption Vulnerability in Qualcomm GPU Micronode
CVE-2025-21479
Key Information:
- Vendor
Qualcomm
- Status
- Vendor
- CVE Published:
- 3 June 2025
Badges
What is CVE-2025-21479?
CVE-2025-21479 is a significant memory corruption vulnerability present in the Qualcomm GPU micronode, where unauthorized command execution can occur due to a specific sequence of commands. The Qualcomm GPU is widely used in various mobile devices and embedded systems, providing graphics processing capabilities that are crucial for performance and user experience. If exploited, this vulnerability could lead to a range of malicious outcomes, as attackers may execute unauthorized commands that could compromise system integrity or lead to denial of service. The nature of this vulnerability is particularly concerning, as it exploits low-level memory management issues, which can be challenging to detect and mitigate.
Potential Impact of CVE-2025-21479
-
System Compromise: Successful exploitation could allow attackers to execute arbitrary commands, resulting in a complete compromise of the affected device. This could enable them to manipulate system behavior, access sensitive information, or install additional malicious payloads.
-
Denial of Service: The memory corruption could lead to system instability or crashes, resulting in a denial of service for users. Devices may experience unexpected behavior, rendering them unusable and impacting critical operations, particularly in environments relying on uninterrupted service.
-
Data Security Risks: If attackers gain access through this vulnerability, there is a substantial risk of data breaches, exposing sensitive personal information or corporate data stored on the compromised devices. This could lead to reputational damage and financial losses for organizations.
CISA has reported CVE-2025-21479
CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2025-21479 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace
The CISA's recommendation is: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Affected Version(s)
Snapdragon Snapdragon CCW AQT1000
Snapdragon Snapdragon CCW FastConnect 6200
Snapdragon Snapdragon CCW FastConnect 6700
News Articles
Qualcomm patches three exploited security flaws, but you could still be vulnerable
Device manufacturers must still apply the critical updates to their individual products, but we're not out of the woods yet.
14 hours ago
CISA Adds Three Known Exploited Vulnerabilities to Catalog | CISA
CISA has added three new vulnerabilities to itsโฏKEV Catalog, based on evidence of active exploitation
22 hours ago
Qualcomm fixes multiple zero-day chip flaws after Google warns of active exploits by hackers
Qualcomm has patched three serious zero-day flaws in its Adreno GPU driver after Google warned of active exploitation by hackers. Users are urged to update their devices as soon as possible.
1 day ago
References
EPSS Score
12% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- ๐
Vulnerability started trending
- ๐ฆ
CISA Reported
Vulnerability published
- ๐พ
Exploit known to exist
- ๐ฐ
First article discovered by BleepingComputer
Vulnerability Reserved