CVE-2025-27055
Unknown
Unknown - Not Provided
BaseFortify
Publication date: 2025-07-08
Last updated on: 2025-08-11
Assigner: Qualcomm, Inc.
Description
Description
Memory corruption during the image encoding process.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| qualcomm | aqt1000_firmware | * |
| qualcomm | aqt1000 | * |
| qualcomm | fastconnect_6200_firmware | * |
| qualcomm | fastconnect_6200 | * |
| qualcomm | fastconnect_6700_firmware | * |
| qualcomm | fastconnect_6700 | * |
| qualcomm | fastconnect_6800_firmware | * |
| qualcomm | fastconnect_6800 | * |
| qualcomm | fastconnect_6900_firmware | * |
| qualcomm | fastconnect_6900 | * |
| qualcomm | fastconnect_7800_firmware | * |
| qualcomm | fastconnect_7800 | * |
| qualcomm | qca6391_firmware | * |
| qualcomm | qca6391 | * |
| qualcomm | qca6420_firmware | * |
| qualcomm | qca6420 | * |
| qualcomm | qca6430_firmware | * |
| qualcomm | qca6430 | * |
| qualcomm | qcm5430_firmware | * |
| qualcomm | qcm5430 | * |
| qualcomm | qcm6490_firmware | * |
| qualcomm | qcm6490 | * |
| qualcomm | qcs5430_firmware | * |
| qualcomm | qcs5430 | * |
| qualcomm | qcs6490_firmware | * |
| qualcomm | qcs6490 | * |
| qualcomm | video_collaboration_vc3_platform_firmware | * |
| qualcomm | video_collaboration_vc3_platform | * |
| qualcomm | sc8180x\+sdx55_firmware | * |
| qualcomm | sc8180x\+sdx55 | * |
| qualcomm | sc8380xp_firmware | * |
| qualcomm | sc8380xp | * |
| qualcomm | sm6250_firmware | * |
| qualcomm | sm6250 | * |
| qualcomm | snapdragon_7c_compute_firmware | * |
| qualcomm | snapdragon_7c_compute | * |
| qualcomm | snapdragon_7c_gen_2_compute_firmware | * |
| qualcomm | snapdragon_7c_gen_2_compute | * |
| qualcomm | snapdragon_7c\+_gen_3_compute_firmware | * |
| qualcomm | snapdragon_7c\+_gen_3_compute | * |
| qualcomm | sc8180x-ad_firmware | * |
| qualcomm | sc8180x-ad | * |
| qualcomm | sc8180xp-ad_firmware | * |
| qualcomm | sc8180xp-ad | * |
| qualcomm | sc8180x-aaab_firmware | * |
| qualcomm | sc8180x-aaab | * |
| qualcomm | sc8180xp-acaf_firmware | * |
| qualcomm | sc8180xp-acaf | * |
| qualcomm | sc8180x-acaf_firmware | * |
| qualcomm | sc8180x-acaf | * |
| qualcomm | sc8180xp-aaab_firmware | * |
| qualcomm | sc8180xp-aaab | * |
| qualcomm | sc8280xp-abbb_firmware | * |
| qualcomm | sc8280xp-abbb | * |
| qualcomm | wcd9340_firmware | * |
| qualcomm | wcd9340 | * |
| qualcomm | wcd9341_firmware | * |
| qualcomm | wcd9341 | * |
| qualcomm | wcd9370_firmware | * |
| qualcomm | wcd9370 | * |
| qualcomm | wcd9375_firmware | * |
| qualcomm | wcd9375 | * |
| qualcomm | wcd9380_firmware | * |
| qualcomm | wcd9380 | * |
| qualcomm | wcd9385_firmware | * |
| qualcomm | wcd9385 | * |
| qualcomm | wsa8810_firmware | * |
| qualcomm | wsa8810 | * |
| qualcomm | wsa8815_firmware | * |
| qualcomm | wsa8815 | * |
| qualcomm | wsa8830_firmware | * |
| qualcomm | wsa8830 | * |
| qualcomm | wsa8835_firmware | * |
| qualcomm | wsa8835 | * |
| qualcomm | wsa8840_firmware | * |
| qualcomm | wsa8840 | * |
| qualcomm | wsa8845_firmware | * |
| qualcomm | wsa8845 | * |
| qualcomm | wsa8845h_firmware | * |
| qualcomm | wsa8845h | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-126 | The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer. |
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory corruption issue that occurs during the image encoding process. It means that while encoding images, the software improperly handles memory, which can lead to unexpected behavior or crashes.
How can this vulnerability impact me? :
This vulnerability can have a high impact, potentially allowing an attacker with limited privileges to cause significant damage, including compromising confidentiality, integrity, and availability of the affected system.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70