CVE-2025-21452
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-06

Last updated on: 2025-08-20

Assigner: Qualcomm, Inc.

Description
Transient DOS while processing a random-access response (RAR) with an invalid PDU length on LTE network.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-06
Last Modified
2025-08-20
Generated
2026-05-07
AI Q&A
2025-08-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 160 associated CPEs
Vendor Product Version / Range
qualcomm 315_5g_iot_modem_firmware *
qualcomm 315_5g_iot_modem *
qualcomm ar8035_firmware *
qualcomm ar8035 *
qualcomm fastconnect_6200_firmware *
qualcomm fastconnect_6200 *
qualcomm fastconnect_6700_firmware *
qualcomm fastconnect_6700 *
qualcomm fastconnect_6800_firmware *
qualcomm fastconnect_6800 *
qualcomm fastconnect_6900_firmware *
qualcomm fastconnect_6900 *
qualcomm fsm10055_firmware *
qualcomm fsm10055 *
qualcomm qca6174a_firmware *
qualcomm qca6174a *
qualcomm qca6391_firmware *
qualcomm qca6391 *
qualcomm qca6421_firmware *
qualcomm qca6421 *
qualcomm qca6426_firmware *
qualcomm qca6426 *
qualcomm qca6431_firmware *
qualcomm qca6431 *
qualcomm qca6436_firmware *
qualcomm qca6436 *
qualcomm qca6574a_firmware *
qualcomm qca6574a *
qualcomm qca6574au_firmware *
qualcomm qca6574au *
qualcomm qca6595au_firmware *
qualcomm qca6595au *
qualcomm qca6696_firmware *
qualcomm qca6696 *
qualcomm qca6698aq_firmware *
qualcomm qca6698aq *
qualcomm qca8337_firmware *
qualcomm qca8337 *
qualcomm qcm5430_firmware *
qualcomm qcm5430 *
qualcomm qcm6490_firmware *
qualcomm qcm6490 *
qualcomm qcs5430_firmware *
qualcomm qcs5430 *
qualcomm qcs6490_firmware *
qualcomm qcs6490 *
qualcomm qep8111_firmware *
qualcomm qep8111 *
qualcomm video_collaboration_vc3_platform_firmware *
qualcomm video_collaboration_vc3_platform *
qualcomm sd855_firmware *
qualcomm sd855 *
qualcomm sd865_5g_firmware *
qualcomm sd865_5g *
qualcomm sdx55_firmware *
qualcomm sdx55 *
qualcomm sdx57m_firmware *
qualcomm sdx57m *
qualcomm sm6370_firmware *
qualcomm sm6370 *
qualcomm sm6650_firmware *
qualcomm sm6650 *
qualcomm sm7250p_firmware *
qualcomm sm7250p *
qualcomm sm7325p_firmware *
qualcomm sm7325p *
qualcomm sm7635_firmware *
qualcomm sm7635 *
qualcomm snapdragon_4_gen_1_mobile_platform_firmware *
qualcomm wcn6450 *
qualcomm wcn6650_firmware *
qualcomm wcn6650 *
qualcomm wcn6740_firmware *
qualcomm wcn6740 *
qualcomm wcn6755_firmware *
qualcomm wcn6755 *
qualcomm wcn7861_firmware *
qualcomm wcn7861 *
qualcomm wcn7881_firmware *
qualcomm wcn7881 *
qualcomm wsa8810_firmware *
qualcomm wsa8810 *
qualcomm wsa8815_firmware *
qualcomm wsa8815 *
qualcomm wsa8830_firmware *
qualcomm wsa8830 *
qualcomm wsa8832_firmware *
qualcomm wsa8832 *
qualcomm wsa8835_firmware *
qualcomm wsa8835 *
qualcomm snapdragon_4_gen_1_mobile_platform *
qualcomm snapdragon_480_5g_mobile_platform_firmware *
qualcomm snapdragon_480_5g_mobile_platform *
qualcomm snapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmware *
qualcomm snapdragon_480\+_5g_mobile_platform_\(sm4350-ac\) *
qualcomm snapdragon_690_5g_mobile_platform_firmware *
qualcomm snapdragon_690_5g_mobile_platform *
qualcomm snapdragon_695_5g_mobile_platform_firmware *
qualcomm snapdragon_695_5g_mobile_platform *
qualcomm snapdragon_765_5g_mobile_platform_\(sm7250-aa\)_firmware *
qualcomm snapdragon_765_5g_mobile_platform_\(sm7250-aa\) *
qualcomm snapdragon_765g_5g_mobile_platform_\(sm7250-ab\)_firmware *
qualcomm snapdragon_765g_5g_mobile_platform_\(sm7250-ab\) *
qualcomm snapdragon_768g_5g_mobile_platform_\(sm7250-ac\)_firmware *
qualcomm snapdragon_768g_5g_mobile_platform_\(sm7250-ac\) *
qualcomm snapdragon_778g_5g_mobile_platform_firmware *
qualcomm snapdragon_778g_5g_mobile_platform *
qualcomm snapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)_firmware *
qualcomm snapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\) *
qualcomm snapdragon_780g_5g_mobile_platform_firmware *
qualcomm snapdragon_780g_5g_mobile_platform *
qualcomm snapdragon_782g_mobile_platform_\(sm7325-af\)_firmware *
qualcomm snapdragon_782g_mobile_platform_\(sm7325-af\) *
qualcomm snapdragon_7c\+_gen_3_compute_firmware *
qualcomm snapdragon_7c\+_gen_3_compute *
qualcomm snapdragon_855_mobile_platform_firmware *
qualcomm snapdragon_855_mobile_platform *
qualcomm snapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)_firmware *
qualcomm snapdragon_855\+\/860_mobile_platform_\(sm8150-ac\) *
qualcomm snapdragon_865_5g_mobile_platform_firmware *
qualcomm snapdragon_865_5g_mobile_platform *
qualcomm snapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)_firmware *
qualcomm snapdragon_865\+_5g_mobile_platform_\(sm8250-ab\) *
qualcomm snapdragon_870_5g_mobile_platform_\(sm8250-ac\)_firmware *
qualcomm snapdragon_870_5g_mobile_platform_\(sm8250-ac\) *
qualcomm snapdragon_888_5g_mobile_platform_firmware *
qualcomm snapdragon_888_5g_mobile_platform *
qualcomm snapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmware *
qualcomm snapdragon_888\+_5g_mobile_platform_\(sm8350-ac\) *
qualcomm snapdragon_auto_5g_modem-rf_firmware *
qualcomm snapdragon_auto_5g_modem-rf *
qualcomm snapdragon_x35_5g_modem-rf_system_firmware *
qualcomm snapdragon_x35_5g_modem-rf_system *
qualcomm snapdragon_x55_5g_modem-rf_system_firmware *
qualcomm snapdragon_x55_5g_modem-rf_system *
qualcomm snapdragon_xr2_5g_platform_firmware *
qualcomm snapdragon_xr2_5g_platform *
qualcomm sxr2130_firmware *
qualcomm sxr2130 *
qualcomm wcd9340_firmware *
qualcomm wcd9340 *
qualcomm wcd9341_firmware *
qualcomm wcd9341 *
qualcomm wcd9360_firmware *
qualcomm wcd9360 *
qualcomm wcd9370_firmware *
qualcomm wcd9370 *
qualcomm wcd9375_firmware *
qualcomm wcd9375 *
qualcomm wcd9378_firmware *
qualcomm wcd9378 *
qualcomm wcd9380_firmware *
qualcomm wcd9380 *
qualcomm wcd9385_firmware *
qualcomm wcd9385 *
qualcomm wcd9395_firmware *
qualcomm wcd9395 *
qualcomm wcn3988_firmware *
qualcomm wcn3988 *
qualcomm wcn6450_firmware *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-617 The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a transient denial of service (DOS) that occurs when processing a random-access response (RAR) with an invalid protocol data unit (PDU) length on an LTE network.


How can this vulnerability impact me? :

The vulnerability can cause a temporary denial of service, potentially disrupting LTE network connectivity or service availability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart