CVE-2025-21458
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-06

Last updated on: 2025-08-19

Assigner: Qualcomm, Inc.

Description
Memory corruption when IOCTL interface is called to map and unmap buffers simultaneously.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-06
Last Modified
2025-08-19
Generated
2026-05-06
AI Q&A
2025-08-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 48 associated CPEs
Vendor Product Version / Range
qualcomm qca6174a_firmware *
qualcomm qca6174a *
qualcomm qca6698aq_firmware *
qualcomm qca6698aq *
qualcomm qca6797aq_firmware *
qualcomm qca6797aq *
qualcomm sa7255p_firmware *
qualcomm sa7255p *
qualcomm sa7775p_firmware *
qualcomm sa7775p *
qualcomm sa8255p_firmware *
qualcomm sa8255p *
qualcomm sa8620p_firmware *
qualcomm sa8620p *
qualcomm sa8650p_firmware *
qualcomm sa8650p *
qualcomm sa8775p_firmware *
qualcomm sa8775p *
qualcomm sa9000p_firmware *
qualcomm sa9000p *
qualcomm snapdragon_888_5g_mobile_platform_firmware *
qualcomm snapdragon_888_5g_mobile_platform *
qualcomm snapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmware *
qualcomm snapdragon_888\+_5g_mobile_platform_\(sm8350-ac\) *
qualcomm sw5100_firmware *
qualcomm sw5100 *
qualcomm sw5100p_firmware *
qualcomm sw5100p *
qualcomm wcd9380_firmware *
qualcomm wcd9380 *
qualcomm wcd9385_firmware *
qualcomm wcd9385 *
qualcomm wcn3980_firmware *
qualcomm wcn3980 *
qualcomm wcn3988_firmware *
qualcomm wcn3988 *
qualcomm wsa8830_firmware *
qualcomm wsa8830 *
qualcomm wsa8835_firmware *
qualcomm wsa8835 *
qualcomm fastconnect_6900_firmware *
qualcomm fastconnect_6900 *
qualcomm qam8255p_firmware *
qualcomm qam8255p *
qualcomm qam8650p_firmware *
qualcomm qam8650p *
qualcomm qam8775p_firmware *
qualcomm qam8775p *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-416 The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a memory corruption issue that occurs when the IOCTL interface is called to map and unmap buffers simultaneously.


How can this vulnerability impact me? :

The vulnerability can lead to high impact on confidentiality, integrity, and availability of the affected system, potentially allowing an attacker with limited privileges to cause memory corruption.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart