CVE-2025-47328
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-24

Last updated on: 2025-09-25

Assigner: Qualcomm, Inc.

Description
Transient DOS while processing power control requests with invalid antenna or stream values.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-24
Last Modified
2025-09-25
Generated
2026-05-07
AI Q&A
2025-09-24
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 134 associated CPEs
Vendor Product Version / Range
qualcomm fastconnect_7800_firmware *
qualcomm fastconnect_7800 *
qualcomm immersive_home_3210_platform_firmware *
qualcomm immersive_home_3210_platform *
qualcomm immersive_home_326_platform_firmware *
qualcomm immersive_home_326_platform *
qualcomm ipq5300_firmware *
qualcomm ipq5300 *
qualcomm ipq5302_firmware *
qualcomm ipq5302 *
qualcomm ipq5312_firmware *
qualcomm ipq5312 *
qualcomm ipq5332_firmware *
qualcomm ipq5332 *
qualcomm ipq5424_firmware *
qualcomm ipq5424 *
qualcomm ipq9008_firmware *
qualcomm ipq9008 *
qualcomm ipq9048_firmware *
qualcomm ipq9048 *
qualcomm ipq9554_firmware *
qualcomm ipq9554 *
qualcomm ipq9570_firmware *
qualcomm ipq9570 *
qualcomm ipq9574_firmware *
qualcomm ipq9574 *
qualcomm qca0000_firmware *
qualcomm qca0000 *
qualcomm qca8075_firmware *
qualcomm qca8075 *
qualcomm qca8080_firmware *
qualcomm qca8080 *
qualcomm qca8081_firmware *
qualcomm qca8081 *
qualcomm qca8082_firmware *
qualcomm qca8082 *
qualcomm qca8084_firmware *
qualcomm qca8084 *
qualcomm qca8085_firmware *
qualcomm qca8085 *
qualcomm qca8101_firmware *
qualcomm qca8101 *
qualcomm qca8102_firmware *
qualcomm qca8102 *
qualcomm qca8111_firmware *
qualcomm qca8111 *
qualcomm qca8112_firmware *
qualcomm qca8112 *
qualcomm qca8384_firmware *
qualcomm qca8384 *
qualcomm qca8385_firmware *
qualcomm qca8385 *
qualcomm qca8386_firmware *
qualcomm qca8386 *
qualcomm qcc710_firmware *
qualcomm qcc710 *
qualcomm qcf8000_firmware *
qualcomm qcf8000 *
qualcomm qcf8001_firmware *
qualcomm qcf8001 *
qualcomm qcn5124_firmware *
qualcomm qcn5124 *
qualcomm qcn5224_firmware *
qualcomm qcn5224 *
qualcomm qcn6224_firmware *
qualcomm qcn6224 *
qualcomm qcn6274_firmware *
qualcomm qcn6274 *
qualcomm qcn6402_firmware *
qualcomm qcn6402 *
qualcomm qcn6412_firmware *
qualcomm qcn6412 *
qualcomm qcn6422_firmware *
qualcomm qcn6422 *
qualcomm qcn6432_firmware *
qualcomm qcn6432 *
qualcomm qcn9000_firmware *
qualcomm qcn9000 *
qualcomm qcn9012_firmware *
qualcomm qcn9012 *
qualcomm qcn9024_firmware *
qualcomm qcn9024 *
qualcomm qcn9074_firmware *
qualcomm qcn9074 *
qualcomm qcn9160_firmware *
qualcomm qcn9160 *
qualcomm qcn9274_firmware *
qualcomm qcn9274 *
qualcomm qfw7114_firmware *
qualcomm qfw7114 *
qualcomm qfw7124_firmware *
qualcomm qfw7124 *
qualcomm qmp1000_firmware *
qualcomm qmp1000 *
qualcomm qxm8083_firmware *
qualcomm qxm8083 *
qualcomm sm8735_firmware *
qualcomm sm8735 *
qualcomm sm8750_firmware *
qualcomm sm8750 *
qualcomm sm8750p_firmware *
qualcomm sm8750p *
qualcomm snapdragon_x72_5g_modem-rf_system_firmware *
qualcomm snapdragon_x72_5g_modem-rf_system *
qualcomm snapdragon_x75_5g_modem-rf_system_firmware *
qualcomm snapdragon_x75_5g_modem-rf_system *
qualcomm wcd9340_firmware *
qualcomm wcd9340 *
qualcomm wcd9378_firmware *
qualcomm wcd9378 *
qualcomm wcd9395_firmware *
qualcomm wcd9395 *
qualcomm wcn7750_firmware *
qualcomm wcn7750 *
qualcomm wcn7860_firmware *
qualcomm wcn7860 *
qualcomm wcn7861_firmware *
qualcomm wcn7861 *
qualcomm wcn7880_firmware *
qualcomm wcn7880 *
qualcomm wcn7881_firmware *
qualcomm wcn7881 *
qualcomm wsa8830_firmware *
qualcomm wsa8830 *
qualcomm wsa8832_firmware *
qualcomm wsa8832 *
qualcomm wsa8835_firmware *
qualcomm wsa8835 *
qualcomm wsa8840_firmware *
qualcomm wsa8840 *
qualcomm wsa8845_firmware *
qualcomm wsa8845 *
qualcomm wsa8845h_firmware *
qualcomm wsa8845h *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-126 The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a transient denial of service (DOS) issue that occurs when processing power control requests containing invalid antenna or stream values. Essentially, the system temporarily becomes unavailable or unresponsive due to improper handling of these invalid inputs.


How can this vulnerability impact me? :

The impact of this vulnerability is a temporary denial of service, meaning the affected system or device may become unresponsive or unavailable for a short period when it processes certain malformed power control requests. This could disrupt normal operations or communications.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart