CVE-2025-47353
Unknown
Unknown - Not Provided
BaseFortify
Publication date: 2025-11-04
Last updated on: 2025-11-05
Assigner: Qualcomm, Inc.
Description
Description
Memory corruption while processing request sent from GVM.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| qualcomm | qam8255p_firmware | * |
| qualcomm | qam8255p | * |
| qualcomm | qam8650p_firmware | * |
| qualcomm | qam8650p | * |
| qualcomm | qam8775p_firmware | * |
| qualcomm | qam8775p | * |
| qualcomm | qamsrv1h_firmware | * |
| qualcomm | qamsrv1h | * |
| qualcomm | qamsrv1m_firmware | * |
| qualcomm | qamsrv1m | * |
| qualcomm | qca6595_firmware | * |
| qualcomm | qca6595 | * |
| qualcomm | qca6698aq_firmware | * |
| qualcomm | qca6698aq | * |
| qualcomm | qca6797aq_firmware | * |
| qualcomm | qca6797aq | * |
| qualcomm | sa7255p_firmware | * |
| qualcomm | sa7255p | * |
| qualcomm | sa7775p_firmware | * |
| qualcomm | sa7775p | * |
| qualcomm | sa8255p_firmware | * |
| qualcomm | sa8255p | * |
| qualcomm | sa8620p_firmware | * |
| qualcomm | sa8620p | * |
| qualcomm | sa8650p_firmware | * |
| qualcomm | sa8650p | * |
| qualcomm | sa8770p_firmware | * |
| qualcomm | sa8770p | * |
| qualcomm | sa8775p_firmware | * |
| qualcomm | sa8775p | * |
| qualcomm | sa9000p_firmware | * |
| qualcomm | sa9000p | * |
| qualcomm | srv1h_firmware | * |
| qualcomm | srv1h | * |
| qualcomm | srv1m_firmware | * |
| qualcomm | srv1m | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-749 | The product provides an Applications Programming Interface (API) or similar interface for interaction with external actors, but the interface includes a dangerous method or function that is not properly restricted. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory corruption issue that occurs when processing a request sent from GVM (Greenbone Vulnerability Manager).
How can this vulnerability impact me? :
The vulnerability can lead to high impact on confidentiality, integrity, and availability of the affected system, potentially allowing an attacker with limited privileges to cause significant damage or unauthorized access.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70