CVE-2025-47360
BaseFortify
Publication date: 2025-11-04
Last updated on: 2025-11-05
Assigner: Qualcomm, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| qualcomm | qam8255p_firmware | * |
| qualcomm | qam8255p | * |
| qualcomm | qam8295p_firmware | * |
| qualcomm | qam8295p | * |
| qualcomm | qam8620p_firmware | * |
| qualcomm | qam8620p | * |
| qualcomm | qam8650p_firmware | * |
| qualcomm | qam8650p | * |
| qualcomm | qam8775p_firmware | * |
| qualcomm | qam8775p | * |
| qualcomm | qamsrv1h_firmware | * |
| qualcomm | qamsrv1h | * |
| qualcomm | qamsrv1m_firmware | * |
| qualcomm | qamsrv1m | * |
| qualcomm | qca6574au_firmware | * |
| qualcomm | qca6574au | * |
| qualcomm | qca6595_firmware | * |
| qualcomm | qca6595 | * |
| qualcomm | qca6595au_firmware | * |
| qualcomm | qca6595au | * |
| qualcomm | qca6688aq_firmware | * |
| qualcomm | qca6688aq | * |
| qualcomm | qca6696_firmware | * |
| qualcomm | qca6696 | * |
| qualcomm | qca6698aq_firmware | * |
| qualcomm | qca6698aq | * |
| qualcomm | qca6797aq_firmware | * |
| qualcomm | qca6797aq | * |
| qualcomm | qca8695au_firmware | * |
| qualcomm | qca8695au | * |
| qualcomm | sa6145p_firmware | * |
| qualcomm | sa6145p | * |
| qualcomm | sa6150p_firmware | * |
| qualcomm | sa6150p | * |
| qualcomm | sa6155p_firmware | * |
| qualcomm | sa6155p | * |
| qualcomm | sa7255p_firmware | * |
| qualcomm | sa7255p | * |
| qualcomm | sa7775p_firmware | * |
| qualcomm | sa7775p | * |
| qualcomm | sa8145p_firmware | * |
| qualcomm | sa8145p | * |
| qualcomm | sa8150p_firmware | * |
| qualcomm | sa8150p | * |
| qualcomm | sa8155p_firmware | * |
| qualcomm | sa8155p | * |
| qualcomm | sa8195p_firmware | * |
| qualcomm | sa8195p | * |
| qualcomm | sa8255p_firmware | * |
| qualcomm | sa8255p | * |
| qualcomm | sa8295p_firmware | * |
| qualcomm | sa8295p | * |
| qualcomm | sa8540p_firmware | * |
| qualcomm | sa8540p | * |
| qualcomm | sa8620p_firmware | * |
| qualcomm | sa8620p | * |
| qualcomm | sa8650p_firmware | * |
| qualcomm | sa8650p | * |
| qualcomm | sa8770p_firmware | * |
| qualcomm | sa8770p | * |
| qualcomm | sa8775p_firmware | * |
| qualcomm | sa8775p | * |
| qualcomm | sa9000p_firmware | * |
| qualcomm | sa9000p | * |
| qualcomm | srv1h_firmware | * |
| qualcomm | srv1h | * |
| qualcomm | srv1l_firmware | * |
| qualcomm | srv1l | * |
| qualcomm | srv1m_firmware | * |
| qualcomm | srv1m | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory corruption issue that occurs while processing client messages during device management. It means that when the device management system handles messages from clients, a flaw in the code can cause the device's memory to be corrupted.
How can this vulnerability impact me? :
This vulnerability can have a high impact as it affects confidentiality, integrity, and availability. An attacker with limited privileges and local access could exploit this flaw to corrupt memory, potentially leading to unauthorized access, data modification, or denial of service.