CVE-2025-47332
BaseFortify
Publication date: 2026-01-07
Last updated on: 2026-01-28
Assigner: Qualcomm, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| qualcomm | fastconnect_6200_firmware | * |
| qualcomm | fastconnect_6200 | * |
| qualcomm | fastconnect_6700_firmware | * |
| qualcomm | fastconnect_6700 | * |
| qualcomm | fastconnect_6900_firmware | * |
| qualcomm | fastconnect_6900 | * |
| qualcomm | fastconnect_7800_firmware | * |
| qualcomm | fastconnect_7800 | * |
| qualcomm | qca6698au_firmware | * |
| qualcomm | qca6698au | * |
| qualcomm | qca6797aq_firmware | * |
| qualcomm | qca6797aq | * |
| qualcomm | qcm4490_firmware | * |
| qualcomm | qcm4490 | * |
| qualcomm | qcm8550_firmware | * |
| qualcomm | qcm8550 | * |
| qualcomm | qcs4490_firmware | * |
| qualcomm | qcs4490 | * |
| qualcomm | qcs8550_firmware | * |
| qualcomm | qcs8550 | * |
| qualcomm | qmp1000_firmware | * |
| qualcomm | qmp1000 | * |
| qualcomm | sg8275_firmware | * |
| qualcomm | sg8275 | * |
| qualcomm | sg8275p_firmware | * |
| qualcomm | sg8275p | * |
| qualcomm | sm6650_firmware | * |
| qualcomm | sm6650 | * |
| qualcomm | sm6650p_firmware | * |
| qualcomm | sm6650p | * |
| qualcomm | sm7435_firmware | * |
| qualcomm | sm7435 | * |
| qualcomm | sm7550_firmware | * |
| qualcomm | sm7550 | * |
| qualcomm | sm7550p_firmware | * |
| qualcomm | sm7550p | * |
| qualcomm | sm7635_firmware | * |
| qualcomm | sm7635 | * |
| qualcomm | sm7635p_firmware | * |
| qualcomm | sm7635p | * |
| qualcomm | sm7675_firmware | * |
| qualcomm | sm7675 | * |
| qualcomm | sm7675p_firmware | * |
| qualcomm | sm7675p | * |
| qualcomm | sm8475p_firmware | * |
| qualcomm | sm8475p | * |
| qualcomm | sm8550p_firmware | * |
| qualcomm | sm8550p | * |
| qualcomm | sm8635_firmware | * |
| qualcomm | sm8635 | * |
| qualcomm | sm8635p_firmware | * |
| qualcomm | sm8635p | * |
| qualcomm | sm8650q_firmware | * |
| qualcomm | sm8650q | * |
| qualcomm | sm8735_firmware | * |
| qualcomm | sm8735 | * |
| qualcomm | sm8750_firmware | * |
| qualcomm | sm8750 | * |
| qualcomm | sm8750p_firmware | * |
| qualcomm | sm8750p | * |
| qualcomm | snapdragon_4_gen_2_mobile_platform_firmware | * |
| qualcomm | snapdragon_4_gen_2_mobile_platform | * |
| qualcomm | snapdragon_6_gen_1_mobile_platform_firmware | * |
| qualcomm | snapdragon_6_gen_1_mobile_platform | * |
| qualcomm | snapdragon_7_gen_1_mobile_platform_firmware | * |
| qualcomm | snapdragon_7_gen_1_mobile_platform | * |
| qualcomm | snapdragon_7\+_gen_2_mobile_platform_firmware | * |
| qualcomm | snapdragon_7\+_gen_2_mobile_platform | * |
| qualcomm | snapdragon_8_gen_2_mobile_platform_firmware | * |
| qualcomm | snapdragon_8_gen_2_mobile_platform | * |
| qualcomm | snapdragon_8_gen_3_mobile_platform_firmware | * |
| qualcomm | snapdragon_8_gen_3_mobile_platform | * |
| qualcomm | snapdragon_8\+_gen_1_mobile_platform_firmware | * |
| qualcomm | snapdragon_8\+_gen_1_mobile_platform | * |
| qualcomm | snapdragon_8\+_gen_2_mobile_platform_firmware | * |
| qualcomm | snapdragon_8\+_gen_2_mobile_platform | * |
| qualcomm | snapdragon_ar1_gen_1_platform_firmware | * |
| qualcomm | snapdragon_ar1_gen_1_platform | * |
| qualcomm | snapdragon_ar1_gen_1_platform_\luna1\_firmware | * |
| qualcomm | snapdragon_ar1_gen_1_platform_\luna1\ | * |
| qualcomm | snapdragon_ar2_gen_1_platform_firmware | * |
| qualcomm | snapdragon_ar2_gen_1_platform | * |
| qualcomm | ssg2115p_firmware | * |
| qualcomm | ssg2115p | * |
| qualcomm | ssg2125p_firmware | * |
| qualcomm | ssg2125p | * |
| qualcomm | sxr1230p_firmware | * |
| qualcomm | sxr1230p | * |
| qualcomm | sxr2230p_firmware | * |
| qualcomm | sxr2230p | * |
| qualcomm | sxr2250p_firmware | * |
| qualcomm | sxr2250p | * |
| qualcomm | sxr2330p_firmware | * |
| qualcomm | sxr2330p | * |
| qualcomm | sxr2350p_firmware | * |
| qualcomm | sxr2350p | * |
| qualcomm | wcd9370_firmware | * |
| qualcomm | wcd9370 | * |
| qualcomm | wcd9371_firmware | * |
| qualcomm | wcd9371 | * |
| qualcomm | wcd9375_firmware | * |
| qualcomm | wcd9375 | * |
| qualcomm | wcd9378_firmware | * |
| qualcomm | wcd9378 | * |
| qualcomm | wcd9380_firmware | * |
| qualcomm | wcd9380 | * |
| qualcomm | wcd9385_firmware | * |
| qualcomm | wcd9385 | * |
| qualcomm | wcd9390_firmware | * |
| qualcomm | wcd9390 | * |
| qualcomm | wcd9395_firmware | * |
| qualcomm | wcd9395 | * |
| qualcomm | wcn3950_firmware | * |
| qualcomm | wcn3950 | * |
| qualcomm | wcn3988_firmware | * |
| qualcomm | wcn3988 | * |
| qualcomm | wcn6650_firmware | * |
| qualcomm | wcn6650 | * |
| qualcomm | wcn6740_firmware | * |
| qualcomm | wcn6740 | * |
| qualcomm | wcn6755_firmware | * |
| qualcomm | wcn6755 | * |
| qualcomm | wcn7750_firmware | * |
| qualcomm | wcn7750 | * |
| qualcomm | wcn7860_firmware | * |
| qualcomm | wcn7860 | * |
| qualcomm | wcn7861_firmware | * |
| qualcomm | wcn7861 | * |
| qualcomm | wcn7880_firmware | * |
| qualcomm | wcn7880 | * |
| qualcomm | wcn7881_firmware | * |
| qualcomm | wcn7881 | * |
| qualcomm | wsa8810_firmware | * |
| qualcomm | wsa8810 | * |
| qualcomm | wsa8815_firmware | * |
| qualcomm | wsa8815 | * |
| qualcomm | wsa8830_firmware | * |
| qualcomm | wsa8830 | * |
| qualcomm | wsa8832_firmware | * |
| qualcomm | wsa8832 | * |
| qualcomm | wsa8835_firmware | * |
| qualcomm | wsa8835 | * |
| qualcomm | wsa8840_firmware | * |
| qualcomm | wsa8840 | * |
| qualcomm | wsa8845_firmware | * |
| qualcomm | wsa8845 | * |
| qualcomm | wsa8845h_firmware | * |
| qualcomm | wsa8845h | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-367 | The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory corruption issue that occurs when processing a configuration call from userspace. It means that when the system handles certain configuration requests, it may improperly manage memory, potentially leading to unexpected behavior or system instability.
How can this vulnerability impact me? :
The vulnerability can lead to high impact consequences including confidentiality, integrity, and availability being compromised. This means an attacker with high privileges could exploit this flaw to cause serious damage such as data leaks, unauthorized data modification, or denial of service.