CVE-2025-47380
Analyzed
Analyzed - Analysis Complete
BaseFortify
Publication date: 2026-01-07
Last updated on: 2026-01-27
Assigner: Qualcomm, Inc.
Description
Description
Memory corruption while preprocessing IOCTLs in sensors.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| qualcomm | wsa8845h_firmware | * |
| qualcomm | wsa8845h | * |
| qualcomm | x2000077_firmware | * |
| qualcomm | x2000077 | * |
| qualcomm | x2000086_firmware | * |
| qualcomm | x2000086 | * |
| qualcomm | x2000090_firmware | * |
| qualcomm | x2000090 | * |
| qualcomm | x2000092_firmware | * |
| qualcomm | x2000092 | * |
| qualcomm | x2000094_firmware | * |
| qualcomm | x2000094 | * |
| qualcomm | xg101002_firmware | * |
| qualcomm | xg101002 | * |
| qualcomm | xg101032_firmware | * |
| qualcomm | xg101032 | * |
| qualcomm | xg101039_firmware | * |
| qualcomm | xg101039 | * |
| qualcomm | fastconnect_7800_firmware | * |
| qualcomm | fastconnect_7800 | * |
| qualcomm | qcc2072_firmware | * |
| qualcomm | qcc2072 | * |
| qualcomm | wcd9378c_firmware | * |
| qualcomm | wcd9378c | * |
| qualcomm | wsa8840_firmware | * |
| qualcomm | wsa8840 | * |
| qualcomm | wsa8845_firmware | * |
| qualcomm | wsa8845 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-822 | The product obtains a value from an untrusted source, converts this value to a pointer, and dereferences the resulting pointer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory corruption issue that occurs while preprocessing IOCTLs (Input/Output Control codes) in sensors. It involves improper handling of IOCTL requests, which can lead to memory corruption.
How can this vulnerability impact me? :
The vulnerability can have a high impact, potentially allowing an attacker with limited privileges to cause memory corruption that affects confidentiality, integrity, and availability of the system. This could lead to unauthorized access, data modification, or denial of service.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70