CVE-2025-47393
Analyzed
Analyzed - Analysis Complete
BaseFortify
Publication date: 2026-01-07
Last updated on: 2026-01-27
Assigner: Qualcomm, Inc.
Description
Description
Memory corruption when accessing resources in kernel driver.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| qualcomm | qam8255p_firmware | * |
| qualcomm | qam8255p | * |
| qualcomm | qam8650p_firmware | * |
| qualcomm | qam8650p | * |
| qualcomm | qam8775p_firmware | * |
| qualcomm | qam8775p | * |
| qualcomm | qamsrv1h_firmware | * |
| qualcomm | qamsrv1h | * |
| qualcomm | qamsrv1m_firmware | * |
| qualcomm | qamsrv1m | * |
| qualcomm | qca6595_firmware | * |
| qualcomm | qca6595 | * |
| qualcomm | qca6698aq_firmware | * |
| qualcomm | qca6698aq | * |
| qualcomm | qca6797aq_firmware | * |
| qualcomm | qca6797aq | * |
| qualcomm | sa7255p_firmware | * |
| qualcomm | sa7255p | * |
| qualcomm | sa7775p_firmware | * |
| qualcomm | sa7775p | * |
| qualcomm | sa8255p_firmware | * |
| qualcomm | sa8255p | * |
| qualcomm | sa8620p_firmware | * |
| qualcomm | sa8620p | * |
| qualcomm | sa8650p_firmware | * |
| qualcomm | sa8650p | * |
| qualcomm | sa8770p_firmware | * |
| qualcomm | sa8770p | * |
| qualcomm | sa8775p_firmware | * |
| qualcomm | sa8775p | * |
| qualcomm | sa9000p_firmware | * |
| qualcomm | sa9000p | * |
| qualcomm | srv1h_firmware | * |
| qualcomm | srv1h | * |
| qualcomm | srv1m_firmware | * |
| qualcomm | srv1m | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-129 | The product uses untrusted input when calculating or using an array index, but the product does not validate or incorrectly validates the index to ensure the index references a valid position within the array. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory corruption issue that occurs when accessing resources in a kernel driver. Memory corruption can lead to unpredictable behavior, crashes, or exploitation by attackers.
How can this vulnerability impact me? :
The vulnerability can have a high impact, potentially allowing attackers with limited privileges to cause significant damage, including compromising confidentiality, integrity, and availability of the system.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70