CVE-2025-59600
Awaiting Analysis Awaiting Analysis - Queue
Buffer Overflow in Qualcomm Component Causes Memory Corruption

Publication date: 2026-03-02

Last updated on: 2026-03-03

Assigner: Qualcomm, Inc.

Description
Memory Corruption when adding user-supplied data without checking available buffer space.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-02
Last Modified
2026-03-03
Generated
2026-05-07
AI Q&A
2026-03-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 164 associated CPEs
Vendor Product Version / Range
qualcomm fastconnect_6200_firmware *
qualcomm fastconnect_6700_firmware *
qualcomm fastconnect_6900_firmware *
qualcomm fastconnect_7800_firmware *
qualcomm g1_gen_1_firmware *
qualcomm g2_gen_1_firmware *
qualcomm iq-615_firmware *
qualcomm iq-8275_firmware *
qualcomm iq-8300_firmware *
qualcomm iq-9075_firmware *
qualcomm iq-9100_firmware *
qualcomm lemans_au_lgit_firmware *
qualcomm lemansau_firmware *
qualcomm mdm9628_firmware *
qualcomm milos_firmware *
qualcomm monaco_iot_firmware *
qualcomm netrani_firmware *
qualcomm orne_firmware *
qualcomm palawan25_firmware *
qualcomm pandeiro_firmware *
qualcomm qam8255p_firmware *
qualcomm qamsrv1h_firmware *
qualcomm qamsrv1m_firmware *
qualcomm qca2066_firmware *
qualcomm qca6174a_firmware *
qualcomm qca6391_firmware *
qualcomm qca6564a_firmware *
qualcomm qca6564au_firmware *
qualcomm qca6574_firmware *
qualcomm qca6574a_firmware *
qualcomm qca6574au_firmware *
qualcomm qca6595_firmware *
qualcomm qca6595au_firmware *
qualcomm qca6688aq_firmware *
qualcomm qca6696_firmware *
qualcomm qca6698aq_firmware *
qualcomm qca8081_firmware *
qualcomm qca8337_firmware *
qualcomm qcm2290_firmware *
qualcomm qcm4325_firmware *
qualcomm snapdragon_xr2_5g_platform_firmware *
qualcomm snapdragon_xr2+_gen_1_platform_firmware *
qualcomm srv1h_firmware *
qualcomm srv1m_firmware *
qualcomm sw5100_firmware *
qualcomm sw5100p_firmware *
qualcomm sw6100_firmware *
qualcomm sw6100p_firmware *
qualcomm sxr2230p_firmware *
qualcomm sxr2250p_firmware *
qualcomm sxr2330p_firmware *
qualcomm sxr2350p_firmware *
qualcomm themisto_firmware *
qualcomm wcd9335_firmware *
qualcomm wcd9370_firmware *
qualcomm wcd9375_firmware *
qualcomm wcd9378_firmware *
qualcomm wcd9380_firmware *
qualcomm wcd9385_firmware *
qualcomm wcd9390_firmware *
qualcomm wcd9395_firmware *
qualcomm wcn3910_firmware *
qualcomm wcn3950_firmware *
qualcomm wcn3980_firmware *
qualcomm wcn3988_firmware *
qualcomm wcn6450_firmware *
qualcomm wcn6650_firmware *
qualcomm wcn6755_firmware *
qualcomm wcn7860_firmware *
qualcomm wcn7861_firmware *
qualcomm wcn7880_firmware *
qualcomm wcn7881_firmware *
qualcomm wsa8810_firmware *
qualcomm wsa8815_firmware *
qualcomm wsa8830_firmware *
qualcomm wsa8832_firmware *
qualcomm wsa8835_firmware *
qualcomm wsa8840_firmware *
qualcomm wsa8845_firmware *
qualcomm wsa8845h_firmware *
qualcomm ar8031_firmware *
qualcomm ar8035_firmware *
qualcomm csra6620_firmware *
qualcomm csra6640_firmware *
qualcomm qcm4490_firmware *
qualcomm qcm5430_firmware *
qualcomm qcm6125_firmware *
qualcomm qcm6490_firmware *
qualcomm qcn6024_firmware *
qualcomm qcn9011_firmware *
qualcomm qcn9012_firmware *
qualcomm qcn9024_firmware *
qualcomm qcs2290_firmware *
qualcomm qcs4290_firmware *
qualcomm qcs4490_firmware *
qualcomm qcs8550_firmware *
qualcomm qln1083bd_firmware *
qualcomm qln1086bd_firmware *
qualcomm qmp1000_firmware *
qualcomm qpa1083bd_firmware *
qualcomm qpa1086bd_firmware *
qualcomm video_collaboration_vc1_platform_firmware *
qualcomm video_collaboration_vc3_platform_firmware *
qualcomm video_collaboration_vc5_platform_firmware *
qualcomm qxm1083_firmware *
qualcomm qxm1086_firmware *
qualcomm qxm1093_firmware *
qualcomm qxm1094_firmware *
qualcomm qxm1095_firmware *
qualcomm qxm1096_firmware *
qualcomm sa4150p_firmware *
qualcomm sa4155p_firmware *
qualcomm sa6145p_firmware *
qualcomm sa6150p_firmware *
qualcomm sa6155p_firmware *
qualcomm sa7255p_firmware *
qualcomm sa7775p_firmware *
qualcomm sa8145p_firmware *
qualcomm sa8150p_firmware *
qualcomm sa8155p_firmware *
qualcomm sa8195p_firmware *
qualcomm sa8255p_firmware *
qualcomm sa8620p_firmware *
qualcomm sa8770p_firmware *
qualcomm sa9000p_firmware *
qualcomm sar1165p_firmware *
qualcomm sar1250p_firmware *
qualcomm sar2130p_firmware *
qualcomm sar2230p_firmware *
qualcomm sc8380xp_firmware *
qualcomm sd662_firmware *
qualcomm sd865_5g_firmware *
qualcomm sdx61_firmware *
qualcomm sm6225p_firmware *
qualcomm sm6650p_firmware *
qualcomm sm7435_firmware *
qualcomm sm7635p_firmware *
qualcomm sm7675_firmware *
qualcomm sm7675p_firmware *
qualcomm sm8635_firmware *
qualcomm sm8635p_firmware *
qualcomm sm8650q_firmware *
qualcomm sm8750p_firmware *
qualcomm smart_audio_400_platform_firmware *
qualcomm snapdragon_4_gen_1_mobile_platform_firmware *
qualcomm snapdragon_4_gen_2_mobile_platform_firmware *
qualcomm snapdragon_460_mobile_platform_firmware *
qualcomm snapdragon_480_5g_mobile_platform_firmware *
qualcomm snapdragon_480+_5g_mobile_platform_firmware *
qualcomm snapdragon_6_gen_1_mobile_platform_firmware *
qualcomm snapdragon_6_gen_3_mobile_platform_firmware *
qualcomm snapdragon_6_gen_4_mobile_platform_firmware *
qualcomm snapdragon_662_mobile_platform_firmware *
qualcomm snapdragon_680_4g_mobile_platform_firmware *
qualcomm snapdragon_685_4g_mobile_platform_firmware *
qualcomm snapdragon_695_5g_mobile_platform_firmware *
qualcomm snapdragon_7s_gen_3_mobile_platform_firmware *
qualcomm snapdragon_8_elite_firmware *
qualcomm snapdragon_8_elite_gen_5_firmware *
qualcomm snapdragon_8_gen_3_mobile_platform_firmware *
qualcomm snapdragon_ar1_gen_1_platform_firmware *
qualcomm snapdragon_ar1+_gen_1_platform_firmware *
qualcomm snapdragon_w5+_gen_1_wearable_platform_firmware *
qualcomm snapdragon_x65_5g_modem-rf_system_firmware *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-126 The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a memory corruption issue that occurs when user-supplied data is added without verifying if there is enough buffer space available. Essentially, the system does not check the size of the input data against the allocated memory buffer, which can lead to overwriting adjacent memory.


How can this vulnerability impact me? :

The vulnerability can have severe impacts including high confidentiality, integrity, and availability risks. Because it involves memory corruption, an attacker with low privileges and local access could exploit this to execute arbitrary code, cause system crashes, or escalate privileges.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart