Cyber Posture

CVE-2025-47358

High

Published: 02 February 2026

Published
02 February 2026
Modified
11 February 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 0.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-47358 is a high-severity Use After Free (CWE-416) vulnerability in Qualcomm Fastconnect 6900 Firmware. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 0.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-16 enforces memory protections such as address space layout randomization and page permissions that prevent exploitation of use-after-free vulnerabilities like invalid kernel memory freeing from user-supplied addresses.

prevent

SI-10 requires validation of user-supplied addresses passed to kernel APIs like mem_free, blocking modified user space addresses from causing kernel memory corruption.

prevent

SC-39 provides process isolation between user and kernel spaces, limiting the impact of flawed APIs that allow user-controlled inputs to affect kernel memory.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Kernel UAF/memory corruption directly enables local privilege escalation via exploitation of the mem_free API flaw.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Memory Corruption when user space address is modified and passed to mem_free API, causing kernel memory to be freed inadvertently.

Deeper analysisAI

CVE-2025-47358 is a memory corruption vulnerability that arises when a modified user space address is passed to the mem_free API, leading to the inadvertent freeing of kernel memory. Published on 2026-02-02, this issue is classified as CWE-416 (Use After Free) and affects Qualcomm software components, with a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact on confidentiality, integrity, and availability.

A local attacker with low privileges (PR:L) can exploit this vulnerability with low complexity and no user interaction required. By modifying a user space address and supplying it to the mem_free API, the attacker triggers kernel memory corruption, potentially achieving arbitrary kernel memory manipulation, privilege escalation, data leakage, or system compromise.

Qualcomm's February 2026 security bulletin at https://docs.qualcomm.com/product/publicresources/securitybulletin/february-2026-bulletin.html details affected products and recommends applying available patches or mitigations to address the vulnerability.

Details

CWE(s)

Affected Products

qualcomm
fastconnect 6900 firmware
all versions
qualcomm
fastconnect 7800 firmware
all versions
qualcomm
qcc2072 firmware
all versions
qualcomm
sc8380xp firmware
all versions
qualcomm
snapdragon 8cx gen 3 compute platform firmware
all versions
qualcomm
wcd9378c firmware
all versions
qualcomm
wcd9380 firmware
all versions
qualcomm
wcd9385 firmware
all versions
qualcomm
wsa8830 firmware
all versions
qualcomm
wsa8835 firmware
all versions
+11 more product configuration(s) — see NVD for full list

CVEs Like This One

CVE-2026-21380Same product: Qualcomm Fastconnect 6900
CVE-2025-47359Same product: Qualcomm Fastconnect 6900
CVE-2026-21382Same product: Qualcomm Fastconnect 6900
CVE-2025-47356Same product: Qualcomm Fastconnect 6900
CVE-2025-47390Same product: Qualcomm Fastconnect 6900
CVE-2025-47380Same product: Qualcomm Fastconnect 7800
CVE-2025-59603Same product: Qualcomm Fastconnect 6900
CVE-2025-47399Same product: Qualcomm Fastconnect 7800
CVE-2025-47343Same product: Qualcomm Fastconnect 6900
CVE-2024-53023Same product: Qualcomm Fastconnect 6900

References