Cyber Posture

CVE-2025-47363

Medium

Published: 02 February 2026

Published
02 February 2026
Modified
11 February 2026
KEV Added
Patch
CVSS Score 6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 0.4th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-47363 is a medium-severity Integer Overflow or Wraparound (CWE-190) vulnerability in Qualcomm Qam8255P Firmware. Its CVSS base score is 6.8 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 0.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068).
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Memory corruption from integer overflow enables arbitrary code execution with physical access, directly facilitating local privilege escalation on affected Qualcomm components.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Memory corruption when calculating oversized partition sizes without proper checks.

Deeper analysisAI

CVE-2025-47363 is a memory corruption vulnerability stemming from CWE-190 (Integer Overflow or Wraparound), triggered by calculating oversized partition sizes without adequate bounds checking. It affects Qualcomm components, as detailed in the vendor's security bulletin. The vulnerability was published on 2026-02-02 with a CVSS v3.1 base score of 6.8 (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating medium severity with high impacts on confidentiality, integrity, and availability.

Exploitation requires physical access to the target device (AV:P) and involves low attack complexity with no privileges or user interaction needed (PR:N/UI:N). A successful attacker can leverage the memory corruption to achieve high-level compromise, potentially gaining unauthorized control over affected components through arbitrary code execution or data manipulation.

Qualcomm's February 2026 security bulletin at https://docs.qualcomm.com/product/publicresources/securitybulletin/february-2026-bulletin.html provides guidance on mitigation, including available patches and remediation steps for impacted products.

Details

CWE(s)

Affected Products

qualcomm
qam8255p firmware
all versions
qualcomm
qam8295p firmware
all versions
qualcomm
qam8620p firmware
all versions
qualcomm
qam8650p firmware
all versions
qualcomm
qam8775p firmware
all versions
qualcomm
qamsrv1h firmware
all versions
qualcomm
qamsrv1m firmware
all versions
qualcomm
qca6574au firmware
all versions
qualcomm
qca6595 firmware
all versions
qualcomm
qca6595au firmware
all versions
+25 more product configuration(s) — see NVD for full list

CVEs Like This One

CVE-2025-47364Same product: Qualcomm Qam8255P
CVE-2024-53028Same product: Qualcomm Qam8255P
CVE-2024-53030Same product: Qualcomm Qam8255P
CVE-2024-53012Same product: Qualcomm Qam8255P
CVE-2024-53031Same product: Qualcomm Qam8255P
CVE-2024-49837Same product: Qualcomm Qam8255P
CVE-2024-53032Same product: Qualcomm Qam8255P
CVE-2024-53022Same product: Qualcomm Qam8255P
CVE-2026-21385Same product: Qualcomm Qam8255P
CVE-2024-45555Same product: Qualcomm Qam8255P

References