Cyber Posture

CVE-2025-47373

High

Published: 02 March 2026

Published
02 March 2026
Modified
04 March 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0002 4.3th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-47373 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Qualcomm Fastconnect 7800 Firmware. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 4.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Validates buffer lengths during TA invocation to prevent out-of-bounds writes from invalid inputs.

prevent

Implements memory protection mechanisms to guard against memory corruption exploits like CWE-787 out-of-bounds writes.

preventrecover

Ensures timely application of Qualcomm patches to remediate the specific memory corruption flaw in affected products.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Local out-of-bounds write memory corruption in TA invocation directly enables privilege escalation via exploitation of the vulnerability.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Memory Corruption when accessing buffers with invalid length during TA invocation.

Deeper analysisAI

CVE-2025-47373 is a memory corruption vulnerability classified under CWE-787 (Out-of-bounds Write), triggered by accessing buffers with invalid length during Trusted Application (TA) invocation. It was published on 2026-03-02 and carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). The vulnerability affects components in Qualcomm products, as referenced in their security documentation.

A local attacker with low privileges can exploit this vulnerability with low attack complexity and no user interaction required. Successful exploitation enables high impacts on confidentiality, integrity, and availability, potentially allowing the attacker to compromise affected systems through memory corruption.

Qualcomm's March 2026 security bulletin at https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2026-bulletin.html details the affected products and provides guidance on mitigations or patches.

Details

CWE(s)

Affected Products

qualcomm
fastconnect 7800 firmware
all versions
qualcomm
fwa gen 3 ultra firmware
all versions
qualcomm
g1 gen 1 firmware
all versions
qualcomm
g2 gen 1 firmware
all versions
qualcomm
iq-615 firmware
all versions
qualcomm
iq-8275 firmware
all versions
qualcomm
iq-8300 firmware
all versions
qualcomm
iq-9075 firmware
all versions
qualcomm
iq-9100 firmware
all versions
qualcomm
lemans au lgit firmware
all versions
+178 more product configuration(s) — see NVD for full list

CVEs Like This One

CVE-2025-47346Same product: Qualcomm Ar8035
CVE-2025-47389Same product: Qualcomm Ar8035
CVE-2025-59600Same product: Qualcomm Ar8035
CVE-2025-59603Same product: Qualcomm Cologne
CVE-2026-21385Same product: Qualcomm Ar8035
CVE-2025-47377Same product: Qualcomm Ar8035
CVE-2025-47391Same product: Qualcomm Fastconnect 6200
CVE-2025-47348Same product: Qualcomm Ar8035
CVE-2026-24082Same product: Qualcomm Ar8035
CVE-2025-47376Same product: Qualcomm Ar8035

References