CVE-2025-47378
Published: 02 March 2026
Summary
CVE-2025-47378 is a high-severity Exposure of Sensitive System Information to an Unauthorized Control Sphere (CWE-497) vulnerability in Qualcomm Cologne Firmware. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked at the 2.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Ongoing reviews detect and remove sensitive system information before it reaches publicly accessible systems.
Employs detection to prevent unauthorized mining of sensitive system information from being exfiltrated to external control spheres.
Documenting where system information is processed and stored prevents exposure to unauthorized control spheres.
The control stops sensitive system information from crossing into unauthorized control spheres through EM emanations.
Authorization and minimization requirements keep PII out of test/research control spheres that often lack production-grade protections.
Documented categorization of system information reduces the chance that sensitive internals are left exposed to unauthorized spheres.
System information is concealed or replaced with decoys, reducing leakage to unauthorized observers.
Ensures sensitive system information is not disclosed outside the intended control sphere through error output.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Local exposure of bootloader/cert chain data directly enables T1005 for sensitive data access and facilitates T1542.001 for boot process tampering.
NVD Description
Cryptographic Issue when a shared VM reference allows HLOS to boot loader and access cert chain.
Deeper analysisAI
CVE-2025-47378 is a cryptographic vulnerability stemming from a shared virtual machine (VM) reference that enables the High-Level Operating System (HLOS) to access the bootloader and certificate chain. It affects Qualcomm components, as detailed in their security advisories, and is classified under CWE-497 (Exposure of Sensitive System Information to an Unauthorized Control Sphere). The issue received a CVSS v3.1 base score of 7.1 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N), indicating high severity due to its potential for unauthorized access to sensitive cryptographic elements.
A local attacker with low privileges can exploit this vulnerability through low-complexity means without requiring user interaction. Successful exploitation allows high-impact confidentiality and integrity violations, such as reading sensitive certificate chain data or tampering with boot processes, while availability remains unaffected due to the unchanged scope.
Qualcomm's March 2026 security bulletin at https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2026-bulletin.html provides further details on affected products, patches, and mitigation recommendations for this CVE.
Details
- CWE(s)