CVE-2025-47385
Published: 02 March 2026
Summary
CVE-2025-47385 is a high-severity Improper Access Control for Register Interface (CWE-1262) vulnerability in Qualcomm Sa8295P Firmware. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 2.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Employs the principle of least privilege to ensure low-privileged local attackers cannot access the trusted execution environment without proper checks.
Enforces approved authorizations and privilege checks for logical access to sensitive resources like the trusted execution environment, preventing unauthorized access.
Implements memory protections to prevent unauthorized disclosure, modification, or execution resulting from memory corruption during improper TEE access.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Local memory corruption in TEE due to missing privilege checks directly enables privilege escalation via exploitation.
NVD Description
Memory Corruption when accessing trusted execution environment without proper privilege check.
Deeper analysisAI
CVE-2025-47385 is a memory corruption vulnerability that arises when accessing the trusted execution environment without proper privilege checks. It affects components in Qualcomm products, as detailed in the vendor's March 2026 security bulletin. The issue carries a CVSS v3.1 base score of 7.8, with vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, and is classified under CWE-1262. The vulnerability was published on 2026-03-02.
A local attacker with low privileges can exploit CVE-2025-47385 with low attack complexity and no user interaction. Exploitation enables high-impact consequences, including unauthorized access to confidential data, modification of system integrity, and disruption of availability through memory corruption in the trusted execution environment.
Qualcomm's security bulletin at https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2026-bulletin.html provides details on affected products, patches, and mitigation recommendations for addressing this vulnerability.
Details
- CWE(s)