CVE-2025-47394
Published: 07 January 2026
Summary
CVE-2025-47394 is a high-severity Classic Buffer Overflow (CWE-120) vulnerability in Qualcomm Fastconnect 6200 Firmware. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 6.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires timely patching and remediation of the specific memory corruption flaw in CVE-2025-47394 as recommended in the Qualcomm bulletin.
Implements memory protection mechanisms to restrict unauthorized access and detect corruption from incorrect offset calculations during buffer copying operations.
Enables vulnerability scanning to identify the presence of CVE-2025-47394 in Qualcomm products for subsequent remediation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Local memory corruption vulnerability enabling arbitrary code execution from low privileges directly maps to exploitation for privilege escalation.
NVD Description
Memory corruption when copying overlapping buffers during memory operations due to incorrect offset calculations.
Deeper analysisAI
CVE-2025-47394 is a memory corruption vulnerability stemming from incorrect offset calculations when copying overlapping buffers during memory operations. It affects Qualcomm products, as detailed in their security bulletin, and is classified under CWE-120 (Buffer Copy without Checking Size of Input). The vulnerability received a CVSS v3.1 base score of 7.8 (High), reflecting its local attack vector (AV:L), low attack complexity (AC:L), requirement for low privileges (PR:L), lack of user interaction (UI:N), unchanged scope (S:U), and high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). It was published on 2026-01-07.
A local attacker with low privileges can exploit this vulnerability with low complexity and no user interaction required. Successful exploitation enables high-impact outcomes, including potential arbitrary code execution, data tampering, or denial of service through memory corruption.
The Qualcomm January 2026 security bulletin at https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2026-bulletin.html provides details on affected products and recommended mitigations, such as applying available patches.
Details
- CWE(s)