CVE-2025-47396
Published: 07 January 2026
Summary
CVE-2025-47396 is a high-severity Double Free (CWE-415) vulnerability in Qualcomm Fastconnect 6200 Firmware. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 6.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-2 mandates timely patching of the specific double free vulnerability as detailed in Qualcomm's security bulletin.
SI-16 enforces memory safeguards that directly prevent exploitation of double free memory corruption in the secure application.
RA-5 enables vulnerability scanning to identify and prioritize remediation of this Qualcomm-specific CVE.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Local double-free memory corruption in a Qualcomm secure app directly enables local privilege escalation to full system compromise (AV:L, low privs, high C/I/A impact).
NVD Description
Memory corruption occurs when a secure application is launched on a device with insufficient memory.
Deeper analysisAI
CVE-2025-47396 is a memory corruption vulnerability classified under CWE-415 (Double Free), which occurs when a secure application is launched on a device with insufficient memory. It affects components in Qualcomm products, as documented in the vendor's January 2026 security bulletin.
The vulnerability has a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating a high-severity issue exploitable by a local attacker with low privileges. Exploitation requires low complexity and no user interaction, allowing the attacker to achieve high impacts on confidentiality, integrity, and availability, potentially leading to full system compromise.
Qualcomm's security bulletin (https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2026-bulletin.html), published on 2026-01-07, provides details on mitigation, including patches for affected versions. Security practitioners should consult the advisory for specific remediation steps.
Details
- CWE(s)