CVE-2025-47407
Published: 04 May 2026
Summary
CVE-2025-47407 is a high-severity Time-of-check Time-of-use (TOCTOU) Race Condition (CWE-367) vulnerability in Qualcomm Cq7790 Firmware. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 1.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-16 implements memory protection mechanisms that directly and comprehensively prevent exploitation of kernel-level memory corruption during DSP process creation due to allocation failure.
SI-2 requires timely remediation of the specific kernel allocation flaw causing memory corruption in Qualcomm DSP process creation.
SI-11 enforces proper error handling for kernel allocation failures, mitigating the mishandling that leads to memory corruption during DSP process creation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Local kernel-level memory corruption (TOCTOU race condition) on DSP process creation directly enables local privilege escalation from low-privileged context with no user interaction.
NVD Description
Memory corruption while creating a process on the digital signal processor due to allocation failure at the kernel level.
Deeper analysisAI
CVE-2025-47407 is a memory corruption vulnerability that occurs while creating a process on the digital signal processor due to allocation failure at the kernel level. It is associated with CWE-367 and affects Qualcomm components, as documented in their security bulletin. The vulnerability received a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity with significant impacts on confidentiality, integrity, and availability.
A local attacker with low privileges can exploit this vulnerability with low attack complexity and no user interaction required. Successful exploitation leads to memory corruption, enabling high-level impacts such as unauthorized data access, modification, or denial of service on the affected DSP kernel.
Qualcomm's May 2026 security bulletin at https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2026-bulletin.html details the vulnerability, including affected products and recommended mitigations or patches. Security practitioners should consult this advisory for specific remediation guidance.
Details
- CWE(s)