Cyber Posture

CVE-2025-47408

High

Published: 04 May 2026

Published
04 May 2026
Modified
06 May 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 2.0th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-47408 is a high-severity Untrusted Pointer Dereference (CWE-822) vulnerability in Qualcomm Fastconnect 6200 Firmware. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 2.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of IOCTL input/output buffers to prevent untrusted pointer dereferences causing memory corruption.

prevent

Implements memory safeguards such as address space randomization and data execution prevention to protect against memory corruption from invalid buffer handling.

prevent

Mandates timely remediation of the specific flaw via patches from Qualcomm's security bulletin to eliminate the memory corruption vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Local memory corruption in Qualcomm driver via invalid IOCTL enables privilege escalation from low-privileged context.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Memory corruption when another driver calls an IOCTL with invalid input/output buffer.

Deeper analysisAI

CVE-2025-47408 is a memory corruption vulnerability (CWE-822: Untrusted Pointer Dereference) triggered when another driver issues an IOCTL call with invalid input or output buffers. It affects components in Qualcomm products, as documented in the vendor's security bulletin.

The vulnerability carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating it can be exploited by a local attacker with low privileges. Exploitation requires low complexity and no user interaction, allowing the attacker to achieve high impacts on confidentiality, integrity, and availability through memory corruption.

Qualcomm's May 2026 security bulletin at https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2026-bulletin.html provides details on affected products and recommended mitigations or patches.

Details

CWE(s)

Affected Products

qualcomm
fastconnect 6200 firmware
all versions
qualcomm
fastconnect 6900 firmware
all versions
qualcomm
fastconnect 7800 firmware
all versions
qualcomm
iqx5121 firmware
all versions
qualcomm
iqx7181 firmware
all versions
qualcomm
qca0000 firmware
all versions
qualcomm
sc8380xp firmware
all versions
qualcomm
sd865 5g firmware
all versions
qualcomm
sm6250 firmware
all versions
qualcomm
snapdragon 7c compute firmware
all versions
+10 more product configuration(s) — see NVD for full list

CVEs Like This One

CVE-2025-47405Same product: Qualcomm Fastconnect 6900
CVE-2024-53034Same product: Qualcomm Fastconnect 6900
CVE-2024-53033Same product: Qualcomm Fastconnect 6900
CVE-2024-49840Same product: Qualcomm Fastconnect 6900
CVE-2025-47343Same product: Qualcomm Fastconnect 6900
CVE-2025-47380Same product: Qualcomm Fastconnect 7800
CVE-2025-59603Same product: Qualcomm Fastconnect 6900
CVE-2026-21382Same product: Qualcomm Fastconnect 6900
CVE-2025-47356Same product: Qualcomm Fastconnect 6900
CVE-2026-21380Same product: Qualcomm Fastconnect 6900

References