Memory Corruption in Driver Reading FW Response: Null-Term Buffer Size Mismatch
CVE-2025-21468 Published on May 6, 2025
Out-of-bounds Write in Computer Vision
Memory corruption while reading response from FW, when buffer size is changed by FW while driver is using this size to write null character at the end of buffer.
Vulnerability Analysis
CVE-2025-21468 is exploitable with local system access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.
Weakness Type
What is a Memory Corruption Vulnerability?
The software writes data past the end, or before the beginning, of the intended buffer. Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
CVE-2025-21468 has been classified to as a Memory Corruption vulnerability or weakness.
Products Associated with CVE-2025-21468
stack.watch emails you whenever new vulnerabilities are published in Google Android or Qualcomm Snapdragon. Just hit a watch button to start following.
Affected Versions
Qualcomm, Inc. Snapdragon:- Version AR8035 is affected.
- Version CSRA6620 is affected.
- Version CSRA6640 is affected.
- Version FastConnect 6200 is affected.
- Version FastConnect 6700 is affected.
- Version FastConnect 6900 is affected.
- Version FastConnect 7800 is affected.
- Version Flight RB5 5G Platform is affected.
- Version MDM9628 is affected.
- Version QAM8295P is affected.
- Version QCA6174A is affected.
- Version QCA6391 is affected.
- Version QCA6564A is affected.
- Version QCA6564AU is affected.
- Version QCA6574 is affected.
- Version QCA6574A is affected.
- Version QCA6574AU is affected.
- Version QCA6595 is affected.
- Version QCA6595AU is affected.
- Version QCA6696 is affected.
- Version QCA6698AQ is affected.
- Version QCA8081 is affected.
- Version QCA8337 is affected.
- Version QCA9377 is affected.
- Version QCM4490 is affected.
- Version QCM5430 is affected.
- Version QCM6490 is affected.
- Version QCM8550 is affected.
- Version QCN6024 is affected.
- Version QCN9011 is affected.
- Version QCN9012 is affected.
- Version QCN9024 is affected.
- Version QCN9274 is affected.
- Version QCS410 is affected.
- Version QCS4490 is affected.
- Version QCS5430 is affected.
- Version QCS610 is affected.
- Version QCS615 is affected.
- Version QCS6490 is affected.
- Version QCS7230 is affected.
- Version QCS8250 is affected.
- Version QCS8300 is affected.
- Version QCS8550 is affected.
- Version QCS9100 is affected.
- Version QMP1000 is affected.
- Version QRB5165M is affected.
- Version QRB5165N is affected.
- Version QSM8350 is affected.
- Version Qualcomm Video Collaboration VC1 Platform is affected.
- Version Qualcomm Video Collaboration VC3 Platform is affected.
- Version Qualcomm Video Collaboration VC5 Platform is affected.
- Version Robotics RB2 Platform is affected.
- Version Robotics RB5 Platform is affected.
- Version SA4150P is affected.
- Version SA4155P is affected.
- Version SA6145P is affected.
- Version SA6150P is affected.
- Version SA6155P is affected.
- Version SA8145P is affected.
- Version SA8150P is affected.
- Version SA8155P is affected.
- Version SA8195P is affected.
- Version SA8295P is affected.
- Version SA8530P is affected.
- Version SA8540P is affected.
- Version SA9000P is affected.
- Version SD 8 Gen1 5G is affected.
- Version SD888 is affected.
- Version SDX61 is affected.
- Version SG8275P is affected.
- Version SM6370 is affected.
- Version SM6650 is affected.
- Version SM6650P is affected.
- Version SM7315 is affected.
- Version SM7325P is affected.
- Version SM7635 is affected.
- Version SM7675 is affected.
- Version SM7675P is affected.
- Version SM8550P is affected.
- Version SM8635 is affected.
- Version SM8635P is affected.
- Version SM8650Q is affected.
- Version SM8735 is affected.
- Version SM8750 is affected.
- Version SM8750P is affected.
- Version Smart Audio 400 Platform is affected.
- Version Snapdragon 4 Gen 1 Mobile Platform is affected.
- Version Snapdragon 4 Gen 2 Mobile Platform is affected.
- Version Snapdragon 480 5G Mobile Platform is affected.
- Version Snapdragon 480+ 5G Mobile Platform (SM4350-AC) is affected.
- Version Snapdragon 695 5G Mobile Platform is affected.
- Version Snapdragon 778G 5G Mobile Platform is affected.
- Version Snapdragon 778G+ 5G Mobile Platform (SM7325-AE) is affected.
- Version Snapdragon 780G 5G Mobile Platform is affected.
- Version Snapdragon 782G Mobile Platform (SM7325-AF) is affected.
- Version Snapdragon 7c+ Gen 3 Compute is affected.
- Version Snapdragon 8 Gen 1 Mobile Platform is affected.
- Version Snapdragon 8 Gen 2 Mobile Platform is affected.
- Version Snapdragon 8 Gen 3 Mobile Platform is affected.
- Version Snapdragon 8+ Gen 1 Mobile Platform is affected.
- Version Snapdragon 8+ Gen 2 Mobile Platform is affected.
- Version Snapdragon 888 5G Mobile Platform is affected.
- Version Snapdragon 888+ 5G Mobile Platform (SM8350-AC) is affected.
- Version Snapdragon AR1 Gen 1 Platform is affected.
- Version Snapdragon AR1 Gen 1 Platform "Luna1" is affected.
- Version Snapdragon AR2 Gen 1 Platform is affected.
- Version Snapdragon Auto 5G Modem-RF is affected.
- Version Snapdragon W5+ Gen 1 Wearable Platform is affected.
- Version Snapdragon X12 LTE Modem is affected.
- Version Snapdragon X62 5G Modem-RF System is affected.
- Version Snapdragon X65 5G Modem-RF System is affected.
- Version SSG2115P is affected.
- Version SSG2125P is affected.
- Version SW5100 is affected.
- Version SW5100P is affected.
- Version SXR1230P is affected.
- Version SXR2230P is affected.
- Version SXR2250P is affected.
- Version SXR2330P is affected.
- Version TalynPlus is affected.
- Version Vision Intelligence 400 Platform is affected.
- Version WCD9335 is affected.
- Version WCD9341 is affected.
- Version WCD9370 is affected.
- Version WCD9375 is affected.
- Version WCD9378 is affected.
- Version WCD9380 is affected.
- Version WCD9385 is affected.
- Version WCD9390 is affected.
- Version WCD9395 is affected.
- Version WCN3910 is affected.
- Version WCN3950 is affected.
- Version WCN3980 is affected.
- Version WCN3988 is affected.
- Version WCN3990 is affected.
- Version WCN6450 is affected.
- Version WCN6650 is affected.
- Version WCN6740 is affected.
- Version WCN6755 is affected.
- Version WCN7750 is affected.
- Version WCN7860 is affected.
- Version WCN7861 is affected.
- Version WCN7880 is affected.
- Version WCN7881 is affected.
- Version WSA8810 is affected.
- Version WSA8815 is affected.
- Version WSA8830 is affected.
- Version WSA8832 is affected.
- Version WSA8835 is affected.
- Version WSA8840 is affected.
- Version WSA8845 is affected.
- Version WSA8845H is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.