The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-47378

CVE-2025-47378: Qualcomm Cologne Information Disclosure

CVE-2025-47378 is an information disclosure vulnerability in Qualcomm Cologne Firmware caused by a cryptographic issue. Attackers can exploit shared VM references to access certificate chains. Learn the technical details.

Updated: May 15, 2026

CVE-2025-47378 Overview

CVE-2025-47378 is a cryptographic flaw in Qualcomm firmware that allows the High-Level Operating System (HLOS) to reach the boot loader and access the certificate chain through a shared Virtual Machine (VM) reference. The weakness is classified under CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere. It affects a wide range of Qualcomm chipsets, including Snapdragon mobile platforms, FastConnect connectivity products, and automotive components.

A locally authenticated attacker can leverage this flaw to compromise the confidentiality and integrity of sensitive boot-time cryptographic material. Qualcomm published the fix in its March 2026 Security Bulletin.

Critical Impact

A local attacker with low privileges can access boot loader certificate chain data through an improperly scoped shared VM reference, undermining the cryptographic trust anchor of the device.

Affected Products

  • Qualcomm Snapdragon mobile platforms including Snapdragon 8 Elite Gen 5, Snapdragon 865/865+/870 5G, Snapdragon AR1/AR1+ Gen 1, and Snapdragon XR2/XR2+ Gen 1
  • Qualcomm FastConnect connectivity products (FastConnect 6700, 6800, 6900, 7800) and QCA Wi-Fi/Bluetooth components (QCA6391, QCA6595, QCA6696, QCA6698AQ, QCA6797AQ)
  • Qualcomm automotive and compute platforms (SA7255P, SA7775P, SA8255P, SA8620P, SA8770P, SA9000P, QAM8255P, SRV1H/SRV1M) and audio/RF components (WCD9380/9385/9395, WSA88xx series)

Discovery Timeline

  • 2026-03-02 - CVE-2025-47378 published to NVD
  • 2026-03-02 - Qualcomm publishes March 2026 Security Bulletin with patch information
  • 2026-03-05 - Last updated in NVD database

Technical Details for CVE-2025-47378

Vulnerability Analysis

The vulnerability resides in how Qualcomm firmware manages shared VM references between the High-Level Operating System and the boot loader. A shared VM reference is intended to facilitate controlled, scoped communication between virtualization domains. In affected firmware, this reference exposes boot loader memory regions that hold the device certificate chain to the HLOS.

The certificate chain anchors the secure boot trust model. When the HLOS can read it through a shared mapping, an attacker operating from a privileged user-space context inside the HLOS can extract cryptographic identity material. This breaks the isolation expected between the rich execution environment and the secure boot loader.

The issue also permits modification paths through the same shared mapping, which is why the integrity impact is rated alongside confidentiality. Availability is not affected because the flaw exposes data rather than corrupting execution.

Root Cause

The root cause is improper isolation of sensitive system information across virtualization boundaries. The firmware allocates a shared VM reference that is reachable by HLOS code but contains pointers or mappings to boot loader data structures, including the certificate chain. Access control on the shared region is too permissive for the sensitivity of the data exposed, which aligns with the CWE-497 classification.

Attack Vector

Exploitation requires local access with low privileges and no user interaction. An attacker who has already achieved code execution within the HLOS, such as through a compromised application or a kernel-resident component, queries the shared VM reference to read certificate chain bytes from the boot loader region. The retrieved material can then be used to forge trust decisions, replay boot artifacts, or facilitate downstream attacks against secure boot or attestation logic. No verified public exploit code or proof of concept has been published for this issue.

Detection Methods for CVE-2025-47378

Indicators of Compromise

  • Unexpected HLOS processes opening, mapping, or reading shared VM reference handles associated with boot loader memory regions
  • Anomalous extraction or duplication of certificate chain blobs in HLOS user-space or kernel logs
  • Firmware versions that do not match the patched builds listed in the Qualcomm March 2026 Security Bulletin

Detection Strategies

  • Inventory Qualcomm-based devices using vendor and product identifiers from the affected CPE list, then compare installed firmware against the patched versions published by the OEM
  • Monitor kernel and hypervisor logs for access attempts to shared VM mappings that should be restricted to boot loader contexts
  • Correlate privileged process behavior on mobile, automotive, and XR endpoints to detect attempts to enumerate or read cryptographic material outside expected workflows

Monitoring Recommendations

  • Track OEM firmware bulletin releases that incorporate the Qualcomm March 2026 patch and validate field deployment status
  • Enable platform attestation features where supported and alert on attestation failures that may indicate certificate chain tampering
  • Centralize device telemetry from mobile and automotive fleets to identify outliers consistent with privilege escalation precursors

How to Mitigate CVE-2025-47378

Immediate Actions Required

  • Apply OEM firmware updates that incorporate the fix from the Qualcomm March 2026 Security Bulletin as soon as they are released for your device model
  • Identify all Qualcomm-based assets that match the affected chipset list and prioritize patching for devices that process sensitive workloads
  • Restrict installation of untrusted applications and enforce least-privilege controls on the HLOS to reduce the local code execution prerequisite

Patch Information

Qualcomm has published patches addressing CVE-2025-47378 in the March 2026 Security Bulletin. Patch availability for end-user devices depends on the OEM and carrier integration cycle. Administrators should consult device manufacturer release notes to confirm that the March 2026 Qualcomm patch level has been applied.

Workarounds

  • No vendor-approved workaround substitutes for the firmware update; the cryptographic exposure is structural to the shared VM reference
  • Limit local code execution opportunities by enforcing application allow-listing, mobile device management policies, and verified-boot enforcement until patches are deployed
  • For automotive and embedded deployments, isolate affected components on dedicated network segments and disable non-essential local interfaces to reduce attack surface
bash
# Example: verifying Qualcomm security patch level on Android-based devices
adb shell getprop ro.build.version.security_patch
adb shell getprop ro.vendor.build.security_patch
# Confirm the reported patch level reflects the OEM build that incorporates
# the Qualcomm March 2026 bulletin fix for CVE-2025-47378

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechQualcomm

  • SeverityHIGH

  • CVSS Score7.1

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-497
  • Vendor Resources
  • Qualcomm March 2026 Security Bulletin
  • Related CVEs
  • CVE-2025-47406: Qualcomm Cologne Firmware Info Disclosure

  • CVE-2025-21427: Qualcomm Sm6250 Information Disclosure Flaw

  • CVE-2025-21484: Qualcomm Sm8750 Information Disclosure

  • CVE-2025-21487: Qualcomm APQ8017 Info Disclosure Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English