The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-47404

CVE-2025-47404: Qualcomm Qca8695au Buffer Overflow Flaw

CVE-2025-47404 is a buffer overflow vulnerability in Qualcomm Qca8695au Firmware caused by memory corruption during dynamic buffer resizing. This article covers technical details, affected versions, and mitigation.

Published: May 7, 2026

CVE-2025-47404 Overview

CVE-2025-47404 is a memory corruption vulnerability affecting a wide range of Qualcomm chipsets and firmware components. The flaw occurs when the size of a previously allocated buffer is dynamically changed while its contents are being concurrently modified. This race-style condition leads to out-of-bounds writes and buffer overflow conditions. The vulnerability impacts hundreds of Qualcomm products, including Snapdragon mobile platforms, FastConnect Wi-Fi/Bluetooth modules, automotive (SA-series) SoCs, modems, and IoT/wearable chipsets. Qualcomm addressed the issue in its May 2026 Security Bulletin.

Critical Impact

A local, low-privileged attacker can trigger memory corruption to compromise confidentiality, integrity, and availability of the affected device, potentially leading to arbitrary code execution in firmware context.

Affected Products

  • Qualcomm Snapdragon mobile platforms (4 Gen 1, 6 Gen 4, 7s Gen 3, 8 Gen 2/3, 8+ Gen 2, 865/870/888 5G, and others)
  • Qualcomm FastConnect 6200/6700/6800/6900/7800, QCA wireless chipsets, and WCN/WCD audio-connectivity firmware
  • Qualcomm automotive (SA8155P, SA8255P, SA8295P, SA8770P, SA9000P), modem-RF (X55/X72/X75), IoT, robotics (RB2/RB5), and XR2 platforms

Discovery Timeline

  • CVE-2025-47404 assigned by Qualcomm Product Security
  • 2026-05-04 - CVE-2025-47404 published to NVD
  • 2026-05-06 - Last updated in NVD database
  • May 2026 - Qualcomm publishes the security bulletin with patches

Technical Details for CVE-2025-47404

Vulnerability Analysis

The vulnerability stems from unsafe handling of dynamic buffer resizing in Qualcomm firmware. When code resizes a previously allocated buffer (for example, via realloc-style operations) while another execution context is still writing to the original buffer, the underlying memory layout becomes inconsistent. This produces an out-of-bounds write condition tracked under [CWE-787] and a classic buffer overflow pattern under [CWE-120]. The corruption can overwrite adjacent heap metadata, function pointers, or control structures inside the firmware. Because the affected components run inside trusted execution environments and modem/Wi-Fi subsystems, successful exploitation can compromise the integrity of the entire device.

Root Cause

The defect is a missing synchronization and bounds-tracking guarantee around buffer reallocation. The firmware does not lock the buffer or verify that all in-flight writes have completed before changing the allocation size. As a result, concurrent writers continue to use stale size assumptions and write past the new allocation boundary.

Attack Vector

Exploitation requires local access with low privileges and no user interaction. An attacker running an unprivileged application or a compromised driver on the device must trigger the vulnerable code path that performs the dynamic resize during active modification. The local attack surface includes IPC interfaces, kernel drivers, and userspace clients that interact with affected Qualcomm subsystems such as Wi-Fi, audio, and modem services.

// No verified public proof-of-concept is available for CVE-2025-47404.
// Refer to the Qualcomm May 2026 Security Bulletin for technical details.

Detection Methods for CVE-2025-47404

Indicators of Compromise

  • Unexpected crashes, kernel panics, or subsystem restarts in Qualcomm Wi-Fi, modem, audio, or DSP services
  • Firmware watchdog resets or SubSystem Restart (SSR) events on Snapdragon devices without an obvious cause
  • Anomalous heap corruption signatures in dmesg or vendor crash dumps referencing affected drivers

Detection Strategies

  • Monitor mobile and IoT device fleets for repeated firmware crash reports tied to affected Qualcomm components
  • Correlate application install events with subsequent subsystem instability to identify suspicious local triggers
  • Audit installed applications and drivers for unsigned or untrusted code that interacts with Qualcomm HAL interfaces

Monitoring Recommendations

  • Collect and centralize device crash telemetry, including modem and Wi-Fi firmware logs, for fleet-wide analysis
  • Track patch level (Android Security Patch Level / vendor firmware version) across managed devices and alert on devices below the May 2026 baseline
  • Enable enterprise mobility management (EMM) policies that block sideloading and restrict installation of untrusted local applications

How to Mitigate CVE-2025-47404

Immediate Actions Required

  • Apply the Qualcomm firmware updates from the May 2026 Security Bulletin via your OEM update channel as soon as they become available
  • Inventory all affected Snapdragon, FastConnect, QCA, WCN, WCD, SA-series, and modem-RF components in your environment
  • Restrict installation of untrusted local applications on managed mobile, IoT, automotive, and XR devices

Patch Information

Qualcomm has released patches for affected components in its May 2026 Security Bulletin. Device manufacturers must integrate these patches into OEM firmware images and ship them to end users through standard over-the-air update mechanisms. Refer to the Qualcomm Security Bulletin May 2026 for the authoritative list of fixed components.

Workarounds

  • No vendor-supplied workaround is published; patching is the only durable remediation
  • Enforce least-privilege application policies and disable developer/USB debugging on production devices to reduce local attack surface
  • For automotive and IoT deployments, segment affected devices on isolated networks until OEM firmware updates are available
bash
# Example: check Android Security Patch Level on a managed device
adb shell getprop ro.build.version.security_patch

# Confirm vendor firmware version against the OEM advisory baseline
adb shell getprop ro.vendor.build.fingerprint

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeBuffer Overflow

  • Vendor/TechQualcomm

  • SeverityHIGH

  • CVSS Score7.8

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-120

  • CWE-787
  • Vendor Resources
  • Qualcomm Security Bulletin May 2026
  • Related CVEs
  • CVE-2025-47405: Qualcomm Fastconnect Buffer Overflow Flaw

  • CVE-2025-47408: Qualcomm Fastconnect Buffer Overflow Flaw

  • CVE-2025-47391: Qualcomm Wcn3988 Buffer Overflow Flaw

  • CVE-2025-47390: Qualcomm Qcm5430 Buffer Overflow Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English