Categories: Cyber Security News

Critical Qualcomm Vulnerabilities Allow Attackers to Execute Arbitrary Code Remotely

Multiple critical vulnerabilities in Qualcomm Technologies’ proprietary Data Network Stack and Multi-Mode Call Processor that permit remote attackers to execute arbitrary code. 

These flaws, tracked as CVE-2025-21483 and CVE-2025-27034, each carry a CVSS score of 9.8 and exploit buffer-corruption weaknesses to compromise device security.

Key Takeaways
1. CVE-2025-21483 & CVE-2025-27034 allow remote RCE.
2. Affects Snapdragon 8 Gen1/Gen2, FastConnect, X55, IoT/automotive chips.
3. Patch now and filter RTP/PLMN traffic.

CVE-2025-21483: Remote Heap Buffer Overflow 

The most severe issue, CVE-2025-21483, resides in Qualcomm’s Real-time Transport Protocol (RTP) packet reassembly within the Data Network Stack & Connectivity module. 

An attacker can send a malicious RTP packet that triggers a heap-based buffer overflow (CWE-119) by overrunning the NALU reassembly buffer. 

With a remote access vector and no user interaction required, this vulnerability enables full control over affected chipsets, including Snapdragon 8 Gen1, Snapdragon 8 Gen2, FastConnect 7800, and dozens more. 

Once exploited, arbitrary code execution at the kernel level can occur, compromising data confidentiality, integrity, and availability.

CVE-2025-27034: Improper Array Index Validation Flaw

Equally critical is CVE-2025-27034, which stems from an improper validation of an array index (CWE-129) in the Multi-Mode Call Processor. 

Attackers can craft a malformed Public Land Mobile Network (PLMN) selection response that corrupts memory during index parsing. 

The flaw’s remote access vector and lack of privilege requirements make it exploitable over the network. 

Affected platforms include the Snapdragon X55 5G Modem-RF System, Snapdragon 8 Gen1, QCM5430, and numerous IoT and automotive modems. Successful exploitation leads to arbitrary code execution with escalated privileges.

CVE Title CVSS 3.1 Score Severity
CVE-2025-21483 Improper Restriction of Operations within the Bounds of a Memory Buffer in Data Network Stack & Connectivity 9.8 Critical
CVE-2025-27034 Improper Validation of Array Index in Multi-Mode Call Processor 9.8 Critical

Mitigations

Qualcomm has issued patches for both vulnerabilities, distributing updates directly to OEMs and urging immediate deployment. 

Sponsored

The recommended countermeasure is to integrate the proprietary software updates provided in the September 2025 Security Bulletin and verify the presence of hardened bounds-checking routines. 

Device manufacturers must ensure timely firmware upgrades to eliminate attack vectors in CVE-2025-21483’s RTP parser and CVE-2025-27034’s array index logic.

Security researchers emphasize the necessity of monitoring CVSS strings and employing network filtering as an interim safeguard. 

Administrators should block unexpected RTP streams and PLMN selection traffic until patched firmware is installed. Additionally, implementing strict SELinux policies on Android platforms can further constrain exploit attempts.

Stakeholders are advised to audit firmware versions, apply patches immediately, and maintain vigilant network monitoring to defend against these high-severity exploits.

Qualcomm customers and device end-users should contact their manufacturers or visit Qualcomm’s support portal for detailed patch instructions and chipset coverage details.

Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

The post Critical Qualcomm Vulnerabilities Allow Attackers to Execute Arbitrary Code Remotely appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Vanilla JS Country Dropdown with Flag Icons & Phone Codes – CountrySelect Pro

CountrySelect Pro is a lightweight vanilla JavaScript country selector that adds a searchable dropdown with…

2 hours ago

Rich Text WYSIWYG Editor for React & Vanilla JS – Editium

Editium is a lightweight WYSIWYG editor that supports both React and Vanilla JavaScript with a…

2 hours ago

WiFi Signals Reveal Human Activities Through Walls by Mapping Body Keypoints

A new open-source edge AI system called π RuView is turning ordinary WiFi infrastructure into…

2 hours ago

On 61st Anniversary of Bloody Sunday, Worries About the Future of Voting Rights and Calls to Action

SELMA, Ala. (AP) — Sixty-one years after state troopers attacked Civil Rights marchers on the…

5 hours ago

Family creating scholarship foundation to honor late son

A Janesville family is creating a scholarship foundation in memory of their son, 14-year-old Kase…

6 hours ago

Star Trek: Starfleet Academy Episode 9 Review – “300th Night”

Spoilers follow for Star Trek: Starfleet Academy Episode 9, “300th Night,” which is available on…

8 hours ago

This website uses cookies.