7.8
HIGH CVSS 3.1
CVE-2025-47382
Incorrect Authorization in Boot
Description

Memory corruption while loading an invalid firmware in boot loader.

INFO

Published Date :

Dec. 18, 2025, 6:15 a.m.

Last Modified :

Jan. 28, 2026, 3:49 p.m.

Remotely Exploit :

No
Affected Products

The following products are affected by CVE-2025-47382 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Qualcomm qam8295p_firmware
2 Qualcomm qca6574au_firmware
3 Qualcomm qca6595au_firmware
4 Qualcomm qca6696_firmware
5 Qualcomm sa6155p_firmware
6 Qualcomm sa8155p_firmware
7 Qualcomm sa8195p_firmware
8 Qualcomm sa8295p_firmware
9 Qualcomm sw5100_firmware
10 Qualcomm sw5100p_firmware
11 Qualcomm wcd9380_firmware
12 Qualcomm wcd9385_firmware
13 Qualcomm wcn3980_firmware
14 Qualcomm wcn3988_firmware
15 Qualcomm wsa8810_firmware
16 Qualcomm wsa8815_firmware
17 Qualcomm wsa8830_firmware
18 Qualcomm wsa8835_firmware
19 Qualcomm qca6574_firmware
20 Qualcomm qca6574a_firmware
21 Qualcomm qca6595_firmware
22 Qualcomm qca6698aq_firmware
23 Qualcomm snapdragon_w5\+_gen_1_wearable_platform_firmware
24 Qualcomm wcd9370_firmware
25 Qualcomm wcd9375_firmware
26 Qualcomm wcn3950_firmware
27 Qualcomm wsa8832_firmware
28 Qualcomm qcs610_firmware
29 Qualcomm qca9377_firmware
30 Qualcomm sa9000p_firmware
31 Qualcomm fastconnect_6200_firmware
32 Qualcomm fastconnect_6900_firmware
33 Qualcomm fastconnect_7800_firmware
34 Qualcomm fastconnect_6700_firmware
35 Qualcomm snapdragon_4_gen_1_mobile_platform_firmware
36 Qualcomm snapdragon_480_5g_mobile_platform_firmware
37 Qualcomm snapdragon_695_5g_mobile_platform_firmware
38 Qualcomm qca9367_firmware
39 Qualcomm qam8255p_firmware
40 Qualcomm qca6797aq_firmware
41 Qualcomm sa8255p_firmware
42 Qualcomm qam8650p_firmware
43 Qualcomm qam8775p_firmware
44 Qualcomm wcd9390_firmware
45 Qualcomm wcd9395_firmware
46 Qualcomm wsa8840_firmware
47 Qualcomm wsa8845_firmware
48 Qualcomm wsa8845h_firmware
49 Qualcomm qca6574
50 Qualcomm qca6574a
51 Qualcomm qca6574au
52 Qualcomm qca6595
53 Qualcomm qca6595au
54 Qualcomm qca6696
55 Qualcomm qcs610
56 Qualcomm sa6155p
57 Qualcomm sa8155p
58 Qualcomm sa8195p
59 Qualcomm wcd9370
60 Qualcomm wcd9375
61 Qualcomm wcd9380
62 Qualcomm wcd9385
63 Qualcomm wcn3950
64 Qualcomm wcn3980
65 Qualcomm wcn3988
66 Qualcomm wsa8810
67 Qualcomm wsa8815
68 Qualcomm wsa8830
69 Qualcomm wsa8835
70 Qualcomm qca9367
71 Qualcomm qca9377
72 Qualcomm sa8770p_firmware
73 Qualcomm sa8775p_firmware
74 Qualcomm qamsrv1h_firmware
75 Qualcomm sa8650p_firmware
76 Qualcomm srv1h_firmware
77 Qualcomm snapdragon_8_gen_3_mobile_platform_firmware
78 Qualcomm qamsrv1m_firmware
79 Qualcomm srv1m_firmware
80 Qualcomm qca6688aq_firmware
81 Qualcomm fastconnect_6700
82 Qualcomm sw5100
83 Qualcomm sw5100p
84 Qualcomm fastconnect_6200
85 Qualcomm fastconnect_6900
86 Qualcomm snapdragon_w5\+_gen_1_wearable_platform
87 Qualcomm qam8295p
88 Qualcomm sa8295p
89 Qualcomm fastconnect_7800
90 Qualcomm qam8255p
91 Qualcomm qam8775p
92 Qualcomm qca6698aq
93 Qualcomm sa8255p
94 Qualcomm sa8770p
95 Qualcomm sa8775p
96 Qualcomm sa9000p
97 Qualcomm qam8650p
98 Qualcomm qca6797aq
99 Qualcomm snapdragon_4_gen_1_mobile_platform
100 Qualcomm snapdragon_480_5g_mobile_platform
101 Qualcomm snapdragon_695_5g_mobile_platform
102 Qualcomm wcd9390
103 Qualcomm wcd9395
104 Qualcomm wsa8832
105 Qualcomm wsa8840
106 Qualcomm wsa8845
107 Qualcomm wsa8845h
108 Qualcomm snapdragon_8_gen_3_mobile_platform
109 Qualcomm qamsrv1h
110 Qualcomm qamsrv1m
111 Qualcomm sa8650p
112 Qualcomm srv1h
113 Qualcomm srv1m
114 Qualcomm qca6688aq
115 Qualcomm sa7255p_firmware
116 Qualcomm sa7255p
117 Qualcomm sa7775p_firmware
118 Qualcomm sa7775p
119 Qualcomm sa8620p_firmware
120 Qualcomm sa8620p
121 Qualcomm qam8620p_firmware
122 Qualcomm qam8620p
123 Qualcomm video_collaboration_vc1_platform_firmware
124 Qualcomm video_collaboration_vc1_platform
125 Qualcomm video_collaboration_vc3_platform_firmware
126 Qualcomm video_collaboration_vc3_platform
127 Qualcomm srv1l_firmware
128 Qualcomm srv1l
129 Qualcomm sm8635_firmware
130 Qualcomm sm8635
131 Qualcomm sm8750_firmware
132 Qualcomm sm8750
133 Qualcomm wcn6755_firmware
134 Qualcomm wcn6755
135 Qualcomm sm4635_firmware
136 Qualcomm sm4635
137 Qualcomm wcd9378_firmware
138 Qualcomm wcd9378
139 Qualcomm wcn7880_firmware
140 Qualcomm wcn7880
141 Qualcomm snapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmware
142 Qualcomm snapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)
143 Qualcomm wcn6650_firmware
144 Qualcomm wcn6650
145 Qualcomm wcn7881_firmware
146 Qualcomm wcn7881
147 Qualcomm wcn7861_firmware
148 Qualcomm wcn7861
149 Qualcomm wcn7860_firmware
150 Qualcomm wcn7860
151 Qualcomm sm8750p_firmware
152 Qualcomm sm8750p
153 Qualcomm sm6650_firmware
154 Qualcomm sm6650
155 Qualcomm sm7635_firmware
156 Qualcomm sm7635
157 Qualcomm sm7675_firmware
158 Qualcomm sm7675
159 Qualcomm sm7675p_firmware
160 Qualcomm sm7675p
161 Qualcomm sm8635p_firmware
162 Qualcomm sm8635p
163 Qualcomm sxr2330p_firmware
164 Qualcomm sxr2330p
165 Qualcomm wcn6450_firmware
166 Qualcomm wcn6450
167 Qualcomm sm8650q_firmware
168 Qualcomm sm8650q
169 Qualcomm sm8735_firmware
170 Qualcomm sm8735
171 Qualcomm qmp1000_firmware
172 Qualcomm qmp1000
173 Qualcomm wcn7750_firmware
174 Qualcomm wcn7750
175 Qualcomm sm6650p_firmware
176 Qualcomm sm6650p
177 Qualcomm snapdragon_ar1_gen_1_platform_\"luna1\"_firmware
178 Qualcomm snapdragon_ar1_gen_1_platform_\"luna1\"
179 Qualcomm sm7635p_firmware
180 Qualcomm sm7635p
181 Qualcomm snapdragon_ar1_gen_1_platform_firmware
182 Qualcomm snapdragon_ar1_gen_1_platform
183 Qualcomm qcm6690_firmware
184 Qualcomm qcm6690
185 Qualcomm qcs6690_firmware
186 Qualcomm qcs6690
187 Qualcomm qca8695au_firmware
188 Qualcomm qca8695au
189 Qualcomm sxr2350p_firmware
190 Qualcomm sxr2350p
191 Qualcomm sg6150_firmware
192 Qualcomm sg6150
193 Qualcomm sg6150p_firmware
194 Qualcomm sg6150p
195 Qualcomm sm8850_firmware
196 Qualcomm sm8850
197 Qualcomm sm8850p_firmware
198 Qualcomm sm8850p
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 HIGH 2cfc7d3e-20d3-47ac-8db7-1b7285aff15f
CVSS 3.1 HIGH [email protected]
Solution
Apply patches to fix memory corruption in the boot loader.
  • Update firmware to a trusted source.
  • Avoid loading invalid firmware.
  • Patch the boot loader to prevent corruption.
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2025-47382.

URL Resource
https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2025-bulletin.html Patch Vendor Advisory
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2025-47382 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2025-47382 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2025-47382 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2025-47382 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Jan. 28, 2026

    Action Type Old Value New Value
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7635p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7635p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7675_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7675:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7675p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7675p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8635:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8635p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8635p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8650q_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8650q:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8735_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8735:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8750_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8750:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8750p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8750p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8850_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8850:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8850p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8850p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_4_gen_1_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_480+_5g_mobile_platform_(sm4350-ac)_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_480+_5g_mobile_platform_(sm4350-ac):-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_480_5g_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_695_5g_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_8_gen_3_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_ar1_gen_1_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_ar1_gen_1_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_ar1_gen_1_platform_"luna1"_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_ar1_gen_1_platform_"luna1":-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_w5+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_w5+_gen_1_wearable_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:srv1h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:srv1l_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:srv1l:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:srv1m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sxr2330p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sxr2330p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sxr2350p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sxr2350p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:video_collaboration_vc1_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:video_collaboration_vc3_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9378_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9378:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn6450_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn6450:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn6650_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn6650:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qam8620p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qamsrv1h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qamsrv1m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6688aq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6797aq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8695au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8695au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9367_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9367:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcm6690_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcm6690:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs6690_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs6690:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qmp1000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qmp1000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa7255p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa7775p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8620p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8650p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8770p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8775p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sg6150_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sg6150:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sg6150p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sg6150p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm4635_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm4635:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm6650_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm6650:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm6650p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm6650p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7635_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7635:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn6755:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn7750_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn7750:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn7860_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn7860:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn7861_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn7861:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn7880_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn7880:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn7881_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn7881:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*
    Added Reference Type Qualcomm, Inc.: https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2025-bulletin.html Types: Patch, Vendor Advisory
  • New CVE Received by [email protected]

    Dec. 18, 2025

    Action Type Old Value New Value
    Added Description Memory corruption while loading an invalid firmware in boot loader.
    Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
    Added CWE CWE-863
    Added Reference https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2025-bulletin.html
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 7.8
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact