SB2025090132 - Multiple vulnerabilities in Qualcomm chipsets (August 2025) 



SB2025090132 - Multiple vulnerabilities in Qualcomm chipsets (August 2025)

Published: September 1, 2025

Security Bulletin ID SB2025090132
Severity
Medium
Patch available
YES
Number of vulnerabilities 24
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 29% Low 71%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 24 secuirty vulnerabilities.


1) Use After Free (CVE-ID: CVE-2025-21474)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in BTHOST. A local application can execute arbitrary code.


2) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2025-27076)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Display. A local application can execute arbitrary code.


3) Improper Validation of Array Index (CVE-ID: CVE-2025-27075)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Bluetooth HOST. A local application can execute arbitrary code.


4) Reachable Assertion (CVE-ID: CVE-2025-27073)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.


5) Buffer overflow (CVE-ID: CVE-2025-27072)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation in Automotive Vehicle Networks. A local application can gain access to sensitive information.


6) Buffer over-read (CVE-ID: CVE-2025-27068)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Camera. A local application can execute arbitrary code.


7) Improper Validation of Array Index (CVE-ID: CVE-2025-27067)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in DSP Service. A local application can execute arbitrary code.


8) Reachable Assertion (CVE-ID: CVE-2025-27066)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.


9) Buffer over-read (CVE-ID: CVE-2025-27065)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.


10) Out-of-bounds read (CVE-ID: CVE-2025-21465)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation in Core. A local application can gain access to sensitive information.


11) Out-of-bounds read (CVE-ID: CVE-2025-21464)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation in Core. A local application can gain access to sensitive information.


12) Active Debug Code (CVE-ID: CVE-2025-21472)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation in Secure Element. A local application can gain access to sensitive information.


13) Buffer overflow (CVE-ID: CVE-2025-27071)

The vulnerability allows a remote attacker to read and manipulate data.

The vulnerability exists due to improper input validation in Powerline Communication Firmware. A remote attacker can read and manipulate data.


14) Out-of-bounds write (CVE-ID: CVE-2025-21461)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Camera_Linux. A local application can execute arbitrary code.


15) Use After Free (CVE-ID: CVE-2025-21458)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in NPU. A local application can execute arbitrary code.


16) Buffer over-read (CVE-ID: CVE-2025-21457)

The vulnerability allows a local application to read and manipulate data.

The vulnerability exists due to improper input validation in Automotive OS Platform Android. A local application can read and manipulate data.


17) Use After Free (CVE-ID: CVE-2025-21456)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in NPU. A local application can execute arbitrary code.


18) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2025-21473)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Camera_Linux. A local application can execute arbitrary code.


19) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2025-21455)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Camera_Linux. A local application can execute arbitrary code.


20) Exposure of Sensitive Information Through Metadata (CVE-ID: CVE-2025-47324)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to improper input validation in Powerline Communication Firmware. A remote attacker can gain access to sensitive information.


21) Untrusted Pointer Dereference (CVE-ID: CVE-2025-27069)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in DSP Service. A local application can execute arbitrary code.


22) Improper Access Control (CVE-ID: CVE-2025-27062)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Automotive Multimedia. A local application can execute arbitrary code.


23) Reachable Assertion (CVE-ID: CVE-2025-21452)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in Modem. A remote attacker can perform a denial of service (DoS) attack.


24) Improper input validation (CVE-ID: CVE-2025-21477)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in Modem. A remote attacker can perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.