SB2025090132 - Multiple vulnerabilities in Qualcomm chipsets (August 2025)
Published: September 1, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 24 secuirty vulnerabilities.
1) Use After Free (CVE-ID: CVE-2025-21474)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in BTHOST. A local application can execute arbitrary code.
2) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2025-27076)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Display. A local application can execute arbitrary code.
3) Improper Validation of Array Index (CVE-ID: CVE-2025-27075)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Bluetooth HOST. A local application can execute arbitrary code.
4) Reachable Assertion (CVE-ID: CVE-2025-27073)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.
5) Buffer overflow (CVE-ID: CVE-2025-27072)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation in Automotive Vehicle Networks. A local application can gain access to sensitive information.
6) Buffer over-read (CVE-ID: CVE-2025-27068)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Camera. A local application can execute arbitrary code.
7) Improper Validation of Array Index (CVE-ID: CVE-2025-27067)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in DSP Service. A local application can execute arbitrary code.
8) Reachable Assertion (CVE-ID: CVE-2025-27066)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.
9) Buffer over-read (CVE-ID: CVE-2025-27065)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.
10) Out-of-bounds read (CVE-ID: CVE-2025-21465)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation in Core. A local application can gain access to sensitive information.
11) Out-of-bounds read (CVE-ID: CVE-2025-21464)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation in Core. A local application can gain access to sensitive information.
12) Active Debug Code (CVE-ID: CVE-2025-21472)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation in Secure Element. A local application can gain access to sensitive information.
13) Buffer overflow (CVE-ID: CVE-2025-27071)
The vulnerability allows a remote attacker to read and manipulate data.
The vulnerability exists due to improper input validation in Powerline Communication Firmware. A remote attacker can read and manipulate data.
14) Out-of-bounds write (CVE-ID: CVE-2025-21461)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Camera_Linux. A local application can execute arbitrary code.
15) Use After Free (CVE-ID: CVE-2025-21458)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in NPU. A local application can execute arbitrary code.
16) Buffer over-read (CVE-ID: CVE-2025-21457)
The vulnerability allows a local application to read and manipulate data.
The vulnerability exists due to improper input validation in Automotive OS Platform Android. A local application can read and manipulate data.
17) Use After Free (CVE-ID: CVE-2025-21456)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in NPU. A local application can execute arbitrary code.
18) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2025-21473)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Camera_Linux. A local application can execute arbitrary code.
19) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2025-21455)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Camera_Linux. A local application can execute arbitrary code.
20) Exposure of Sensitive Information Through Metadata (CVE-ID: CVE-2025-47324)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to improper input validation in Powerline Communication Firmware. A remote attacker can gain access to sensitive information.
21) Untrusted Pointer Dereference (CVE-ID: CVE-2025-27069)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in DSP Service. A local application can execute arbitrary code.
22) Improper Access Control (CVE-ID: CVE-2025-27062)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Automotive Multimedia. A local application can execute arbitrary code.
23) Reachable Assertion (CVE-ID: CVE-2025-21452)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in Modem. A remote attacker can perform a denial of service (DoS) attack.
24) Improper input validation (CVE-ID: CVE-2025-21477)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in Modem. A remote attacker can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.