Cyber Security NewsTechnologie

Critical Qualcomm Chipset Vulnerabilities Enables Remote Code Execution

Qualcomm Technologies has released a critical security bulletin addressing multiple severe vulnerabilities in its proprietary and open-source software. These security updates are essential for protecting devices from severe flaws that th...

5. Mai 2026AbinayaLive Redaktion
Critical Qualcomm Chipset Vulnerabilities Enables Remote Code Execution

Kurzfassung

Warum das wichtig ist

Cyber Security NewsTechnologie
  • Qualcomm Technologies has released a critical security bulletin addressing multiple severe vulnerabilities in its proprietary and open-source software.
  • These security updates are essential for protecting devices from severe flaws that th...
  • CVE-2026-25254 : Improper authorization in Qualcomm Software Center (CVSS 9.8).

CVE-2026-25293 : Buffer overflow in Power Line Communication Firmware (CVSS 9.6).

CVE-2026-25255 : Exposed a dangerous function in Qualcomm Software Center (CVSS 8.8).

CVE-2025-47408 : Untrusted pointer dereference in WINBLAST-POWER (CVSS 7.8).

CVE-2025-47405 : Untrusted pointer dereference

CVE-2025-47405 : Untrusted pointer dereference in Camera (CVSS 7.8).

CVE-2025-47407 : Time-of-check Time-of-use (TOCTOU) Race Condition in DSP Service (CVSS 7.8).

CVE-2026-24082 : Use After Free in Automotive GPU (CVSS 7.8).

CVE-2026-25262 : Write-what-where condition in Primary

CVE-2026-25262 : Write-what-where condition in Primary Bootloader (CVSS 6.9).

CVE-2025-47401 : Buffer over-read in WLAN HAL (CVSS 6.5).

CVE-2025-47403 : Buffer over-read in WLAN Firmware (CVSS 6.5).

CVE-2025-47404 : Buffer copy without checking

CVE-2025-47404 : Buffer copy without checking the size of input in Automotive Audio (CVSS 6.5).

CVE-2025-47406 : Buffer over-read in DSP Service (CVSS 6.1).

CVE-2026-25266 : Exposed a dangerous function in Windows WLAN Host (CVSS 5.5). Compromised hardware ranges from legacy modems to the latest flagship mobile processors, including the Snapdragon 8 Elite, Snapdragon 8 Gen 3, and FastConnect 7800 platforms. Furthermore, automotive infrastructure utilizing Snapdragon Auto 5G Modems and various smart home networking products are also vulnerable to these exploits. Mitigation Strategies and OEM Patching Qualcomm has actively shared security patches for these vulnerabilities with Original Equipment Manufacturers (OEMs). Because Qualcomm does not push updates directly to end-user devices, the responsibility of deploying these fixes falls entirely on smartphone brands, router manufacturers, and automakers. Recent Android security updates have already begun integrating patches for various Qualcomm components, underscoring the urgency of these deployments. Cybersecurity professionals must prioritize identifying affected assets within their infrastructure. According to the Qualcomm Security Bulletin, May 2026 , end users should immediately apply the latest firmware and security updates from their device manufacturers. Organizations should implement network-level monitoring to detect anomalous traffic until patches are fully deployed across all endpoints. on

Quellenprofil

Quelle und redaktionelle Angaben

Quelle
Cyber Security News
Originaltitel
Critical Qualcomm Chipset Vulnerabilities Enables Remote Code Execution
Canonical
https://cybersecuritynews.com/qualcomm-chipset-vulnerabilities/
Quell-URL
https://cybersecuritynews.com/qualcomm-chipset-vulnerabilities/

Aehnliche Inhalte

Verwandte Themen und interne Verlinkung

Weitere Artikel aus aehnlichen Themenfeldern, damit Leser direkt im selben Kontext weiterlesen koennen.