Description
Transient DOS when processing target power rate tables during channel configuration.
Published: 2026-05-04
Score: 6.5 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a buffer over‑read in the WLAN Hardware Abstraction Layer that occurs when the system processes target power rate tables during channel configuration. The over‑read can trigger a transient loss of service, temporarily disrupting network connectivity. The description does not mention any escalation or data exfiltration ability, so the impact is limited to service interruption.

Affected Systems

Qualcomm Snapdragon devices that incorporate the WLAN HAL mentioned in Qualcomm’s security bulletin are affected. Specific product models and firmware versions are not listed in the advisory; any Snapdragon platform using the referenced HAL code should be considered potentially impacted.

Risk and Exploitability

The CVSS score of 6.5 indicates a moderate severity vulnerability. The EPSS score is not available, and the flaw is not listed in CISA KEV. The likely attack vector involves triggering the channel configuration process, possibly through crafted WLAN frames or conditions that provoke the device to process a target power rate table. An attacker would need the ability to influence the device’s channel configuration to exploit the flaw, which could cause a brief denial of service. The advisory does not provide additional exploitation prerequisites.

Generated by OpenCVE AI on May 4, 2026 at 19:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Qualcomm firmware update that contains the WLAN HAL fix
  • Validate and correct target power rate tables to ensure they are within expected bounds
  • Monitor WLAN performance for any recurrent channel configuration issues or DOS symptoms

Generated by OpenCVE AI on May 4, 2026 at 19:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 04 May 2026 20:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 04 May 2026 17:15:00 +0000

Type Values Removed Values Added
Description Transient DOS when processing target power rate tables during channel configuration.
Title Buffer Over-read in WLAN HAL
Weaknesses CWE-126
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: qualcomm

Published:

Updated: 2026-05-04T19:49:09.440Z

Reserved: 2025-05-06T08:33:16.277Z

Link: CVE-2025-47401

cve-icon Vulnrichment

Updated: 2026-05-04T19:49:05.231Z

cve-icon NVD

Status : Received

Published: 2026-05-04T17:16:20.143

Modified: 2026-05-04T17:16:20.143

Link: CVE-2025-47401

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T19:30:02Z

Weaknesses