Description
Information Disclosure while processing IOCTL handler callbacks without verifying buffer size.
Published: 2026-05-04
Score: 6.1 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Snapdragon DSP Service contains an IOCTL handler that processes callback data without verifying the size of the supplied buffer, resulting in a buffer over‑read (CWE‑126) that can expose sensitive memory contents. This flaw permits an attacker to read beyond the intended bounds of the IOCTL payload, potentially revealing confidential data.

Affected Systems

All Qualcomm Snapdragon processors that expose the DSP Service IOCTL interface are affected; no specific firmware or software version range was provided, so any device using this service is potentially vulnerable.

Risk and Exploitability

The CVSS score of 6.1 indicates moderate severity. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is operating either locally or remotely through crafted IOCTL calls to the DSP Service. At present no vendor patch or workaround has been released, so a precautionary patch when available should be prioritized.

Generated by OpenCVE AI on May 4, 2026 at 18:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply an updated Qualcomm Snapdragon firmware or patch that implements proper buffer size validation for the DSP Service IOCTL handler.
  • Restrict access to the DSP Service IOCTL interface using role‑based access controls or device driver permissions, limiting how many processes can invoke it.
  • Monitor system logs for unusual IOCTL activity on the DSP Service and alert for potential exploitation attempts.

Generated by OpenCVE AI on May 4, 2026 at 18:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 04 May 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Qualcomm
Qualcomm snapdragon
Vendors & Products Qualcomm
Qualcomm snapdragon

Mon, 04 May 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 04 May 2026 17:15:00 +0000

Type Values Removed Values Added
Description Information Disclosure while processing IOCTL handler callbacks without verifying buffer size.
Title Buffer Over-read in DSP Service
Weaknesses CWE-126
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L'}


Subscriptions

Qualcomm Snapdragon
cve-icon MITRE

Status: PUBLISHED

Assigner: qualcomm

Published:

Updated: 2026-05-04T17:50:51.545Z

Reserved: 2025-05-06T08:33:16.277Z

Link: CVE-2025-47406

cve-icon Vulnrichment

Updated: 2026-05-04T17:46:29.428Z

cve-icon NVD

Status : Received

Published: 2026-05-04T17:16:20.957

Modified: 2026-05-04T17:16:20.957

Link: CVE-2025-47406

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T20:15:07Z

Weaknesses