6.1
MEDIUM CVSS 3.1
CVE-2025-27064
Buffer Over-read in Core Services
Description

Information disclosure while registering commands from clients with diag through diagHal.

INFO

Published Date :

Nov. 4, 2025, 4:15 a.m.

Last Modified :

Nov. 5, 2025, 5:24 p.m.

Remotely Exploit :

No
Affected Products

The following products are affected by CVE-2025-27064 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Qualcomm qca6574au_firmware
2 Qualcomm qca6595au_firmware
3 Qualcomm sa6155p_firmware
4 Qualcomm sa8155p_firmware
5 Qualcomm sa8195p_firmware
6 Qualcomm wcd9380_firmware
7 Qualcomm wcn3980_firmware
8 Qualcomm wsa8830_firmware
9 Qualcomm wsa8835_firmware
10 Qualcomm ipq9008_firmware
11 Qualcomm ipq9574_firmware
12 Qualcomm qca6564au_firmware
13 Qualcomm qca6574a_firmware
14 Qualcomm qca6584au_firmware
15 Qualcomm qca6678aq_firmware
16 Qualcomm qca6698aq_firmware
17 Qualcomm qca8075_firmware
18 Qualcomm qca8081_firmware
19 Qualcomm qca8082_firmware
20 Qualcomm qca8084_firmware
21 Qualcomm qca8085_firmware
22 Qualcomm qca8386_firmware
23 Qualcomm qcn5124_firmware
24 Qualcomm qcn9000_firmware
25 Qualcomm qcn9012_firmware
26 Qualcomm qcn9024_firmware
27 Qualcomm qcn9074_firmware
28 Qualcomm qcn9274_firmware
29 Qualcomm sa4150p_firmware
30 Qualcomm wcn3660b_firmware
31 Qualcomm wcn3680b_firmware
32 Qualcomm mdm9628_firmware
33 Qualcomm qca6564a_firmware
34 Qualcomm qca9377_firmware
35 Qualcomm sa4155p_firmware
36 Qualcomm sa8540p_firmware
37 Qualcomm sa9000p_firmware
38 Qualcomm fastconnect_6900_firmware
39 Qualcomm fastconnect_7800_firmware
40 Qualcomm snapdragon_8_gen_1_mobile_platform_firmware
41 Qualcomm qca9367_firmware
42 Qualcomm qca0000_firmware
43 Qualcomm qam8255p_firmware
44 Qualcomm sa8255p_firmware
45 Qualcomm qam8650p_firmware
46 Qualcomm immersive_home_3210_platform_firmware
47 Qualcomm immersive_home_326_platform_firmware
48 Qualcomm ipq9554_firmware
49 Qualcomm ipq9570_firmware
50 Qualcomm ipq5332_firmware
51 Qualcomm qcf8001_firmware
52 Qualcomm mdm9628
53 Qualcomm qca6564a
54 Qualcomm qca6564au
55 Qualcomm qca6574a
56 Qualcomm qca6574au
57 Qualcomm qca6584au
58 Qualcomm qca6595au
59 Qualcomm sa6155p
60 Qualcomm sa8155p
61 Qualcomm sa8195p
62 Qualcomm wcd9380
63 Qualcomm wcn3660b
64 Qualcomm wcn3680b
65 Qualcomm wcn3980
66 Qualcomm wsa8830
67 Qualcomm wsa8835
68 Qualcomm qca9367
69 Qualcomm qca9377
70 Qualcomm qca8075
71 Qualcomm qca8081
72 Qualcomm qcn5124
73 Qualcomm qcn9000
74 Qualcomm qcn9074
75 Qualcomm qca0000
76 Qualcomm qcn9012
77 Qualcomm qcn9024
78 Qualcomm snapdragon_auto_5g_modem-rf_gen_2_firmware
79 Qualcomm qcf8000_firmware
80 Qualcomm sa8650p_firmware
81 Qualcomm ipq5302_firmware
82 Qualcomm ipq5312_firmware
83 Qualcomm qcn6402_firmware
84 Qualcomm qcn6412_firmware
85 Qualcomm qcn6422_firmware
86 Qualcomm qcn6432_firmware
87 Qualcomm qca6688aq_firmware
88 Qualcomm fastconnect_6900
89 Qualcomm fastconnect_7800
90 Qualcomm qam8255p
91 Qualcomm qca6698aq
92 Qualcomm sa8255p
93 Qualcomm sa9000p
94 Qualcomm snapdragon_auto_5g_modem-rf_gen_2
95 Qualcomm qam8650p
96 Qualcomm sa4150p
97 Qualcomm sa4155p
98 Qualcomm sa8540p
99 Qualcomm snapdragon_8_gen_1_mobile_platform
100 Qualcomm qca6678aq
101 Qualcomm immersive_home_3210_platform
102 Qualcomm immersive_home_326_platform
103 Qualcomm ipq5332
104 Qualcomm ipq9008
105 Qualcomm ipq9554
106 Qualcomm ipq9570
107 Qualcomm ipq9574
108 Qualcomm qca8082
109 Qualcomm qca8084
110 Qualcomm qca8085
111 Qualcomm qca8386
112 Qualcomm qcf8000
113 Qualcomm qcf8001
114 Qualcomm qcn9274
115 Qualcomm sa8650p
116 Qualcomm ipq5302
117 Qualcomm ipq5312
118 Qualcomm qcn6402
119 Qualcomm qcn6412
120 Qualcomm qcn6422
121 Qualcomm qcn6432
122 Qualcomm qca6688aq
123 Qualcomm ipq5300_firmware
124 Qualcomm ipq5300
125 Qualcomm sa7255p_firmware
126 Qualcomm sa7255p
127 Qualcomm sa8530p_firmware
128 Qualcomm sa8530p
129 Qualcomm sxr2250p_firmware
130 Qualcomm sxr2250p
131 Qualcomm qcn9160_firmware
132 Qualcomm qcn9160
133 Qualcomm qxm8083_firmware
134 Qualcomm qxm8083
135 Qualcomm ipq9048_firmware
136 Qualcomm ipq9048
137 Qualcomm ipq5424_firmware
138 Qualcomm ipq5424
139 Qualcomm qca8080_firmware
140 Qualcomm qca8080
141 Qualcomm qca8101_firmware
142 Qualcomm qca8101
143 Qualcomm qca8384_firmware
144 Qualcomm qca8384
145 Qualcomm qca8385_firmware
146 Qualcomm qca8385
147 Qualcomm qcn5224_firmware
148 Qualcomm qcn5224
149 Qualcomm qca8102_firmware
150 Qualcomm qca8102
151 Qualcomm qca8111_firmware
152 Qualcomm qca8111
153 Qualcomm qca8112_firmware
154 Qualcomm qca8112
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 MEDIUM 2cfc7d3e-20d3-47ac-8db7-1b7285aff15f
CVSS 3.1 MEDIUM [email protected]
Solution
Restrict access to diagnostic commands and sanitize output.
  • Limit access to diagnostic functionalities.
  • Validate input for diagnostic commands.
  • Sanitize data before logging.
  • Review command registration process.
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2025-27064.

URL Resource
https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2025-bulletin.html Vendor Advisory
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2025-27064 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2025-27064 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2025-27064 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2025-27064 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Nov. 05, 2025

    Action Type Old Value New Value
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:immersive_home_3210_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:immersive_home_3210_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:immersive_home_326_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:immersive_home_326_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq5300_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq5300:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq5302_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq5302:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq5312_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq5312:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq5332_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq5332:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq5424_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq5424:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq9008_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq9008:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq9048_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq9048:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq9554_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq9554:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq9570_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq9570:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ipq9574_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ipq9574:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:mdm9628:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca0000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca0000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6678aq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6688aq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8075_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8075:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8080_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8080:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8082_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8082:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8084_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8084:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8085_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8085:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8101_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8101:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8102_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8102:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8111_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8111:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8112_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8112:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8384_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8384:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8385_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8385:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8386_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8386:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9367_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9367:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcf8000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcf8000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcf8001_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcf8001:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5124_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5124:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn5224_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn5224:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6402_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6402:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6412_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6412:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6422_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6422:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6432_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6432:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9012:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9160_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9160:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9274_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9274:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qxm8083_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qxm8083:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa4150p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa4155p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa7255p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8530p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8530p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8540p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8650p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sxr2250p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*
    Added Reference Type Qualcomm, Inc.: https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2025-bulletin.html Types: Vendor Advisory
  • New CVE Received by [email protected]

    Nov. 04, 2025

    Action Type Old Value New Value
    Added Description Information disclosure while registering commands from clients with diag through diagHal.
    Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
    Added CWE CWE-126
    Added Reference https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2025-bulletin.html
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 6.1
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact