PT-2025-23468 · Qualcomm · Qualcomm Snapdragon
Published
2025-01-24
·
Updated
2025-11-29
·
CVE-2025-21479
CVSS v3.1
8.6
8.6
High
| Base vector | Vector | AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Qualcomm chipsets (affected versions not specified)
Meta Quest 3 and 3S versions August 7, 2025 and earlier
Samsung S23 (affected versions not specified)
Description
A flaw exists in Qualcomm Adreno GPU firmware that allows unauthorized command execution in the GPU micronode. This can lead to memory corruption when a specific sequence of commands is processed. The issue has been actively exploited, with reports indicating its use in achieving root access on devices like the Meta Quest 3/3S and Samsung S23. Exploitation involves manipulating page tables to gain kernel read/write access and ultimately compromise the device. The vulnerability affects multiple product types, including IoT devices, phones, laptops, and potentially automotive systems. The GPU microcode is shared across various products, making a wide range of devices susceptible. The issue was addressed in Google’s August 2025 Android security update.
Recommendations
For Meta Quest 3/3S devices, disable updates and the Oculus updater (
com.oculus.updater) to prevent the installation of the patched firmware.
For Samsung S23 devices, there is no information about a newer version that contains a fix for this vulnerability.
For other affected Qualcomm chipsets, there is no information about a newer version that contains a fix for this vulnerability.Exploit
RCE
LPE
Incorrect Authorization
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-06374
CVE-2025-21479
Affected Products
Qualcomm Snapdragon
References · 84
- 🔥 https://github.com/FreeXR/eureka_panther-adreno-gpu-exploit-1⭐ 2 · Exploit
- https://bdu.fstec.ru/vul/2025-06374 · Security Note
- https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-21479 · Security Note
- https://twitter.com/ScottyBauer1/status/1929403902761558242 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1l3xv0b/top_10_trending_cves_05062025 · Reddit Post
- https://reddit.com/r/CVEWatch/comments/1mrqwf1/top_10_trending_cves_16082025 · Reddit Post
- https://twitter.com/NETFIXERTECH/status/1930391522975068423 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1opw0fs/top_10_trending_cves_06112025 · Reddit Post
- https://twitter.com/CVEnew/status/1929799360373805547 · Twitter Post
- https://cisa.gov/sites/default/files/csv/known_exploited_vulnerabilities.csv · Note
- https://reddit.com/r/CVEWatch/comments/1p7e9v3/top_10_trending_cves_26112025 · Reddit Post
- https://twitter.com/linkersec/status/1988308143907238076 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1l5hf6g/top_10_trending_cves_07062025 · Reddit Post
- https://t.me/cvetracker/25252 · Telegram Post