Qualcomm Technologies has issued an urgent security bulletin detailing six major vulnerabilities that affect millions of devices relying on its chipsets and software ecosystem. The most critical of these issues, CVE-2025-47372, directly targets the secure boot process, one of the core safeguards that prevents malicious code from running during device startup. Qualcomm assigned this flaw a “Critical” security and CVSS rating, signaling its high potential for exploitation. If abused, attackers could bypass essential boot-level checks, install persistent malware, or seize early-stage control over the device before the operating system is even loaded. This vulnerability, discovered internally by Qualcomm’s own security team, raises questions about how long the issue may have remained undetected in production devices. Alongside the secure boot weakness, Qualcomm disclosed five additional high-severity flaws across different components of its software stack. These include a critical-rated vulnerability in the High-Level Operating System (CVE-2025-47319), a major flaw affecting TrustZone firmware (CVE-2025-47325) reported externally by researchers from Raelize, and three high-rated issues impacting audio systems, DSP services, and camera functionalities. The variety of affected subsystems demonstrates the complex and interconnected nature of Qualcomm’s hardware–software architecture, where a single vulnerability can have cascading security consequences. Qualcomm’s disclosures highlight the importance of continued collaboration between internal security teams and external researchers. To mitigate risks, Qualcomm is distributing patches to OEM partners and strongly urging manufacturers to deploy fixes immediately across all supported devices. The company has also encouraged end-users to reach out to their device manufacturers for update timelines, as Qualcomm itself does not push updates directly to consumer devices. With a dedicated contact channel established for inquiries related to the bulletin, Qualcomm underscores the severity and urgency of the situation. This incident illustrates the broader challenges faced in securing large-scale device ecosystems, where hardware dependencies, firmware layers, and third-party components create wide attack surfaces that must be continuously monitored and updated.
Researchers have unveiled a critical flaw in the .NET Framework, dubbed SOAPwn, that can be exploited to force enterprise applications to perform arbitrary file writes and achieve ...
Google has released an emergency security update for Chrome, addressing a critical zero-day vulnerability that is actively being exploited by attackers. The update, which brings Ch...
A novel Android malware strain, dubbed DroidLock, has been identified that locks victims’ screens and extorts ransom payments while threatening to destroy their data. Discovered ...