Jan 2, 2026·7 min read·9 visits
A classic out-of-bounds write in a Qualcomm driver function (`EnableTestMode`) allows a local, low-privileged attacker to corrupt kernel memory. This can be exploited for full privilege escalation. The attack vector is a malicious app. If your device is on the affected list and unpatched, you're in for a bad time.
CVE-2025-21423 is a classic memory corruption flaw in a vast range of Qualcomm Snapdragon products, from mobile phones to compute platforms. The vulnerability resides in the handling of 'Escape calls' to an `EnableTestMode` function, a feature likely intended for internal diagnostics. A local attacker with low privileges can supply a malicious array index, triggering an out-of-bounds write. This textbook error (CWE-129) allows for memory corruption that can be leveraged for a full system compromise, including privilege escalation and arbitrary code execution, turning a seemingly harmless app into a powerful spyware implant.
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H| Product | Affected Versions | Fixed Version |
|---|---|---|
Snapdragon 8cx Gen 3 Compute Platform Qualcomm, Inc. | SC8280XP-AB, BB | - |
Snapdragon 7c+ Gen 3 Compute Qualcomm, Inc. | All | - |
FastConnect 7800 Qualcomm, Inc. | All | - |
QCM6490 Qualcomm, Inc. | All | - |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-129 |
| CWE Name | Improper Validation of Array Index |
| Attack Vector | Local (AV:L) |
| Privileges Required | Low (PR:L) |
| CVSS v3.1 Score | 7.8 (High) |
| EPSS Score | 0.025% (Very Low Probability of Exploitation) |
| Impact | Privilege Escalation, Arbitrary Code Execution, Denial of Service |
| Exploit Status | poc |
| KEV Status | Not Listed |
The software uses an externally-controlled integer as an index to access an array, but the software fails to validate that the index is within the bounds of the array. This can allow an attacker to read or write to memory outside of the array's boundaries, leading to information disclosure, denial of service, or arbitrary code execution.