Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Konni Hackers Deploy AI-Generated PowerShell Backdoor Towards Blockchain Builders

    January 26, 2026

    The 5 Varieties Of Organizational Buildings For The New World Of Work

    January 26, 2026

    5 Breakthroughs in Graph Neural Networks to Watch in 2026

    January 26, 2026
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»Qualcomm Alerts Customers to Crucial Flaws That Compromise the Safe Boot Course of
    AI Ethics & Regulation

    Qualcomm Alerts Customers to Crucial Flaws That Compromise the Safe Boot Course of

    Declan MurphyBy Declan MurphyDecember 1, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Qualcomm Alerts Customers to Crucial Flaws That Compromise the Safe Boot Course of
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Qualcomm Applied sciences, Inc. has issued an pressing safety bulletin warning clients about a number of vital vulnerabilities affecting tens of millions of gadgets worldwide.

    Essentially the most extreme flaw threatens the safe boot course of, a elementary safety mechanism that protects gadgets from malicious software program throughout startup.

    The safety replace, printed immediately, addresses six high-priority vulnerabilities found in Qualcomm’s proprietary software program.

    Amongst these, CVE-2025-47372 stands out as essentially the most vital risk, receiving the corporate’s highest safety score for its potential impression on the boot course of.

    Crucial Boot Vulnerability Found

    CVE-2025-47372 has been categorized with a “Crucial” safety score and a “Crucial” CVSS (Widespread Vulnerability Scoring System) score, indicating its extreme nature.

    This vulnerability impacts the boot expertise space, which controls how gadgets begin up and cargo their working programs.

    When compromised, attackers may doubtlessly bypass safety checks, set up persistent malware, or acquire unauthorized management over affected gadgets earlier than the working system even hundreds.

    The flaw was found internally by Qualcomm’s safety group, demonstrating the corporate’s proactive strategy to figuring out threats.

    Nevertheless, the invention raises issues about how lengthy the vulnerability could have existed in deployed gadgets earlier than detection.

    Extra Safety Threats Recognized

    Alongside the vital boot flaw, Qualcomm disclosed 5 different important vulnerabilities:

    CVE-2025-47319 impacts the HLOS (Excessive-Stage Working System) with a vital safety score, although its CVSS score is medium. This inside discovery may impression gadget working system performance.

    CVE-2025-47325 targets TZ Firmware and was reported by exterior safety researchers Niek Timmers and Cristofaro Mune from Raelize on September 3, 2025. This high-rated vulnerability demonstrates the worth of collaboration between producers and unbiased researchers.

    Extra high-severity flaws have been present in audio programs (CVE-2025-47323), DSP companies (CVE-2025-47350), and digicam performance (CVE-2025-47387), all found internally.

    Qualcomm is actively sharing safety patches with authentic tools producers (OEMs) and strongly recommends rapid deployment on all launched gadgets.

    The corporate emphasised that gadget producers ought to prioritize these updates because of their high-impact nature.

    Customers involved about their gadget safety ought to contact their gadget producers on to inquire about patch availability and replace schedules.

    The corporate has established a devoted e-mail handle for questions associated to this safety bulletin.

    This incident underscores the continued challenges going through the expertise business in sustaining gadget safety throughout advanced {hardware} and software program ecosystems.

    Observe us on Google Information, LinkedIn, and X to Get On the spot Updates and Set GBH as a Most popular Supply in Google.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    Konni Hackers Deploy AI-Generated PowerShell Backdoor Towards Blockchain Builders

    January 26, 2026

    Microsoft Open-Sources winapp, a New CLI Instrument for Streamlined Home windows App Growth

    January 26, 2026

    The cybercrime business continues to problem CISOs in 2026

    January 25, 2026
    Top Posts

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Konni Hackers Deploy AI-Generated PowerShell Backdoor Towards Blockchain Builders

    January 26, 2026

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025
    Don't Miss

    Konni Hackers Deploy AI-Generated PowerShell Backdoor Towards Blockchain Builders

    By Declan MurphyJanuary 26, 2026

    Ravie LakshmananJan 26, 2026Malware / Endpoint Safety The North Korean menace actor often called Konni…

    The 5 Varieties Of Organizational Buildings For The New World Of Work

    January 26, 2026

    5 Breakthroughs in Graph Neural Networks to Watch in 2026

    January 26, 2026

    Hadrian raises funding for automated manufacturing, bringing valuation to $1.6B

    January 26, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2026 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.