<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Jpeg — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/jpeg/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 06 Apr 2026 16:16:27 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/jpeg/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2025-47390: JPEG Driver IOCTL Memory Corruption Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-jpeg-ioctl-memory-corruption/</link><pubDate>Mon, 06 Apr 2026 16:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-jpeg-ioctl-memory-corruption/</guid><description>A memory corruption vulnerability (CVE-2025-47390) exists while preprocessing IOCTL requests in the JPEG driver, potentially leading to local privilege escalation or denial of service.</description><content:encoded><![CDATA[<p>CVE-2025-47390 describes a memory corruption vulnerability found in the JPEG driver related to the preprocessing of IOCTL requests. This vulnerability, reported by Qualcomm, could allow a local attacker to potentially corrupt memory leading to a crash or arbitrary code execution. This vulnerability is documented in the Qualcomm Security Bulletin for April 2026. Successful exploitation of this issue could lead to denial of service, local privilege escalation, or information disclosure, impacting the confidentiality, integrity, and availability of the system. Defenders should investigate systems using Qualcomm chipsets, prioritizing devices that handle JPEG image processing.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A malicious application is installed on the target device.</li>
<li>The application crafts a specially crafted IOCTL request intended for the JPEG driver.</li>
<li>The application sends the malicious IOCTL request to the JPEG driver via the device&rsquo;s operating system API.</li>
<li>The JPEG driver improperly processes the IOCTL request during the preprocessing stage.</li>
<li>Due to a buffer over-read (CWE-126), the driver reads beyond the allocated memory buffer.</li>
<li>This memory corruption could lead to a crash, denial of service, or the potential to overwrite adjacent memory regions.</li>
<li>If the attacker can control the overwritten memory, they may be able to inject and execute arbitrary code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-47390 can lead to memory corruption, potentially resulting in a denial-of-service condition. In more severe scenarios, attackers could potentially gain arbitrary code execution and escalate their privileges on the targeted system. This vulnerability affects devices utilizing the vulnerable Qualcomm JPEG driver. The specific number of affected devices is unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patches released by Qualcomm as detailed in the Qualcomm Security Bulletin for April 2026 to remediate CVE-2025-47390.</li>
<li>Monitor process creations for applications interacting with the JPEG driver using suspicious IOCTL requests to identify potential exploitation attempts (see the process creation Sigma rule below).</li>
<li>Enable driver verifier on test systems to proactively identify driver-level memory corruption issues.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>memory-corruption</category><category>jpeg</category><category>qualcomm</category></item></channel></rss>