Skip to main content

CVE-2023-28580: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qualcomm, Inc. Snapdragon

Medium
VulnerabilityCVE-2023-28580cvecve-2023-28580cwe-120
Published: Tue Dec 05 2023 (12/05/2023, 03:03:52 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption in WLAN Host while setting the PMK length in PMK length in internal cache.

AI-Powered Analysis

AILast updated: 07/08/2025, 03:26:36 UTC

Technical Analysis

CVE-2023-28580 is a medium-severity buffer overflow vulnerability classified under CWE-120, affecting multiple Qualcomm Snapdragon and related wireless connectivity platforms. The flaw arises from improper handling of input size when setting the Pairwise Master Key (PMK) length in the internal WLAN host cache, leading to a classic buffer overflow condition. This memory corruption vulnerability can impact confidentiality, integrity, and availability of affected devices. Exploitation requires local access with high privileges (PR:H) and does not require user interaction (UI:N), but the attack complexity is low (AC:L). The vulnerability affects a broad range of Qualcomm products, including Snapdragon 8 Gen 1 Mobile Platform, various FastConnect modules, QCA series wireless chips, and Qualcomm Video Collaboration platforms. The CVSS v3.1 score is 6.7, indicating a medium severity level, with potential for high impact on confidentiality, integrity, and availability if exploited. No public exploits are known at this time, and no patches have been linked yet. The vulnerability is significant because it targets WLAN host components, which are critical for wireless communication security and performance. Buffer overflow vulnerabilities can lead to arbitrary code execution, privilege escalation, or denial of service, depending on exploitation specifics. Given the wide deployment of Qualcomm Snapdragon chipsets in mobile devices, IoT, and embedded systems, this vulnerability poses a substantial risk to affected devices if exploited.

Potential Impact

For European organizations, the impact of CVE-2023-28580 could be considerable, especially for enterprises relying on mobile devices, embedded systems, or IoT infrastructure powered by Qualcomm Snapdragon and related wireless components. Successful exploitation could allow attackers to corrupt memory, potentially leading to unauthorized access, data leakage, or disruption of wireless communications. This could compromise sensitive corporate data transmitted over WLAN or disrupt critical business operations dependent on wireless connectivity. The requirement for local high-privilege access limits remote exploitation but does not eliminate risk, as attackers could leverage other vulnerabilities or social engineering to gain initial access. Industries such as telecommunications, manufacturing, healthcare, and government agencies using Qualcomm-based devices may face increased risk. Additionally, the vulnerability could affect consumer devices used by employees, increasing the attack surface. The absence of known exploits and patches means organizations must proactively assess exposure and implement mitigations to prevent potential exploitation.

Mitigation Recommendations

1. Inventory and identify all devices and embedded systems within the organization that utilize affected Qualcomm Snapdragon and related wireless components. 2. Monitor Qualcomm and device vendor advisories closely for official patches or firmware updates addressing CVE-2023-28580 and apply them promptly once available. 3. Implement strict access controls to limit local high-privilege access to devices, reducing the risk of exploitation requiring PR:H. 4. Employ network segmentation and endpoint protection to detect and prevent lateral movement that could lead to local access on vulnerable devices. 5. Use mobile device management (MDM) solutions to enforce security policies and update device firmware regularly. 6. Conduct security awareness training to reduce the risk of social engineering attacks that could facilitate privilege escalation. 7. For critical systems, consider additional runtime protections such as memory corruption mitigations (e.g., DEP, ASLR) and intrusion detection systems tuned to detect anomalous WLAN host behavior. 8. Engage with device manufacturers and Qualcomm representatives to obtain timely information on patches and recommended configurations. These steps go beyond generic advice by focusing on device-specific inventory, access control hardening, and proactive monitoring tailored to the affected Qualcomm platforms.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2023-03-17T11:41:45.852Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683864b2182aa0cae27f9cce

Added to database: 5/29/2025, 1:44:18 PM

Last enriched: 7/8/2025, 3:26:36 AM

Last updated: 7/31/2025, 7:14:33 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats