Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-33031: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2023-33031cvecve-2023-33031cwe-120
Published: Tue Nov 07 2023 (11/07/2023, 05:26:46 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

CVE-2023-33031 is a high-severity buffer overflow vulnerability in Qualcomm Snapdragon platforms affecting a wide range of mobile, automotive, and IoT devices. The flaw arises from improper size checking when copying data from the ADSP shared buffer to the VOC packet data buffer in the Automotive Audio component, leading to memory corruption. Exploitation requires local privileges and no user interaction, potentially allowing attackers to execute arbitrary code with elevated privileges, compromising confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the extensive list of affected Snapdragon versions and platforms increases the risk. European organizations using devices or embedded systems with these Qualcomm components, especially in automotive, mobile, and industrial sectors, face significant security risks. Mitigation requires prompt application of vendor patches once available, strict access controls to limit local privilege escalation, and monitoring for anomalous behavior in affected systems. Countries with strong automotive industries and high adoption of Snapdragon-based devices, such as Germany, France, Italy, and the UK, are particularly at risk. Given the complexity and privileged nature of the vulnerability, the severity is assessed as high, demanding immediate attention from defenders.

AI-Powered Analysis

AILast updated: 12/23/2025, 18:26:04 UTC

Technical Analysis

CVE-2023-33031 is a classic buffer overflow vulnerability (CWE-120) identified in the Automotive Audio component of Qualcomm Snapdragon platforms. The vulnerability occurs due to a failure to properly check the size of input data when copying from the ADSP (Audio Digital Signal Processor) shared buffer to the VOC packet data buffer. This memory corruption flaw can be triggered by a local attacker with limited privileges, potentially leading to arbitrary code execution with elevated privileges. The affected products span a broad range of Qualcomm Snapdragon platforms, including mobile processors, automotive platforms, wearable devices, modems, and IoT components, reflecting the widespread use of Qualcomm chips in diverse technology sectors. The vulnerability's CVSS v3.1 score is 7.8, indicating high severity, with an attack vector requiring local access (AV:L), low attack complexity (AC:L), low privileges (PR:L), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). No patches are currently linked, and no known exploits have been reported in the wild, but the potential for exploitation remains significant due to the broad attack surface and critical nature of the flaw. The vulnerability could allow attackers to compromise device security, execute arbitrary code, and disrupt system operations, especially in safety-critical automotive environments.

Potential Impact

For European organizations, the impact of CVE-2023-33031 is substantial due to the extensive deployment of Qualcomm Snapdragon platforms in mobile devices, automotive systems, and IoT infrastructure. In the automotive sector, where safety and reliability are paramount, exploitation could lead to unauthorized control or disruption of vehicle audio systems, potentially cascading to broader system compromises. Mobile devices used by employees in enterprises could be targeted to gain elevated privileges, leading to data breaches or espionage. Industrial IoT devices incorporating affected Qualcomm chips may also be vulnerable, risking operational disruptions. The confidentiality, integrity, and availability of critical systems could be severely impacted, with potential regulatory and reputational consequences under GDPR and other European cybersecurity frameworks. The lack of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits targeting this vulnerability. Organizations relying on Snapdragon-based hardware must consider this vulnerability a high priority for risk assessment and remediation.

Mitigation Recommendations

1. Monitor Qualcomm and device vendors for official patches and apply them promptly once released. 2. Implement strict access controls and privilege separation on devices using affected Snapdragon platforms to limit local attacker capabilities. 3. Employ runtime protections such as stack canaries, address space layout randomization (ASLR), and control flow integrity (CFI) where supported by the device firmware. 4. Conduct thorough security audits and code reviews of custom software interacting with the ADSP shared buffer to detect and prevent unsafe buffer operations. 5. Use endpoint detection and response (EDR) solutions capable of detecting anomalous behavior indicative of exploitation attempts on mobile and embedded devices. 6. For automotive and industrial systems, isolate critical components and enforce network segmentation to contain potential compromises. 7. Educate users and administrators about the risks of local privilege escalation vulnerabilities and enforce policies to minimize installation of untrusted software that could exploit this flaw. 8. Maintain an inventory of devices using affected Qualcomm platforms to prioritize patching and monitoring efforts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2023-05-17T09:28:53.121Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694194789050fe8508060cba

Added to database: 12/16/2025, 5:18:48 PM

Last enriched: 12/23/2025, 6:26:04 PM

Last updated: 2/7/2026, 12:59:00 PM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats