Skip to main content

CVE-2023-33057: CWE-20 Improper Input Validation in Qualcomm, Inc. Snapdragon

High
VulnerabilityCVE-2023-33057cvecve-2023-33057cwe-20
Published: Tue Feb 06 2024 (02/06/2024, 05:47:00 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Transient DOS in Multi-Mode Call Processor while processing UE policy container.

AI-Powered Analysis

AILast updated: 07/05/2025, 09:27:14 UTC

Technical Analysis

CVE-2023-33057 is a high-severity vulnerability identified in multiple Qualcomm Snapdragon platforms and associated modem and connectivity chipsets. The root cause is improper input validation (CWE-20) in the Multi-Mode Call Processor component while processing the User Equipment (UE) policy container. This improper validation can lead to a transient Denial of Service (DoS) condition. Specifically, when the vulnerable component processes malformed or unexpected input within the UE policy container, it can cause the affected system to temporarily become unresponsive or crash, disrupting normal operation. The vulnerability affects a broad range of Qualcomm products, including many Snapdragon mobile platforms (from Snapdragon 4 Gen 1 up to Snapdragon 8+ Gen 2), various FastConnect Wi-Fi/Bluetooth combo chipsets, multiple QCA series Wi-Fi chipsets, Snapdragon Auto 5G Modem-RF systems, and other related connectivity and multimedia platforms. The CVSS v3.1 base score is 7.5, indicating high severity, with attack vector being network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and the impact limited to availability (A:H) without affecting confidentiality or integrity. No known exploits are currently reported in the wild, and no patches are linked yet. The vulnerability could be exploited remotely without authentication, making it a significant risk for devices using these chipsets, potentially causing service interruptions in mobile communications or connected devices relying on these platforms.

Potential Impact

For European organizations, the impact of this vulnerability could be substantial, especially for enterprises and service providers relying on mobile devices, IoT deployments, automotive telematics, and wireless infrastructure that incorporate Qualcomm Snapdragon chipsets. A transient DoS could disrupt critical communications, degrade service availability, and impact operational continuity. Industries such as telecommunications, automotive, healthcare (with connected medical devices), and manufacturing (with IoT sensors and controllers) could experience interruptions. Additionally, mobile users in Europe relying on affected smartphones or devices might face temporary service outages, which could affect business operations, emergency communications, and customer trust. Given the widespread use of Qualcomm Snapdragon chipsets in consumer and industrial devices, the scope of impact is broad. However, since the vulnerability does not affect confidentiality or integrity, the primary concern is availability degradation rather than data breaches or unauthorized access.

Mitigation Recommendations

Organizations should prioritize the following mitigation steps: 1) Inventory and identify all devices and infrastructure components using affected Qualcomm Snapdragon chipsets or related modules. 2) Monitor vendor advisories from Qualcomm and device manufacturers for official patches or firmware updates addressing CVE-2023-33057 and apply them promptly once available. 3) Implement network-level protections such as filtering or anomaly detection to identify and block malformed UE policy container packets that could trigger the DoS, if feasible. 4) For critical systems, consider deploying redundancy and failover mechanisms to maintain service availability in case of transient DoS events. 5) Engage with device vendors to confirm patch status and timelines, especially for embedded or automotive platforms where updates may be less frequent. 6) Educate IT and security teams about the vulnerability to ensure rapid incident response if service disruptions occur. 7) Where possible, restrict exposure of vulnerable devices to untrusted networks or isolate them within segmented network zones to reduce attack surface. These targeted actions go beyond generic advice by focusing on inventory management, vendor coordination, network filtering of specific malformed inputs, and operational continuity planning.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2023-05-17T09:28:53.126Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd8d25

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/5/2025, 9:27:14 AM

Last updated: 8/8/2025, 12:03:37 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats