Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-33059: CWE-191 Integer Underflow (Wrap or Wraparound) in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2023-33059cvecve-2023-33059cwe-191
Published: Tue Nov 07 2023 (11/07/2023, 05:26:54 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

CVE-2023-33059 is a high-severity integer underflow vulnerability (CWE-191) affecting a wide range of Qualcomm Snapdragon platforms and related chipsets. The flaw occurs due to improper handling of VOC packet data in the audio processing component of the ADSP, leading to memory corruption. Exploitation requires local privileges and no user interaction, potentially allowing attackers to compromise confidentiality, integrity, and availability of affected devices. This vulnerability impacts numerous Snapdragon-based devices, including mobile phones, IoT devices, automotive platforms, and wearable technology. Although no known exploits are currently reported in the wild, the broad range of affected products and the high CVSS score (7. 8) indicate significant risk. European organizations relying on Snapdragon-powered devices, especially in telecommunications, automotive, and industrial IoT sectors, may face operational and security risks. Mitigation requires timely patching from device manufacturers and applying strict input validation and memory safety checks in audio processing modules. Countries with high adoption of Snapdragon devices and advanced automotive or IoT industries, such as Germany, France, the UK, and the Nordics, are most likely to be affected. Due to the complexity and privilege requirements, exploitation is moderately difficult but impactful, warranting urgent attention from defenders.

AI-Powered Analysis

AILast updated: 12/23/2025, 18:26:40 UTC

Technical Analysis

CVE-2023-33059 is an integer underflow vulnerability classified under CWE-191 found in Qualcomm Snapdragon chipsets' audio processing subsystem, specifically when handling VOC packet data from the Audio Digital Signal Processor (ADSP). The vulnerability arises from an integer underflow condition that leads to memory corruption, which can be exploited to execute arbitrary code or cause denial of service. The affected components span a vast array of Qualcomm products, including numerous Snapdragon mobile platforms, IoT modems, automotive platforms, wearable devices, and connectivity modules such as FastConnect and WCN series. The flaw requires local privilege (PR:L) to exploit, does not require user interaction (UI:N), and affects confidentiality, integrity, and availability (C:H/I:H/A:H). The CVSS 3.1 score of 7.8 reflects the high impact but limited attack vector (local). No public patches or known exploits are currently available, but the extensive list of affected devices suggests a wide attack surface. The root cause is improper boundary checks or arithmetic operations on packet data sizes, leading to wraparound and subsequent memory corruption during audio data processing. This can allow attackers with local access to escalate privileges or disrupt device functionality. Given the critical role of Snapdragon chipsets in mobile and embedded systems, exploitation could compromise sensitive data or disrupt critical services.

Potential Impact

For European organizations, the impact of CVE-2023-33059 is significant due to the widespread use of Qualcomm Snapdragon chipsets in smartphones, IoT devices, automotive systems, and industrial equipment. Confidentiality breaches could expose sensitive corporate or personal data, while integrity violations might allow attackers to alter device behavior or firmware. Availability impacts could disrupt communication, operational technology, or safety-critical automotive functions. Telecommunications providers, automotive manufacturers, and enterprises deploying IoT solutions are particularly at risk. The vulnerability could facilitate local privilege escalation attacks, potentially enabling attackers to bypass security controls or implant persistent malware. Disruption in automotive or industrial IoT environments could have safety and operational consequences. The lack of known exploits suggests a window for proactive mitigation, but the broad device footprint means many endpoints could be vulnerable, increasing the risk of targeted attacks or supply chain compromises within Europe.

Mitigation Recommendations

Mitigation should focus on coordinated efforts between device manufacturers, service providers, and end-users. Qualcomm and OEMs must prioritize releasing firmware and software patches that address the integer underflow by implementing robust input validation and safe arithmetic operations in the audio processing code. European organizations should inventory devices using affected Snapdragon platforms and apply updates as soon as patches become available. Where patching is delayed, organizations should restrict local access to vulnerable devices, enforce strict privilege separation, and monitor for anomalous audio subsystem behavior or memory corruption indicators. Employing endpoint detection and response (EDR) solutions capable of detecting exploitation attempts targeting audio processing components can enhance defense. For IoT and automotive deployments, network segmentation and strict access controls can limit attacker movement. Security teams should also engage with vendors to confirm patch status and validate remediation. Finally, raising user awareness about the risks of local privilege escalation and enforcing device hardening policies will reduce exploitation likelihood.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2023-05-17T09:28:53.126Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694194789050fe8508060cc0

Added to database: 12/16/2025, 5:18:48 PM

Last enriched: 12/23/2025, 6:26:40 PM

Last updated: 2/7/2026, 7:14:23 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats