Skip to main content

CVE-2023-33070: CWE-287 Improper Authentication in Qualcomm, Inc. Snapdragon

High
VulnerabilityCVE-2023-33070cvecve-2023-33070cwe-287
Published: Tue Dec 05 2023 (12/05/2023, 03:04:12 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Transient DOS in Automotive OS due to improper authentication to the secure IO calls.

AI-Powered Analysis

AILast updated: 07/08/2025, 03:27:07 UTC

Technical Analysis

CVE-2023-33070 is a high-severity vulnerability identified in multiple Qualcomm Snapdragon platforms and related chipsets, primarily impacting automotive operating systems and other embedded platforms. The root cause is improper authentication (CWE-287) in secure IO calls, which allows an attacker to trigger a transient denial-of-service (DoS) condition. Specifically, the vulnerability arises because the affected Snapdragon components do not adequately verify the authenticity of requests to secure IO interfaces, enabling unauthorized entities to disrupt normal operations temporarily. The affected products span a broad range of Qualcomm hardware, including automotive platforms (e.g., AQT1000, AR8031), mobile platforms (e.g., Snapdragon 660, 675, 730, 855), wireless connectivity modules (e.g., QCA series, WCN series), and specialized platforms for robotics and video collaboration. The CVSS v3.1 base score is 7.1, reflecting a high severity level, with an attack vector classified as local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope is changed (S:C), indicating that exploitation affects components beyond the initially vulnerable security scope. The impact is limited to availability (A:H), with no direct confidentiality or integrity compromise. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is particularly critical in automotive OS environments where transient DoS could disrupt vehicle functions or safety-critical systems. Given the extensive list of affected hardware, the vulnerability potentially impacts a wide array of devices from mobile phones to automotive and IoT devices that rely on Qualcomm Snapdragon chipsets and connectivity modules.

Potential Impact

For European organizations, the impact of CVE-2023-33070 is significant, especially those involved in automotive manufacturing, telematics, and critical infrastructure relying on Qualcomm Snapdragon-based embedded systems. The transient DoS could lead to temporary loss of functionality in automotive operating systems, potentially affecting vehicle safety features, navigation, or communication modules. This could disrupt supply chains, fleet management, and connected vehicle services. Mobile devices using affected Snapdragon platforms may experience service interruptions, impacting business communications and operations. The vulnerability's exploitation does not compromise data confidentiality or integrity directly but can degrade system availability, which in safety-critical automotive contexts can translate into safety risks or operational downtime. European automotive OEMs and Tier 1 suppliers integrating Qualcomm chipsets into their products must consider this vulnerability in their risk assessments. Additionally, industries deploying IoT devices with affected chipsets (e.g., smart audio platforms, robotics) could face operational disruptions. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits targeting local access scenarios. The broad range of affected devices and platforms increases the attack surface within European markets, where Qualcomm Snapdragon technology is widely used.

Mitigation Recommendations

1. Immediate inventory and identification of all Qualcomm Snapdragon-based devices and platforms within the organization, focusing on automotive OS and embedded systems. 2. Engage with Qualcomm and device vendors to obtain and apply security patches or firmware updates as soon as they become available. 3. Implement strict access controls and network segmentation to limit local access to vulnerable devices, reducing the risk of exploitation since the attack vector is local. 4. Monitor device logs and system behavior for signs of transient DoS or unusual disruptions in secure IO operations. 5. For automotive systems, integrate fail-safe mechanisms that maintain critical functions even during transient DoS conditions to mitigate safety risks. 6. Collaborate with suppliers to ensure secure update mechanisms are in place for embedded devices to facilitate timely patch deployment. 7. Conduct penetration testing and security assessments focusing on local access vectors to identify potential exploitation paths. 8. Educate technical teams about the vulnerability specifics to enhance detection and response capabilities. 9. Consider deploying runtime protection or anomaly detection tools that can identify and block unauthorized secure IO calls. 10. Maintain up-to-date asset management and vulnerability scanning to track affected hardware and firmware versions continuously.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2023-05-17T09:28:53.131Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683864b2182aa0cae27f9cd7

Added to database: 5/29/2025, 1:44:18 PM

Last enriched: 7/8/2025, 3:27:07 AM

Last updated: 8/2/2025, 12:25:33 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats