Skip to main content

CVE-2023-33072: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qualcomm, Inc. Snapdragon

Critical
VulnerabilityCVE-2023-33072cvecve-2023-33072cwe-120
Published: Tue Feb 06 2024 (02/06/2024, 05:47:11 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption in Core while processing control functions.

AI-Powered Analysis

AILast updated: 07/04/2025, 18:40:09 UTC

Technical Analysis

CVE-2023-33072 is a critical buffer overflow vulnerability (CWE-120) identified in Qualcomm Snapdragon chipsets and related platforms. The flaw arises from improper handling of memory during processing of control functions within the core components of affected Qualcomm products. Specifically, the vulnerability is a classic buffer copy without checking the size of the input, which can lead to memory corruption. This type of vulnerability allows an attacker to overwrite memory regions, potentially enabling arbitrary code execution, privilege escalation, or denial of service conditions. The vulnerability affects a broad range of Qualcomm Snapdragon products, including numerous mobile platforms (e.g., Snapdragon 8 Gen series, Snapdragon 7 series, Snapdragon 4 series), modem systems (LTE and 5G modems such as X24, X55, X65, X70), IoT devices, wearable platforms, automotive platforms, and various connectivity modules (FastConnect series, QCA series, WCD series, and others). The CVSS v3.1 base score is 9.3, indicating a critical severity with the vector AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H. This means the attack requires local access (AV:L) but no privileges (PR:N) or user interaction (UI:N), and the impact affects confidentiality, integrity, and availability at a high level with scope changed (S:C). No known exploits are currently reported in the wild, but the extensive list of affected devices and the critical nature of the vulnerability make it a significant security concern. The vulnerability could be exploited by an attacker with local access to the device, such as through a malicious app or compromised local interface, to execute arbitrary code or cause system crashes, potentially compromising device security and user data.

Potential Impact

For European organizations, the impact of CVE-2023-33072 is substantial due to the widespread deployment of Qualcomm Snapdragon chipsets in mobile devices, IoT equipment, automotive systems, and enterprise wireless infrastructure. Many employees and consumers use smartphones and tablets powered by affected Snapdragon platforms, which could be targeted to gain unauthorized access or disrupt services. IoT and automotive devices using these chipsets may also be vulnerable, posing risks to operational technology environments and connected vehicle security. The vulnerability's ability to compromise confidentiality, integrity, and availability means sensitive corporate data could be exposed or manipulated, and critical communications disrupted. Given the local attack vector, insider threats or malware that gains local execution could leverage this flaw to escalate privileges or persist undetected. The broad scope of affected products increases the attack surface across multiple sectors including telecommunications, manufacturing, automotive, and consumer electronics. This could lead to significant operational disruptions, data breaches, and reputational damage for European organizations relying on affected Qualcomm hardware.

Mitigation Recommendations

1. Immediate deployment of vendor-provided patches or firmware updates once available is critical. Organizations should monitor Qualcomm and device manufacturers for security advisories and update schedules. 2. Implement strict application whitelisting and endpoint protection to prevent untrusted local code execution that could exploit this vulnerability. 3. Restrict local access to devices, especially in sensitive environments, by enforcing strong physical security and limiting user privileges. 4. Conduct thorough inventory and asset management to identify all devices using affected Qualcomm Snapdragon platforms, including embedded IoT and automotive systems. 5. Employ network segmentation to isolate vulnerable devices from critical infrastructure and sensitive data stores. 6. Use runtime application self-protection (RASP) and behavior monitoring to detect anomalous memory corruption attempts. 7. For organizations deploying custom firmware or embedded systems, perform code audits and fuzz testing focused on buffer management in control function processing. 8. Educate users and administrators about the risks of installing untrusted applications or connecting unauthorized peripherals that could facilitate local exploitation. 9. Collaborate with device vendors to prioritize patching and validate firmware integrity post-update to ensure vulnerability remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2023-05-17T09:28:53.132Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec2fc

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 6:40:09 PM

Last updated: 8/15/2025, 3:39:18 AM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats