Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-33074: CWE-416 Use After Free in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2023-33074cvecve-2023-33074cwe-416
Published: Tue Nov 07 2023 (11/07/2023, 05:26:56 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

CVE-2023-33074 is a high-severity use-after-free vulnerability in Qualcomm Snapdragon chipsets affecting audio components when a subsystem restart (SSR) event occurs after music playback stops. It can lead to memory corruption, potentially allowing an attacker to execute arbitrary code or cause denial of service without requiring user interaction or privileges. The vulnerability impacts a wide range of Snapdragon platforms, including mobile, wearable, and XR devices. No known exploits are currently reported in the wild. European organizations using devices with affected Snapdragon chipsets, especially in critical communication or IoT infrastructure, could face confidentiality, integrity, and availability risks. Mitigation requires timely firmware and software updates from device manufacturers and careful monitoring of SSR event handling. Countries with high smartphone and IoT adoption, such as Germany, France, and the UK, are most likely to be affected due to market penetration and strategic importance. Given the ease of exploitation and broad impact, this vulnerability is rated as high severity.

AI-Powered Analysis

AILast updated: 12/23/2025, 18:26:58 UTC

Technical Analysis

CVE-2023-33074 is a use-after-free vulnerability (CWE-416) identified in the audio subsystem of Qualcomm Snapdragon chipsets. The flaw occurs when a subsystem restart (SSR) event is triggered after music playback has stopped, leading to memory corruption. This memory corruption can be exploited to execute arbitrary code, escalate privileges, or cause denial of service conditions. The vulnerability affects a broad range of Qualcomm products, including FastConnect modules (e.g., 6700, 6900, 7800), multiple QAM and QCA series chipsets, Snapdragon mobile platforms from 680 4G to 8+ Gen 2, wearable platforms like Snapdragon W5+ Gen 1, and XR platforms such as Snapdragon XR2 5G. The CVSS v3.1 score is 8.4 (high), with an attack vector of local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability does not require user interaction or privileges, making it easier to exploit if an attacker has local access. No public exploits have been reported yet, but the wide range of affected devices and high impact make it a critical concern. The root cause is improper memory management in the audio component triggered by SSR events, which are system-level resets of subsystems often used to recover from faults. This vulnerability highlights the risks in complex SoC (System on Chip) environments where multiple subsystems interact and require robust memory handling.

Potential Impact

For European organizations, the impact of CVE-2023-33074 can be significant, particularly for those relying on devices powered by affected Qualcomm Snapdragon chipsets. This includes smartphones, tablets, wearable devices, XR platforms, and IoT devices used in enterprise, industrial, and critical infrastructure contexts. Exploitation could lead to unauthorized code execution, data leakage, or denial of service, compromising confidentiality, integrity, and availability of sensitive information and services. In sectors such as finance, healthcare, telecommunications, and government, where secure communications and device reliability are paramount, this vulnerability could facilitate espionage, disruption of services, or lateral movement within networks. The local attack vector implies that attackers need some level of access to the device, which could be achieved through malicious apps, insider threats, or physical access. The absence of required user interaction lowers the barrier for exploitation once local access is obtained. The broad range of affected Snapdragon platforms means that many consumer and enterprise devices in Europe are potentially vulnerable, increasing the attack surface and risk exposure.

Mitigation Recommendations

Mitigation of CVE-2023-33074 requires coordinated efforts between device manufacturers, software vendors, and end users. Specific recommendations include: 1) Promptly apply firmware and software updates provided by device OEMs and Qualcomm that address this vulnerability; 2) Monitor vendor advisories and security bulletins for patches related to affected Snapdragon platforms; 3) Implement strict application whitelisting and privilege restrictions to limit local access that could trigger SSR events maliciously; 4) Employ runtime protections such as memory corruption mitigations (e.g., ASLR, DEP) where supported by the device; 5) For enterprise deployments, restrict physical and network access to devices to reduce risk of local exploitation; 6) Conduct security audits and penetration testing focusing on audio subsystem interactions and SSR event handling; 7) Educate users about risks of installing untrusted applications that could exploit local vulnerabilities; 8) Utilize endpoint detection and response (EDR) tools to identify anomalous behavior indicative of exploitation attempts. Since no public exploits are known yet, proactive patching and access control are critical to prevent future attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2023-05-17T09:28:53.132Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694194799050fe8508060cf1

Added to database: 12/16/2025, 5:18:49 PM

Last enriched: 12/23/2025, 6:26:58 PM

Last updated: 2/7/2026, 4:09:31 AM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats