Skip to main content

CVE-2023-33085: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qualcomm, Inc. Snapdragon

High
VulnerabilityCVE-2023-33085cvecve-2023-33085cwe-120
Published: Tue Jan 02 2024 (01/02/2024, 05:38:37 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption in wearables while processing data from AON.

AI-Powered Analysis

AILast updated: 07/04/2025, 06:40:55 UTC

Technical Analysis

CVE-2023-33085 is a high-severity buffer overflow vulnerability (CWE-120) affecting a broad range of Qualcomm Snapdragon platforms and related chipsets, including mobile, wearable, automotive, and IoT devices. The vulnerability arises from improper handling of input data size during memory operations in the Always-On Network (AON) processing components of these devices, leading to memory corruption. Specifically, the flaw is a classic buffer copy without checking the size of the input, which can result in overwriting adjacent memory regions. This can cause arbitrary code execution, privilege escalation, or denial of service. The affected products span numerous Snapdragon mobile platforms (e.g., Snapdragon 888, 8 Gen 1, 7c+ Gen 3 Compute), FastConnect wireless subsystems, automotive platforms, wearable platforms (e.g., Snapdragon W5+ Gen 1), and various wireless connectivity modules (e.g., QCA series, WCD series). The vulnerability requires local privileges (CVSS vector AV:L/PR:L/UI:N), meaning an attacker must have some level of access to the device but does not require user interaction. Exploitation could lead to full compromise of confidentiality, integrity, and availability of the affected device. No known public exploits are reported yet, and Qualcomm has not published patches at the time of this report. Given the extensive list of affected chipsets integrated into millions of consumer and industrial devices worldwide, this vulnerability poses a significant risk if exploited.

Potential Impact

For European organizations, the impact of CVE-2023-33085 is substantial due to the widespread use of Qualcomm Snapdragon chipsets in smartphones, wearables, automotive systems, and IoT devices. Confidentiality breaches could expose sensitive corporate and personal data, while integrity violations might allow attackers to manipulate device behavior or firmware. Availability impacts could disrupt critical services, especially in automotive and industrial IoT contexts. Enterprises relying on mobile devices for secure communications or wearables for health monitoring could face operational disruptions or data leaks. The vulnerability’s local attack vector suggests that attackers would need some foothold on the device, but given the prevalence of these chipsets in consumer and enterprise devices, lateral movement or insider threats could leverage this flaw to escalate privileges or deploy persistent malware. The lack of available patches increases the window of exposure, necessitating immediate risk management. Additionally, automotive platforms affected could impact connected vehicle security, raising safety concerns. Overall, this vulnerability threatens the security posture of European organizations across sectors including telecommunications, automotive, healthcare, and manufacturing.

Mitigation Recommendations

1. Immediate inventory and identification of devices using affected Qualcomm Snapdragon chipsets within the organization’s environment, including mobile devices, wearables, automotive systems, and IoT devices. 2. Apply vendor-supplied patches or firmware updates as soon as they become available from Qualcomm or device manufacturers. 3. Implement strict access controls to limit local access to devices, reducing the risk of local privilege exploitation. 4. Employ endpoint detection and response (EDR) solutions capable of monitoring for anomalous memory corruption or exploitation behaviors on affected devices. 5. For automotive and industrial IoT deployments, enforce network segmentation to isolate vulnerable devices from critical infrastructure. 6. Educate users and administrators about the risks of local exploitation and the importance of device security hygiene. 7. Monitor threat intelligence feeds for emerging exploit code or attack campaigns targeting this vulnerability. 8. Where possible, disable or restrict Always-On Network (AON) features if they are not essential, to reduce the attack surface. 9. Collaborate with device vendors and Qualcomm representatives to obtain timely updates and guidance. 10. Conduct penetration testing and vulnerability assessments focusing on local privilege escalation vectors on affected devices to identify potential exploitation paths.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2023-05-17T09:28:53.141Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0dc1182aa0cae27ff2f8

Added to database: 6/3/2025, 2:59:13 PM

Last enriched: 7/4/2025, 6:40:55 AM

Last updated: 8/13/2025, 7:41:02 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats