Skip to main content

CVE-2023-33092: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qualcomm, Inc. Snapdragon

High
VulnerabilityCVE-2023-33092cvecve-2023-33092cwe-120
Published: Tue Dec 05 2023 (12/05/2023, 03:04:24 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while processing pin reply in Bluetooth, when pin code received from APP layer is greater than expected size.

AI-Powered Analysis

AILast updated: 07/08/2025, 03:27:20 UTC

Technical Analysis

CVE-2023-33092 is a high-severity buffer overflow vulnerability (CWE-120) found in various Qualcomm Snapdragon platforms and related wireless connectivity chipsets. The flaw arises from improper handling of the Bluetooth PIN reply processing, specifically when the PIN code received from the application layer exceeds the expected size. This unchecked buffer copy leads to memory corruption, which can be exploited to execute arbitrary code, cause denial of service, or escalate privileges. The vulnerability affects a broad range of Qualcomm products, including numerous Snapdragon mobile platforms (from Snapdragon 215 up to Snapdragon 8+ Gen 2), FastConnect wireless subsystems, and multiple wireless connectivity modules (WCD, WCN, WSA series). The CVSS v3.1 base score is 8.4, indicating a high severity level, with an attack vector classified as local (AV:L), requiring no privileges (PR:N) or user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). Although exploitation requires local access, the extensive deployment of affected Snapdragon chipsets in smartphones, tablets, laptops, and IoT devices worldwide makes this vulnerability significant. The flaw could be triggered by a malicious application or component within the device that sends an oversized Bluetooth PIN code, leading to memory corruption and potential arbitrary code execution within the Bluetooth stack or kernel context. No known exploits are currently reported in the wild, and no patches are linked yet, indicating that mitigation and detection efforts are critical to prevent exploitation.

Potential Impact

For European organizations, the impact of CVE-2023-33092 is considerable due to the widespread use of Qualcomm Snapdragon chipsets in mobile devices, laptops, and embedded systems used in enterprise environments. Compromise of devices through this vulnerability could lead to unauthorized access to sensitive corporate data, disruption of communications, and potential lateral movement within networks if compromised devices are connected to corporate infrastructure. The vulnerability's ability to affect confidentiality, integrity, and availability means attackers could exfiltrate data, implant persistent malware, or cause device outages. This is particularly concerning for sectors relying heavily on mobile connectivity and Bluetooth peripherals, such as finance, healthcare, and critical infrastructure. Additionally, the local attack vector implies that attackers need some form of local access, which could be achieved via malicious apps or insider threats, emphasizing the need for strict device management and application control policies. The lack of current known exploits provides a window for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting installation of untrusted or unsigned applications on devices using affected Qualcomm chipsets to prevent local attackers from triggering the vulnerability via malicious Bluetooth PIN codes. 2. Organizations should enforce strict mobile device management (MDM) policies that include application whitelisting and regular security audits of installed apps. 3. Disable Bluetooth functionality on devices where it is not required, especially in sensitive environments, to reduce the attack surface. 4. Monitor device logs and Bluetooth subsystem behavior for anomalies indicative of buffer overflow attempts or crashes. 5. Coordinate with device manufacturers and Qualcomm for timely deployment of firmware or software patches once available. 6. Educate users about the risks of installing untrusted applications and the importance of applying updates promptly. 7. For enterprise environments, consider network segmentation to isolate mobile devices from critical systems to limit potential lateral movement. 8. Employ endpoint detection and response (EDR) solutions capable of detecting abnormal Bluetooth stack behavior or memory corruption events.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2023-05-17T09:28:53.142Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683864b2182aa0cae27f9cd9

Added to database: 5/29/2025, 1:44:18 PM

Last enriched: 7/8/2025, 3:27:20 AM

Last updated: 8/5/2025, 2:19:21 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats