Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-33107: CWE-190 Integer Overflow or Wraparound in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2023-33107cvecve-2023-33107cwe-190
Published: Tue Dec 05 2023 (12/05/2023, 03:04:29 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

CVE-2023-33107 is a high-severity integer overflow vulnerability in Qualcomm Snapdragon platforms affecting a wide range of mobile, IoT, automotive, and wearable devices. The flaw occurs in the Graphics Linux driver during IOCTL calls when assigning shared virtual memory regions, leading to memory corruption. Exploitation requires local access and no user interaction or privileges, potentially allowing attackers to execute arbitrary code or cause denial of service. Although no known exploits are reported, the broad product impact and high CVSS score indicate significant risk. European organizations using devices with affected Snapdragon chipsets, especially in telecommunications, automotive, and IoT sectors, face confidentiality, integrity, and availability threats. Mitigation involves applying vendor patches once available, restricting local access, and monitoring for anomalous behavior. Countries with high smartphone penetration and automotive industries, such as Germany, France, and the UK, are most likely impacted. The vulnerability's ease of exploitation without privileges and its broad scope warrant a high severity rating. Defenders should prioritize patch management and device security controls to mitigate potential exploitation.

AI-Powered Analysis

AILast updated: 10/28/2025, 23:49:28 UTC

Technical Analysis

CVE-2023-33107 is an integer overflow vulnerability classified under CWE-190 found in the Graphics Linux driver component of Qualcomm Snapdragon platforms. The vulnerability arises during the assignment of shared virtual memory regions via IOCTL system calls, where improper handling of integer values leads to overflow or wraparound conditions. This results in memory corruption, which can be exploited to achieve arbitrary code execution, privilege escalation, or denial of service on affected devices. The vulnerability affects a vast array of Qualcomm Snapdragon products, including mobile platforms (e.g., Snapdragon 8 Gen 1, Snapdragon 888), IoT modems, automotive platforms, wearable devices, and connectivity modules. The flaw requires local attacker access but no privileges or user interaction, making it easier for malicious local applications or compromised processes to exploit. The CVSS v3.1 score is 8.4 (high), reflecting the vulnerability's potential to impact confidentiality, integrity, and availability severely. No public exploits are currently known, but the extensive list of affected platforms and the critical nature of the flaw necessitate urgent attention. The vulnerability was publicly disclosed in December 2023, with Qualcomm assigned as the vendor responsible for patches, though no patch links are currently provided. The flaw's exploitation could compromise device security, leading to unauthorized access or disruption of services on devices widely used in consumer electronics, industrial IoT, automotive systems, and telecommunications infrastructure.

Potential Impact

For European organizations, the impact of CVE-2023-33107 is significant due to the widespread use of Qualcomm Snapdragon chipsets in smartphones, IoT devices, automotive systems, and industrial equipment. Confidentiality risks include potential data leakage from compromised devices, while integrity risks involve unauthorized code execution or manipulation of device operations. Availability could be affected by denial-of-service conditions triggered by memory corruption. Telecommunications providers and enterprises relying on mobile and IoT infrastructure may experience service disruptions or breaches. Automotive manufacturers and suppliers using affected Snapdragon automotive platforms could face safety and operational risks. The vulnerability's local access requirement limits remote exploitation but does not eliminate risk in environments where devices are accessible to insiders or compromised applications. Given the critical role of mobile and embedded devices in European digital infrastructure, exploitation could undermine trust and operational continuity. The lack of current public exploits provides a window for mitigation, but the high severity and broad impact necessitate proactive defense measures.

Mitigation Recommendations

1. Apply official Qualcomm patches immediately once released for all affected Snapdragon platforms and devices. 2. Restrict local access to devices by enforcing strict user permissions and application sandboxing to prevent untrusted code from invoking vulnerable IOCTL calls. 3. Employ endpoint detection and response (EDR) solutions to monitor for anomalous behavior indicative of exploitation attempts, such as unusual IOCTL activity or memory corruption symptoms. 4. For organizations deploying IoT or automotive devices, implement network segmentation and device hardening to limit exposure to potentially malicious local actors. 5. Coordinate with device manufacturers and service providers to ensure firmware and software updates are deployed promptly. 6. Conduct regular security audits and penetration testing focusing on local privilege escalation vectors. 7. Educate users and administrators about the risks of installing untrusted applications that could exploit local vulnerabilities. 8. Maintain an inventory of devices with affected Snapdragon chipsets to prioritize patching and monitoring efforts. 9. Consider deploying runtime application self-protection (RASP) or similar technologies on critical devices to detect and block exploitation attempts in real time.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2023-05-17T09:28:53.143Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9a9247d717aace21ed5

Added to database: 10/21/2025, 7:06:17 PM

Last enriched: 10/28/2025, 11:49:28 PM

Last updated: 10/30/2025, 3:05:54 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats