Skip to main content

CVE-2023-33108: CWE-416 Use After Free in Qualcomm, Inc. Snapdragon

High
VulnerabilityCVE-2023-33108cvecve-2023-33108cwe-416
Published: Tue Jan 02 2024 (01/02/2024, 05:38:40 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption in Graphics Driver when destroying a context with KGSL_GPU_AUX_COMMAND_TIMELINE objects queued.

AI-Powered Analysis

AILast updated: 07/04/2025, 06:40:23 UTC

Technical Analysis

CVE-2023-33108 is a high-severity use-after-free vulnerability (CWE-416) found in the graphics driver component of Qualcomm Snapdragon platforms. The flaw arises during the destruction of a context when KGSL_GPU_AUX_COMMAND_TIMELINE objects are queued, leading to memory corruption. This vulnerability affects a broad range of Qualcomm Snapdragon chipsets and platforms, including mobile SoCs (e.g., QAM8255P, QAM8295P), wearable platforms (Snapdragon W5+ Gen 1), automotive platforms (SA8155P, SA8195P), and video collaboration platforms. The vulnerability has a CVSS v3.1 score of 8.4, indicating high severity, with an attack vector classified as local (AV:L), requiring no privileges (PR:N) or user interaction (UI:N). The impact includes high confidentiality, integrity, and availability consequences, meaning exploitation could allow an attacker to execute arbitrary code, escalate privileges, or cause denial of service by corrupting memory. Although no known exploits are currently reported in the wild, the vulnerability’s nature and broad affected product range make it a significant risk. The vulnerability is rooted in improper memory management within the GPU driver, specifically when handling auxiliary command timelines during context teardown, which can lead to use-after-free conditions and subsequent memory corruption. This can be leveraged by a local attacker to compromise device security, potentially gaining control over the affected system or causing system instability.

Potential Impact

For European organizations, the impact of CVE-2023-33108 is substantial, especially those relying on devices powered by affected Qualcomm Snapdragon chipsets. This includes smartphones, tablets, automotive infotainment systems, wearable devices, and specialized video collaboration hardware. Exploitation could lead to unauthorized access to sensitive data, disruption of critical services, and compromise of device integrity. In sectors such as finance, healthcare, automotive, and critical infrastructure, where mobile and embedded devices are integral, this vulnerability could be exploited to bypass security controls, execute arbitrary code, or cause denial of service. The local attack vector implies that attackers need some level of access to the device, which could be achieved through malicious apps or insider threats. Given the widespread use of Qualcomm Snapdragon platforms in consumer and enterprise devices across Europe, the vulnerability poses a risk to data confidentiality and operational continuity. Additionally, automotive platforms affected could impact connected vehicles, raising safety and privacy concerns. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for mitigation due to the vulnerability’s high severity and potential for future exploitation.

Mitigation Recommendations

European organizations should implement a multi-layered mitigation strategy: 1) Promptly apply security patches and firmware updates from Qualcomm and device manufacturers as they become available, prioritizing devices running affected Snapdragon platforms. 2) Enforce strict application vetting and control policies to prevent installation of untrusted or malicious applications that could exploit the vulnerability locally. 3) Employ mobile device management (MDM) solutions to monitor device integrity and enforce security configurations, including restricting local access to sensitive device components. 4) For automotive and embedded systems, coordinate with vendors to ensure timely updates and consider network segmentation to isolate vulnerable devices from critical infrastructure. 5) Increase user awareness about the risks of installing unauthorized software and the importance of updating devices. 6) Monitor security advisories and threat intelligence feeds for emerging exploit techniques targeting this vulnerability. 7) Where possible, implement runtime protections such as memory corruption mitigations (e.g., ASLR, DEP) and leverage hardware security features provided by Qualcomm platforms to reduce exploitation likelihood. These steps go beyond generic advice by focusing on device-specific controls, vendor coordination, and operational security tailored to the affected platforms and environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2023-05-17T09:28:53.143Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0dc1182aa0cae27ff2fa

Added to database: 6/3/2025, 2:59:13 PM

Last enriched: 7/4/2025, 6:40:23 AM

Last updated: 7/30/2025, 10:48:22 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats