Skip to main content

CVE-2023-33110: CWE-823 Use of Out-of-range Pointer Offset in Qualcomm, Inc. Snapdragon

High
VulnerabilityCVE-2023-33110cvecve-2023-33110cwe-823
Published: Tue Jan 02 2024 (01/02/2024, 05:38:43 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

The session index variable in PCM host voice audio driver initialized before PCM open, accessed during event callback from ADSP and reset during PCM close may lead to race condition between event callback - PCM close and reset session index causing memory corruption.

AI-Powered Analysis

AILast updated: 07/07/2025, 15:55:38 UTC

Technical Analysis

CVE-2023-33110 is a high-severity vulnerability affecting a wide range of Qualcomm Snapdragon platforms and associated modem and audio components. The root cause is a race condition in the PCM (Pulse Code Modulation) host voice audio driver. Specifically, the session index variable is initialized before the PCM device is opened, accessed asynchronously during event callbacks from the ADSP (Audio Digital Signal Processor), and reset during PCM close operations. This timing discrepancy can cause a race condition between the event callback and the PCM close/reset sequence, leading to out-of-range pointer offsets and subsequent memory corruption. The vulnerability is classified under CWE-823 (Use of Out-of-range Pointer Offset), which typically results in undefined behavior including potential memory corruption, crashes, or arbitrary code execution. The affected products include an extensive list of Qualcomm Snapdragon SoCs, modems, audio platforms, and wearable platforms spanning multiple generations and device categories, from mobile phones to IoT and automotive platforms. The CVSS v3.1 score is 7.8 (high), reflecting that the vulnerability requires local access with low privileges and no user interaction, but can lead to high confidentiality, integrity, and availability impacts. Although no known exploits are currently reported in the wild, the broad impact surface and potential for memory corruption make this a significant threat. The vulnerability could be exploited by an attacker with local access to the device to cause denial of service or potentially escalate privileges or execute arbitrary code within the audio driver context.

Potential Impact

For European organizations, this vulnerability poses a substantial risk due to the widespread use of Qualcomm Snapdragon chipsets in smartphones, IoT devices, automotive systems, and other embedded platforms. Confidentiality could be compromised if an attacker leverages the memory corruption to access sensitive audio data or other protected memory regions. Integrity and availability are also at risk, as exploitation could lead to system crashes or persistent denial of service, disrupting critical communications or device functionality. Enterprises relying on mobile devices for secure communications, automotive manufacturers integrating Snapdragon-based telematics, and IoT deployments using affected modems could face operational disruptions or data breaches. The vulnerability's local access requirement limits remote exploitation but does not eliminate risk, especially in environments where devices are physically accessible or where malicious applications could be installed. Given the critical role of mobile and embedded devices in European business and infrastructure, this vulnerability could impact sectors such as telecommunications, automotive, manufacturing, and public services.

Mitigation Recommendations

1. Apply official patches and firmware updates from Qualcomm or device manufacturers as soon as they become available to address the race condition in the PCM host voice audio driver. 2. For organizations managing fleets of devices, implement strict device management policies to prevent installation of unauthorized or untrusted applications that could exploit local vulnerabilities. 3. Employ runtime protections such as memory corruption mitigations (e.g., ASLR, DEP) where supported by the device firmware to reduce exploitation likelihood. 4. Monitor device behavior for abnormal crashes or audio subsystem errors that could indicate exploitation attempts. 5. For critical environments, consider network segmentation and physical security controls to limit local access to vulnerable devices. 6. Collaborate with vendors to receive timely vulnerability disclosures and updates, ensuring rapid deployment of fixes. 7. Conduct security assessments on embedded systems and IoT devices using affected Qualcomm platforms to identify and remediate exposure. 8. Educate users and administrators about the risks of installing untrusted software on devices with Qualcomm Snapdragon chipsets.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2023-05-17T09:28:53.144Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682de1cdc4522896dcbffb27

Added to database: 5/21/2025, 2:23:09 PM

Last enriched: 7/7/2025, 3:55:38 PM

Last updated: 7/28/2025, 5:39:50 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats