CVE-2023-33110: CWE-823 Use of Out-of-range Pointer Offset in Qualcomm, Inc. Snapdragon
The session index variable in PCM host voice audio driver initialized before PCM open, accessed during event callback from ADSP and reset during PCM close may lead to race condition between event callback - PCM close and reset session index causing memory corruption.
AI Analysis
Technical Summary
CVE-2023-33110 is a high-severity vulnerability affecting a wide range of Qualcomm Snapdragon platforms and associated modem and audio components. The root cause is a race condition in the PCM (Pulse Code Modulation) host voice audio driver. Specifically, the session index variable is initialized before the PCM device is opened, accessed asynchronously during event callbacks from the ADSP (Audio Digital Signal Processor), and reset during PCM close operations. This timing discrepancy can cause a race condition between the event callback and the PCM close/reset sequence, leading to out-of-range pointer offsets and subsequent memory corruption. The vulnerability is classified under CWE-823 (Use of Out-of-range Pointer Offset), which typically results in undefined behavior including potential memory corruption, crashes, or arbitrary code execution. The affected products include an extensive list of Qualcomm Snapdragon SoCs, modems, audio platforms, and wearable platforms spanning multiple generations and device categories, from mobile phones to IoT and automotive platforms. The CVSS v3.1 score is 7.8 (high), reflecting that the vulnerability requires local access with low privileges and no user interaction, but can lead to high confidentiality, integrity, and availability impacts. Although no known exploits are currently reported in the wild, the broad impact surface and potential for memory corruption make this a significant threat. The vulnerability could be exploited by an attacker with local access to the device to cause denial of service or potentially escalate privileges or execute arbitrary code within the audio driver context.
Potential Impact
For European organizations, this vulnerability poses a substantial risk due to the widespread use of Qualcomm Snapdragon chipsets in smartphones, IoT devices, automotive systems, and other embedded platforms. Confidentiality could be compromised if an attacker leverages the memory corruption to access sensitive audio data or other protected memory regions. Integrity and availability are also at risk, as exploitation could lead to system crashes or persistent denial of service, disrupting critical communications or device functionality. Enterprises relying on mobile devices for secure communications, automotive manufacturers integrating Snapdragon-based telematics, and IoT deployments using affected modems could face operational disruptions or data breaches. The vulnerability's local access requirement limits remote exploitation but does not eliminate risk, especially in environments where devices are physically accessible or where malicious applications could be installed. Given the critical role of mobile and embedded devices in European business and infrastructure, this vulnerability could impact sectors such as telecommunications, automotive, manufacturing, and public services.
Mitigation Recommendations
1. Apply official patches and firmware updates from Qualcomm or device manufacturers as soon as they become available to address the race condition in the PCM host voice audio driver. 2. For organizations managing fleets of devices, implement strict device management policies to prevent installation of unauthorized or untrusted applications that could exploit local vulnerabilities. 3. Employ runtime protections such as memory corruption mitigations (e.g., ASLR, DEP) where supported by the device firmware to reduce exploitation likelihood. 4. Monitor device behavior for abnormal crashes or audio subsystem errors that could indicate exploitation attempts. 5. For critical environments, consider network segmentation and physical security controls to limit local access to vulnerable devices. 6. Collaborate with vendors to receive timely vulnerability disclosures and updates, ensuring rapid deployment of fixes. 7. Conduct security assessments on embedded systems and IoT devices using affected Qualcomm platforms to identify and remediate exposure. 8. Educate users and administrators about the risks of installing untrusted software on devices with Qualcomm Snapdragon chipsets.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland, Belgium
CVE-2023-33110: CWE-823 Use of Out-of-range Pointer Offset in Qualcomm, Inc. Snapdragon
Description
The session index variable in PCM host voice audio driver initialized before PCM open, accessed during event callback from ADSP and reset during PCM close may lead to race condition between event callback - PCM close and reset session index causing memory corruption.
AI-Powered Analysis
Technical Analysis
CVE-2023-33110 is a high-severity vulnerability affecting a wide range of Qualcomm Snapdragon platforms and associated modem and audio components. The root cause is a race condition in the PCM (Pulse Code Modulation) host voice audio driver. Specifically, the session index variable is initialized before the PCM device is opened, accessed asynchronously during event callbacks from the ADSP (Audio Digital Signal Processor), and reset during PCM close operations. This timing discrepancy can cause a race condition between the event callback and the PCM close/reset sequence, leading to out-of-range pointer offsets and subsequent memory corruption. The vulnerability is classified under CWE-823 (Use of Out-of-range Pointer Offset), which typically results in undefined behavior including potential memory corruption, crashes, or arbitrary code execution. The affected products include an extensive list of Qualcomm Snapdragon SoCs, modems, audio platforms, and wearable platforms spanning multiple generations and device categories, from mobile phones to IoT and automotive platforms. The CVSS v3.1 score is 7.8 (high), reflecting that the vulnerability requires local access with low privileges and no user interaction, but can lead to high confidentiality, integrity, and availability impacts. Although no known exploits are currently reported in the wild, the broad impact surface and potential for memory corruption make this a significant threat. The vulnerability could be exploited by an attacker with local access to the device to cause denial of service or potentially escalate privileges or execute arbitrary code within the audio driver context.
Potential Impact
For European organizations, this vulnerability poses a substantial risk due to the widespread use of Qualcomm Snapdragon chipsets in smartphones, IoT devices, automotive systems, and other embedded platforms. Confidentiality could be compromised if an attacker leverages the memory corruption to access sensitive audio data or other protected memory regions. Integrity and availability are also at risk, as exploitation could lead to system crashes or persistent denial of service, disrupting critical communications or device functionality. Enterprises relying on mobile devices for secure communications, automotive manufacturers integrating Snapdragon-based telematics, and IoT deployments using affected modems could face operational disruptions or data breaches. The vulnerability's local access requirement limits remote exploitation but does not eliminate risk, especially in environments where devices are physically accessible or where malicious applications could be installed. Given the critical role of mobile and embedded devices in European business and infrastructure, this vulnerability could impact sectors such as telecommunications, automotive, manufacturing, and public services.
Mitigation Recommendations
1. Apply official patches and firmware updates from Qualcomm or device manufacturers as soon as they become available to address the race condition in the PCM host voice audio driver. 2. For organizations managing fleets of devices, implement strict device management policies to prevent installation of unauthorized or untrusted applications that could exploit local vulnerabilities. 3. Employ runtime protections such as memory corruption mitigations (e.g., ASLR, DEP) where supported by the device firmware to reduce exploitation likelihood. 4. Monitor device behavior for abnormal crashes or audio subsystem errors that could indicate exploitation attempts. 5. For critical environments, consider network segmentation and physical security controls to limit local access to vulnerable devices. 6. Collaborate with vendors to receive timely vulnerability disclosures and updates, ensuring rapid deployment of fixes. 7. Conduct security assessments on embedded systems and IoT devices using affected Qualcomm platforms to identify and remediate exposure. 8. Educate users and administrators about the risks of installing untrusted software on devices with Qualcomm Snapdragon chipsets.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- qualcomm
- Date Reserved
- 2023-05-17T09:28:53.144Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682de1cdc4522896dcbffb27
Added to database: 5/21/2025, 2:23:09 PM
Last enriched: 7/7/2025, 3:55:38 PM
Last updated: 12/2/2025, 9:18:09 AM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10971: CWE-922 Insecure Storage of Sensitive Information in FERMAX ELECTRÓNICA S.A.U MeetMe
HighCVE-2025-13696: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in softdiscover Zigaform – Price Calculator & Cost Estimation Form Builder Lite
MediumCVE-2025-11726: CWE-862 Missing Authorization in beaverbuilder Beaver Builder Page Builder – Drag and Drop Website Builder
MediumCVE-2025-13685: CWE-352 Cross-Site Request Forgery (CSRF) in ays-pro Photo Gallery by Ays – Responsive Image Gallery
MediumCVE-2025-13140: CWE-352 Cross-Site Request Forgery (CSRF) in devsoftbaltic SurveyJS: Drag & Drop WordPress Form Builder to create, style and embed multiple forms of any complexity
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.