Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-33119: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2023-33119cvecve-2023-33119cwe-367
Published: Mon May 06 2024 (05/06/2024, 14:32:01 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

CVE-2023-33119 is a high-severity TOCTOU race condition vulnerability in Qualcomm Snapdragon platforms that leads to memory corruption when loading a VM from a signed VM image that is not coherent in the processor cache. It affects a wide range of Snapdragon SoCs and related products, potentially compromising confidentiality, integrity, and availability without requiring user interaction or privileges. The vulnerability arises from a time-of-check to time-of-use flaw (CWE-367) where cache incoherency allows an attacker to manipulate VM images during loading. Although no known exploits are reported in the wild yet, the broad product impact and high CVSS score (8. 4) make it a critical concern for devices using affected Snapdragon components. European organizations relying on mobile, IoT, automotive, or edge computing devices with these chipsets could face risks of device compromise or data breaches. Mitigation requires applying vendor patches once available, ensuring secure VM image handling, and monitoring for suspicious activity related to VM loading processes. Countries with high adoption of Snapdragon-based devices, such as Germany, France, UK, and Nordic states, are most likely to be impacted due to market penetration and strategic use of affected platforms.

AI-Powered Analysis

AILast updated: 12/23/2025, 18:27:19 UTC

Technical Analysis

CVE-2023-33119 is a vulnerability classified as a time-of-check to time-of-use (TOCTOU) race condition (CWE-367) in Qualcomm Snapdragon platforms. The flaw occurs during the loading of a virtual machine (VM) from a signed VM image that is not coherent in the processor cache, leading to memory corruption. This incoherency allows an attacker to exploit the timing window between the verification of the VM image and its actual use, potentially substituting or modifying the VM image in memory. The affected products span a vast array of Qualcomm Snapdragon SoCs and related platforms, including mobile, compute, automotive, and IoT chipsets such as Snapdragon 8 Gen 1/2/3, Snapdragon 865/888 series, FastConnect modules, and various modem-RF systems. The vulnerability does not require privileges or user interaction to exploit, increasing its risk profile. The CVSS v3.1 score is 8.4, indicating high severity with impacts on confidentiality, integrity, and availability. Exploitation could allow attackers to execute arbitrary code, escalate privileges, or cause denial of service by corrupting memory during VM loading. Although no public exploits are known, the broad scope and critical nature necessitate prompt mitigation. The root cause lies in improper handling of cache coherence during VM image verification and loading, a subtle hardware-software interaction issue. Qualcomm and ecosystem partners need to address this through firmware and software updates that ensure atomicity and cache coherency during VM image processing.

Potential Impact

For European organizations, the impact of CVE-2023-33119 is significant due to the widespread use of Qualcomm Snapdragon platforms in smartphones, automotive systems, IoT devices, and edge computing infrastructure. Exploitation could lead to unauthorized code execution, data leakage, or service disruption on devices critical for business operations, communications, or industrial control. Confidentiality breaches could expose sensitive corporate or personal data, while integrity violations might allow attackers to implant persistent malware or manipulate device behavior. Availability impacts could disrupt mobile communications or automotive safety systems, posing safety risks. The vulnerability's presence in automotive and industrial platforms raises concerns for sectors like manufacturing, transportation, and critical infrastructure. Given the lack of required privileges or user interaction, attackers could exploit this remotely or via local network vectors, increasing the attack surface. The absence of known exploits currently provides a window for proactive defense, but the high severity demands urgent attention to prevent potential targeted attacks or supply chain compromises affecting European entities.

Mitigation Recommendations

1. Monitor Qualcomm and device vendors for official patches or firmware updates addressing CVE-2023-33119 and apply them promptly across all affected devices. 2. Implement strict supply chain validation to ensure VM images are securely signed and verified with mechanisms that guarantee cache coherency and atomicity during loading. 3. Employ runtime integrity monitoring and anomaly detection on devices to identify suspicious VM loading behavior or memory corruption attempts. 4. For enterprise-managed devices, enforce policies restricting installation of unsigned or unverified VM images and limit administrative privileges to reduce exploitation risk. 5. Collaborate with hardware and software vendors to validate cache management and VM loading processes in development and testing environments. 6. Increase network segmentation and access controls around critical devices using affected Snapdragon platforms to limit attacker lateral movement. 7. Educate security teams about TOCTOU vulnerabilities and encourage threat hunting focused on memory corruption and VM manipulation indicators. 8. For automotive and industrial deployments, coordinate with OEMs to prioritize updates and conduct risk assessments considering safety implications. 9. Maintain up-to-date inventories of devices using vulnerable Snapdragon components to prioritize patching and monitoring efforts. 10. Consider deploying endpoint detection and response (EDR) solutions capable of detecting exploitation attempts targeting low-level hardware vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2023-05-17T09:28:53.146Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694194799050fe8508060cf4

Added to database: 12/16/2025, 5:18:49 PM

Last enriched: 12/23/2025, 6:27:19 PM

Last updated: 2/6/2026, 10:49:24 PM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats