CVE-2023-33119: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in Qualcomm, Inc. Snapdragon
Memory corruption while loading a VM from a signed VM image that is not coherent in the processor cache.
AI Analysis
Technical Summary
CVE-2023-33119 is a time-of-check to time-of-use (TOCTOU) race condition vulnerability classified under CWE-367, found in Qualcomm Snapdragon platforms. The flaw arises during the loading of a virtual machine (VM) from a signed VM image that is not coherent in the processor cache, leading to memory corruption. This race condition occurs because the system checks the VM image's validity before use, but the state of the image can change between the check and the actual use due to cache incoherence, allowing an attacker to exploit this timing window. The vulnerability affects a wide array of Qualcomm products, including many Snapdragon mobile platforms (from SD 675 up to Snapdragon 8 Gen 3), FastConnect wireless subsystems, modem-RF systems, compute platforms, and specialized platforms like Robotics RB3 and Vision Intelligence. The CVSS v3.1 score is 8.4 (high severity), reflecting that the attack vector is local (AV:L), requires low attack complexity (AC:L), no privileges (PR:N), and no user interaction (UI:N), with high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Exploiting this vulnerability could allow an attacker to execute arbitrary code, escalate privileges, or cause denial of service by corrupting memory during VM loading. The vulnerability is particularly critical because it affects foundational components in many devices, including smartphones, automotive systems, and IoT devices, which rely on these Snapdragon platforms for secure execution environments. No patches or exploits are currently publicly available, but the broad affected product list and severity indicate a significant risk if exploited.
Potential Impact
For European organizations, the impact of CVE-2023-33119 is substantial due to the widespread use of Qualcomm Snapdragon platforms in mobile devices, automotive systems, IoT devices, and networking equipment. Confidentiality breaches could expose sensitive corporate or personal data, while integrity compromises could allow attackers to manipulate device behavior or firmware. Availability impacts could disrupt critical services, especially in sectors like telecommunications, automotive (connected cars), and industrial IoT, where Snapdragon platforms are embedded. The vulnerability’s local attack vector means attackers need some level of access to the device, but no privileges or user interaction are required, increasing the risk in environments where devices are accessible to insiders or through compromised local networks. European industries relying on secure mobile communications, automotive safety systems, or industrial automation could face operational disruptions, data leaks, or safety hazards. Additionally, the lack of known exploits in the wild currently provides a window for proactive mitigation, but the high severity score demands urgent attention to prevent future exploitation.
Mitigation Recommendations
1. Monitor Qualcomm’s official security advisories and apply firmware and software patches promptly once released to address CVE-2023-33119. 2. Implement strict validation and integrity checks on VM images before loading, ensuring cache coherence to prevent race conditions. 3. Employ runtime protections such as memory corruption detection and mitigation techniques (e.g., Control Flow Integrity, Address Space Layout Randomization) on affected devices. 4. Restrict local access to devices running vulnerable Snapdragon platforms by enforcing strong physical security and network segmentation to reduce attack surface. 5. For organizations developing custom firmware or software on Snapdragon platforms, review and update VM loading procedures to eliminate TOCTOU race conditions. 6. Conduct thorough security testing and code reviews focusing on race conditions and cache coherence issues in embedded systems. 7. Maintain an inventory of devices using affected Snapdragon versions to prioritize patching and risk management. 8. Collaborate with device vendors and suppliers to ensure timely updates and mitigations are deployed in the supply chain.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Norway, Denmark
CVE-2023-33119: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in Qualcomm, Inc. Snapdragon
Description
Memory corruption while loading a VM from a signed VM image that is not coherent in the processor cache.
AI-Powered Analysis
Technical Analysis
CVE-2023-33119 is a time-of-check to time-of-use (TOCTOU) race condition vulnerability classified under CWE-367, found in Qualcomm Snapdragon platforms. The flaw arises during the loading of a virtual machine (VM) from a signed VM image that is not coherent in the processor cache, leading to memory corruption. This race condition occurs because the system checks the VM image's validity before use, but the state of the image can change between the check and the actual use due to cache incoherence, allowing an attacker to exploit this timing window. The vulnerability affects a wide array of Qualcomm products, including many Snapdragon mobile platforms (from SD 675 up to Snapdragon 8 Gen 3), FastConnect wireless subsystems, modem-RF systems, compute platforms, and specialized platforms like Robotics RB3 and Vision Intelligence. The CVSS v3.1 score is 8.4 (high severity), reflecting that the attack vector is local (AV:L), requires low attack complexity (AC:L), no privileges (PR:N), and no user interaction (UI:N), with high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Exploiting this vulnerability could allow an attacker to execute arbitrary code, escalate privileges, or cause denial of service by corrupting memory during VM loading. The vulnerability is particularly critical because it affects foundational components in many devices, including smartphones, automotive systems, and IoT devices, which rely on these Snapdragon platforms for secure execution environments. No patches or exploits are currently publicly available, but the broad affected product list and severity indicate a significant risk if exploited.
Potential Impact
For European organizations, the impact of CVE-2023-33119 is substantial due to the widespread use of Qualcomm Snapdragon platforms in mobile devices, automotive systems, IoT devices, and networking equipment. Confidentiality breaches could expose sensitive corporate or personal data, while integrity compromises could allow attackers to manipulate device behavior or firmware. Availability impacts could disrupt critical services, especially in sectors like telecommunications, automotive (connected cars), and industrial IoT, where Snapdragon platforms are embedded. The vulnerability’s local attack vector means attackers need some level of access to the device, but no privileges or user interaction are required, increasing the risk in environments where devices are accessible to insiders or through compromised local networks. European industries relying on secure mobile communications, automotive safety systems, or industrial automation could face operational disruptions, data leaks, or safety hazards. Additionally, the lack of known exploits in the wild currently provides a window for proactive mitigation, but the high severity score demands urgent attention to prevent future exploitation.
Mitigation Recommendations
1. Monitor Qualcomm’s official security advisories and apply firmware and software patches promptly once released to address CVE-2023-33119. 2. Implement strict validation and integrity checks on VM images before loading, ensuring cache coherence to prevent race conditions. 3. Employ runtime protections such as memory corruption detection and mitigation techniques (e.g., Control Flow Integrity, Address Space Layout Randomization) on affected devices. 4. Restrict local access to devices running vulnerable Snapdragon platforms by enforcing strong physical security and network segmentation to reduce attack surface. 5. For organizations developing custom firmware or software on Snapdragon platforms, review and update VM loading procedures to eliminate TOCTOU race conditions. 6. Conduct thorough security testing and code reviews focusing on race conditions and cache coherence issues in embedded systems. 7. Maintain an inventory of devices using affected Snapdragon versions to prioritize patching and risk management. 8. Collaborate with device vendors and suppliers to ensure timely updates and mitigations are deployed in the supply chain.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- qualcomm
- Date Reserved
- 2023-05-17T09:28:53.146Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 694194799050fe8508060cf4
Added to database: 12/16/2025, 5:18:49 PM
Last enriched: 12/16/2025, 5:51:21 PM
Last updated: 12/20/2025, 2:25:16 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-7782: CWE-862 Missing Authorization in WP JobHunt
HighCVE-2025-7733: CWE-639 Authorization Bypass Through User-Controlled Key in WP JobHunt
MediumCVE-2025-14298: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in damian-gora FiboSearch – Ajax Search for WooCommerce
MediumCVE-2025-12492: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ultimatemember Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin
MediumCVE-2025-13619: CWE-269 Improper Privilege Management in CMSSuperHeroes Flex Store Users
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.