Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-33119: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2023-33119cvecve-2023-33119cwe-367
Published: Mon May 06 2024 (05/06/2024, 14:32:01 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while loading a VM from a signed VM image that is not coherent in the processor cache.

AI-Powered Analysis

AILast updated: 12/16/2025, 17:51:21 UTC

Technical Analysis

CVE-2023-33119 is a time-of-check to time-of-use (TOCTOU) race condition vulnerability classified under CWE-367, found in Qualcomm Snapdragon platforms. The flaw arises during the loading of a virtual machine (VM) from a signed VM image that is not coherent in the processor cache, leading to memory corruption. This race condition occurs because the system checks the VM image's validity before use, but the state of the image can change between the check and the actual use due to cache incoherence, allowing an attacker to exploit this timing window. The vulnerability affects a wide array of Qualcomm products, including many Snapdragon mobile platforms (from SD 675 up to Snapdragon 8 Gen 3), FastConnect wireless subsystems, modem-RF systems, compute platforms, and specialized platforms like Robotics RB3 and Vision Intelligence. The CVSS v3.1 score is 8.4 (high severity), reflecting that the attack vector is local (AV:L), requires low attack complexity (AC:L), no privileges (PR:N), and no user interaction (UI:N), with high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Exploiting this vulnerability could allow an attacker to execute arbitrary code, escalate privileges, or cause denial of service by corrupting memory during VM loading. The vulnerability is particularly critical because it affects foundational components in many devices, including smartphones, automotive systems, and IoT devices, which rely on these Snapdragon platforms for secure execution environments. No patches or exploits are currently publicly available, but the broad affected product list and severity indicate a significant risk if exploited.

Potential Impact

For European organizations, the impact of CVE-2023-33119 is substantial due to the widespread use of Qualcomm Snapdragon platforms in mobile devices, automotive systems, IoT devices, and networking equipment. Confidentiality breaches could expose sensitive corporate or personal data, while integrity compromises could allow attackers to manipulate device behavior or firmware. Availability impacts could disrupt critical services, especially in sectors like telecommunications, automotive (connected cars), and industrial IoT, where Snapdragon platforms are embedded. The vulnerability’s local attack vector means attackers need some level of access to the device, but no privileges or user interaction are required, increasing the risk in environments where devices are accessible to insiders or through compromised local networks. European industries relying on secure mobile communications, automotive safety systems, or industrial automation could face operational disruptions, data leaks, or safety hazards. Additionally, the lack of known exploits in the wild currently provides a window for proactive mitigation, but the high severity score demands urgent attention to prevent future exploitation.

Mitigation Recommendations

1. Monitor Qualcomm’s official security advisories and apply firmware and software patches promptly once released to address CVE-2023-33119. 2. Implement strict validation and integrity checks on VM images before loading, ensuring cache coherence to prevent race conditions. 3. Employ runtime protections such as memory corruption detection and mitigation techniques (e.g., Control Flow Integrity, Address Space Layout Randomization) on affected devices. 4. Restrict local access to devices running vulnerable Snapdragon platforms by enforcing strong physical security and network segmentation to reduce attack surface. 5. For organizations developing custom firmware or software on Snapdragon platforms, review and update VM loading procedures to eliminate TOCTOU race conditions. 6. Conduct thorough security testing and code reviews focusing on race conditions and cache coherence issues in embedded systems. 7. Maintain an inventory of devices using affected Snapdragon versions to prioritize patching and risk management. 8. Collaborate with device vendors and suppliers to ensure timely updates and mitigations are deployed in the supply chain.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2023-05-17T09:28:53.146Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694194799050fe8508060cf4

Added to database: 12/16/2025, 5:18:49 PM

Last enriched: 12/16/2025, 5:51:21 PM

Last updated: 12/20/2025, 2:25:16 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats