Skip to main content

CVE-2023-43517: CWE-284 Improper Access Control in Qualcomm, Inc. Snapdragon

High
VulnerabilityCVE-2023-43517cvecve-2023-43517cwe-284
Published: Tue Feb 06 2024 (02/06/2024, 05:47:18 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption in Automotive Multimedia due to improper access control in HAB.

AI-Powered Analysis

AILast updated: 07/04/2025, 18:41:30 UTC

Technical Analysis

CVE-2023-43517 is a high-severity vulnerability affecting multiple Qualcomm Snapdragon chipsets, specifically those used in automotive multimedia systems. The root cause is improper access control (CWE-284) within the High Assurance Boot (HAB) component, leading to memory corruption. HAB is a security feature designed to ensure that only authenticated and authorized code runs during the boot process. Improper access control in this context means that unauthorized entities may gain access to privileged operations or memory regions that should be protected. The vulnerability affects a broad range of Snapdragon variants including QAM8255P, QAM8295P, QAM8650P, QAM8775P, and others, which are commonly integrated into automotive infotainment and multimedia platforms. The CVSS v3.1 score of 8.4 reflects a high impact with local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Exploitation could allow an attacker with local access to cause memory corruption, potentially leading to arbitrary code execution, system compromise, or denial of service. Although no known exploits are currently reported in the wild, the vulnerability's nature and impact make it a significant risk for automotive systems relying on these Snapdragon platforms. The lack of available patches at the time of publication increases the urgency for affected organizations to monitor for updates and implement compensating controls.

Potential Impact

For European organizations, the impact of CVE-2023-43517 is particularly critical in the automotive sector, which is a major industry in Europe. Automotive manufacturers, suppliers, and service providers using Snapdragon-based multimedia systems could face risks including unauthorized control over infotainment systems, potential escalation to vehicle control systems if the multimedia platform interfaces with critical vehicle functions, and disruption of services. This could lead to safety risks, privacy breaches, and reputational damage. Additionally, compromised infotainment systems could serve as a foothold for lateral movement within connected vehicle networks or enterprise environments. The high confidentiality, integrity, and availability impact means sensitive data could be exposed or manipulated, and system availability could be disrupted. Given the increasing integration of connected and autonomous vehicle technologies in Europe, this vulnerability poses a strategic risk to automotive cybersecurity and consumer safety.

Mitigation Recommendations

1. Immediate inventory and identification of affected Snapdragon chipsets in automotive multimedia systems within the organization’s supply chain and products. 2. Engage with Qualcomm and automotive OEMs to obtain patches or firmware updates as soon as they become available; prioritize deployment in production and test environments. 3. Implement strict access controls and network segmentation to limit local access to multimedia systems, reducing the attack surface. 4. Monitor for unusual behavior or anomalies in automotive infotainment systems that could indicate exploitation attempts. 5. Employ runtime protections such as memory integrity checks and exploit mitigation technologies where supported by the platform. 6. Collaborate with automotive cybersecurity teams to integrate this vulnerability into threat models and incident response plans. 7. For organizations involved in vehicle maintenance or telematics, ensure secure update mechanisms and restrict physical and remote access to vulnerable components. 8. Advocate for and participate in industry information sharing to track emerging exploit techniques and mitigation strategies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2023-09-19T14:48:15.089Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec315

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 6:41:30 PM

Last updated: 8/15/2025, 6:38:21 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats