CVE-2023-33036

7.1 HIGH

📋 TL;DR

This vulnerability allows an untrusted virtual machine without Power State Coordination Interface (PSCI) support to make a PSCI call, causing a permanent denial-of-service condition in the hypervisor. It affects Qualcomm hypervisor implementations on affected chipsets. Systems using vulnerable Qualcomm hardware with virtualization features enabled are at risk.

💻 Affected Systems

Products:
  • Qualcomm hypervisor implementations
Versions: Specific versions not publicly detailed in bulletin
Operating Systems: Android, Linux, and other OS using Qualcomm virtualization
Default Config Vulnerable: ⚠️ Yes
Notes: Requires hypervisor with virtualization enabled and untrusted VM access. Affects various Qualcomm chipsets mentioned in January 2024 bulletin.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Permanent hypervisor crash leading to complete system failure requiring physical reboot, affecting all VMs and services running on the host.

🟠

Likely Case

Hypervisor instability causing service disruption to virtual machines, potentially requiring host restart.

🟢

If Mitigated

Limited impact if untrusted VMs are isolated or PSCI access is restricted through proper hypervisor configuration.

🌐 Internet-Facing: LOW (requires local VM access, not directly exploitable over network)
🏢 Internal Only: MEDIUM (requires compromised or malicious VM on same host)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to run untrusted VM code. No public exploit details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to January 2024 Qualcomm security bulletin for specific patched versions

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/january-2024-bulletin

Restart Required: Yes

Instructions:

1. Check Qualcomm January 2024 security bulletin for affected chipsets. 2. Obtain firmware/software updates from device manufacturer. 3. Apply patches according to manufacturer instructions. 4. Reboot system after patching.

🔧 Temporary Workarounds

Restrict VM PSCI Access

all

Configure hypervisor to restrict PSCI calls from untrusted VMs

Configuration varies by hypervisor implementation - consult vendor documentation

Isolate Untrusted VMs

all

Run untrusted VMs on separate physical hardware or with restricted privileges

🧯 If You Can't Patch

  • Isolate critical VMs from potentially untrusted VMs on separate physical hosts
  • Implement strict VM privilege separation and monitor for abnormal hypervisor behavior

🔍 How to Verify

Check if Vulnerable:

Check Qualcomm chipset version and hypervisor implementation against January 2024 bulletin

Check Version:

System-specific commands vary by device manufacturer - check device documentation

Verify Fix Applied:

Verify firmware/software version matches patched versions in Qualcomm bulletin

📡 Detection & Monitoring

Log Indicators:

  • Hypervisor crash logs
  • Unexpected PSCI call attempts from VMs
  • System reboot events

Network Indicators:

  • Not network exploitable - local hypervisor event

SIEM Query:

Search for hypervisor crash events or unexpected VM privilege escalation attempts

🔗 References

📤 Share & Export