CVE-2023-33054
📋 TL;DR
CVE-2023-33054 is a cryptographic vulnerability in Qualcomm's GPS HLOS driver that allows improper authentication when downloading GNSS assistance data. This affects Android devices with Qualcomm chipsets, potentially enabling attackers to spoof GPS data or execute arbitrary code. The vulnerability impacts mobile devices, IoT devices, and automotive systems using affected Qualcomm components.
💻 Affected Systems
- Qualcomm Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
📦 What is this software?
8098 Firmware by Qualcomm
8998 Firmware by Qualcomm
Snapdragon 4 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 2 Mobile Platform Firmware →
Snapdragon 675 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 675 Mobile Platform Firmware →
Snapdragon 7c\+ Gen 3 Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 7c\+ Gen 3 Compute Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon W5\+ Gen 1 Wearable Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon W5\+ Gen 1 Wearable Platform Firmware →
Snapdragon Wear 4100\+ Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Wear 4100\+ Platform Firmware →
Snapdragon X12 Lte Modem Firmware by Qualcomm
Snapdragon X50 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X50 5g Modem Rf System Firmware →
Snapdragon X55 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf System Firmware →
Snapdragon X65 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf System Firmware →
Snapdragon X75 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X75 5g Modem Rf System Firmware →
Snapdragon Xr2 5g Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Xr2 5g Platform Firmware →
Snapdragon Xr2\+ Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Xr2\+ Gen 1 Platform Firmware →
Video Collaboration Vc1 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc1 Platform Firmware →
Video Collaboration Vc3 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc3 Platform Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with kernel privileges leading to complete device compromise, persistent backdoor installation, and GPS spoofing for location tracking manipulation.
Likely Case
GPS data manipulation leading to location spoofing, denial of service for location services, and potential information disclosure.
If Mitigated
Limited to GPS functionality disruption with no system compromise if proper network segmentation and access controls are implemented.
🎯 Exploit Status
Exploitation requires sending specially crafted GNSS assistance data to the vulnerable driver. No public exploit code is available as of knowledge cutoff.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: December 2023 Qualcomm security bulletin patches
Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin
Restart Required: Yes
Instructions:
1. Check device manufacturer for security updates. 2. Apply December 2023 or later Qualcomm security patches. 3. Update Android security patch level to December 2023 or later. 4. Reboot device after update.
🔧 Temporary Workarounds
Disable GNSS assistance data download
androidPrevent the vulnerable driver from downloading external GNSS assistance data
adb shell settings put secure location_providers_allowed -gps
adb shell pm disable com.qualcomm.location
Network filtering
linuxBlock GNSS assistance data servers at network perimeter
iptables -A OUTPUT -p tcp --dport 443 -d supl.google.com -j DROP
iptables -A OUTPUT -p tcp --dport 443 -d supl.qualcomm.com -j DROP
🧯 If You Can't Patch
- Segment affected devices on isolated networks without internet access
- Implement strict firewall rules to block all GNSS assistance data traffic
🔍 How to Verify
Check if Vulnerable:
Check Android security patch level: Settings > About phone > Android security patch level. If before December 2023, likely vulnerable.
Check Version:
adb shell getprop ro.build.version.security_patch
Verify Fix Applied:
Verify Android security patch level is December 2023 or later and Qualcomm driver version has been updated.
📡 Detection & Monitoring
Log Indicators:
- Unusual GNSS assistance data download patterns
- GPS driver crash logs
- Unexpected location service behavior
Network Indicators:
- Traffic to GNSS assistance servers (supl.google.com, supl.qualcomm.com) with abnormal patterns
- GPS data manipulation attempts
SIEM Query:
source="android_logs" AND ("GNSS" OR "GPS") AND ("crash" OR "error" OR "assistance data")