CVE-2023-33054

9.1 CRITICAL

📋 TL;DR

CVE-2023-33054 is a cryptographic vulnerability in Qualcomm's GPS HLOS driver that allows improper authentication when downloading GNSS assistance data. This affects Android devices with Qualcomm chipsets, potentially enabling attackers to spoof GPS data or execute arbitrary code. The vulnerability impacts mobile devices, IoT devices, and automotive systems using affected Qualcomm components.

💻 Affected Systems

Products:
  • Qualcomm Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
Versions: Multiple Qualcomm chipset versions prior to December 2023 security updates
Operating Systems: Android, Linux-based systems using Qualcomm GNSS components
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with Qualcomm GNSS/GPS functionality enabled. The vulnerability is in the HLOS (High Level Operating System) driver component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with kernel privileges leading to complete device compromise, persistent backdoor installation, and GPS spoofing for location tracking manipulation.

🟠

Likely Case

GPS data manipulation leading to location spoofing, denial of service for location services, and potential information disclosure.

🟢

If Mitigated

Limited to GPS functionality disruption with no system compromise if proper network segmentation and access controls are implemented.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending specially crafted GNSS assistance data to the vulnerable driver. No public exploit code is available as of knowledge cutoff.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: December 2023 Qualcomm security bulletin patches

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin

Restart Required: Yes

Instructions:

1. Check device manufacturer for security updates. 2. Apply December 2023 or later Qualcomm security patches. 3. Update Android security patch level to December 2023 or later. 4. Reboot device after update.

🔧 Temporary Workarounds

Disable GNSS assistance data download

android

Prevent the vulnerable driver from downloading external GNSS assistance data

adb shell settings put secure location_providers_allowed -gps
adb shell pm disable com.qualcomm.location

Network filtering

linux

Block GNSS assistance data servers at network perimeter

iptables -A OUTPUT -p tcp --dport 443 -d supl.google.com -j DROP
iptables -A OUTPUT -p tcp --dport 443 -d supl.qualcomm.com -j DROP

🧯 If You Can't Patch

  • Segment affected devices on isolated networks without internet access
  • Implement strict firewall rules to block all GNSS assistance data traffic

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level: Settings > About phone > Android security patch level. If before December 2023, likely vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify Android security patch level is December 2023 or later and Qualcomm driver version has been updated.

📡 Detection & Monitoring

Log Indicators:

  • Unusual GNSS assistance data download patterns
  • GPS driver crash logs
  • Unexpected location service behavior

Network Indicators:

  • Traffic to GNSS assistance servers (supl.google.com, supl.qualcomm.com) with abnormal patterns
  • GPS data manipulation attempts

SIEM Query:

source="android_logs" AND ("GNSS" OR "GPS") AND ("crash" OR "error" OR "assistance data")

🔗 References

📤 Share & Export