CVE-2023-33085
📋 TL;DR
This vulnerability involves memory corruption in Qualcomm wearable devices while processing data from the Always-On (AON) subsystem. Attackers could potentially execute arbitrary code or cause denial of service on affected wearables. The vulnerability affects Qualcomm-powered wearable devices with specific chipsets.
💻 Affected Systems
- Qualcomm wearable chipsets (specific models not publicly detailed in advisory)
📦 What is this software?
Flight Rb5 5g Platform Firmware by Qualcomm
Snapdragon 4 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 1 Mobile Platform Firmware →
Snapdragon 480 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 480 5g Mobile Platform Firmware →
Snapdragon 480 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 480 5g Mobile Platform Firmware →
Snapdragon 680 4g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 680 4g Mobile Platform Firmware →
Snapdragon 685 4g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 685 4g Mobile Platform Firmware →
Snapdragon 695 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 695 5g Mobile Platform Firmware →
Snapdragon 778g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Platform Firmware →
Snapdragon 778g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Platform Firmware →
Snapdragon 780g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 780g 5g Mobile Platform Firmware →
Snapdragon 782g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 782g Mobile Platform Firmware →
Snapdragon 7c\+ Gen 3 Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 7c\+ Gen 3 Compute Firmware →
Snapdragon 8 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Platform Firmware →
Snapdragon 888 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 888 5g Mobile Platform Firmware →
Snapdragon 888 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 888 5g Mobile Platform Firmware →
Snapdragon Auto 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Firmware →
Snapdragon W5\+ Gen 1 Wearable Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon W5\+ Gen 1 Wearable Platform Firmware →
Snapdragon X12 Lte Modem Firmware by Qualcomm
Snapdragon X65 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf System Firmware →
Video Collaboration Vc1 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc1 Platform Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution allowing complete device compromise, data theft, or persistent malware installation on wearable devices.
Likely Case
Device crash or reboot leading to denial of service, potentially requiring physical reset of the wearable device.
If Mitigated
Limited impact with proper network segmentation and device isolation, potentially only causing temporary service disruption.
🎯 Exploit Status
Exploitation requires sending specially crafted data to the AON subsystem, but specific attack vectors are not publicly documented.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Firmware updates released in January 2024 security bulletin
Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/january-2024-bulletin
Restart Required: Yes
Instructions:
1. Check with wearable device manufacturer for firmware updates. 2. Apply the latest firmware update from the device manufacturer. 3. Restart the wearable device after update installation.
🔧 Temporary Workarounds
Disable unnecessary connectivity features
allReduce attack surface by disabling Bluetooth, Wi-Fi, or other connectivity features when not needed
Limit device pairing
allOnly pair wearable with trusted devices and avoid public Bluetooth connections
🧯 If You Can't Patch
- Isolate wearable devices on separate network segments
- Implement strict Bluetooth pairing policies and monitor for unusual connection attempts
🔍 How to Verify
Check if Vulnerable:
Check wearable device firmware version against manufacturer's security bulletin. Contact device manufacturer for specific vulnerability status.
Check Version:
Check in device settings > About > Software information (exact path varies by device)
Verify Fix Applied:
Verify firmware version has been updated to January 2024 or later security patch level
📡 Detection & Monitoring
Log Indicators:
- Unexpected device reboots
- Bluetooth connection anomalies
- Memory error logs in device diagnostics
Network Indicators:
- Unusual Bluetooth traffic patterns
- Multiple failed pairing attempts from unknown devices
SIEM Query:
Not applicable - wearables typically don't integrate with enterprise SIEM systems