CVE-2023-33087

7.8 HIGH

📋 TL;DR

This vulnerability involves memory corruption in Qualcomm's Core component while processing RX intent requests, potentially allowing attackers to execute arbitrary code or cause denial of service. It affects devices using vulnerable Qualcomm chipsets, primarily mobile devices and IoT products.

💻 Affected Systems

Products:
  • Qualcomm chipsets with vulnerable Core component
Versions: Specific versions not publicly detailed in bulletin; refer to Qualcomm advisory
Operating Systems: Android, Linux-based systems using Qualcomm chips
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices using vulnerable Qualcomm SoCs; exact models depend on chipset implementation

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, data theft, or persistent backdoor installation

🟠

Likely Case

Device crash/reboot (denial of service) or limited code execution in privileged context

🟢

If Mitigated

No impact if patched or if exploit attempts are blocked by network controls

🌐 Internet-Facing: MEDIUM - Requires proximity or network access to target device, but many affected devices are mobile/connected
🏢 Internal Only: MEDIUM - Internal attackers with network access could exploit, but requires specific conditions

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Memory corruption vulnerabilities often require specific conditions to exploit reliably; no public exploit available as of advisory date

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to device manufacturer updates; Qualcomm provides fixes to OEMs

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin

Restart Required: Yes

Instructions:

1. Check with device manufacturer for security updates 2. Apply available firmware/OS updates 3. Reboot device after update

🔧 Temporary Workarounds

Network segmentation

all

Isolate affected devices from untrusted networks to reduce attack surface

Disable unnecessary wireless interfaces

all

Turn off Bluetooth/Wi-Fi when not needed to limit attack vectors

🧯 If You Can't Patch

  • Segment affected devices in isolated network zones
  • Implement strict network access controls and monitor for anomalous behavior

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against manufacturer's security bulletin; no direct command available

Check Version:

Device-specific (e.g., Android: Settings > About phone > Build number)

Verify Fix Applied:

Verify latest security patches are installed and device reports updated firmware version

📡 Detection & Monitoring

Log Indicators:

  • Unexpected device reboots
  • Kernel panic logs
  • Memory corruption errors in system logs

Network Indicators:

  • Unusual Bluetooth/Wi-Fi connection attempts to affected devices
  • Anomalous network traffic patterns

SIEM Query:

Device logs showing repeated crashes or memory errors from Qualcomm chipset devices

🔗 References

📤 Share & Export