CVE-2023-33113
📋 TL;DR
This vulnerability allows memory corruption when the Qualcomm resource manager sends fragmented reply messages to the host kernel. Attackers could exploit this to execute arbitrary code or cause denial of service. Affects devices with Qualcomm chipsets including smartphones, IoT devices, and embedded systems.
💻 Affected Systems
- Qualcomm chipsets with resource manager functionality
📦 What is this software?
Flight Rb5 5g Platform Firmware by Qualcomm
Smart Audio 400 Platform Firmware by Qualcomm
Snapdragon 4 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 1 Mobile Platform Firmware →
Snapdragon 4 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 2 Mobile Platform Firmware →
Snapdragon 480 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 480 5g Mobile Platform Firmware →
Snapdragon 480 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 480 5g Mobile Platform Firmware →
Snapdragon 680 4g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 680 4g Mobile Platform Firmware →
Snapdragon 685 4g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 685 4g Mobile Platform Firmware →
Snapdragon 695 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 695 5g Mobile Platform Firmware →
Snapdragon 778g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Platform Firmware →
Snapdragon 778g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Platform Firmware →
Snapdragon 780g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 780g 5g Mobile Platform Firmware →
Snapdragon 782g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 782g Mobile Platform Firmware →
Snapdragon 7c\+ Gen 3 Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 7c\+ Gen 3 Compute Firmware →
Snapdragon 8 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Platform Firmware →
Snapdragon 8 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 820 Automotive Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 820 Automotive Platform Firmware →
Snapdragon 888 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 888 5g Mobile Platform Firmware →
Snapdragon 888 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 888 5g Mobile Platform Firmware →
Snapdragon Ar2 Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar2 Gen 1 Platform Firmware →
Snapdragon Auto 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Firmware →
Snapdragon W5\+ Gen 1 Wearable Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon W5\+ Gen 1 Wearable Platform Firmware →
Snapdragon X12 Lte Modem Firmware by Qualcomm
Snapdragon X65 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf System Firmware →
Video Collaboration Vc1 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc1 Platform Firmware →
Video Collaboration Vc3 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc3 Platform Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with kernel privileges leading to complete device compromise, data theft, or persistent backdoor installation.
Likely Case
Local privilege escalation from user to kernel space, allowing attackers to bypass security controls and gain elevated access.
If Mitigated
Denial of service causing device instability or crashes if exploitation attempts fail or are partially successful.
🎯 Exploit Status
Requires local access or ability to interact with resource manager interface. Memory corruption vulnerabilities often lead to reliable exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Qualcomm January 2024 security bulletin for specific patched versions
Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/january-2024-bulletin
Restart Required: Yes
Instructions:
1. Check Qualcomm security bulletin for your chipset model. 2. Obtain firmware/kernel patches from device manufacturer. 3. Apply updates following manufacturer instructions. 4. Reboot device to activate fixes.
🔧 Temporary Workarounds
Restrict local access
allLimit physical and network access to vulnerable devices to reduce attack surface
Application sandboxing
androidEnforce strict app permissions and sandboxing to prevent malicious apps from reaching kernel interfaces
🧯 If You Can't Patch
- Isolate affected devices on separate network segments
- Implement strict access controls and monitor for unusual kernel activity
🔍 How to Verify
Check if Vulnerable:
Check device firmware/kernel version against Qualcomm's patched versions in January 2024 bulletin
Check Version:
Device-specific commands vary by manufacturer (e.g., 'getprop ro.build.fingerprint' on Android for some devices)
Verify Fix Applied:
Verify firmware/kernel version matches or exceeds patched versions listed in Qualcomm advisory
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs
- Resource manager abnormal activity
- Memory corruption error messages
Network Indicators:
- Unusual inter-process communication patterns
- Suspicious local service interactions
SIEM Query:
Search for kernel panic events OR resource manager service crashes OR memory access violation logs