CVE-2023-33115
📋 TL;DR
This CVE describes a memory corruption vulnerability in Qualcomm's trusted execution environment when processing buffer initialization for certain report types. Attackers could potentially execute arbitrary code or cause denial of service. This affects devices using Qualcomm chipsets with vulnerable firmware.
💻 Affected Systems
- Qualcomm chipsets with trusted execution environment
📦 What is this software?
Snapdragon 765 5g Mobile Firmware by Qualcomm
Snapdragon 765g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 765g 5g Mobile Firmware →
Snapdragon 768g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 768g 5g Mobile Firmware →
Snapdragon 778g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Firmware →
Snapdragon 778g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Firmware →
Snapdragon 780g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 780g 5g Mobile Firmware →
Snapdragon 782g Mobile Firmware by Qualcomm
Snapdragon 7c\+ Gen 3 Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 7c\+ Gen 3 Compute Firmware →
Snapdragon 8 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Firmware →
Snapdragon 8 Gen 3 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Firmware →
Snapdragon 850 Mobile Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 850 Mobile Compute Firmware →
Snapdragon 865 5g Mobile Firmware by Qualcomm
Snapdragon 865 5g Mobile Firmware by Qualcomm
Snapdragon 870 5g Mobile Firmware by Qualcomm
Snapdragon 888 5g Mobile Firmware by Qualcomm
Snapdragon 888 5g Mobile Firmware by Qualcomm
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon X24 Lte Modem Firmware by Qualcomm
Snapdragon X35 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X35 5g Modem Rf Firmware →
Snapdragon X50 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X50 5g Modem Rf Firmware →
Snapdragon X55 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf Firmware →
Snapdragon X65 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf Firmware →
Snapdragon X75 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X75 5g Modem Rf Firmware →
Video Collaboration Vc3 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc3 Platform Firmware →
Video Collaboration Vc5 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc5 Platform Firmware →
Vision Intelligence 300 Firmware by Qualcomm
Vision Intelligence 400 Firmware by Qualcomm
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with kernel privileges leading to complete device compromise, data theft, and persistent backdoor installation.
Likely Case
Local privilege escalation allowing attackers to gain elevated privileges on affected devices.
If Mitigated
Denial of service or application crashes if memory corruption cannot be leveraged for code execution.
🎯 Exploit Status
Requires local access or ability to execute code on device. Memory corruption vulnerabilities often require specific conditions to exploit reliably.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Qualcomm's April 2024 security bulletin for specific patched versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2024-bulletin.html
Restart Required: Yes
Instructions:
1. Check Qualcomm's security bulletin for your specific chipset. 2. Obtain firmware update from device manufacturer. 3. Apply firmware update following manufacturer instructions. 4. Reboot device to complete installation.
🔧 Temporary Workarounds
Restrict local code execution
allLimit ability for untrusted applications to execute code on affected devices
🧯 If You Can't Patch
- Isolate affected devices from critical networks and sensitive data
- Implement strict application allowlisting to prevent untrusted code execution
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against Qualcomm's security bulletin for affected chipsets
Check Version:
Device-specific commands vary by manufacturer. Typically: 'getprop ro.build.fingerprint' or checking firmware version in device settings.
Verify Fix Applied:
Verify firmware version has been updated to patched version specified in Qualcomm bulletin
📡 Detection & Monitoring
Log Indicators:
- Unexpected process crashes in trusted execution environment
- Memory access violations in system logs
- Abnormal trusted report generation attempts
Network Indicators:
- Unusual local process communication patterns
SIEM Query:
Process: (name contains "trusted" OR name contains "tee") AND (event_type="crash" OR event_type="access_violation")