CVE-2023-33118
📋 TL;DR
This CVE describes a use-after-free vulnerability in Qualcomm's Sound Technology Hardware Abstraction Layer (ST HAL) when processing Listen Sound Model client payloads. Attackers could exploit this memory corruption to execute arbitrary code or cause denial of service on affected devices. This primarily affects Android devices with Qualcomm chipsets that use the vulnerable ST HAL component.
💻 Affected Systems
- Qualcomm chipsets with Sound Technology HAL
- Android devices using affected Qualcomm components
📦 What is this software?
Flight Rb5 5g Platform Firmware by Qualcomm
Qualcomm 215 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Qualcomm 215 Mobile Platform Firmware →
Smart Audio 400 Platform Firmware by Qualcomm
Snapdragon 4 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 1 Mobile Platform Firmware →
Snapdragon 460 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 460 Mobile Platform Firmware →
Snapdragon 480 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 480 5g Mobile Platform Firmware →
Snapdragon 480 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 480 5g Mobile Platform Firmware →
Snapdragon 660 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 660 Mobile Platform Firmware →
Snapdragon 662 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 662 Mobile Platform Firmware →
Snapdragon 680 4g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 680 4g Mobile Platform Firmware →
Snapdragon 685 4g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 685 4g Mobile Platform Firmware →
Snapdragon 690 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 690 5g Mobile Platform Firmware →
Snapdragon 695 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 695 5g Mobile Platform Firmware →
Snapdragon 750g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 750g 5g Mobile Platform Firmware →
Snapdragon 765 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 765 5g Mobile Platform Firmware →
Snapdragon 765g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 765g 5g Mobile Platform Firmware →
Snapdragon 768g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 768g 5g Mobile Platform Firmware →
Snapdragon 778g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Platform Firmware →
Snapdragon 778g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Platform Firmware →
Snapdragon 780g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 780g 5g Mobile Platform Firmware →
Snapdragon 782g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 782g Mobile Platform Firmware →
Snapdragon 7c\+ Gen 3 Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 7c\+ Gen 3 Compute Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 865 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 865 5g Mobile Platform Firmware →
Snapdragon 865 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 865 5g Mobile Platform Firmware →
Snapdragon 870 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 870 5g Mobile Platform Firmware →
Snapdragon 888 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 888 5g Mobile Platform Firmware →
Snapdragon 888 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 888 5g Mobile Platform Firmware →
Snapdragon Auto 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Firmware →
Snapdragon W5\+ Gen 1 Wearable Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon W5\+ Gen 1 Wearable Platform Firmware →
Snapdragon X12 Lte Modem Firmware by Qualcomm
Snapdragon X55 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf System Firmware →
Snapdragon X75 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X75 5g Modem Rf System Firmware →
Snapdragon Xr2 5g Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Xr2 5g Platform Firmware →
Snapdragon Xr2\+ Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Xr2\+ Gen 1 Platform Firmware →
Video Collaboration Vc1 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc1 Platform Firmware →
Video Collaboration Vc3 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc3 Platform Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with kernel privileges leading to complete device compromise, data theft, or persistent backdoor installation.
Likely Case
Local privilege escalation from user to kernel space, potentially allowing app sandbox escape and system-level access.
If Mitigated
Denial of service through system crash or instability if exploitation attempts fail or are partially successful.
🎯 Exploit Status
Exploitation requires understanding of Qualcomm's audio subsystem and memory layout. Likely requires local access or malicious app with appropriate permissions.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: January 2024 security patches and later
Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/january-2024-bulletin
Restart Required: Yes
Instructions:
1. Check with device manufacturer for available security updates. 2. Apply January 2024 or later Android security patches. 3. For OEMs: Integrate Qualcomm's provided fixes into device firmware. 4. Reboot device after patch installation.
🔧 Temporary Workarounds
Disable affected audio features
androidTemporarily disable Listen Sound Model functionality if not required
Requires device-specific configuration; consult device documentation
🧯 If You Can't Patch
- Restrict installation of untrusted applications
- Implement application allowlisting and monitor for suspicious audio service behavior
🔍 How to Verify
Check if Vulnerable:
Check Android security patch level (Settings > About phone > Android version > Security update). If before January 2024, device may be vulnerable.
Check Version:
adb shell getprop ro.build.version.security_patch
Verify Fix Applied:
Verify security patch level shows January 2024 or later. Check with device manufacturer for specific firmware updates.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs
- Audio service crashes
- SELinux denials related to audio HAL
Network Indicators:
- Unusual audio service network connections (though unlikely for this vulnerability)
SIEM Query:
Device logs showing audio service crashes or kernel panics with references to sound model processing