INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global phishing Multiple sectors HIGH 34m Global insider Cybersecurity Services CRITICAL 43m Global ransomware Multiple sectors (U.S. companies) CRITICAL 57m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h Global phishing Multiple sectors HIGH 34m Global insider Cybersecurity Services CRITICAL 43m Global ransomware Multiple sectors (U.S. companies) CRITICAL 57m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h Global phishing Multiple sectors HIGH 34m Global insider Cybersecurity Services CRITICAL 43m Global ransomware Multiple sectors (U.S. companies) CRITICAL 57m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h
Vulnerabilities

CVE-2023-33106

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Qualcomm Multiple Chipsets Use of Out-of-Range Pointer Offset Vulnerability — Multiple Qualcomm chipsets contain a use of out-of-range pointer offset vulnerability due to memory corruption in Graphics
Published: Dec 5, 2023  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Qualcomm Multiple Chipsets Use of Out-of-Range Pointer Offset Vulnerability — Multiple Qualcomm chipsets contain a use of out-of-range pointer offset vulnerability due to memory corruption in Graphics while submitting a large list of sync points in an AUX command to the IOCTL_KGSL_GPU_AUX_COMMAND.

🤖 AI Executive Summary

CVE-2023-33106 is a critical memory corruption vulnerability (CVSS 9.0) affecting multiple Qualcomm chipsets, specifically in the Graphics subsystem when processing large sync point lists via IOCTL_KGSL_GPU_AUX_COMMAND. An attacker exploiting this out-of-range pointer offset flaw can achieve privilege escalation or arbitrary code execution at the kernel level on affected Android and embedded devices. A confirmed exploit is publicly available, significantly elevating the risk of active exploitation in the wild. Organizations relying on Qualcomm-powered devices — including smartphones, IoT endpoints, and embedded systems — must treat this as an urgent patching priority.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 18, 2026 11:54
🇸🇦 Saudi Arabia Impact Assessment
Saudi Arabia faces elevated exposure due to the widespread deployment of Qualcomm-powered devices across critical sectors. Telecom operators (STC, Mobily, Zain) rely heavily on Qualcomm-based network infrastructure and mobile endpoints. Government entities under NCA oversight using Android-based mobile devices for field operations are at risk of kernel-level compromise. Banking and financial institutions regulated by SAMA that issue corporate mobile devices to employees face potential credential theft and lateral movement risks. Energy sector organizations including Saudi Aramco and NEOM smart city infrastructure using Qualcomm-based IoT and embedded systems are particularly vulnerable. Healthcare organizations using Qualcomm-powered medical tablets and mobile diagnostic devices face patient data exposure risks. The availability of a working exploit makes this especially dangerous for Saudi SOCs managing large mobile device fleets.
🏢 Affected Saudi Sectors
Telecom Banking Government Energy Healthcare Smart Cities Defense Retail
⚖️ Saudi Risk Score (AI)
9.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS (0-24 hours):
1. Inventory all Qualcomm-chipset devices across the organization (smartphones, tablets, IoT, embedded systems)
2. Identify affected chipset models using Qualcomm's official security bulletin (October 2023)
3. Restrict physical and network access to unpatched high-value devices
4. Enable Mobile Device Management (MDM) policies to detect unauthorized privilege escalation attempts

PATCHING GUIDANCE (24-72 hours):
1. Apply Qualcomm's October 2023 security patch immediately — coordinate with OEM vendors (Samsung, Xiaomi, OnePlus, etc.) for device-specific updates
2. For Android devices: apply Google's October 2023 Android Security Bulletin patches
3. For embedded/IoT systems: contact Qualcomm OEM partners for firmware updates
4. Prioritize patching devices with privileged access to corporate networks

COMPENSATING CONTROLS (if patching is delayed):
1. Enforce strict application allowlisting on affected devices via MDM
2. Disable sideloading of applications on all corporate devices
3. Implement network segmentation to isolate unpatched devices
4. Enable kernel integrity monitoring where supported
5. Deploy mobile threat defense (MTD) solutions to detect exploitation attempts

DETECTION RULES:
1. Monitor for anomalous IOCTL calls to KGSL GPU driver from unprivileged processes
2. Alert on unexpected privilege escalation events on mobile endpoints
3. Deploy SIEM rules to detect unusual GPU memory allocation patterns
4. Monitor for known exploit signatures using updated EDR/MTD signatures
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية (0-24 ساعة):
1. جرد جميع الأجهزة المزودة بشرائح Qualcomm في المؤسسة (الهواتف الذكية، الأجهزة اللوحية، إنترنت الأشياء، الأنظمة المدمجة)
2. تحديد طرازات الشرائح المتأثرة باستخدام نشرة أمان Qualcomm الرسمية (أكتوبر 2023)
3. تقييد الوصول المادي والشبكي للأجهزة غير المُرقَّعة ذات القيمة العالية
4. تفعيل سياسات إدارة الأجهزة المحمولة (MDM) للكشف عن محاولات تصعيد الامتيازات غير المصرح بها

إرشادات التصحيح (24-72 ساعة):
1. تطبيق تصحيح أمان Qualcomm لأكتوبر 2023 فوراً والتنسيق مع موردي OEM للحصول على تحديثات خاصة بالأجهزة
2. لأجهزة Android: تطبيق تصحيحات نشرة أمان Android لأكتوبر 2023
3. لأنظمة IoT والأنظمة المدمجة: التواصل مع شركاء OEM من Qualcomm للحصول على تحديثات البرامج الثابتة
4. إعطاء الأولوية لتصحيح الأجهزة ذات الوصول المميز إلى شبكات الشركة

ضوابط التعويض (في حالة تأخر التصحيح):
1. فرض قوائم السماح الصارمة للتطبيقات على الأجهزة المتأثرة عبر MDM
2. تعطيل تثبيت التطبيقات من مصادر غير رسمية على جميع أجهزة الشركة
3. تطبيق تجزئة الشبكة لعزل الأجهزة غير المُرقَّعة
4. تفعيل مراقبة سلامة النواة حيثما كان ذلك مدعوماً
5. نشر حلول الدفاع عن التهديدات المحمولة (MTD) للكشف عن محاولات الاستغلال

قواعد الكشف:
1. مراقبة استدعاءات IOCTL غير الطبيعية لمشغل KGSL GPU من العمليات غير المميزة
2. التنبيه على أحداث تصعيد الامتيازات غير المتوقعة على نقاط النهاية المحمولة
3. نشر قواعد SIEM للكشف عن أنماط تخصيص ذاكرة GPU غير المعتادة
4. مراقبة توقيعات الاستغلال المعروفة باستخدام توقيعات EDR/MTD المحدثة
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-2-1: Asset Management — inventory of Qualcomm-based devices ECC-3-3: Vulnerability Management — timely patching of critical vulnerabilities ECC-3-2: Patch Management — applying vendor security updates within defined SLAs ECC-4-1: Mobile Device Security — MDM enforcement and device hardening ECC-2-6: Physical and Environmental Security — restricting access to unpatched devices
🔵 SAMA CSF
Cybersecurity Risk Management — identification and treatment of critical device vulnerabilities Endpoint Security — mobile device security controls and patch management Vulnerability Management — exploit-available vulnerability prioritization Third-Party Risk Management — OEM vendor patch coordination Security Monitoring and Operations — detection of exploitation attempts on mobile endpoints
🟡 ISO 27001:2022
A.8.8 — Management of technical vulnerabilities A.8.9 — Configuration management for affected devices A.8.7 — Protection against malware on mobile endpoints A.5.30 — ICT readiness for business continuity A.8.19 — Installation of software on operational systems
🟣 PCI DSS v4.0
Requirement 6.3 — Security vulnerabilities are identified and addressed Requirement 6.3.3 — All system components protected from known vulnerabilities via patching Requirement 12.3.2 — Targeted risk analysis for payment-processing mobile devices Requirement 5.2 — Malicious software protection on mobile POS devices
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Qualcomm:Multiple Chipsets
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS0.16%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2023-12-26
Published 2023-12-05
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.2
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.