INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global phishing Multiple sectors HIGH 34m Global insider Cybersecurity Services CRITICAL 44m Global ransomware Multiple sectors (U.S. companies) CRITICAL 57m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h Global phishing Multiple sectors HIGH 34m Global insider Cybersecurity Services CRITICAL 44m Global ransomware Multiple sectors (U.S. companies) CRITICAL 57m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h Global phishing Multiple sectors HIGH 34m Global insider Cybersecurity Services CRITICAL 44m Global ransomware Multiple sectors (U.S. companies) CRITICAL 57m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h
Vulnerabilities

CVE-2023-33107

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Qualcomm Multiple Chipsets Integer Overflow Vulnerability — Multiple Qualcomm chipsets contain an integer overflow vulnerability due to memory corruption in Graphics Linux while assigning shared virtu
Published: Dec 5, 2023  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Qualcomm Multiple Chipsets Integer Overflow Vulnerability — Multiple Qualcomm chipsets contain an integer overflow vulnerability due to memory corruption in Graphics Linux while assigning shared virtual memory region during IOCTL call.

🤖 AI Executive Summary

CVE-2023-33107 is a critical integer overflow vulnerability (CVSS 9.0) affecting multiple Qualcomm chipsets in the Graphics Linux subsystem, triggered during IOCTL calls when assigning shared virtual memory regions. The flaw enables memory corruption that can lead to privilege escalation or arbitrary code execution on affected devices. This vulnerability has a confirmed public exploit, making it actively exploitable in the wild. Immediate patching is strongly recommended given the widespread deployment of Qualcomm chipsets across mobile, IoT, and embedded systems.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 18, 2026 08:50
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations face significant exposure across multiple critical sectors. Government and NCA-regulated entities using Qualcomm-powered mobile devices and endpoints are at high risk of privilege escalation attacks targeting sensitive data. Banking and SAMA-regulated institutions relying on mobile banking platforms and employee devices with Qualcomm chipsets could face credential theft and unauthorized access to financial systems. Energy sector organizations including Saudi Aramco and NEOM smart infrastructure projects using Qualcomm-based IoT and embedded devices in operational technology environments are particularly vulnerable. Telecom providers such as STC and Zain KSA deploying Qualcomm-based network equipment and customer devices face broad attack surfaces. Healthcare organizations using Qualcomm-powered medical IoT devices and tablets for patient data management are also at risk. The confirmed exploit availability significantly elevates the threat level for all sectors.
🏢 Affected Saudi Sectors
Banking Government Energy Telecom Healthcare Defense Smart Cities Transportation
⚖️ Saudi Risk Score (AI)
9.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Inventory all Qualcomm chipset-based devices across the organization including mobile phones, tablets, IoT devices, and embedded systems.
2. Identify devices running affected chipset models and prioritize based on criticality and network exposure.
3. Restrict IOCTL access permissions on Linux-based Qualcomm systems where patching is not immediately possible.
4. Isolate high-risk unpatched devices from sensitive network segments.

PATCHING GUIDANCE:
1. Apply Qualcomm Security Bulletin patches immediately — check Qualcomm Product Security Center for the specific chipset firmware updates.
2. For Android devices, apply the relevant Android Security Bulletin patches (December 2023 or later) from OEM vendors.
3. For embedded/IoT systems, contact device manufacturers for firmware updates incorporating Qualcomm's patch.
4. Prioritize patching internet-facing and privileged-access devices first.

COMPENSATING CONTROLS (if patch unavailable):
1. Enforce Mobile Device Management (MDM) policies to restrict sideloading and untrusted application installation.
2. Implement application whitelisting on Qualcomm-based Linux systems.
3. Enable SELinux/AppArmor mandatory access controls to limit IOCTL exploitation impact.
4. Deploy network segmentation to isolate vulnerable devices from critical infrastructure.
5. Monitor for anomalous privilege escalation attempts using SIEM rules.

DETECTION RULES:
1. Monitor for unusual IOCTL calls from unprivileged processes targeting GPU/graphics subsystems.
2. Alert on unexpected privilege escalation events (UID 0 transitions) on mobile and embedded Linux systems.
3. Deploy EDR solutions capable of detecting memory corruption exploitation patterns.
4. Review logs for abnormal graphics driver interactions and shared memory allocation anomalies.
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. جرد جميع الأجهزة المبنية على شرائح Qualcomm في المؤسسة بما تشمل الهواتف المحمولة والأجهزة اللوحية وأجهزة إنترنت الأشياء والأنظمة المدمجة.
2. تحديد الأجهزة التي تعمل بشرائح متأثرة وترتيب أولويات المعالجة بناءً على الأهمية ومستوى التعرض للشبكة.
3. تقييد صلاحيات الوصول إلى IOCTL على أنظمة Qualcomm المبنية على Linux حيث لا يمكن التصحيح الفوري.
4. عزل الأجهزة غير المُصححة عالية الخطورة عن شرائح الشبكة الحساسة.

إرشادات التصحيح:
1. تطبيق تصحيحات نشرة أمان Qualcomm فوراً — مراجعة مركز أمان منتجات Qualcomm للحصول على تحديثات البرامج الثابتة الخاصة بكل شريحة.
2. لأجهزة Android، تطبيق تصحيحات نشرة أمان Android ذات الصلة (ديسمبر 2023 أو أحدث) من موردي OEM.
3. للأنظمة المدمجة وإنترنت الأشياء، التواصل مع الشركات المصنعة للأجهزة للحصول على تحديثات البرامج الثابتة المتضمنة لتصحيح Qualcomm.
4. إعطاء الأولوية لتصحيح الأجهزة المتصلة بالإنترنت والأجهزة ذات الوصول المميز أولاً.

ضوابط التعويض (في حال عدم توفر التصحيح):
1. تطبيق سياسات إدارة الأجهزة المحمولة (MDM) لتقييد التثبيت الجانبي والتطبيقات غير الموثوقة.
2. تطبيق قوائم السماح للتطبيقات على أنظمة Linux المبنية على Qualcomm.
3. تفعيل ضوابط الوصول الإلزامية SELinux/AppArmor للحد من تأثير استغلال IOCTL.
4. نشر تجزئة الشبكة لعزل الأجهزة الضعيفة عن البنية التحتية الحيوية.
5. مراقبة محاولات تصعيد الصلاحيات غير الطبيعية باستخدام قواعد SIEM.

قواعد الكشف:
1. مراقبة استدعاءات IOCTL غير المعتادة من العمليات غير المميزة التي تستهدف نظام الرسومات/GPU.
2. التنبيه على أحداث تصعيد الصلاحيات غير المتوقعة (انتقالات UID 0) على أنظمة Linux المحمولة والمدمجة.
3. نشر حلول EDR القادرة على اكتشاف أنماط استغلال إتلاف الذاكرة.
4. مراجعة السجلات بحثاً عن تفاعلات غير طبيعية مع برامج تشغيل الرسومات وشذوذات تخصيص الذاكرة المشتركة.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-2-1: Cybersecurity Risk Management ECC-3-1: Asset Management — Mobile and IoT device inventory ECC-3-3: Vulnerability Management — Critical patch application within defined SLA ECC-3-5: Endpoint Security — Mobile device protection controls ECC-4-1: Cybersecurity Event Management — Detection of exploitation attempts
🔵 SAMA CSF
3.3.3 Vulnerability Management — Timely remediation of critical vulnerabilities 3.3.5 Patch Management — Critical patch deployment procedures 3.3.6 Mobile Device Security — MDM policy enforcement 3.4.2 Incident Management — Response to active exploitation 3.2.1 Asset Management — Qualcomm device inventory and classification
🟡 ISO 27001:2022
A.8.8 Management of technical vulnerabilities A.8.7 Protection against malware A.8.9 Configuration management A.8.19 Installation of software on operational systems A.5.30 ICT readiness for business continuity A.8.16 Monitoring activities — Detection of anomalous behavior
🟣 PCI DSS v4.0
Requirement 6.3.3 — All system components protected from known vulnerabilities via security patches Requirement 12.3.2 — Targeted risk analysis for technology in use Requirement 6.2.4 — Software development practices to prevent vulnerabilities
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Qualcomm:Multiple Chipsets
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS0.25%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2023-12-26
Published 2023-12-05
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.2
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.