CVE-2022-33251
📋 TL;DR
This vulnerability allows attackers to cause a denial-of-service (DoS) condition in Qualcomm modems by sending invalid network configuration data. The modem crashes due to a reachable assertion when processing malformed network configuration, affecting devices with vulnerable Qualcomm modem chipsets.
💻 Affected Systems
- Qualcomm modem chipsets
- Devices with Qualcomm modems (smartphones, IoT devices, embedded systems)
📦 What is this software?
Snapdragon 7c\+ Gen 3 Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 7c\+ Gen 3 Compute Firmware →
Snapdragon Auto 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Firmware →
Snapdragon X55 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf System Firmware →
Snapdragon X65 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf System Firmware →
Snapdragon X70 Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X70 Modem Rf System Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Permanent modem failure requiring device reboot or factory reset, disrupting all cellular connectivity including emergency calls.
Likely Case
Temporary modem crash causing loss of cellular connectivity until modem restarts automatically or device reboots.
If Mitigated
Minimal impact with proper network filtering and updated firmware preventing invalid configurations from reaching modem.
🎯 Exploit Status
Exploitation requires sending specially crafted network configuration to modem, which could be done via malicious base station or network packets.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not specified in public bulletin - check with device manufacturers for specific firmware updates
Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/june-2023-bulletin
Restart Required: Yes
Instructions:
1. Check with device manufacturer for firmware updates. 2. Apply Qualcomm-provided modem firmware patches. 3. Reboot device after update. 4. Verify modem functionality post-update.
🔧 Temporary Workarounds
Network filtering
allImplement network filtering to block invalid network configuration packets
Disable vulnerable features
allDisable non-essential network configuration features if supported
🧯 If You Can't Patch
- Implement network monitoring for abnormal modem configuration attempts
- Restrict physical and network access to devices with vulnerable modems
🔍 How to Verify
Check if Vulnerable:
Check device modem firmware version against manufacturer's security bulletins
Check Version:
Device-specific commands vary by manufacturer (e.g., Android: Settings > About phone > Baseband version)
Verify Fix Applied:
Verify modem firmware has been updated to version containing June 2023 Qualcomm security patches
📡 Detection & Monitoring
Log Indicators:
- Modem crash logs
- Unexpected modem resets
- Network configuration errors
Network Indicators:
- Abnormal network configuration packets
- Unexpected modem protocol messages
SIEM Query:
Search for modem crash events or unexpected network configuration attempts in device logs