CVE-2022-33305

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to cause a denial-of-service (DoS) condition in Qualcomm modems by sending specially crafted invalid messages on the DCCH channel. The NULL pointer dereference can crash the modem, disrupting cellular connectivity. This affects devices using vulnerable Qualcomm modem chipsets.

💻 Affected Systems

Products:
  • Qualcomm modem chipsets
Versions: Specific versions not publicly detailed in bulletin
Operating Systems: Android and other mobile OS using Qualcomm modems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with vulnerable Qualcomm modem firmware. Exact chipset models not specified in public bulletin.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Permanent modem crash requiring device reboot, complete loss of cellular connectivity including emergency services access.

🟠

Likely Case

Temporary modem crash causing dropped calls, lost data connectivity, and service disruption until modem resets.

🟢

If Mitigated

Minimal impact with proper network filtering and updated firmware preventing invalid message delivery.

🌐 Internet-Facing: MEDIUM - Attack requires proximity to target device or ability to send cellular network messages.
🏢 Internal Only: LOW - Not typically exploitable from internal enterprise networks without cellular access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires ability to send invalid DCCH messages to target device, typically requiring cellular network access or proximity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to May 2023 Qualcomm security bulletin for specific patched versions

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/may-2023-bulletin

Restart Required: Yes

Instructions:

1. Check device manufacturer for firmware updates. 2. Apply Qualcomm modem firmware patches. 3. Reboot device after update. 4. Verify patch installation through device settings.

🔧 Temporary Workarounds

Network filtering

all

Implement network-level filtering to block invalid DCCH messages

🧯 If You Can't Patch

  • Isolate vulnerable devices from untrusted cellular networks when possible
  • Implement monitoring for modem crash events and service disruptions

🔍 How to Verify

Check if Vulnerable:

Check device modem firmware version against Qualcomm's patched versions in May 2023 bulletin

Check Version:

Device-specific: Check Settings > About Phone > Baseband version on Android devices

Verify Fix Applied:

Verify modem firmware has been updated to patched version and monitor for stability

📡 Detection & Monitoring

Log Indicators:

  • Modem crash logs
  • Unexpected modem resets
  • DCCH protocol errors

Network Indicators:

  • Unusual DCCH message patterns
  • Modem disconnection events

SIEM Query:

Search for modem crash events, baseband processor failures, or cellular service disruption logs

🔗 References

📤 Share & Export