CVE-2023-24852

8.4 HIGH

📋 TL;DR

This vulnerability allows memory corruption in Qualcomm's Core due to improper secure memory access while loading modem images. Attackers could potentially execute arbitrary code or cause denial of service. Affects devices with Qualcomm chipsets that haven't applied the November 2023 security patches.

💻 Affected Systems

Products:
  • Qualcomm Snapdragon chipsets
  • Devices with Qualcomm modems
Versions: Specific affected chipset versions listed in Qualcomm November 2023 bulletin
Operating Systems: Android, Linux-based systems using Qualcomm chips
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices before November 2023 security patches. Exact chipset models vary - check Qualcomm advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, data theft, or persistent backdoor installation.

🟠

Likely Case

Device crash/reboot (denial of service) or limited memory corruption affecting modem functionality.

🟢

If Mitigated

Minimal impact if patched; unpatched devices remain vulnerable to attacks requiring physical access or local exploitation.

🌐 Internet-Facing: MEDIUM - Requires specific conditions but could be exploited remotely via malicious baseband interactions.
🏢 Internal Only: HIGH - Local attackers or malicious apps could exploit this vulnerability more easily.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires specific knowledge of modem image loading process and memory layout. Likely requires local access or specialized radio equipment.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: November 2023 security patch level or later

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/november-2023-bulletin

Restart Required: Yes

Instructions:

1. Check device manufacturer for November 2023 security update availability. 2. Apply OTA update from device settings. 3. For embedded systems, update Qualcomm firmware through vendor channels. 4. Reboot device after update.

🔧 Temporary Workarounds

Disable unnecessary modem features

all

Reduce attack surface by disabling unused modem capabilities

# Device-specific commands vary by manufacturer
# Consult device documentation for modem configuration

Restrict physical access

all

Prevent local exploitation by controlling device physical access

🧯 If You Can't Patch

  • Isolate affected devices on separate network segments
  • Implement strict application allowlisting to prevent malicious apps

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android version. If before November 2023, device is likely vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify security patch level shows November 2023 or later. Check Qualcomm chipset firmware version if available.

📡 Detection & Monitoring

Log Indicators:

  • Modem crash logs
  • Kernel panic related to modem subsystem
  • Unexpected modem image loading attempts

Network Indicators:

  • Unusual baseband communication patterns
  • Suspicious modem firmware update attempts

SIEM Query:

source="kernel" AND ("modem crash" OR "qcom" OR "secure memory")

🔗 References

📤 Share & Export