CVE-2023-28538
📋 TL;DR
This vulnerability allows memory corruption in Qualcomm WIN Product's UEFI region when invoking the WinAcpi update driver. Attackers could exploit this to execute arbitrary code or cause system crashes. Affected systems include devices with specific Qualcomm chipsets.
💻 Affected Systems
- Qualcomm WIN Product with WinAcpi driver
📦 What is this software?
Flight Rb5 5g Platform Firmware by Qualcomm
Qualcomm Robotics Rb3 Platform Firmware by Qualcomm
View all CVEs affecting Qualcomm Robotics Rb3 Platform Firmware →
Qualcomm Robotics Rb5 Platform Firmware by Qualcomm
View all CVEs affecting Qualcomm Robotics Rb5 Platform Firmware →
Sd7c Firmware by Qualcomm
Smart Audio 200 Platform Firmware by Qualcomm
Snapdragon 850 Mobile Compute Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 850 Mobile Compute Platform Firmware →
Snapdragon Ar2 Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar2 Gen 1 Platform Firmware →
Snapdragon W5\+ Gen 1 Wearable Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon W5\+ Gen 1 Wearable Platform Firmware →
Snapdragon X50 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X50 5g Modem Rf System Firmware →
Snapdragon X55 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf System Firmware →
Snapdragon Xr1 Platform Firmware by Qualcomm
Snapdragon Xr2 5g Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Xr2 5g Platform Firmware →
Snapdragon Xr2\+ Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Xr2\+ Gen 1 Platform Firmware →
Vision Intelligence 300 Platform Firmware by Qualcomm
View all CVEs affecting Vision Intelligence 300 Platform Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with persistent malware installation at firmware level, allowing attackers to bypass OS security controls and maintain persistence across reboots.
Likely Case
System instability, crashes, or denial of service; potential for privilege escalation if combined with other vulnerabilities.
If Mitigated
Limited impact with proper firmware validation and secure boot enabled; system may still experience crashes but less likely to be fully compromised.
🎯 Exploit Status
Exploitation requires local access or ability to trigger WinAcpi driver calls; UEFI-level vulnerabilities typically require sophisticated exploitation
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Qualcomm chipset-specific firmware updates
Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin
Restart Required: Yes
Instructions:
1. Check Qualcomm advisory for affected chipset list. 2. Contact device manufacturer for firmware updates. 3. Apply UEFI firmware update following manufacturer instructions. 4. Verify secure boot remains enabled after update.
🔧 Temporary Workarounds
Enable Secure Boot
windowsEnsure UEFI Secure Boot is enabled to prevent unauthorized firmware modifications
Restrict Physical Access
allLimit physical access to devices to prevent local exploitation
🧯 If You Can't Patch
- Isolate affected systems from untrusted networks
- Implement strict access controls and monitoring for suspicious firmware activity
🔍 How to Verify
Check if Vulnerable:
Check UEFI firmware version against Qualcomm advisory; examine system logs for WinAcpi driver errors
Check Version:
wmic bios get smbiosbiosversion (Windows) or dmidecode -t bios (Linux)
Verify Fix Applied:
Verify UEFI firmware version has been updated to patched version; confirm secure boot is active
📡 Detection & Monitoring
Log Indicators:
- UEFI firmware update logs
- WinAcpi driver error messages
- System crashes with memory corruption errors
Network Indicators:
- Unusual firmware update network traffic
SIEM Query:
EventID=6008 OR EventID=41 (Windows crash events) combined with firmware-related process names