CVE-2023-28546

7.8 HIGH

📋 TL;DR

This vulnerability allows memory corruption in Qualcomm's SPS application when exporting public keys in the sorter TA. Attackers could potentially execute arbitrary code or cause denial of service on affected devices. This affects devices using Qualcomm chipsets with vulnerable firmware.

💻 Affected Systems

Products:
  • Qualcomm chipsets with SPS application
Versions: Specific firmware versions as listed in Qualcomm advisories
Operating Systems: Android, Linux-based systems using Qualcomm chips
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with Qualcomm chipsets that include the vulnerable SPS firmware component

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, data theft, or persistent backdoor installation

🟠

Likely Case

Application crash or denial of service affecting specific functionality

🟢

If Mitigated

Limited impact due to TrustZone isolation preventing full system compromise

🌐 Internet-Facing: MEDIUM - Requires specific conditions but could be triggered via network interactions
🏢 Internal Only: MEDIUM - Local applications could trigger the vulnerability

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires specific conditions and knowledge of the memory corruption vulnerability

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Qualcomm December 2023 security bulletin for specific patched versions

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin

Restart Required: Yes

Instructions:

1. Check Qualcomm advisory for affected chipset models. 2. Obtain firmware updates from device manufacturer. 3. Apply firmware update following manufacturer instructions. 4. Reboot device to complete installation.

🔧 Temporary Workarounds

Disable vulnerable functionality

all

Restrict or disable SPS application functionality if not required

Enhanced memory protection

linux

Enable ASLR and other memory protection mechanisms

🧯 If You Can't Patch

  • Isolate affected devices from untrusted networks
  • Implement strict application control to prevent unauthorized SPS usage

🔍 How to Verify

Check if Vulnerable:

Check firmware version against Qualcomm's advisory list of vulnerable versions

Check Version:

Device-specific commands vary by manufacturer; typically in Settings > About Phone > Build Number

Verify Fix Applied:

Verify firmware version has been updated to patched version listed in Qualcomm bulletin

📡 Detection & Monitoring

Log Indicators:

  • SPS application crashes
  • TrustZone TA abnormal termination logs
  • Memory access violation errors

Network Indicators:

  • Unexpected SPS-related network traffic
  • Abnormal cryptographic operations

SIEM Query:

source="device_logs" AND ("SPS" OR "sorter_TA") AND ("crash" OR "memory" OR "corruption")

🔗 References

📤 Share & Export