CVE-2023-28547

8.4 HIGH

📋 TL;DR

This CVE describes a memory corruption vulnerability in the SPS Application's sorter Trusted Application (TA) when requesting public keys. Successful exploitation could allow attackers to execute arbitrary code or cause denial of service. The vulnerability affects Qualcomm chipsets used in mobile devices and IoT products.

💻 Affected Systems

Products:
  • Qualcomm chipsets with SPS Application
Versions: Multiple Qualcomm chipset versions prior to April 2024 security updates
Operating Systems: Android, Linux-based embedded systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices using vulnerable Qualcomm chipsets; exact device models depend on manufacturer implementation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, data theft, or persistent backdoor installation.

🟠

Likely Case

Application crash or denial of service affecting device functionality.

🟢

If Mitigated

Limited impact with proper memory protection mechanisms and exploit mitigations in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires local access or ability to execute code in the affected TA context.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: April 2024 security patch level or later

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2024-bulletin.html

Restart Required: Yes

Instructions:

1. Check with device manufacturer for available security updates. 2. Apply April 2024 or later security patches. 3. Reboot device after patch installation.

🔧 Temporary Workarounds

Disable unnecessary TA functionality

all

Restrict access to sorter TA if not required for device operation

🧯 If You Can't Patch

  • Implement strict application sandboxing to limit TA access
  • Deploy runtime memory protection mechanisms like ASLR and DEP

🔍 How to Verify

Check if Vulnerable:

Check device security patch level in settings; if before April 2024, likely vulnerable.

Check Version:

On Android: Settings > About phone > Android version > Security patch level

Verify Fix Applied:

Verify security patch level shows April 2024 or later after update.

📡 Detection & Monitoring

Log Indicators:

  • Crash logs from sorter TA
  • Unexpected memory access violations in system logs

Network Indicators:

  • Unusual TA communication patterns

SIEM Query:

Search for process crashes related to 'sorter' or 'SPS' components

🔗 References

📤 Share & Export