CVE-2023-28551

7.8 HIGH

📋 TL;DR

This vulnerability allows memory corruption in Qualcomm modem UTILS when processing Diag commands with arbitrary address values. Attackers could potentially execute arbitrary code or cause denial of service on affected devices. This affects devices with Qualcomm modems that have vulnerable firmware versions.

💻 Affected Systems

Products:
  • Qualcomm modem chipsets with vulnerable firmware
Versions: Specific affected firmware versions not publicly detailed in bulletin
Operating Systems: Android and other OS using Qualcomm modems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with Qualcomm modems where Diag interface is accessible. Exact chipset models not specified in public bulletin.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution on the modem, potentially leading to complete device compromise, data exfiltration, or persistent backdoor installation.

🟠

Likely Case

Denial of service causing modem crashes, loss of cellular connectivity, or device instability requiring reboot.

🟢

If Mitigated

Limited impact if proper access controls prevent unauthorized Diag command execution and network segmentation is implemented.

🌐 Internet-Facing: MEDIUM - Requires specific Diag command access which may be exposed through diagnostic interfaces or vulnerable applications.
🏢 Internal Only: HIGH - If internal diagnostic tools or compromised applications can send Diag commands to the modem.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to send Diag commands to the modem, which typically requires some level of access or compromised application.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to December 2023 Qualcomm security bulletin for specific patched firmware versions

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin

Restart Required: Yes

Instructions:

1. Check with device manufacturer for firmware updates. 2. Apply Qualcomm-provided firmware patches. 3. Reboot device after update. 4. Verify modem firmware version is updated.

🔧 Temporary Workarounds

Disable diagnostic interfaces

all

Restrict access to modem diagnostic interfaces to prevent unauthorized Diag command execution

Device-specific commands to disable Diag services

Network segmentation

all

Isolate devices with vulnerable modems from untrusted networks

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized applications from accessing modem interfaces
  • Monitor for unusual modem diagnostic activity or unexpected modem resets

🔍 How to Verify

Check if Vulnerable:

Check modem firmware version against Qualcomm security bulletin. Use device-specific diagnostic tools to query modem firmware version.

Check Version:

Device-specific commands (e.g., Android: getprop | grep version.baseband)

Verify Fix Applied:

Verify modem firmware version has been updated to patched version specified in Qualcomm bulletin.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected modem resets
  • Diag command execution logs
  • Modem crash reports

Network Indicators:

  • Unusual diagnostic protocol traffic to modem interfaces

SIEM Query:

Search for modem diagnostic service access or modem crash events in device logs

🔗 References

📤 Share & Export