CVE-2023-28574

9.0 CRITICAL

📋 TL;DR

This vulnerability allows memory corruption in Qualcomm's Diag handler when processing commands to configure event listeners. Attackers could potentially execute arbitrary code or cause denial of service on affected devices. This affects smartphones, tablets, and other devices using vulnerable Qualcomm chipsets.

💻 Affected Systems

Products:
  • Qualcomm chipsets with Diag services enabled
Versions: Multiple Qualcomm chipset versions prior to November 2023 patches
Operating Systems: Android, Linux-based systems using Qualcomm chips
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Diag services to be enabled/accessible. Many mobile devices have this enabled by default for debugging.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, data theft, or persistent backdoor installation

🟠

Likely Case

Device crash/reboot (denial of service) or limited code execution in privileged context

🟢

If Mitigated

Denial of service only if memory corruption cannot be leveraged for code execution

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending specially crafted Diag commands. No public exploit code available as of knowledge cutoff.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to November 2023 Qualcomm security bulletin for specific chipset patches

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/november-2023-bulletin

Restart Required: Yes

Instructions:

1. Check Qualcomm November 2023 security bulletin for your chipset. 2. Obtain firmware update from device manufacturer. 3. Apply update following manufacturer instructions. 4. Reboot device.

🔧 Temporary Workarounds

Disable Diag services

all

Disable Qualcomm Diag diagnostic services if not required

Device-specific - consult manufacturer documentation

Network segmentation

linux

Restrict access to Diag service ports

iptables -A INPUT -p tcp --dport [diag_port] -j DROP
ufw deny [diag_port]

🧯 If You Can't Patch

  • Implement strict network access controls to Diag service ports
  • Monitor for abnormal Diag command patterns and device crashes

🔍 How to Verify

Check if Vulnerable:

Check chipset version and compare against Qualcomm's November 2023 security bulletin

Check Version:

Device-specific - typically 'getprop ro.bootloader' or similar on Android devices

Verify Fix Applied:

Verify firmware version includes November 2023 Qualcomm security patches

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Diag service activity
  • Device crashes/reboots
  • Memory corruption errors in system logs

Network Indicators:

  • Traffic to Diag service ports (typically 9200-9210)
  • Unusual command patterns to Diag services

SIEM Query:

source="*diag*" OR "Qualcomm Diag" AND (event="crash" OR "memory corruption" OR "unexpected command")

🔗 References

📤 Share & Export