CVE-2023-31114

9.1 CRITICAL

📋 TL;DR

This vulnerability in Samsung Exynos modem chips allows a crafted application to improperly query SIM card status information. It affects devices using Exynos 5123 and 5300 modems, potentially exposing sensitive SIM data to unauthorized applications.

💻 Affected Systems

Products:
  • Samsung devices with Exynos 5123 modem
  • Samsung devices with Exynos 5300 modem
Versions: All versions prior to patch
Operating Systems: Android-based systems using affected modems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects baseband firmware in modem chips, not the Android OS itself. Requires physical device access or malicious app installation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of SIM card data including IMSI, location information, and authentication credentials, leading to subscriber impersonation or tracking.

🟠

Likely Case

Unauthorized access to SIM status information allowing tracking of device location and subscriber identification.

🟢

If Mitigated

Limited information leakage if proper application sandboxing and permission controls are enforced.

🌐 Internet-Facing: LOW - Requires local application execution, not directly exploitable over internet.
🏢 Internal Only: HIGH - Malicious applications on device can exploit this without user interaction.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires crafting a malicious application that can interact with the modem component. No public exploit code available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Baseband firmware updates from Samsung

Vendor Advisory: https://semiconductor.samsung.com/support/quality-support/product-security-updates/

Restart Required: Yes

Instructions:

1. Check for device manufacturer security updates. 2. Apply latest firmware updates from Samsung. 3. Reboot device after update installation.

🔧 Temporary Workarounds

Application permission restrictions

android

Restrict applications from accessing modem/SIM-related permissions

Disable unnecessary modem features

android

Turn off RCS and other advanced messaging features if not needed

🧯 If You Can't Patch

  • Isolate affected devices from sensitive networks
  • Implement strict application whitelisting and vetting procedures

🔍 How to Verify

Check if Vulnerable:

Check device modem/baseband version in Settings > About Phone > Baseband version

Check Version:

adb shell getprop gsm.version.baseband

Verify Fix Applied:

Verify baseband firmware version matches patched version from Samsung security bulletin

📡 Detection & Monitoring

Log Indicators:

  • Unusual modem/SIM access attempts from applications
  • Multiple SIM status query failures

Network Indicators:

  • Unexpected SIM registration attempts
  • Abnormal RCS protocol traffic

SIEM Query:

source="android_logs" AND (event="modem_access" OR event="sim_query") AND result="denied"

🔗 References

📤 Share & Export