CVE-2023-32845

7.5 HIGH

📋 TL;DR

This vulnerability in 5G modem firmware allows remote attackers to cause a system crash (denial of service) by sending malformed RRC messages. No user interaction or special privileges are required for exploitation. Affects devices using MediaTek 5G modem chipsets.

💻 Affected Systems

Products:
  • MediaTek 5G modem chipsets
Versions: Specific firmware versions not publicly detailed in advisory
Operating Systems: Embedded modem firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with vulnerable MediaTek 5G modem firmware; exact device models not specified in public advisory

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device/system crash requiring physical restart, potentially disrupting critical communications in 5G-connected devices

🟠

Likely Case

Temporary denial of service affecting 5G connectivity until system restarts or recovers

🟢

If Mitigated

Minimal impact if patched; unpatched systems remain vulnerable to remote DoS attacks

🌐 Internet-Facing: HIGH - Attackers can exploit remotely without authentication via 5G network
🏢 Internal Only: LOW - Exploitation requires 5G network access, not typical internal network vectors

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires ability to send malformed RRC messages over 5G network; no public exploit code available

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware with patch ID MOLY01128524

Vendor Advisory: https://corp.mediatek.com/product-security-bulletin/December-2023

Restart Required: Yes

Instructions:

1. Contact device manufacturer for firmware updates 2. Apply firmware update containing patch MOLY01128524 3. Restart device to activate patched firmware

🔧 Temporary Workarounds

Network filtering

all

Implement network-level filtering of suspicious RRC messages if supported by network infrastructure

🧯 If You Can't Patch

  • Isolate vulnerable devices from untrusted 5G networks when possible
  • Implement monitoring for unusual 5G connection drops or modem resets

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against manufacturer's patched versions; contact device vendor for specific vulnerability status

Check Version:

Device-specific commands vary by manufacturer; consult device documentation

Verify Fix Applied:

Confirm firmware version includes patch ID MOLY01128524; verify with manufacturer that patch is applied

📡 Detection & Monitoring

Log Indicators:

  • Unexpected modem/system crashes
  • 5G connection drops without user action
  • Error logs related to RRC message processing

Network Indicators:

  • Unusual RRC message patterns
  • Multiple connection attempts with malformed packets

SIEM Query:

Search for: (event_category="system_crash" OR event_category="modem_failure") AND component="5g_modem"

🔗 References

📤 Share & Export