CVE-2023-32888
📋 TL;DR
This vulnerability in MediaTek's Modem IMS Call UA allows remote attackers to cause denial of service via an out-of-bounds write due to missing bounds checking. It affects devices with MediaTek chipsets that use the vulnerable modem firmware. No user interaction is required for exploitation.
💻 Affected Systems
- MediaTek chipsets with Modem IMS Call UA functionality
📦 What is this software?
Nr15 by Mediatek
Nr16 by Mediatek
Nr17 by Mediatek
⚠️ Risk & Real-World Impact
Worst Case
Remote denial of service causing complete modem failure, disrupting all cellular connectivity including voice calls, SMS, and mobile data on affected devices.
Likely Case
Temporary modem crashes requiring device reboot to restore cellular connectivity, potentially disrupting ongoing calls and data sessions.
If Mitigated
With proper network segmentation and access controls, exploitation attempts would be blocked before reaching vulnerable devices.
🎯 Exploit Status
Exploitation requires sending specially crafted packets to the modem interface, but no public exploit code is available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Firmware patch MOLY01161830
Vendor Advisory: https://corp.mediatek.com/product-security-bulletin/January-2024
Restart Required: Yes
Instructions:
1. Contact device manufacturer for firmware updates. 2. Apply MediaTek-provided patch MOLY01161830. 3. Reboot device after patch installation.
🔧 Temporary Workarounds
Network segmentation
allIsolate devices from untrusted networks to prevent remote exploitation
Firewall restrictions
allBlock unnecessary modem management interfaces from external networks
🧯 If You Can't Patch
- Isolate affected devices on separate network segments
- Implement strict network access controls to modem interfaces
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against MediaTek security bulletin or contact device manufacturer
Check Version:
Device-specific commands vary by manufacturer; typically in Settings > About Phone > Baseband version
Verify Fix Applied:
Verify patch MOLY01161830 is installed via device firmware version check
📡 Detection & Monitoring
Log Indicators:
- Unexpected modem resets
- IMS service crashes
- Baseband processor errors
Network Indicators:
- Unusual traffic patterns to modem management interfaces
- Malformed IMS protocol packets
SIEM Query:
Search for modem crash events or baseband error messages in device logs