CVE-2023-32888

7.5 HIGH

📋 TL;DR

This vulnerability in MediaTek's Modem IMS Call UA allows remote attackers to cause denial of service via an out-of-bounds write due to missing bounds checking. It affects devices with MediaTek chipsets that use the vulnerable modem firmware. No user interaction is required for exploitation.

💻 Affected Systems

Products:
  • MediaTek chipsets with Modem IMS Call UA functionality
Versions: Specific firmware versions not publicly detailed in advisory
Operating Systems: Android and other OS using MediaTek modem chips
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with MediaTek chipsets; exact device models not specified in public advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote denial of service causing complete modem failure, disrupting all cellular connectivity including voice calls, SMS, and mobile data on affected devices.

🟠

Likely Case

Temporary modem crashes requiring device reboot to restore cellular connectivity, potentially disrupting ongoing calls and data sessions.

🟢

If Mitigated

With proper network segmentation and access controls, exploitation attempts would be blocked before reaching vulnerable devices.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending specially crafted packets to the modem interface, but no public exploit code is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware patch MOLY01161830

Vendor Advisory: https://corp.mediatek.com/product-security-bulletin/January-2024

Restart Required: Yes

Instructions:

1. Contact device manufacturer for firmware updates. 2. Apply MediaTek-provided patch MOLY01161830. 3. Reboot device after patch installation.

🔧 Temporary Workarounds

Network segmentation

all

Isolate devices from untrusted networks to prevent remote exploitation

Firewall restrictions

all

Block unnecessary modem management interfaces from external networks

🧯 If You Can't Patch

  • Isolate affected devices on separate network segments
  • Implement strict network access controls to modem interfaces

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against MediaTek security bulletin or contact device manufacturer

Check Version:

Device-specific commands vary by manufacturer; typically in Settings > About Phone > Baseband version

Verify Fix Applied:

Verify patch MOLY01161830 is installed via device firmware version check

📡 Detection & Monitoring

Log Indicators:

  • Unexpected modem resets
  • IMS service crashes
  • Baseband processor errors

Network Indicators:

  • Unusual traffic patterns to modem management interfaces
  • Malformed IMS protocol packets

SIEM Query:

Search for modem crash events or baseband error messages in device logs

🔗 References

📤 Share & Export