CVE-2023-33043
📋 TL;DR
This vulnerability allows a denial-of-service (DoS) attack on Qualcomm modems when a beam switch request is made with a non-configured bandwidth part (BWP). It affects devices using Qualcomm modems with vulnerable firmware, primarily mobile devices and IoT equipment.
💻 Affected Systems
- Qualcomm modem chipsets
📦 What is this software?
Snapdragon 4 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 2 Mobile Platform Firmware →
Snapdragon 7c\+ Gen 3 Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 7c\+ Gen 3 Compute Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon X65 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf System Firmware →
Snapdragon X70 Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X70 Modem Rf System Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Complete modem failure causing loss of cellular connectivity until device restart, potentially affecting emergency services access.
Likely Case
Temporary loss of cellular data/voice connectivity requiring device reboot to restore functionality.
If Mitigated
Minimal impact with proper network segmentation and monitoring; isolated to affected device only.
🎯 Exploit Status
Exploitation requires specialized knowledge of modem protocols and likely physical proximity or network-level access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to device manufacturer updates; Qualcomm has provided fixes to OEMs.
Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin
Restart Required: Yes
Instructions:
1. Check with device manufacturer for security updates. 2. Apply available firmware updates. 3. Reboot device after update installation.
🔧 Temporary Workarounds
Network segmentation
allIsolate vulnerable devices from untrusted networks to reduce attack surface.
Monitor for unusual modem behavior
allImplement monitoring for modem disconnections or failures.
🧯 If You Can't Patch
- Isolate affected devices on separate network segments
- Implement strict physical access controls for vulnerable devices
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against manufacturer security bulletins; no direct command available.
Check Version:
Device-specific; typically in Settings > About Phone > Baseband Version or similar.
Verify Fix Applied:
Verify firmware version has been updated to patched version from manufacturer.
📡 Detection & Monitoring
Log Indicators:
- Unexpected modem resets
- Beam switch failure logs
- Modem connectivity loss events
Network Indicators:
- Sudden loss of cellular connectivity in monitored devices
- Abnormal beam switching patterns
SIEM Query:
Search for modem failure events or baseband resets in device logs.