CVE-2023-33049

7.5 HIGH

📋 TL;DR

CVE-2023-33049 is a heap memory leak vulnerability in Qualcomm's Multi-Mode Call Processor that can cause a denial of service (DoS) when user equipment (UE) fails. This affects mobile devices and infrastructure using vulnerable Qualcomm chipsets, potentially disrupting cellular connectivity.

💻 Affected Systems

Products:
  • Qualcomm chipsets with Multi-Mode Call Processor functionality
Versions: Specific versions not publicly detailed; refer to Qualcomm advisory for chipset-specific details.
Operating Systems: Android and other mobile OSes using affected Qualcomm chipsets
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both mobile devices and cellular network infrastructure equipment using vulnerable Qualcomm components.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete cellular service disruption on affected devices, requiring device restart or carrier intervention to restore functionality.

🟠

Likely Case

Temporary call drops or connectivity issues for individual users on vulnerable devices.

🟢

If Mitigated

Minimal impact with proper patching; isolated incidents quickly resolved.

🌐 Internet-Facing: LOW - This is a cellular network vulnerability, not directly internet-exposed.
🏢 Internal Only: MEDIUM - Affects internal cellular infrastructure and devices, but requires specific conditions.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires triggering specific UE failure conditions; no public exploit details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Qualcomm chipset-specific security updates

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/february-2024-bulletin

Restart Required: Yes

Instructions:

1. Check with device manufacturer for security updates. 2. Apply Qualcomm-provided firmware patches. 3. Reboot affected devices after patching.

🔧 Temporary Workarounds

Network-side monitoring

all

Monitor cellular network for abnormal UE failures and isolate affected devices

🧯 If You Can't Patch

  • Implement network monitoring to detect and isolate devices showing abnormal failure patterns
  • Consider temporary device replacement or rotation for critical infrastructure components

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against manufacturer's security bulletins; verify Qualcomm chipset model and firmware version

Check Version:

Device-specific: Typically in Settings > About Phone > Software Information

Verify Fix Applied:

Confirm firmware version has been updated to patched version from manufacturer

📡 Detection & Monitoring

Log Indicators:

  • Repeated UE failure events in cellular network logs
  • Abnormal call processor restarts

Network Indicators:

  • Increased call drop rates in specific areas
  • Unusual UE re-registration patterns

SIEM Query:

Search for 'UE failure' OR 'call processor restart' events in cellular network logs

🔗 References

📤 Share & Export