CVE-2023-33058
📋 TL;DR
This vulnerability allows information disclosure in Qualcomm modem chipsets while processing System Information Block 5 (SIB5) messages. Attackers can potentially access sensitive information from affected devices. This affects smartphones and other devices using vulnerable Qualcomm modem chipsets.
💻 Affected Systems
- Qualcomm modem chipsets
📦 What is this software?
Snapdragon 4 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Platform Firmware →
Snapdragon 8 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 3 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Platform Firmware →
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon X65 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf System Firmware →
Snapdragon X70 Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X70 Modem Rf System Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of modem communications allowing interception of cellular data, location tracking, and access to device identifiers.
Likely Case
Information leakage including device identifiers, network configuration data, and potentially user location information.
If Mitigated
Limited information exposure if proper network segmentation and security controls are implemented.
🎯 Exploit Status
Exploitation requires proximity to target device and specialized equipment to interact with cellular signals.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not specified in public references
Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/february-2024-bulletin
Restart Required: Yes
Instructions:
1. Check with device manufacturer for firmware updates. 2. Apply Qualcomm-provided modem firmware patches. 3. Reboot device after update.
🔧 Temporary Workarounds
Disable vulnerable cellular bands
allTemporarily disable affected cellular frequency bands if supported by device
Device-specific carrier settings may allow band disabling
🧯 If You Can't Patch
- Implement network segmentation to isolate vulnerable devices
- Monitor for unusual modem activity and cellular network anomalies
🔍 How to Verify
Check if Vulnerable:
Check device modem firmware version against Qualcomm security bulletin
Check Version:
Device-specific commands vary by manufacturer (e.g., *#*#4636#*#* on some Android devices)
Verify Fix Applied:
Verify modem firmware has been updated to patched version
📡 Detection & Monitoring
Log Indicators:
- Unusual modem firmware errors
- SIB5 processing failures in modem logs
Network Indicators:
- Anomalous cellular signal interactions
- Unexpected modem reset events
SIEM Query:
Search for modem firmware error codes related to SIB5 processing