CVE-2023-33095
📋 TL;DR
This vulnerability in Qualcomm's NR (New Radio) DL NAS transport OTA processing allows an attacker to cause a denial-of-service (DoS) by sending specially crafted payload containers with incorrect length values. It affects mobile devices and infrastructure equipment using vulnerable Qualcomm chipsets, potentially disrupting cellular network connectivity.
💻 Affected Systems
- Qualcomm chipsets with NR (5G) capabilities
- Mobile devices using affected Qualcomm chipsets
- 5G network infrastructure equipment
📦 What is this software?
Snapdragon 4 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 1 Mobile Firmware →
Snapdragon 4 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 2 Mobile Firmware →
Snapdragon 480 5g Mobile Firmware by Qualcomm
Snapdragon 480 5g Mobile Firmware by Qualcomm
Snapdragon 690 5g Mobile Firmware by Qualcomm
Snapdragon 695 5g Mobile Firmware by Qualcomm
Snapdragon 750g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 750g 5g Mobile Firmware →
Snapdragon 765 5g Mobile Firmware by Qualcomm
Snapdragon 765g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 765g 5g Mobile Firmware →
Snapdragon 768g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 768g 5g Mobile Firmware →
Snapdragon 778g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Firmware →
Snapdragon 778g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Firmware →
Snapdragon 780g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 780g 5g Mobile Firmware →
Snapdragon 782g Mobile Firmware by Qualcomm
Snapdragon 7c\+ Gen 3 Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 7c\+ Gen 3 Compute Firmware →
Snapdragon 8 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Firmware →
Snapdragon 8 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Firmware →
Snapdragon 8 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Firmware →
Snapdragon 8 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Firmware →
Snapdragon 8 Gen 3 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Firmware →
Snapdragon 865 5g Mobile Firmware by Qualcomm
Snapdragon 865 5g Mobile Firmware by Qualcomm
Snapdragon 870 5g Mobile Firmware by Qualcomm
Snapdragon 888 5g Mobile Firmware by Qualcomm
Snapdragon 888 5g Mobile Firmware by Qualcomm
Snapdragon Auto 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Firmware →
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon X35 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X35 5g Modem Rf Firmware →
Snapdragon X55 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf Firmware →
Snapdragon X65 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf Firmware →
Snapdragon X70 Modem Rf Firmware by Qualcomm
Snapdragon X75 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X75 5g Modem Rf Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Complete disruption of cellular connectivity for affected devices, potentially affecting emergency services and critical communications in targeted areas.
Likely Case
Temporary service disruption for individual devices or small groups, requiring device reboot or network reconnection to restore functionality.
If Mitigated
Minimal impact with proper network segmentation and monitoring, though some service degradation may still occur during attack attempts.
🎯 Exploit Status
Exploitation requires ability to send malicious OTA messages, which typically requires cellular network access or proximity to target.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Qualcomm March 2024 security bulletin for chipset-specific patches
Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/march-2024-bulletin
Restart Required: Yes
Instructions:
1. Check device manufacturer for firmware updates
2. Apply Qualcomm-provided patches through OEM firmware updates
3. Reboot device after update installation
4. Verify patch application through version checks
🔧 Temporary Workarounds
Network monitoring and filtering
allMonitor for abnormal OTA message patterns and implement filtering at network level
🧯 If You Can't Patch
- Implement network segmentation to isolate vulnerable devices
- Monitor for DoS patterns and implement rate limiting on OTA message processing
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against Qualcomm security bulletin; vulnerability is chipset-level so device-specific checks required
Check Version:
Device-specific commands vary by manufacturer; typically in Settings > About Phone > Baseband version
Verify Fix Applied:
Verify firmware version has been updated to patched version specified in Qualcomm bulletin
📡 Detection & Monitoring
Log Indicators:
- Multiple failed OTA message processing attempts
- Baseband processor crashes or resets
- Abnormal DL NAS transport message patterns
Network Indicators:
- Unusual OTA message traffic patterns
- Multiple devices experiencing simultaneous connectivity loss
SIEM Query:
Search for baseband error logs containing 'DL NAS transport' or 'OTA processing failure' patterns