CVE-2023-33099
📋 TL;DR
This vulnerability allows a denial-of-service (DoS) attack on 5G NR (New Radio) devices by sending specially crafted SMS messages with non-standard container sizes. It affects mobile devices using Qualcomm chipsets with vulnerable firmware. Attackers can temporarily disrupt cellular connectivity on targeted devices.
💻 Affected Systems
- Qualcomm Snapdragon mobile platforms
- 5G NR devices with Qualcomm modems
📦 What is this software?
Snapdragon 4 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 1 Mobile Firmware →
Snapdragon 4 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 2 Mobile Firmware →
Snapdragon 480 5g Mobile Firmware by Qualcomm
Snapdragon 480 5g Mobile Firmware by Qualcomm
Snapdragon 690 5g Mobile Firmware by Qualcomm
Snapdragon 695 5g Mobile Firmware by Qualcomm
Snapdragon 750g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 750g 5g Mobile Firmware →
Snapdragon 765 5g Mobile Firmware by Qualcomm
Snapdragon 765g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 765g 5g Mobile Firmware →
Snapdragon 768g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 768g 5g Mobile Firmware →
Snapdragon 778g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Firmware →
Snapdragon 778g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Firmware →
Snapdragon 780g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 780g 5g Mobile Firmware →
Snapdragon 782g Mobile Firmware by Qualcomm
Snapdragon 7c\+ Gen 3 Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 7c\+ Gen 3 Compute Firmware →
Snapdragon 8 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Firmware →
Snapdragon 8 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Firmware →
Snapdragon 8 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Firmware →
Snapdragon 8 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Firmware →
Snapdragon 8 Gen 3 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Firmware →
Snapdragon 865 5g Mobile Firmware by Qualcomm
Snapdragon 865 5g Mobile Firmware by Qualcomm
Snapdragon 870 5g Mobile Firmware by Qualcomm
Snapdragon 888 5g Mobile Firmware by Qualcomm
Snapdragon 888 5g Mobile Firmware by Qualcomm
Snapdragon Auto 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Firmware →
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon X35 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X35 5g Modem Rf Firmware →
Snapdragon X55 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf Firmware →
Snapdragon X65 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf Firmware →
Snapdragon X70 Modem Rf Firmware by Qualcomm
Snapdragon X75 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X75 5g Modem Rf Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Complete loss of cellular connectivity on affected devices, requiring device restart to restore service. Could be used in targeted attacks against critical mobile infrastructure or emergency services devices.
Likely Case
Temporary service disruption on individual devices, causing dropped calls, failed SMS delivery, and interrupted data sessions until the device recovers or is restarted.
If Mitigated
Minimal impact with proper network filtering and updated firmware; isolated incidents affecting only devices that haven't been patched.
🎯 Exploit Status
Exploitation requires sending specially crafted SMS messages; no authentication needed but requires ability to send SMS to target device.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Qualcomm April 2024 security bulletin for specific patched firmware versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2024-bulletin.html
Restart Required: Yes
Instructions:
1. Check device manufacturer for security updates. 2. Apply firmware updates from device manufacturer. 3. Restart device after update. 4. Verify patch applied via device settings.
🔧 Temporary Workarounds
SMS Filtering
allImplement SMS filtering at network level to block messages with non-standard container sizes
Disable SMS Auto-retrieve
androidConfigure devices to not automatically retrieve SMS messages
🧯 If You Can't Patch
- Implement network-level SMS filtering to block malicious messages
- Monitor for unusual SMS patterns and cellular service disruptions
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against Qualcomm's security bulletin; vulnerable if using affected chipset firmware.
Check Version:
Android: Settings > About Phone > Build Number/Baseband Version
Verify Fix Applied:
Verify device has received April 2024 or later security updates from manufacturer; check firmware version in device settings.
📡 Detection & Monitoring
Log Indicators:
- Multiple failed SMS processing attempts
- Unexpected modem/radio resets
- DL NAS transport errors
Network Indicators:
- Unusual SMS traffic patterns
- SMS messages with non-standard sizes
- Increased cellular service disruptions
SIEM Query:
Search for modem/radio reset events or SMS processing failures in device logs