CVE-2023-33101
📋 TL;DR
This vulnerability allows attackers to cause a denial-of-service (DoS) condition in Qualcomm devices by sending specially crafted DL NAS TRANSPORT messages with zero payload length. It affects mobile devices and infrastructure equipment using vulnerable Qualcomm chipsets. The attack disrupts service availability but doesn't allow code execution or data theft.
💻 Affected Systems
- Qualcomm Snapdragon chipsets
- Qualcomm 5G modems
- Devices using Qualcomm cellular components
📦 What is this software?
Snapdragon 4 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 1 Mobile Firmware →
Snapdragon 4 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 2 Mobile Firmware →
Snapdragon 480 5g Mobile Firmware by Qualcomm
Snapdragon 480 5g Mobile Firmware by Qualcomm
Snapdragon 690 5g Mobile Firmware by Qualcomm
Snapdragon 695 5g Mobile Firmware by Qualcomm
Snapdragon 750g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 750g 5g Mobile Firmware →
Snapdragon 765 5g Mobile Firmware by Qualcomm
Snapdragon 765g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 765g 5g Mobile Firmware →
Snapdragon 768g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 768g 5g Mobile Firmware →
Snapdragon 778g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Firmware →
Snapdragon 778g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Firmware →
Snapdragon 780g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 780g 5g Mobile Firmware →
Snapdragon 782g Mobile Firmware by Qualcomm
Snapdragon 7c\+ Gen 3 Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 7c\+ Gen 3 Compute Firmware →
Snapdragon 8 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Firmware →
Snapdragon 8 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Firmware →
Snapdragon 8 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Firmware →
Snapdragon 8 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Firmware →
Snapdragon 8 Gen 3 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Firmware →
Snapdragon 865 5g Mobile Firmware by Qualcomm
Snapdragon 865 5g Mobile Firmware by Qualcomm
Snapdragon 870 5g Mobile Firmware by Qualcomm
Snapdragon 888 5g Mobile Firmware by Qualcomm
Snapdragon 888 5g Mobile Firmware by Qualcomm
Snapdragon Auto 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Firmware →
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon X35 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X35 5g Modem Rf Firmware →
Snapdragon X55 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf Firmware →
Snapdragon X65 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf Firmware →
Snapdragon X70 Modem Rf Firmware by Qualcomm
Snapdragon X75 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X75 5g Modem Rf Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Complete service disruption on affected devices, requiring reboot to restore functionality. Could impact critical communications infrastructure if exploited at scale.
Likely Case
Temporary service interruption on individual devices, causing dropped calls or data sessions until system recovers automatically.
If Mitigated
Minimal impact with proper network segmentation and monitoring; isolated incidents quickly detected and contained.
🎯 Exploit Status
Exploitation requires sending malformed NAS messages to cellular interfaces. No public exploit code available as of analysis.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Qualcomm April 2024 security bulletin for specific patched versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2024-bulletin.html
Restart Required: Yes
Instructions:
1. Check Qualcomm security bulletin for affected components. 2. Obtain firmware updates from device manufacturers. 3. Apply patches following manufacturer instructions. 4. Reboot affected devices after patching.
🔧 Temporary Workarounds
Network filtering
allImplement network filtering to block malformed NAS messages at network perimeter
Rate limiting
allApply rate limiting on NAS message processing to mitigate DoS impact
🧯 If You Can't Patch
- Segment cellular network components from untrusted networks
- Implement monitoring for unusual NAS message patterns and DoS conditions
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against Qualcomm's security bulletin. Use manufacturer-specific diagnostic tools to verify cellular component versions.
Check Version:
Device-specific commands vary by manufacturer; typically 'adb shell getprop' for Android devices or manufacturer diagnostic tools
Verify Fix Applied:
Verify firmware version has been updated to patched version specified in Qualcomm bulletin. Test cellular functionality under normal conditions.
📡 Detection & Monitoring
Log Indicators:
- Unexpected device reboots
- Cellular service interruptions
- NAS protocol errors in network logs
Network Indicators:
- Unusual volume of NAS TRANSPORT messages
- Messages with zero payload length
SIEM Query:
source="cellular_gateway" AND (message="NAS error" OR message="service interruption")