CVE-2023-33103

7.5 HIGH

📋 TL;DR

This vulnerability in Qualcomm chipsets allows a denial-of-service attack when processing CAG (Closed Access Group) information elements from network messages. It affects mobile devices and infrastructure equipment using vulnerable Qualcomm components. Attackers can cause temporary service disruption by sending specially crafted network messages.

💻 Affected Systems

Products:
  • Qualcomm chipsets with cellular modem functionality
Versions: Specific chipset versions not publicly detailed in advisory
Operating Systems: Android, embedded systems using Qualcomm modems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with cellular connectivity using vulnerable Qualcomm components. Exact product list in vendor advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption for affected devices, requiring reboot to restore functionality. Could impact critical communications infrastructure.

🟠

Likely Case

Temporary service interruption for mobile devices, causing dropped calls, lost data connections, or device instability.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring; affected devices automatically recover after attack stops.

🌐 Internet-Facing: MEDIUM - Requires proximity to target or ability to send network messages to vulnerable devices.
🏢 Internal Only: LOW - Typically requires network-level access or physical proximity to exploit.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires ability to send network messages to target device, typically requiring proximity or network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to March 2024 Qualcomm security bulletin

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/march-2024-bulletin

Restart Required: Yes

Instructions:

1. Check device manufacturer for security updates. 2. Apply Qualcomm-provided firmware updates. 3. Reboot device after update. 4. Verify patch installation.

🔧 Temporary Workarounds

Network filtering

all

Filter or monitor for malicious CAG information elements at network perimeter

🧯 If You Can't Patch

  • Implement network segmentation to isolate vulnerable devices
  • Monitor for unusual network traffic patterns and service disruptions

🔍 How to Verify

Check if Vulnerable:

Check device chipset version and compare against Qualcomm advisory. Use device-specific security update check.

Check Version:

Device-specific (e.g., Android: Settings > About phone > Android security patch level)

Verify Fix Applied:

Verify security patch level in device settings matches or exceeds March 2024 Qualcomm updates.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected modem resets
  • Service disruption logs
  • CAG processing errors

Network Indicators:

  • Unusual CAG information element patterns
  • Suspicious network messages targeting modems

SIEM Query:

Search for modem reset events or service disruption patterns in device logs

🔗 References

📤 Share & Export