CVE-2023-33103
📋 TL;DR
This vulnerability in Qualcomm chipsets allows a denial-of-service attack when processing CAG (Closed Access Group) information elements from network messages. It affects mobile devices and infrastructure equipment using vulnerable Qualcomm components. Attackers can cause temporary service disruption by sending specially crafted network messages.
💻 Affected Systems
- Qualcomm chipsets with cellular modem functionality
📦 What is this software?
Snapdragon 4 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 2 Mobile Firmware →
Snapdragon 8 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Firmware →
Snapdragon 8 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Firmware →
Snapdragon 8 Gen 3 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Firmware →
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon X35 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X35 5g Modem Rf Firmware →
Snapdragon X65 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf Firmware →
Snapdragon X70 Modem Rf Firmware by Qualcomm
⚠️ Risk & Real-World Impact
Worst Case
Complete service disruption for affected devices, requiring reboot to restore functionality. Could impact critical communications infrastructure.
Likely Case
Temporary service interruption for mobile devices, causing dropped calls, lost data connections, or device instability.
If Mitigated
Limited impact with proper network segmentation and monitoring; affected devices automatically recover after attack stops.
🎯 Exploit Status
Exploitation requires ability to send network messages to target device, typically requiring proximity or network access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to March 2024 Qualcomm security bulletin
Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/march-2024-bulletin
Restart Required: Yes
Instructions:
1. Check device manufacturer for security updates. 2. Apply Qualcomm-provided firmware updates. 3. Reboot device after update. 4. Verify patch installation.
🔧 Temporary Workarounds
Network filtering
allFilter or monitor for malicious CAG information elements at network perimeter
🧯 If You Can't Patch
- Implement network segmentation to isolate vulnerable devices
- Monitor for unusual network traffic patterns and service disruptions
🔍 How to Verify
Check if Vulnerable:
Check device chipset version and compare against Qualcomm advisory. Use device-specific security update check.
Check Version:
Device-specific (e.g., Android: Settings > About phone > Android security patch level)
Verify Fix Applied:
Verify security patch level in device settings matches or exceeds March 2024 Qualcomm updates.
📡 Detection & Monitoring
Log Indicators:
- Unexpected modem resets
- Service disruption logs
- CAG processing errors
Network Indicators:
- Unusual CAG information element patterns
- Suspicious network messages targeting modems
SIEM Query:
Search for modem reset events or service disruption patterns in device logs