CVE-2023-35648

9.8 CRITICAL

📋 TL;DR

This CVE describes an out-of-bounds read vulnerability in Android's baseband firmware that could allow remote information disclosure. Attackers with baseband firmware compromise could potentially read sensitive memory contents without user interaction. This primarily affects Google Pixel devices running vulnerable Android versions.

💻 Affected Systems

Products:
  • Google Pixel devices
Versions: Android versions prior to October 2023 security patch
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Requires baseband firmware compromise for exploitation, which is a significant barrier but possible in targeted attacks.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker with baseband firmware compromise could read sensitive memory contents, potentially exposing cryptographic keys, authentication tokens, or other protected data from the device's memory.

🟠

Likely Case

Targeted attacks against specific devices where attackers have already achieved baseband firmware compromise, potentially leading to information disclosure about device state or memory contents.

🟢

If Mitigated

With proper patching, the vulnerability is eliminated. Without patching but with network segmentation and monitoring, risk is reduced but not eliminated.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: HIGH

Exploitation requires baseband firmware compromise first, which significantly raises the technical barrier. No authentication is required once baseband is compromised.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: October 2023 Android security patch or later

Vendor Advisory: https://source.android.com/security/bulletin/pixel/2023-10-01

Restart Required: Yes

Instructions:

1. Check for system updates in Settings > System > System update. 2. Download and install October 2023 security patch or later. 3. Reboot device after installation completes.

🔧 Temporary Workarounds

Network segmentation

all

Isolate vulnerable devices from untrusted networks to reduce attack surface

Disable unnecessary baseband features

android

Turn off features like Wi-Fi calling, VoLTE if not needed to reduce attack surface

🧯 If You Can't Patch

  • Isolate affected devices on separate network segments with strict firewall rules
  • Implement network monitoring for unusual baseband communication patterns

🔍 How to Verify

Check if Vulnerable:

Check Android version and security patch level in Settings > About phone > Android version. If security patch level is before October 2023, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify security patch level shows October 2023 or later in Settings > About phone > Android version.

📡 Detection & Monitoring

Log Indicators:

  • Unusual baseband firmware activity logs
  • Memory access violation logs in system logs

Network Indicators:

  • Unusual baseband communication patterns
  • Suspicious cellular network interactions

SIEM Query:

source="android_system_logs" AND ("baseband" OR "modem") AND ("error" OR "violation" OR "out of bounds")

🔗 References

📤 Share & Export