CVE-2023-43540

8.4 HIGH

📋 TL;DR

This CVE describes a memory corruption vulnerability in Qualcomm's FM HCI driver when processing IOCTL WRITE requests. Attackers could exploit this to execute arbitrary code or cause denial of service on affected devices. The vulnerability affects devices with Qualcomm chipsets that use the vulnerable FM HCI driver.

💻 Affected Systems

Products:
  • Qualcomm chipsets with FM HCI driver
Versions: Specific versions not detailed in provided references; affected versions would be those prior to March 2024 patches
Operating Systems: Android, Linux-based systems using Qualcomm drivers
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with Qualcomm chipsets that include the vulnerable FM HCI driver implementation. The exact chipset models would be detailed in the Qualcomm advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with kernel privileges leading to complete device compromise, data theft, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation allowing attackers to gain elevated privileges on the device, potentially leading to data access or further system compromise.

🟢

If Mitigated

Denial of service through system crash or instability if memory corruption cannot be leveraged for code execution.

🌐 Internet-Facing: LOW - This appears to be a local driver vulnerability requiring local access or adjacent network access to exploit.
🏢 Internal Only: MEDIUM - Could be exploited by malicious insiders or through lateral movement if an attacker gains initial access to the device.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires sending crafted IOCTL requests to the FM HCI driver, which typically requires some level of access to the device. The CWE-120 (Buffer Copy without Checking Size of Input) suggests a classic buffer overflow vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches included in March 2024 Qualcomm security bulletin

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/march-2024-bulletin

Restart Required: Yes

Instructions:

1. Check device manufacturer for security updates. 2. Apply March 2024 or later Qualcomm security patches. 3. Update device firmware to latest version. 4. Reboot device after update.

🔧 Temporary Workarounds

Disable FM HCI driver if unused

linux

Remove or disable the vulnerable FM HCI driver if FM radio functionality is not required

rmmod fm_hci
modprobe -r fm_hci

Restrict IOCTL access

linux

Use SELinux or similar MAC systems to restrict access to FM HCI driver IOCTLs

setenforce 1
Configure SELinux policies to restrict fm_hci device access

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized users from accessing device drivers
  • Monitor for unusual IOCTL requests to FM HCI driver and implement intrusion detection

🔍 How to Verify

Check if Vulnerable:

Check Qualcomm chipset version and driver versions against March 2024 security bulletin. Use: lsmod | grep fm_hci to check if driver is loaded.

Check Version:

getprop ro.build.version.security_patch (Android) or check /sys/class/fm_hci/version

Verify Fix Applied:

Verify device has March 2024 or later security patches installed. Check driver version after update.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • Driver crash messages in dmesg
  • Unusual IOCTL requests to /dev/fm_hci

Network Indicators:

  • Not applicable - local driver vulnerability

SIEM Query:

source="kernel" AND ("fm_hci" OR "FM HCI") AND ("panic" OR "crash" OR "buffer overflow")

🔗 References

📤 Share & Export