CVE-2023-43550
📋 TL;DR
This vulnerability allows memory corruption when processing QMI requests for memory allocation in DHMS-supported subsystems. It affects Qualcomm chipsets used in mobile devices and IoT products. Attackers could potentially execute arbitrary code or cause denial of service.
💻 Affected Systems
- Qualcomm chipsets with QMI and DHMS support
📦 What is this software?
Snapdragon 4 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 1 Mobile Firmware →
Snapdragon 4 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 2 Mobile Firmware →
Snapdragon 480 5g Mobile Firmware by Qualcomm
Snapdragon 480 5g Mobile Firmware by Qualcomm
Snapdragon 680 4g Mobile Firmware by Qualcomm
Snapdragon 685 4g Mobile Firmware by Qualcomm
Snapdragon 695 5g Mobile Firmware by Qualcomm
Snapdragon 778g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Firmware →
Snapdragon 778g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Firmware →
Snapdragon 780g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 780g 5g Mobile Firmware →
Snapdragon 782g Mobile Firmware by Qualcomm
Snapdragon 7c\+ Gen 3 Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 7c\+ Gen 3 Compute Firmware →
Snapdragon 8 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Firmware →
Snapdragon 8 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Firmware →
Snapdragon 8 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Firmware →
Snapdragon 8 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Firmware →
Snapdragon 888 5g Mobile Firmware by Qualcomm
Snapdragon 888 5g Mobile Firmware by Qualcomm
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon W5\+ Gen 1 Wearable Firmware by Qualcomm
View all CVEs affecting Snapdragon W5\+ Gen 1 Wearable Firmware →
Snapdragon X35 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X35 5g Modem Rf Firmware →
Snapdragon X75 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X75 5g Modem Rf Firmware →
Video Collaboration Vc1 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc1 Platform Firmware →
Video Collaboration Vc3 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc3 Platform Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete device compromise, data theft, or persistent backdoor installation.
Likely Case
Device crash or denial of service requiring reboot, potentially leading to temporary loss of functionality.
If Mitigated
Limited impact with proper network segmentation and exploit mitigations like ASLR and stack canaries.
🎯 Exploit Status
Requires sending malformed QMI packets to vulnerable subsystem. No public exploits known as of March 2024.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Qualcomm March 2024 security bulletin for specific chipset patches
Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/march-2024-bulletin
Restart Required: Yes
Instructions:
1. Check Qualcomm advisory for affected chipset models. 2. Obtain firmware updates from device manufacturer. 3. Apply patches following manufacturer instructions. 4. Reboot device to activate fixes.
🔧 Temporary Workarounds
Network segmentation
allRestrict access to QMI interfaces from untrusted networks
Disable unnecessary QMI services
linuxTurn off QMI services not required for device operation
Check device-specific documentation for QMI service management
🧯 If You Can't Patch
- Isolate affected devices in separate network segments
- Implement strict firewall rules to block QMI traffic from untrusted sources
🔍 How to Verify
Check if Vulnerable:
Check chipset version and compare against Qualcomm's patched versions list
Check Version:
Device-specific commands vary by manufacturer (e.g., Android: Settings > About phone > Build number)
Verify Fix Applied:
Verify firmware version has been updated to March 2024 or later security patch level
📡 Detection & Monitoring
Log Indicators:
- Unexpected QMI service crashes
- Memory allocation failures in modem logs
- Kernel panic related to QMI
Network Indicators:
- Malformed QMI packets to modem interfaces
- Unusual traffic to QMI ports (typically 9200-9210)
SIEM Query:
source="modem_logs" AND ("QMI" OR "DHMS") AND ("crash" OR "corruption" OR "allocation failure")