CVE-2023-43550

7.8 HIGH

📋 TL;DR

This vulnerability allows memory corruption when processing QMI requests for memory allocation in DHMS-supported subsystems. It affects Qualcomm chipsets used in mobile devices and IoT products. Attackers could potentially execute arbitrary code or cause denial of service.

💻 Affected Systems

Products:
  • Qualcomm chipsets with QMI and DHMS support
Versions: Multiple Qualcomm chipset versions prior to March 2024 patches
Operating Systems: Android, Linux-based embedded systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices using vulnerable Qualcomm firmware/modems. Specific chipset models listed in Qualcomm advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, data theft, or persistent backdoor installation.

🟠

Likely Case

Device crash or denial of service requiring reboot, potentially leading to temporary loss of functionality.

🟢

If Mitigated

Limited impact with proper network segmentation and exploit mitigations like ASLR and stack canaries.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires sending malformed QMI packets to vulnerable subsystem. No public exploits known as of March 2024.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Qualcomm March 2024 security bulletin for specific chipset patches

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/march-2024-bulletin

Restart Required: Yes

Instructions:

1. Check Qualcomm advisory for affected chipset models. 2. Obtain firmware updates from device manufacturer. 3. Apply patches following manufacturer instructions. 4. Reboot device to activate fixes.

🔧 Temporary Workarounds

Network segmentation

all

Restrict access to QMI interfaces from untrusted networks

Disable unnecessary QMI services

linux

Turn off QMI services not required for device operation

Check device-specific documentation for QMI service management

🧯 If You Can't Patch

  • Isolate affected devices in separate network segments
  • Implement strict firewall rules to block QMI traffic from untrusted sources

🔍 How to Verify

Check if Vulnerable:

Check chipset version and compare against Qualcomm's patched versions list

Check Version:

Device-specific commands vary by manufacturer (e.g., Android: Settings > About phone > Build number)

Verify Fix Applied:

Verify firmware version has been updated to March 2024 or later security patch level

📡 Detection & Monitoring

Log Indicators:

  • Unexpected QMI service crashes
  • Memory allocation failures in modem logs
  • Kernel panic related to QMI

Network Indicators:

  • Malformed QMI packets to modem interfaces
  • Unusual traffic to QMI ports (typically 9200-9210)

SIEM Query:

source="modem_logs" AND ("QMI" OR "DHMS") AND ("crash" OR "corruption" OR "allocation failure")

🔗 References

📤 Share & Export