The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-22388

CVE-2023-22388: Qualcomm 315 5G IoT Modem Buffer Overflow

CVE-2023-22388 is a buffer overflow vulnerability in Qualcomm 315 5G IoT Modem Firmware that causes memory corruption in the Multi-mode Call Processor. This article covers technical details, affected versions, and mitigation.

Published: February 4, 2026

CVE-2023-22388 Overview

CVE-2023-22388 is a critical memory corruption vulnerability affecting Qualcomm's Multi-mode Call Processor component. The vulnerability occurs during the processing of bit mask API operations, where improper memory handling can lead to memory corruption conditions. This flaw is particularly concerning given its presence across an extensive range of Qualcomm chipsets, including Snapdragon mobile platforms, modems, connectivity solutions, and IoT devices.

The vulnerability is classified under CWE-787 (Out-of-bounds Write) and CWE-823 (Use of Out-of-range Pointer Offset), indicating that the flaw involves improper memory write operations that can corrupt adjacent memory regions or allow attackers to write data outside the intended buffer boundaries.

Critical Impact

This vulnerability enables remote attackers to potentially achieve arbitrary code execution, compromise device confidentiality, integrity, and availability without requiring authentication or user interaction.

Affected Products

  • Qualcomm Snapdragon 8 Gen 1/Gen 2 Mobile Platforms
  • Qualcomm Snapdragon 888/888+ 5G Mobile Platforms
  • Qualcomm Snapdragon 865/870 5G Mobile Platforms
  • Qualcomm Snapdragon X55/X65/X70/X75 5G Modem-RF Systems
  • Qualcomm FastConnect 6200/6700/6800/6900/7800
  • Qualcomm 315 5G IoT Modem
  • Qualcomm 9205/9206/9207 LTE Modems
  • Qualcomm Snapdragon Wear Platforms (1100, 1200, 1300, 2100, 2500, 3100)
  • Qualcomm Snapdragon XR1/XR2 5G Platforms
  • Qualcomm Vision Intelligence Platforms (100, 200, 300, 400)

Discovery Timeline

  • November 7, 2023 - CVE-2023-22388 published to NVD
  • August 11, 2025 - Last updated in NVD database

Technical Details for CVE-2023-22388

Vulnerability Analysis

The vulnerability resides in Qualcomm's Multi-mode Call Processor (MCP), a critical component responsible for managing cellular communications across multiple network modes (LTE, 5G NR, etc.). The flaw manifests when the MCP processes bit mask API requests, where insufficient validation of input parameters or improper bounds checking leads to memory corruption.

Memory corruption in the modem subsystem is particularly severe because the modem operates with elevated privileges and has direct access to cellular baseband functions. An attacker who successfully exploits this vulnerability could potentially execute arbitrary code within the modem's execution context, intercept cellular communications, or cause denial of service conditions.

The attack can be performed remotely over the network without requiring any privileges or user interaction, making it highly exploitable in real-world scenarios. Successful exploitation could result in complete compromise of confidentiality, integrity, and availability of the affected device.

Root Cause

The root cause stems from improper memory handling in the bit mask API processing logic. When the Multi-mode Call Processor receives malformed or specially crafted bit mask parameters, the code fails to properly validate the size or boundaries of the data being processed. This results in:

  • Out-of-bounds Write (CWE-787): The processor writes data beyond the allocated buffer boundaries, corrupting adjacent memory structures
  • Use of Out-of-range Pointer Offset (CWE-823): Pointer arithmetic uses invalid offset values that reference memory locations outside the intended data structure

The combination of these weaknesses allows attackers to manipulate memory in ways that can redirect program execution or corrupt critical data structures within the modem subsystem.

Attack Vector

The vulnerability is exploitable via network-based attack vectors. An attacker can craft malicious network packets or signaling messages that reach the Multi-mode Call Processor through cellular network interfaces. The attack characteristics include:

  • Network-accessible: Exploitation can occur over cellular network connections
  • No privileges required: The attacker does not need any prior authentication
  • No user interaction: The attack can succeed without any action from the device user
  • Modem-level impact: Successful exploitation affects the baseband processor

Given the modem's role in cellular communications, exploitation could potentially occur through malicious base stations, rogue network infrastructure, or by intercepting and modifying legitimate cellular traffic.

Detection Methods for CVE-2023-22388

Indicators of Compromise

  • Unexpected modem crashes or restarts without user initiation
  • Anomalous cellular baseband behavior including connection drops or unusual network registrations
  • Device instability during cellular operations, particularly when transitioning between network modes
  • Kernel panic events originating from modem subsystem components

Detection Strategies

  • Monitor device logs for modem subsystem crashes or memory corruption signatures in logcat or kernel logs
  • Implement baseband firmware integrity verification where supported by device management solutions
  • Deploy network-level monitoring for anomalous cellular signaling patterns that could indicate exploitation attempts
  • Use Mobile Device Management (MDM) solutions to track firmware versions and ensure timely updates

Monitoring Recommendations

  • Enable enhanced logging for cellular modem operations where available in enterprise device management
  • Monitor for devices reporting outdated firmware versions that remain vulnerable
  • Track security bulletin compliance across managed device fleets
  • Implement alerting for devices exhibiting patterns consistent with baseband exploitation

How to Mitigate CVE-2023-22388

Immediate Actions Required

  • Apply the latest firmware updates from Qualcomm and device OEMs that address this vulnerability
  • Prioritize updates for devices in high-risk environments or those processing sensitive communications
  • Inventory all devices containing affected Qualcomm chipsets to assess organizational exposure
  • Contact device manufacturers for patch availability timelines if updates are not yet available

Patch Information

Qualcomm has addressed this vulnerability in their November 2023 Security Bulletin. Organizations should work with their device vendors to obtain and deploy firmware updates that incorporate these patches.

Due to the supply chain nature of Qualcomm chipsets, patches are typically distributed through device OEMs (Samsung, Google, OnePlus, etc.) via their respective security update channels. Users should:

  1. Check for system updates through device settings
  2. Monitor OEM security bulletins for patch availability
  3. Apply updates as soon as they become available

Workarounds

  • Limit exposure by avoiding untrusted cellular networks or potentially malicious base stations
  • Where supported, consider using Wi-Fi calling as an alternative to reduce cellular modem attack surface
  • Implement network segmentation for IoT devices containing affected chipsets to limit lateral movement potential
  • For enterprise environments, maintain strict firmware update policies to minimize exposure windows
bash
# Check Android device security patch level
adb shell getprop ro.build.version.security_patch

# Verify modem firmware version (device-specific)
adb shell cat /sys/devices/soc0/build_id

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeBuffer Overflow

  • Vendor/TechQualcomm

  • SeverityCRITICAL

  • CVSS Score9.8

  • EPSS Probability0.16%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-823

  • CWE-787
  • Vendor Resources
  • Qualcomm November 2023 Bulletin
  • Related CVEs
  • CVE-2025-47391: Qualcomm Wcn3988 Buffer Overflow Flaw

  • CVE-2025-47390: Qualcomm Qcm5430 Buffer Overflow Flaw

  • CVE-2025-47389: Qualcomm AR8035 Buffer Overflow Flaw

  • CVE-2026-21374: Qualcomm Aqt1000 Buffer Overflow Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English