CVE-2021-30302

7.5 HIGH

📋 TL;DR

This vulnerability allows improper authentication of EAP WAPI EAPOL frames from unauthenticated users, potentially leading to information disclosure. It affects various Snapdragon chipsets used in compute, connectivity, mobile, and IoT devices. Attackers could exploit this to access sensitive information without proper authentication.

💻 Affected Systems

Products:
  • Snapdragon Compute
  • Snapdragon Connectivity
  • Snapdragon Consumer Electronics Connectivity
  • Snapdragon Consumer IOT
  • Snapdragon Industrial IOT
  • Snapdragon Mobile
  • Snapdragon Wired Infrastructure and Networking
Versions: Specific versions not detailed in CVE; refer to Qualcomm October 2021 bulletin for exact affected versions
Operating Systems: Android, Linux-based systems using affected Snapdragon chipsets
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices using WAPI (WLAN Authentication and Privacy Infrastructure) with EAP authentication. Requires Wi-Fi connectivity to be exploitable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthenticated attackers could intercept and access sensitive network communications and device information on vulnerable systems.

🟠

Likely Case

Information disclosure of network authentication data and potentially device identifiers in enterprise or public Wi-Fi environments.

🟢

If Mitigated

Limited impact with proper network segmentation and updated firmware, though some information leakage might still occur.

🌐 Internet-Facing: MEDIUM - Exploitable over Wi-Fi networks but requires proximity and specific network conditions.
🏢 Internal Only: MEDIUM - Could be exploited within organizational Wi-Fi networks by malicious insiders or compromised devices.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires proximity to target device and knowledge of WAPI/EAP protocols. No public exploit code has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Qualcomm October 2021 security bulletin for specific patched versions

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin

Restart Required: Yes

Instructions:

1. Check device manufacturer for firmware updates. 2. Apply Qualcomm-provided patches through OEM updates. 3. Reboot device after update installation. 4. Verify patch application through version checks.

🔧 Temporary Workarounds

Disable WAPI Authentication

all

Disable WAPI authentication method on affected devices if not required for network connectivity.

Device-specific configuration commands vary by manufacturer

Network Segmentation

all

Isolate devices using WAPI authentication on separate network segments with strict access controls.

🧯 If You Can't Patch

  • Implement strict network access controls and monitor for unusual authentication attempts
  • Disable Wi-Fi on critical devices and use wired connections where possible

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against Qualcomm's October 2021 security bulletin. Use 'getprop ro.build.fingerprint' on Android devices to check chipset and version.

Check Version:

Android: getprop ro.build.fingerprint; Linux-based: cat /proc/version or manufacturer-specific version commands

Verify Fix Applied:

Verify firmware version has been updated to a version listed as patched in Qualcomm's advisory. Check that WAPI authentication is properly configured.

📡 Detection & Monitoring

Log Indicators:

  • Unusual EAP authentication failures
  • Multiple WAPI authentication attempts from single source
  • Authentication bypass events in Wi-Fi logs

Network Indicators:

  • Unencrypted EAPOL frames in WAPI networks
  • Authentication requests from unexpected MAC addresses
  • Abnormal WAPI protocol traffic patterns

SIEM Query:

source="wifi_logs" AND (event_type="authentication_failure" OR event_type="auth_bypass") AND protocol="WAPI"

🔗 References

📤 Share & Export