CVE-2022-33275
📋 TL;DR
This vulnerability allows memory corruption in Qualcomm WLAN hardware abstraction layer due to improper array index validation. Attackers could potentially execute arbitrary code or cause denial of service on affected devices. This affects devices using vulnerable Qualcomm WLAN chipsets.
💻 Affected Systems
- Qualcomm WLAN chipsets and devices using them
📦 What is this software?
Flight Rb5 5g Platform Firmware by Qualcomm
Immersive Home 214 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 214 Platform Firmware →
Immersive Home 216 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 216 Platform Firmware →
Immersive Home 316 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 316 Platform Firmware →
Immersive Home 318 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 318 Platform Firmware →
Snapdragon 662 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 662 Mobile Platform Firmware →
Snapdragon 675 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 675 Mobile Platform Firmware →
Snapdragon 750g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 750g 5g Mobile Platform Firmware →
Snapdragon 7c\+ Gen 3 Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 7c\+ Gen 3 Compute Firmware →
Snapdragon Ar2 Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar2 Gen 1 Platform Firmware →
Snapdragon Auto 4g Modem Firmware by Qualcomm
Snapdragon Auto 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Firmware →
Snapdragon W5\+ Gen 1 Wearable Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon W5\+ Gen 1 Wearable Platform Firmware →
Snapdragon X50 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X50 5g Modem Rf System Firmware →
Snapdragon X55 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf System Firmware →
Snapdragon X65 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf System Firmware →
Snapdragon Xr2 5g Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Xr2 5g Platform Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete device compromise, data theft, or persistent backdoor installation
Likely Case
Device crash/reboot causing denial of service, potentially requiring physical reset
If Mitigated
Limited impact with proper network segmentation and exploit mitigations in place
🎯 Exploit Status
Exploitation requires sending specially crafted WLAN packets to vulnerable devices
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Qualcomm September 2023 security bulletin
Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin
Restart Required: Yes
Instructions:
1. Check device manufacturer for firmware updates 2. Apply Qualcomm-provided patches 3. Reboot device 4. Verify patch installation
🔧 Temporary Workarounds
Network segmentation
allIsolate vulnerable devices from untrusted networks
WLAN access control
allRestrict WLAN access to trusted devices only
🧯 If You Can't Patch
- Segment network to isolate vulnerable devices
- Implement strict WLAN authentication and monitoring
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against Qualcomm advisory or manufacturer security updates
Check Version:
Device-specific commands vary by manufacturer (e.g., 'cat /proc/version' on Linux systems)
Verify Fix Applied:
Verify firmware version has been updated to patched version
📡 Detection & Monitoring
Log Indicators:
- Unexpected device reboots
- WLAN driver crashes
- Memory corruption errors in system logs
Network Indicators:
- Unusual WLAN packet patterns
- Malformed WLAN management frames
SIEM Query:
Search for WLAN driver crashes or unexpected reboots on affected devices