CVE-2022-46415
📋 TL;DR
CVE-2022-46415 is a denial-of-service vulnerability in DJI Spark drones where attackers can exhaust the DHCP IP address pool, preventing legitimate devices from connecting to the drone's Wi-Fi network. This requires the attacker to first connect to the drone's internal Wi-Fi network (potentially by guessing the password) and then send numerous DHCP request packets. This affects DJI Spark drone users who rely on Wi-Fi connections for control.
💻 Affected Systems
- DJI Spark
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete denial of service where legitimate users cannot connect to the drone via Wi-Fi, potentially disrupting operations or causing the drone to become unresponsive if already in flight.
Likely Case
Temporary disruption of Wi-Fi connectivity requiring drone restart or reconnection attempts, causing operational delays.
If Mitigated
Minimal impact if strong Wi-Fi passwords are used and network monitoring detects abnormal DHCP traffic.
🎯 Exploit Status
Requires two-step attack: 1) Connect to drone Wi-Fi (may need password guessing), 2) Send DHCP exhaustion packets. No public exploit code found in references.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: No official DJI advisory found in provided references
Restart Required: No
Instructions:
No official patch available. Check DJI website for firmware updates. References suggest contacting DJI support for potential fixes.
🔧 Temporary Workarounds
Use Strong Wi-Fi Password
allSet a complex, unique password for the drone's Wi-Fi network to prevent unauthorized access.
Limit Wi-Fi Exposure
allOnly enable drone Wi-Fi when needed and disable when not in use to reduce attack window.
🧯 If You Can't Patch
- Monitor for unusual DHCP request patterns using network monitoring tools
- Physically secure drone during operations to prevent unauthorized proximity access
🔍 How to Verify
Check if Vulnerable:
Check drone firmware version in DJI app. If version is 01.00.0900, device is vulnerable.
Check Version:
Check in DJI GO 4 app: Settings > Aircraft Status > Firmware Version
Verify Fix Applied:
Update to newer firmware version if available from DJI and verify version changed from 01.00.0900.
📡 Detection & Monitoring
Log Indicators:
- Unusually high number of DHCP requests from single MAC address
- Multiple failed connection attempts to drone Wi-Fi
Network Indicators:
- DHCP request flooding from suspicious devices
- ARP spoofing attempts near drone network
SIEM Query:
DHCP requests count > 100 from single source within 60 seconds OR Failed authentication attempts > 10 to drone SSID
🔗 References
- https://github.com/bosslabdcu/Vulnerability-Reporting/security/advisories/GHSA-54q2-3r2m-9pgm
- https://smartstore.naver.com/chachablues/products/6617613337
- https://smartstore.naver.com/hancomawesome-tech/products/5367473135
- https://github.com/bosslabdcu/Vulnerability-Reporting/security/advisories/GHSA-54q2-3r2m-9pgm
- https://smartstore.naver.com/chachablues/products/6617613337
- https://smartstore.naver.com/hancomawesome-tech/products/5367473135