CVE-2022-46415

9.1 CRITICAL

📋 TL;DR

CVE-2022-46415 is a denial-of-service vulnerability in DJI Spark drones where attackers can exhaust the DHCP IP address pool, preventing legitimate devices from connecting to the drone's Wi-Fi network. This requires the attacker to first connect to the drone's internal Wi-Fi network (potentially by guessing the password) and then send numerous DHCP request packets. This affects DJI Spark drone users who rely on Wi-Fi connections for control.

💻 Affected Systems

Products:
  • DJI Spark
Versions: 01.00.0900
Operating Systems: Drone firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices using the vulnerable firmware version. Requires physical proximity to drone's Wi-Fi signal.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service where legitimate users cannot connect to the drone via Wi-Fi, potentially disrupting operations or causing the drone to become unresponsive if already in flight.

🟠

Likely Case

Temporary disruption of Wi-Fi connectivity requiring drone restart or reconnection attempts, causing operational delays.

🟢

If Mitigated

Minimal impact if strong Wi-Fi passwords are used and network monitoring detects abnormal DHCP traffic.

🌐 Internet-Facing: LOW - The drone's Wi-Fi network is typically short-range and not directly internet-facing.
🏢 Internal Only: MEDIUM - Attackers within Wi-Fi range who can guess or obtain the Wi-Fi password could disrupt operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires two-step attack: 1) Connect to drone Wi-Fi (may need password guessing), 2) Send DHCP exhaustion packets. No public exploit code found in references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No official DJI advisory found in provided references

Restart Required: No

Instructions:

No official patch available. Check DJI website for firmware updates. References suggest contacting DJI support for potential fixes.

🔧 Temporary Workarounds

Use Strong Wi-Fi Password

all

Set a complex, unique password for the drone's Wi-Fi network to prevent unauthorized access.

Limit Wi-Fi Exposure

all

Only enable drone Wi-Fi when needed and disable when not in use to reduce attack window.

🧯 If You Can't Patch

  • Monitor for unusual DHCP request patterns using network monitoring tools
  • Physically secure drone during operations to prevent unauthorized proximity access

🔍 How to Verify

Check if Vulnerable:

Check drone firmware version in DJI app. If version is 01.00.0900, device is vulnerable.

Check Version:

Check in DJI GO 4 app: Settings > Aircraft Status > Firmware Version

Verify Fix Applied:

Update to newer firmware version if available from DJI and verify version changed from 01.00.0900.

📡 Detection & Monitoring

Log Indicators:

  • Unusually high number of DHCP requests from single MAC address
  • Multiple failed connection attempts to drone Wi-Fi

Network Indicators:

  • DHCP request flooding from suspicious devices
  • ARP spoofing attempts near drone network

SIEM Query:

DHCP requests count > 100 from single source within 60 seconds OR Failed authentication attempts > 10 to drone SSID

🔗 References

📤 Share & Export