CVE-2023-21628
📋 TL;DR
This vulnerability allows memory corruption in Qualcomm's WLAN Hardware Abstraction Layer (HAL) when processing specific wireless commands. Attackers could potentially execute arbitrary code or cause denial of service on affected devices. This affects devices using Qualcomm chipsets with vulnerable WLAN firmware.
💻 Affected Systems
- Qualcomm chipsets with WLAN functionality
📦 What is this software?
Immersive Home 214 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 214 Platform Firmware →
Immersive Home 216 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 216 Platform Firmware →
Immersive Home 316 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 316 Platform Firmware →
Immersive Home 318 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 318 Platform Firmware →
Smart Audio 200 Platform Firmware by Qualcomm
Smart Audio 400 Platform Firmware by Qualcomm
Snapdragon 630 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 630 Mobile Platform Firmware →
Snapdragon 636 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 636 Mobile Platform Firmware →
Snapdragon 652 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 652 Mobile Platform Firmware →
Snapdragon 662 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 662 Mobile Platform Firmware →
Snapdragon 675 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 675 Mobile Platform Firmware →
Snapdragon 808 Processor Firmware by Qualcomm
Snapdragon 810 Processor Firmware by Qualcomm
Snapdragon 820 Automotive Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 820 Automotive Platform Firmware →
Snapdragon 820 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 820 Mobile Platform Firmware →
Snapdragon 821 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 821 Mobile Platform Firmware →
Snapdragon 835 Mobile Pc Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 835 Mobile Pc Platform Firmware →
Snapdragon 845 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 845 Mobile Platform Firmware →
Snapdragon 850 Mobile Compute Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 850 Mobile Compute Platform Firmware →
Snapdragon Auto 4g Modem Firmware by Qualcomm
Snapdragon Auto 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Firmware →
Snapdragon W5\+ Gen 1 Wearable Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon W5\+ Gen 1 Wearable Platform Firmware →
Snapdragon X12 Lte Modem Firmware by Qualcomm
Snapdragon X20 Lte Modem Firmware by Qualcomm
Snapdragon X24 Lte Modem Firmware by Qualcomm
Snapdragon X5 Lte Modem Firmware by Qualcomm
Snapdragon X50 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X50 5g Modem Rf System Firmware →
Snapdragon X55 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf System Firmware →
Snapdragon Xr1 Platform Firmware by Qualcomm
Vision Intelligence 300 Platform Firmware by Qualcomm
View all CVEs affecting Vision Intelligence 300 Platform Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with kernel privileges leading to complete device compromise
Likely Case
Device crash/reboot (denial of service) or limited code execution in WLAN context
If Mitigated
No impact if patched or if vulnerable commands are blocked
🎯 Exploit Status
Exploitation requires sending crafted wireless commands to vulnerable WLAN interface
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to June 2023 Qualcomm security bulletin for specific firmware versions
Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/june-2023-bulletin
Restart Required: Yes
Instructions:
1. Check device manufacturer for firmware updates 2. Apply Qualcomm-provided firmware patches 3. Reboot device to load new firmware
🔧 Temporary Workarounds
Disable vulnerable WLAN features
linuxDisable WMI-UTF and FTM TLV1 command processing if not required
# Requires firmware/device-specific configuration
🧯 If You Can't Patch
- Segment wireless networks to limit attack surface
- Monitor for unusual WLAN command patterns or device crashes
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against Qualcomm's patched versions in June 2023 bulletin
Check Version:
# Device-specific: cat /sys/class/net/wlan0/device/firmware_version or similar
Verify Fix Applied:
Verify firmware version has been updated to post-June 2023 patched version
📡 Detection & Monitoring
Log Indicators:
- WLAN driver crashes
- Kernel panics related to WLAN
- Unexpected device reboots
Network Indicators:
- Unusual WMI-UTF or FTM TLV1 command patterns on wireless networks
SIEM Query:
Search for: (WLAN crash OR kernel panic) AND (Qualcomm OR WMI OR FTM)