CVE-2023-21669
📋 TL;DR
This vulnerability allows information disclosure in Qualcomm WLAN HOST software when sending DPP action frames with invalid source addresses. Attackers could potentially access sensitive wireless network information. Affects devices using Qualcomm chipsets with vulnerable WLAN firmware.
💻 Affected Systems
- Qualcomm WLAN HOST software
📦 What is this software?
Flight Rb5 5g Platform Firmware by Qualcomm
Snapdragon 675 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 675 Mobile Platform Firmware →
Snapdragon X50 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X50 5g Modem Rf System Firmware →
Snapdragon X55 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf System Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Attackers could intercept sensitive wireless communication, obtain network credentials, or perform man-in-the-middle attacks on vulnerable devices.
Likely Case
Information leakage about wireless network configuration and potentially device identifiers, enabling reconnaissance for further attacks.
If Mitigated
Limited information exposure with proper network segmentation and access controls in place.
🎯 Exploit Status
Requires proximity to target device and ability to send crafted DPP frames.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to June 2023 Qualcomm security bulletin for specific patched versions
Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/june-2023-bulletin
Restart Required: Yes
Instructions:
1. Check device manufacturer for firmware updates. 2. Apply Qualcomm-provided patches. 3. Reboot device after update.
🔧 Temporary Workarounds
Disable DPP if not needed
allDisable Device Provisioning Protocol feature if not required for network operations
Network segmentation
allSegment wireless networks to limit exposure of vulnerable devices
🧯 If You Can't Patch
- Isolate vulnerable devices on separate network segments
- Implement strict network access controls and monitoring
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against Qualcomm's patched versions list
Check Version:
Device-specific commands vary by manufacturer (e.g., Android: Settings > About Phone > Build Number)
Verify Fix Applied:
Verify firmware version has been updated to patched release
📡 Detection & Monitoring
Log Indicators:
- Unusual DPP frame activity
- Multiple failed DPP authentication attempts
Network Indicators:
- Malformed DPP frames with invalid source addresses
- Unusual wireless protocol traffic
SIEM Query:
wireless_protocol:DPP AND (source_address:invalid OR frame_type:malformed)