CVE-2023-24851

7.8 HIGH

📋 TL;DR

This vulnerability allows memory corruption in Qualcomm WLAN Host software when parsing QMI response messages from firmware. Attackers could potentially execute arbitrary code or cause denial of service on affected devices. This affects devices using Qualcomm WLAN chipsets with vulnerable firmware.

💻 Affected Systems

Products:
  • Qualcomm WLAN Host software/firmware
Versions: Specific versions not publicly detailed in bulletin
Operating Systems: Android, Linux-based systems with Qualcomm chipsets
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with Qualcomm WLAN chipsets; exact device models not specified in public bulletin.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with kernel privileges, allowing complete device compromise and persistence.

🟠

Likely Case

Device crash/reboot (denial of service) or limited code execution in WLAN subsystem context.

🟢

If Mitigated

Denial of service only if exploit fails or memory protections limit impact.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending crafted QMI messages to WLAN firmware; no public exploits known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to July 2023 Qualcomm security bulletin for specific patched versions

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/july-2023-bulletin

Restart Required: Yes

Instructions:

1. Check device manufacturer for firmware updates. 2. Apply Qualcomm-provided firmware patches. 3. Reboot device after update.

🔧 Temporary Workarounds

Disable WLAN if not needed

linux

Temporarily disable wireless functionality to prevent exploitation

nmcli radio wifi off
ip link set wlan0 down

🧯 If You Can't Patch

  • Segment network to limit WLAN device exposure
  • Implement strict network filtering for QMI protocol traffic

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against Qualcomm security bulletin; command varies by device manufacturer

Check Version:

cat /sys/class/net/wlan0/device/firmware_version (Linux example, varies by device)

Verify Fix Applied:

Verify firmware version has been updated to patched version from manufacturer

📡 Detection & Monitoring

Log Indicators:

  • WLAN firmware crashes
  • Kernel panic logs related to WLAN driver

Network Indicators:

  • Unusual QMI protocol traffic to WLAN interfaces

SIEM Query:

source="kernel" AND "WLAN" AND ("panic" OR "crash")

🔗 References

📤 Share & Export