CVE-2023-28549
📋 TL;DR
This vulnerability allows memory corruption in Qualcomm's WLAN HAL (Hardware Abstraction Layer) when parsing received network buffers containing TLV (Type-Length-Value) payloads. Attackers could potentially execute arbitrary code or cause denial of service on affected devices. This affects devices using Qualcomm wireless chipsets with vulnerable WLAN firmware.
💻 Affected Systems
- Qualcomm WLAN chipsets and associated firmware
📦 What is this software?
Flight Rb5 5g Platform Firmware by Qualcomm
Immersive Home 214 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 214 Platform Firmware →
Immersive Home 216 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 216 Platform Firmware →
Immersive Home 316 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 316 Platform Firmware →
Immersive Home 318 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 318 Platform Firmware →
Qualcomm Robotics Rb5 Platform Firmware by Qualcomm
View all CVEs affecting Qualcomm Robotics Rb5 Platform Firmware →
Snapdragon 4 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 1 Mobile Platform Firmware →
Snapdragon 480 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 480 5g Mobile Platform Firmware →
Snapdragon 480 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 480 5g Mobile Platform Firmware →
Snapdragon 630 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 630 Mobile Platform Firmware →
Snapdragon 636 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 636 Mobile Platform Firmware →
Snapdragon 660 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 660 Mobile Platform Firmware →
Snapdragon 690 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 690 5g Mobile Platform Firmware →
Snapdragon 695 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 695 5g Mobile Platform Firmware →
Snapdragon 750g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 750g 5g Mobile Platform Firmware →
Snapdragon 765 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 765 5g Mobile Platform Firmware →
Snapdragon 765g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 765g 5g Mobile Platform Firmware →
Snapdragon 768g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 768g 5g Mobile Platform Firmware →
Snapdragon 778g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Platform Firmware →
Snapdragon 778g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Platform Firmware →
Snapdragon 780g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 780g 5g Mobile Platform Firmware →
Snapdragon 782g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 782g Mobile Platform Firmware →
Snapdragon 7c\+ Gen 3 Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 7c\+ Gen 3 Compute Firmware →
Snapdragon 8 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Platform Firmware →
Snapdragon 8 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Platform Firmware →
Snapdragon 835 Mobile Pc Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 835 Mobile Pc Platform Firmware →
Snapdragon 865 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 865 5g Mobile Platform Firmware →
Snapdragon 865 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 865 5g Mobile Platform Firmware →
Snapdragon 870 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 870 5g Mobile Platform Firmware →
Snapdragon 888 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 888 5g Mobile Platform Firmware →
Snapdragon 888 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 888 5g Mobile Platform Firmware →
Snapdragon 8c Compute Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8c Compute Platform Firmware →
Snapdragon 8c Compute Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8c Compute Platform Firmware →
Snapdragon 8cx Compute Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8cx Compute Platform Firmware →
Snapdragon 8cx Compute Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8cx Compute Platform Firmware →
Snapdragon 8cx Gen 2 5g Compute Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8cx Gen 2 5g Compute Platform Firmware →
Snapdragon 8cx Gen 2 5g Compute Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8cx Gen 2 5g Compute Platform Firmware →
Snapdragon 8cx Gen 3 Compute Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8cx Gen 3 Compute Platform Firmware →
Snapdragon Ar2 Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar2 Gen 1 Platform Firmware →
Snapdragon Auto 4g Modem Firmware by Qualcomm
Snapdragon Auto 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Firmware →
Snapdragon W5\+ Gen 1 Wearable Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon W5\+ Gen 1 Wearable Platform Firmware →
Snapdragon X55 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf System Firmware →
Snapdragon X65 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf System Firmware →
Snapdragon Xr2 5g Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Xr2 5g Platform Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with kernel privileges leading to complete device compromise, data theft, or persistent backdoor installation.
Likely Case
Device crash/reboot (denial of service) or limited memory corruption leading to unstable wireless connectivity.
If Mitigated
Isolated crash of WLAN subsystem with automatic recovery, minimal service disruption.
🎯 Exploit Status
Exploitation requires crafting malicious wireless packets. No public exploits known as of bulletin publication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to September 2023 Qualcomm security bulletin for specific patched versions
Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin
Restart Required: Yes
Instructions:
1. Check with device manufacturer for firmware updates. 2. Apply Qualcomm-provided WLAN firmware patches. 3. Reboot device to load new firmware.
🔧 Temporary Workarounds
Disable wireless interfaces
linuxTemporarily disable Wi-Fi to prevent exploitation
nmcli radio wifi off
ip link set wlan0 down
Network segmentation
allIsolate vulnerable devices on separate network segments
🧯 If You Can't Patch
- Implement strict network access controls to limit who can send packets to vulnerable devices
- Monitor for unusual wireless activity or device crashes indicating potential exploitation attempts
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against Qualcomm's patched versions in September 2023 bulletin
Check Version:
dmesg | grep -i wlan or check manufacturer-specific firmware version tools
Verify Fix Applied:
Verify WLAN firmware version has been updated to patched version from manufacturer
📡 Detection & Monitoring
Log Indicators:
- Kernel panics
- WLAN driver crashes
- Unexpected device reboots
- Memory corruption errors in system logs
Network Indicators:
- Malformed 802.11 packets
- Unusual TLV structures in wireless traffic
SIEM Query:
source="kernel" AND ("panic" OR "oops" OR "WLAN" OR "wifi") AND ("corruption" OR "buffer" OR "TLV")