CVE-2023-28560
📋 TL;DR
This vulnerability allows memory corruption in the WLAN Hardware Abstraction Layer (HAL) when processing devIndex values from untrusted WMI payloads. Attackers could potentially execute arbitrary code or cause denial of service on affected systems. This affects devices using Qualcomm WLAN chipsets with vulnerable firmware.
💻 Affected Systems
- Qualcomm WLAN chipsets and associated firmware
📦 What is this software?
8098 Firmware by Qualcomm
8998 Firmware by Qualcomm
Immersive Home 214 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 214 Platform Firmware →
Immersive Home 216 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 216 Platform Firmware →
Immersive Home 316 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 316 Platform Firmware →
Immersive Home 318 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 318 Platform Firmware →
Snapdragon 630 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 630 Mobile Platform Firmware →
Snapdragon 636 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 636 Mobile Platform Firmware →
Snapdragon 652 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 652 Mobile Platform Firmware →
Snapdragon 660 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 660 Mobile Platform Firmware →
Snapdragon 662 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 662 Mobile Platform Firmware →
Snapdragon 675 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 675 Mobile Platform Firmware →
Snapdragon 808 Processor Firmware by Qualcomm
Snapdragon 810 Processor Firmware by Qualcomm
Snapdragon 820 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 820 Mobile Platform Firmware →
Snapdragon 821 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 821 Mobile Platform Firmware →
Snapdragon 845 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 845 Mobile Platform Firmware →
Snapdragon 850 Mobile Compute Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 850 Mobile Compute Platform Firmware →
Snapdragon Auto 4g Modem Firmware by Qualcomm
Snapdragon W5\+ Gen 1 Wearable Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon W5\+ Gen 1 Wearable Platform Firmware →
Snapdragon X50 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X50 5g Modem Rf System Firmware →
Snapdragon X55 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf System Firmware →
Snapdragon Xr1 Platform Firmware by Qualcomm
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with kernel privileges leading to complete system compromise
Likely Case
System crash or denial of service affecting WLAN functionality
If Mitigated
Limited impact with proper network segmentation and exploit mitigations
🎯 Exploit Status
Requires ability to send crafted WMI packets to WLAN interface; no public exploit code available
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Qualcomm September 2023 security bulletin for specific firmware versions
Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin
Restart Required: Yes
Instructions:
1. Check Qualcomm advisory for affected chipset/firmware versions. 2. Obtain updated firmware from device manufacturer. 3. Apply firmware update following manufacturer instructions. 4. Reboot device to activate new firmware.
🔧 Temporary Workarounds
Network Segmentation
allIsolate WLAN networks from critical systems
WLAN Access Control
allRestrict WLAN access to trusted devices only
🧯 If You Can't Patch
- Disable WLAN functionality if not required
- Implement strict network segmentation to isolate WLAN traffic
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against Qualcomm advisory; examine WLAN chipset model and firmware version
Check Version:
Device-specific commands vary by manufacturer; typically 'dmesg | grep -i wlan' or manufacturer-specific firmware check tools
Verify Fix Applied:
Verify firmware version has been updated to patched version specified in Qualcomm advisory
📡 Detection & Monitoring
Log Indicators:
- Kernel panics
- WLAN driver crashes
- Memory corruption errors in system logs
Network Indicators:
- Unusual WMI packet patterns
- Malformed WLAN management frames
SIEM Query:
source="kernel" AND ("panic" OR "oops" OR "segfault") AND ("wlan" OR "wifi" OR "802.11")