CVE-2023-33056
📋 TL;DR
This vulnerability allows a denial-of-service attack against WLAN firmware when it receives a specially crafted beacon frame containing a T2LM (Target Wake Time Link Management) Information Element. Attackers within Wi-Fi range can crash the firmware, disrupting wireless connectivity. Affects devices with vulnerable Qualcomm WLAN chipsets.
💻 Affected Systems
- Qualcomm WLAN chipsets and devices using them
📦 What is this software?
Immersive Home 214 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 214 Platform Firmware →
Immersive Home 216 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 216 Platform Firmware →
Immersive Home 316 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 316 Platform Firmware →
Immersive Home 318 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 318 Platform Firmware →
Immersive Home 3210 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 3210 Platform Firmware →
Immersive Home 326 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 326 Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon Ar2 Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar2 Gen 1 Platform Firmware →
Snapdragon X65 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf System Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Permanent device bricking requiring hardware replacement if firmware corruption occurs during crash
Likely Case
Temporary Wi-Fi disconnection requiring device reboot to restore functionality
If Mitigated
No impact if patched firmware is installed or device is out of Wi-Fi range
🎯 Exploit Status
Attack requires sending malformed beacon frames, which can be done with standard Wi-Fi penetration testing tools
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to device manufacturer or Qualcomm security bulletin for specific patched versions
Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/november-2023-bulletin
Restart Required: Yes
Instructions:
1. Check with device manufacturer for firmware updates. 2. Apply latest firmware from official sources. 3. Reboot device after update.
🔧 Temporary Workarounds
Disable Wi-Fi when not needed
allTurn off Wi-Fi radio to prevent beacon frame reception
# Android: adb shell svc wifi disable
# Linux: sudo nmcli radio wifi off
# Windows: netsh interface set interface "Wi-Fi" admin=disable
Use wired Ethernet
allSwitch to wired connections in high-risk environments
🧯 If You Can't Patch
- Deploy in Faraday cages or shielded environments for critical devices
- Implement physical security controls to limit Wi-Fi access range
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against manufacturer's patched versions list
Check Version:
# Android: getprop ro.build.fingerprint
# Linux: dmesg | grep -i qualcomm
# Check device settings for firmware version
Verify Fix Applied:
Confirm firmware version matches or exceeds patched version from manufacturer
📡 Detection & Monitoring
Log Indicators:
- WLAN firmware crash logs
- Unexpected Wi-Fi disconnections
- Kernel panic messages related to WLAN
Network Indicators:
- Multiple beacon frames with malformed T2LM IE from single source
- Unusual Wi-Fi disconnection patterns
SIEM Query:
source="*wlan*" AND ("crash" OR "panic" OR "reset") AND NOT user_initiated