CVE-2023-33089
📋 TL;DR
This vulnerability allows attackers to cause a denial-of-service (DoS) condition by sending specially crafted WLAN packets that trigger a NULL pointer dereference in the wireless driver. It affects devices with Qualcomm WLAN chipsets, particularly mobile devices, routers, and IoT products using vulnerable firmware versions.
💻 Affected Systems
- Qualcomm WLAN chipsets
- Devices with Qualcomm wireless components
- Mobile devices
- Routers
- IoT devices
📦 What is this software?
Flight Rb5 5g Platform Firmware by Qualcomm
Immersive Home 214 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 214 Platform Firmware →
Immersive Home 216 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 216 Platform Firmware →
Immersive Home 316 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 316 Platform Firmware →
Immersive Home 318 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 318 Platform Firmware →
Immersive Home 3210 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 3210 Platform Firmware →
Immersive Home 326 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 326 Platform Firmware →
Snapdragon 778g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Platform Firmware →
Snapdragon 778g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Platform Firmware →
Snapdragon 780g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 780g 5g Mobile Platform Firmware →
Snapdragon 782g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 782g Mobile Platform Firmware →
Snapdragon 7c\+ Gen 3 Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 7c\+ Gen 3 Compute Firmware →
Snapdragon 8 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Platform Firmware →
Snapdragon 8 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 865 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 865 5g Mobile Platform Firmware →
Snapdragon 865 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 865 5g Mobile Platform Firmware →
Snapdragon 870 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 870 5g Mobile Platform Firmware →
Snapdragon 888 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 888 5g Mobile Platform Firmware →
Snapdragon 888 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 888 5g Mobile Platform Firmware →
Snapdragon Ar2 Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar2 Gen 1 Platform Firmware →
Snapdragon Auto 4g Modem Firmware by Qualcomm
Snapdragon Auto 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Firmware →
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon Sc8180xp Aa Firmware by Qualcomm
Snapdragon Sc8180xp Ac Firmware by Qualcomm
Snapdragon Sc8180xp Ad Firmware by Qualcomm
Snapdragon Sc8280xp Ab Firmware by Qualcomm
Snapdragon X55 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf System Firmware →
Snapdragon X65 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf System Firmware →
Snapdragon X75 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X75 5g Modem Rf System Firmware →
Snapdragon Xr2 5g Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Xr2 5g Platform Firmware →
Snapdragon Xr2\+ Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Xr2\+ Gen 1 Platform Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Complete system crash requiring physical reboot, potentially disrupting critical wireless services and causing extended downtime.
Likely Case
Temporary wireless connectivity loss affecting affected devices until system restarts or recovers.
If Mitigated
Minimal impact with proper network segmentation and monitoring; isolated to affected wireless interfaces only.
🎯 Exploit Status
Exploitation requires sending malformed WLAN packets to vulnerable interface; no authentication needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Firmware updates specified in Qualcomm December 2023 security bulletin
Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin
Restart Required: Yes
Instructions:
1. Check device manufacturer for security updates. 2. Apply Qualcomm-provided firmware patches. 3. Reboot device after patching. 4. Verify patch installation.
🔧 Temporary Workarounds
Disable vulnerable WLAN interfaces
linuxTemporarily disable wireless functionality if not required
sudo ifconfig wlan0 down
sudo systemctl stop wpa_supplicant
Network segmentation
allIsolate wireless networks from critical infrastructure
🧯 If You Can't Patch
- Implement strict network access controls to limit who can send packets to WLAN interfaces
- Deploy network monitoring for abnormal WLAN traffic patterns and implement rate limiting
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against Qualcomm advisory; examine system logs for WLAN driver crashes.
Check Version:
cat /proc/version or manufacturer-specific firmware check commands
Verify Fix Applied:
Verify firmware version has been updated to patched version; monitor for absence of WLAN driver crashes.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- WLAN driver crash logs
- NULL pointer dereference errors in system logs
Network Indicators:
- Unusual WLAN packet patterns
- Multiple connection attempts to wireless interfaces
- Abnormal broadcast/multicast traffic
SIEM Query:
source="kernel" AND "NULL pointer" AND ("WLAN" OR "wireless")