CVE-2023-33097
📋 TL;DR
This vulnerability allows attackers to cause a temporary denial-of-service (DoS) in WLAN firmware by sending specially crafted Fast Transition Management Request (FTMR) frames. It affects devices with Qualcomm WLAN chipsets that support fast BSS transition features. The attack disrupts wireless connectivity temporarily but doesn't allow persistent access or data theft.
💻 Affected Systems
- Qualcomm WLAN chipsets with fast BSS transition support
📦 What is this software?
Immersive Home 214 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 214 Platform Firmware →
Immersive Home 216 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 216 Platform Firmware →
Immersive Home 316 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 316 Platform Firmware →
Immersive Home 318 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 318 Platform Firmware →
Immersive Home 3210 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 3210 Platform Firmware →
Immersive Home 326 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 326 Platform Firmware →
Snapdragon 8 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon Ar2 Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar2 Gen 1 Platform Firmware →
Snapdragon X65 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf System Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Complete wireless network disruption for affected devices, requiring manual reboot to restore connectivity. In dense environments, could affect multiple devices simultaneously.
Likely Case
Temporary loss of Wi-Fi connectivity on targeted devices for several seconds to minutes until firmware recovers automatically.
If Mitigated
Minimal impact with proper network segmentation and monitoring; affected devices automatically recover without permanent damage.
🎯 Exploit Status
Exploitation requires sending malformed FTMR frames to target devices, which can be done with standard Wi-Fi packet injection tools. No authentication needed as these are management frames.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to device manufacturer firmware updates; Qualcomm has provided fixes to OEM partners
Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin
Restart Required: Yes
Instructions:
1. Check with device manufacturer for firmware updates. 2. Apply manufacturer-provided firmware patches. 3. Reboot affected devices after patching. 4. Verify firmware version matches patched release.
🔧 Temporary Workarounds
Disable Fast BSS Transition
linuxTemporarily disable 802.11r fast transition feature on wireless access points and clients
# On Linux APs: iw dev wlan0 set ft_disabled=1
# Check current setting: iw dev wlan0 info | grep ft
Implement Management Frame Protection
linuxEnable 802.11w management frame protection to validate FTMR frames
# On hostapd config: ieee80211w=1 or ieee80211w=2
# On wpa_supplicant: pmf=1 or pmf=2
🧯 If You Can't Patch
- Segment wireless networks to limit blast radius of potential DoS attacks
- Implement wireless intrusion detection to monitor for FTMR frame anomalies
🔍 How to Verify
Check if Vulnerable:
Check if device uses Qualcomm WLAN chipset and has fast BSS transition enabled. Use: 'iw list | grep -A 20 "Supported interface modes"' to check capabilities.
Check Version:
# For Android: getprop ro.boot.wificontrolfwversion
# For Linux: dmesg | grep -i qualcomm
# Check manufacturer-specific firmware version commands
Verify Fix Applied:
Verify firmware version matches manufacturer's patched release and test FTMR frame handling with controlled testing.
📡 Detection & Monitoring
Log Indicators:
- Multiple FTMR frame failures in wireless logs
- Unexpected WLAN driver crashes or resets
- Increased management frame errors
Network Indicators:
- Abnormal FTMR frame patterns
- Excessive management frame traffic to single MAC
- Wireless connectivity drops following FTMR spikes
SIEM Query:
wireless_logs | where event_type == "ftmr_frame" and result == "failure" | stats count by src_mac, dest_mac