CVE-2024-21467
📋 TL;DR
This vulnerability allows information disclosure when handling beacon probe frames during scan entry generation on client devices. It affects devices with Qualcomm Wi-Fi chipsets that process wireless network scans. Attackers could potentially extract sensitive information from vulnerable devices during wireless scanning operations.
💻 Affected Systems
- Qualcomm Wi-Fi chipsets and devices using them
📦 What is this software?
Immersive Home 214 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 214 Platform Firmware →
Immersive Home 216 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 216 Platform Firmware →
Immersive Home 316 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 316 Platform Firmware →
Immersive Home 318 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 318 Platform Firmware →
Immersive Home 3210 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 3210 Platform Firmware →
Immersive Home 326 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 326 Platform Firmware →
Snapdragon 865 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 865 5g Mobile Platform Firmware →
Snapdragon 865\+ 5g Mobile Platform \(sm8250 Ab\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 865\+ 5g Mobile Platform \(sm8250 Ab\) Firmware →
Snapdragon 870 5g Mobile Platform \(sm8250 Ac\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 870 5g Mobile Platform \(sm8250 Ac\) Firmware →
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon W5\+ Gen 1 Wearable Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon W5\+ Gen 1 Wearable Platform Firmware →
Snapdragon X55 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf System Firmware →
⚠️ Risk & Real-World Impact
Worst Case
An attacker could intercept sensitive device information, network credentials, or location data from vulnerable devices during wireless scanning operations, potentially enabling further attacks.
Likely Case
Information leakage about device capabilities, network preferences, or partial location data could be extracted by nearby attackers monitoring wireless traffic.
If Mitigated
With proper network segmentation and wireless security controls, the impact is limited to information disclosure within the local wireless environment.
🎯 Exploit Status
Exploitation requires proximity to target device and ability to send crafted beacon probe frames. No public exploit code identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to August 2024 Qualcomm security bulletin for specific patched versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2024-bulletin.html
Restart Required: Yes
Instructions:
1. Check device manufacturer for firmware updates. 2. Apply Qualcomm Wi-Fi driver/firmware updates from August 2024 or later. 3. Reboot device after update.
🔧 Temporary Workarounds
Disable unnecessary wireless scanning
allReduce wireless scanning frequency or disable scanning when not needed to limit exposure window
Use enterprise wireless security
allImplement WPA3-Enterprise or 802.1X authentication to limit exposure to untrusted networks
🧯 If You Can't Patch
- Segment wireless networks and restrict access to sensitive devices
- Monitor for unusual wireless scanning activity or beacon frame anomalies
🔍 How to Verify
Check if Vulnerable:
Check device specifications for Qualcomm Wi-Fi chipset and firmware version against August 2024 Qualcomm security bulletin
Check Version:
Platform dependent: Android: 'adb shell getprop ro.boot.wifichip' or similar; Linux: check Wi-Fi driver version in system logs
Verify Fix Applied:
Verify Wi-Fi driver/firmware version is updated to post-August 2024 Qualcomm security patches
📡 Detection & Monitoring
Log Indicators:
- Unusual wireless scanning patterns
- Multiple beacon probe frame processing errors
Network Indicators:
- Anomalous beacon frame patterns in wireless captures
- Unexpected information in probe responses
SIEM Query:
Wireless logs showing frequent scanning errors OR beacon frame processing anomalies