CVE-2024-32991

7.5 HIGH

📋 TL;DR

A permission verification vulnerability in the wpa_supplicant module allows attackers to bypass security controls and disrupt Wi-Fi connectivity. This affects Huawei devices running HarmonyOS with vulnerable wpa_supplicant versions. The vulnerability primarily impacts availability of Wi-Fi services.

💻 Affected Systems

Products:
  • Huawei smartphones
  • Huawei tablets
  • Huawei devices with HarmonyOS
Versions: HarmonyOS versions before security patches released in May 2024
Operating Systems: HarmonyOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices using wpa_supplicant for Wi-Fi management on HarmonyOS. Requires Wi-Fi to be enabled and in use.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of Wi-Fi service on affected devices, preventing network connectivity and disrupting device functionality that depends on wireless communication.

🟠

Likely Case

Intermittent Wi-Fi disconnections or inability to connect to wireless networks, causing service disruption for users.

🟢

If Mitigated

Minimal impact with proper network segmentation and updated systems, though some service degradation may occur.

🌐 Internet-Facing: MEDIUM - Requires proximity to target network or device compromise to exploit, but could affect internet-facing Wi-Fi services.
🏢 Internal Only: HIGH - Internal networks with vulnerable devices are at significant risk as attackers could disrupt corporate Wi-Fi infrastructure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access or ability to send crafted packets to the wpa_supplicant process. No public exploit code available as of current knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: HarmonyOS security updates from May 2024 onward

Vendor Advisory: https://consumer.huawei.com/en/support/bulletin/2024/5/

Restart Required: Yes

Instructions:

1. Check for system updates in device Settings > System & updates > Software update. 2. Download and install available security updates. 3. Restart device after installation completes.

🔧 Temporary Workarounds

Disable Wi-Fi when not in use

all

Turn off Wi-Fi functionality to prevent exploitation of the wpa_supplicant vulnerability

Use wired connections

all

Switch to Ethernet or cellular data instead of Wi-Fi to avoid the vulnerable component

🧯 If You Can't Patch

  • Segment network to isolate vulnerable devices from critical systems
  • Implement network monitoring for unusual Wi-Fi disconnection patterns

🔍 How to Verify

Check if Vulnerable:

Check HarmonyOS version in Settings > About phone > HarmonyOS version. If before May 2024 security update, device is vulnerable.

Check Version:

Settings > About phone > HarmonyOS version (no CLI command available on consumer devices)

Verify Fix Applied:

Verify HarmonyOS version includes May 2024 or later security patches in Settings > About phone > HarmonyOS version.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected wpa_supplicant crashes
  • Multiple Wi-Fi authentication failures
  • Abnormal Wi-Fi disconnection events

Network Indicators:

  • Sudden loss of Wi-Fi connectivity across multiple devices
  • Unusual broadcast/multicast traffic on Wi-Fi networks

SIEM Query:

source="device_logs" AND (process="wpa_supplicant" AND event="crash") OR (interface="wlan*" AND status="disconnected" AND reason="unexpected")

🔗 References

📤 Share & Export