CVE-2024-33010

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to cause a denial-of-service (DoS) condition by sending specially crafted MBSSID Information Element fragments in Wi-Fi beacon frames. It affects systems using Qualcomm Wi-Fi chipsets that parse these frames, potentially disrupting wireless connectivity for affected devices.

💻 Affected Systems

Products:
  • Qualcomm Wi-Fi chipsets and devices using them
Versions: Specific affected versions not detailed in reference; consult Qualcomm advisory for exact chipset versions
Operating Systems: Android, Linux-based systems using Qualcomm Wi-Fi drivers, Embedded systems with Qualcomm Wi-Fi
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with Qualcomm Wi-Fi hardware when wireless interface is active and scanning for networks. Mobile devices, IoT devices, and networking equipment using affected chipsets are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete wireless network disruption, rendering affected devices unable to connect to Wi-Fi networks until system restart or patch application.

🟠

Likely Case

Temporary Wi-Fi connectivity loss on affected devices when malicious beacon frames are received, requiring device reboot to restore functionality.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring; isolated wireless segment affected at most.

🌐 Internet-Facing: MEDIUM - Attackers could target public Wi-Fi networks or devices with exposed wireless interfaces, but requires proximity to target network.
🏢 Internal Only: MEDIUM - Internal wireless networks could be disrupted by malicious insiders or compromised devices within wireless range.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted Wi-Fi beacon frames within wireless range. No authentication needed as beacon frames are broadcast. Attack complexity is low but requires proximity to target.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Qualcomm August 2024 security bulletin for specific firmware versions

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2024-bulletin.html

Restart Required: Yes

Instructions:

1. Check Qualcomm advisory for affected chipset models. 2. Obtain updated firmware/drivers from device manufacturer. 3. Apply patches following manufacturer instructions. 4. Reboot affected devices to load new firmware.

🔧 Temporary Workarounds

Disable Wi-Fi scanning

all

Prevent devices from scanning for wireless networks to avoid parsing malicious beacon frames

# Android: Settings > Network & internet > Wi-Fi > Wi-Fi preferences > Turn off 'Turn on Wi-Fi automatically'
# Linux: sudo nmcli radio wifi off

Network segmentation

all

Isolate vulnerable devices on separate wireless networks with strict access controls

🧯 If You Can't Patch

  • Implement physical security controls to restrict unauthorized wireless devices near vulnerable systems
  • Deploy wireless intrusion detection systems (WIDS) to monitor for malicious beacon frames

🔍 How to Verify

Check if Vulnerable:

Check device specifications for Qualcomm Wi-Fi chipset model, then cross-reference with Qualcomm's August 2024 security bulletin

Check Version:

# Linux: dmesg | grep -i qualcomm
# Android: Settings > About phone > Kernel version (check for Qualcomm references)

Verify Fix Applied:

Verify firmware/driver version matches patched versions listed in Qualcomm advisory, test Wi-Fi functionality under normal conditions

📡 Detection & Monitoring

Log Indicators:

  • Kernel panics or crashes in Wi-Fi driver logs
  • Repeated Wi-Fi disconnections in system logs
  • MBSSID parsing errors in wireless driver logs

Network Indicators:

  • Unusual beacon frame patterns on wireless networks
  • Multiple devices experiencing simultaneous Wi-Fi disconnections
  • Spoofed beacon frames with malformed MBSSID elements

SIEM Query:

source="wireless_logs" AND ("MBSSID" OR "beacon parse" OR "Wi-Fi crash")

🔗 References

📤 Share & Export