CVE-2024-33020
📋 TL;DR
This vulnerability in Qualcomm chipsets allows attackers to cause a denial-of-service condition by sending specially crafted TID-to-link mapping IE elements. It affects devices using vulnerable Qualcomm wireless chipsets, potentially disrupting Wi-Fi connectivity.
💻 Affected Systems
- Qualcomm wireless chipsets and devices using them
📦 What is this software?
Flight Rb5 5g Platform Firmware by Qualcomm
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 3 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Platform Firmware →
Snapdragon 865 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 865 5g Mobile Platform Firmware →
Snapdragon 865 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 865 5g Mobile Platform Firmware →
Snapdragon 870 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 870 5g Mobile Platform Firmware →
Snapdragon Ar2 Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar2 Gen 1 Platform Firmware →
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon X55 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf System Firmware →
Snapdragon X72 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X72 5g Modem Rf System Firmware →
Snapdragon X75 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X75 5g Modem Rf System Firmware →
Snapdragon Xr2 5g Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Xr2 5g Platform Firmware →
Video Collaboration Vc3 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc3 Platform Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Complete disruption of Wi-Fi connectivity on affected devices, requiring reboot to restore functionality.
Likely Case
Temporary Wi-Fi disconnection or performance degradation on vulnerable devices.
If Mitigated
Minimal impact with proper network segmentation and updated firmware.
🎯 Exploit Status
Requires sending crafted wireless frames; no authentication needed but requires network access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Qualcomm August 2024 security bulletin for specific firmware versions.
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2024-bulletin.html
Restart Required: Yes
Instructions:
1. Check device manufacturer for firmware updates. 2. Apply Qualcomm-provided firmware patches. 3. Reboot device after update.
🔧 Temporary Workarounds
Network segmentation
allIsolate vulnerable wireless devices from untrusted networks.
Disable vulnerable features
linuxIf possible, disable TID-to-link mapping features in wireless configuration.
🧯 If You Can't Patch
- Implement strict network access controls to limit who can send wireless frames to vulnerable devices.
- Monitor for unusual wireless disconnection patterns and implement redundancy for critical systems.
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against Qualcomm's advisory; use 'dmesg | grep -i qualcomm' or manufacturer-specific commands.
Check Version:
Manufacturer-specific; typically in device settings or using 'cat /proc/version' on Linux systems.
Verify Fix Applied:
Verify firmware version has been updated to patched version from Qualcomm bulletin.
📡 Detection & Monitoring
Log Indicators:
- Multiple Wi-Fi disconnection events
- Kernel panic or crash logs related to wireless drivers
Network Indicators:
- Unusual wireless frame patterns
- Spike in management frame traffic
SIEM Query:
source="wireless_logs" AND (event="disconnect" OR event="crash") AND count > threshold