CVE-2024-33024
📋 TL;DR
This vulnerability allows an attacker to cause a Denial of Service (DoS) by sending specially crafted Wi-Fi beacon frames with malformed Multi-Link (ML) Information Elements. It affects devices using Qualcomm Wi-Fi chipsets that parse these frames, potentially disrupting wireless connectivity.
💻 Affected Systems
- Qualcomm Wi-Fi chipsets and devices using them
📦 What is this software?
Flight Rb5 5g Platform Firmware by Qualcomm
Immersive Home 214 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 214 Platform Firmware →
Immersive Home 216 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 216 Platform Firmware →
Immersive Home 316 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 316 Platform Firmware →
Immersive Home 318 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 318 Platform Firmware →
Immersive Home 3210 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 3210 Platform Firmware →
Immersive Home 326 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 326 Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 3 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Platform Firmware →
Snapdragon 865 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 865 5g Mobile Platform Firmware →
Snapdragon 865 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 865 5g Mobile Platform Firmware →
Snapdragon 870 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 870 5g Mobile Platform Firmware →
Snapdragon Ar2 Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar2 Gen 1 Platform Firmware →
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon X55 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf System Firmware →
Snapdragon X65 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf System Firmware →
Snapdragon X72 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X72 5g Modem Rf System Firmware →
Snapdragon X75 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X75 5g Modem Rf System Firmware →
Snapdragon Xr2 5g Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Xr2 5g Platform Firmware →
Video Collaboration Vc3 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc3 Platform Firmware →
Video Collaboration Vc5 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc5 Platform Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Complete wireless network disruption for affected devices, requiring reboot or reconnection
Likely Case
Temporary Wi-Fi disconnection or instability on vulnerable devices when malicious beacons are received
If Mitigated
Minimal impact with proper network segmentation and updated firmware
🎯 Exploit Status
Exploitation requires proximity to target device and ability to transmit Wi-Fi frames
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to August 2024 Qualcomm security bulletin for specific patched versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2024-bulletin.html
Restart Required: Yes
Instructions:
1. Check device manufacturer for firmware updates 2. Apply Qualcomm-provided patches 3. Update Wi-Fi driver/firmware 4. Reboot device
🔧 Temporary Workarounds
Disable Wi-Fi when not needed
allTurn off Wi-Fi on critical devices to prevent beacon reception
Network segmentation
allIsolate vulnerable devices on separate network segments
🧯 If You Can't Patch
- Implement physical security controls to limit proximity attacks
- Use wired connections for critical devices instead of Wi-Fi
🔍 How to Verify
Check if Vulnerable:
Check device specifications for Qualcomm Wi-Fi chipset and firmware version against August 2024 bulletin
Check Version:
Device-specific commands vary by manufacturer (e.g., 'adb shell getprop' for Android, manufacturer diagnostic tools)
Verify Fix Applied:
Verify firmware version has been updated to patched version from manufacturer
📡 Detection & Monitoring
Log Indicators:
- Wi-Fi disconnection events
- Driver crash logs
- Unexpected beacon frame parsing errors
Network Indicators:
- Unusual beacon frame patterns
- ML IE length anomalies in packet captures
SIEM Query:
Search for Wi-Fi interface errors, driver crashes, or authentication failures coinciding with beacon reception