CVE-2024-33048
📋 TL;DR
This vulnerability allows an attacker to cause a denial-of-service (DoS) condition by sending specially crafted beacon or probe response frames to affected Wi-Fi devices. The issue occurs during parsing of TID-to-link mapping elements, causing temporary service disruption. This affects devices using Qualcomm Wi-Fi chipsets with vulnerable firmware.
💻 Affected Systems
- Qualcomm Wi-Fi chipsets
📦 What is this software?
Snapdragon 8 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Firmware →
Snapdragon 8 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Firmware →
Snapdragon 8 Gen 3 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Firmware →
Snapdragon 835 Mobile Pc Firmware by Qualcomm
Snapdragon 865 5g Mobile Firmware by Qualcomm
Snapdragon 865 5g Mobile Firmware by Qualcomm
Snapdragon 870 5g Mobile Firmware by Qualcomm
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon X55 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf System Firmware →
Snapdragon X65 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf System Firmware →
Snapdragon X72 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X72 5g Modem Rf System Firmware →
Snapdragon X75 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X75 5g Modem Rf System Firmware →
Video Collaboration Vc3 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc3 Platform Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Persistent denial of Wi-Fi service requiring device reboot, potentially affecting critical infrastructure or medical devices relying on wireless connectivity.
Likely Case
Temporary Wi-Fi disconnection or performance degradation for affected devices in range of malicious frames.
If Mitigated
Brief service interruption with automatic recovery, minimal impact on network operations.
🎯 Exploit Status
Exploitation requires sending crafted wireless frames; no authentication needed. Complexity is low once attacker has necessary wireless transmission capability.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Qualcomm September 2024 security bulletin for specific firmware versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html
Restart Required: Yes
Instructions:
1. Check device manufacturer for firmware updates. 2. Apply Qualcomm-provided firmware patches. 3. Reboot affected devices. 4. Verify patch installation.
🔧 Temporary Workarounds
Wireless Network Segmentation
allIsolate critical devices on separate wireless networks or VLANs to limit attack surface
Monitor for Malicious Frames
allDeploy wireless intrusion detection systems to detect crafted beacon/probe frames
🧯 If You Can't Patch
- Implement physical security controls to limit wireless access to sensitive areas
- Use wired connections for critical devices instead of Wi-Fi where possible
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against Qualcomm security bulletin; contact device manufacturer for vulnerability status
Check Version:
Device-specific; typically through manufacturer management interface or command-line tools
Verify Fix Applied:
Verify firmware version has been updated to patched version specified in Qualcomm advisory
📡 Detection & Monitoring
Log Indicators:
- Unexpected Wi-Fi disconnections
- Driver crash logs
- Beacon frame parsing errors
Network Indicators:
- Unusual beacon/probe response frames
- Abnormal TID-to-link mapping elements
SIEM Query:
Wireless logs showing repeated disconnection events or driver crashes on multiple devices