CVE-2024-33051
📋 TL;DR
This vulnerability allows an attacker to cause a denial-of-service (DoS) condition in affected Wi-Fi systems by sending specially crafted beacon frames with malformed TIM (Traffic Indication Map) Information Elements. The vulnerability affects Qualcomm Wi-Fi chipsets and devices using them, potentially impacting smartphones, routers, IoT devices, and other wireless equipment.
💻 Affected Systems
- Qualcomm Wi-Fi chipsets and devices using them
📦 What is this software?
Snapdragon 1200 Wearable Firmware by Qualcomm
Snapdragon 7c Gen 2 Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 7c Gen 2 Compute Firmware →
Snapdragon 7c\+ Gen 3 Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 7c\+ Gen 3 Compute Firmware →
Snapdragon 820 Automotive Firmware by Qualcomm
View all CVEs affecting Snapdragon 820 Automotive Firmware →
Snapdragon 850 Compute Firmware by Qualcomm
Snapdragon 8cx Compute Firmware by Qualcomm
Snapdragon 8cx Compute Firmware by Qualcomm
Snapdragon 8cx Gen 2 5g Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 8cx Gen 2 5g Compute Firmware →
Snapdragon 8cx Gen 2 5g Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 8cx Gen 2 5g Compute Firmware →
Snapdragon 8cx Gen 3 Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 8cx Gen 3 Compute Firmware →
Snapdragon Auto 5g Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Rf Gen 2 Firmware →
Snapdragon W5\+ Gen 1 Wearable Firmware by Qualcomm
View all CVEs affecting Snapdragon W5\+ Gen 1 Wearable Firmware →
Snapdragon X35 5g Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X35 5g Rf System Firmware →
Snapdragon X50 5g Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X50 5g Rf System Firmware →
Snapdragon X55 5g Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Rf System Firmware →
Snapdragon X62 5g Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X62 5g Rf System Firmware →
Snapdragon X65 5g Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Rf System Firmware →
Snapdragon X72 5g Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X72 5g Rf System Firmware →
Snapdragon X75 5g Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X75 5g Rf System Firmware →
Snapdragon Xr2\+ Gen 1 Firmware by Qualcomm
Video Collaboration Vc1 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc1 Platform Firmware →
Video Collaboration Vc3 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc3 Platform Firmware →
Video Collaboration Vc5 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc5 Platform Firmware →
Vision Intelligence 300 Firmware by Qualcomm
Vision Intelligence 400 Firmware by Qualcomm
⚠️ Risk & Real-World Impact
Worst Case
Complete system crash or reboot of affected wireless devices, disrupting all network connectivity until manual intervention.
Likely Case
Temporary wireless service disruption affecting connected devices, requiring device restart to restore functionality.
If Mitigated
Minimal impact with proper network segmentation and monitoring; isolated wireless segment disruption.
🎯 Exploit Status
Exploitation requires sending malformed beacon frames to target wireless interface; no authentication needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Qualcomm September 2024 security bulletin for specific firmware versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html
Restart Required: Yes
Instructions:
1. Check device manufacturer for firmware updates. 2. Apply Qualcomm-provided firmware patches. 3. Reboot affected devices. 4. Verify patch installation.
🔧 Temporary Workarounds
Wireless Network Segmentation
allIsolate vulnerable devices on separate wireless networks to limit blast radius
Beacon Frame Filtering
allImplement network monitoring to detect and block malformed beacon frames
🧯 If You Can't Patch
- Implement strict wireless access controls and network segmentation
- Deploy wireless intrusion detection systems to monitor for beacon frame anomalies
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against Qualcomm's advisory; devices with unpatched Qualcomm Wi-Fi chipsets are vulnerable
Check Version:
Device-specific commands vary; typically 'iwconfig', 'dmesg | grep -i qualcomm', or manufacturer-specific firmware check
Verify Fix Applied:
Verify firmware version has been updated to patched version specified in Qualcomm bulletin
📡 Detection & Monitoring
Log Indicators:
- System crashes or reboots of wireless devices
- Kernel panic logs related to Wi-Fi drivers
- Unexpected wireless interface resets
Network Indicators:
- Unusual beacon frame patterns
- Malformed TIM IE in wireless captures
- Sudden wireless connectivity drops
SIEM Query:
wireless AND (crash OR reboot OR panic) AND (qualcomm OR wifi)