CVE-2024-33068
📋 TL;DR
This vulnerability allows an attacker to cause a denial-of-service (DoS) condition by sending specially crafted MBSSID Information Element fragments in Wi-Fi beacon frames. It affects devices with Qualcomm Wi-Fi chipsets that parse these frames, potentially disrupting wireless connectivity. The attack requires proximity to the target device.
💻 Affected Systems
- Qualcomm Wi-Fi chipsets and devices using them
📦 What is this software?
Immersive Home 3210 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 3210 Platform Firmware →
Immersive Home 326 Platform Firmware by Qualcomm
View all CVEs affecting Immersive Home 326 Platform Firmware →
Snapdragon 429 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 429 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 3 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Platform Firmware →
Snapdragon Ar2 Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar2 Gen 1 Platform Firmware →
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon X65 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf System Firmware →
Snapdragon X72 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X72 5g Modem Rf System Firmware →
Snapdragon X75 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X75 5g Modem Rf System Firmware →
Video Collaboration Vc3 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc3 Platform Firmware →
Video Collaboration Vc5 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc5 Platform Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Permanent device crash requiring physical restart, complete loss of Wi-Fi connectivity, and potential disruption of critical wireless-dependent services.
Likely Case
Temporary Wi-Fi disconnection or performance degradation until the malicious frames stop, requiring reconnection or brief service interruption.
If Mitigated
Minimal impact with proper network segmentation, monitoring, and updated firmware preventing successful exploitation.
🎯 Exploit Status
Exploitation involves sending malicious beacon frames; no authentication needed as beacon frames are broadcast.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Qualcomm security bulletin for chipset-specific firmware updates.
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html
Restart Required: Yes
Instructions:
1. Check device manufacturer for firmware updates. 2. Apply Qualcomm-provided patches for affected Wi-Fi chipsets. 3. Reboot device after update. 4. Verify patch installation.
🔧 Temporary Workarounds
Disable vulnerable Wi-Fi features
allIf supported, disable MBSSID or restrict beacon parsing in Wi-Fi settings to reduce attack surface.
Network segmentation and monitoring
allSegment Wi-Fi networks and monitor for anomalous beacon frame activity using wireless intrusion detection systems.
🧯 If You Can't Patch
- Implement physical security controls to restrict unauthorized wireless access near critical devices.
- Use wired connections for sensitive systems instead of Wi-Fi where possible.
🔍 How to Verify
Check if Vulnerable:
Check device specifications for Qualcomm Wi-Fi chipset model and compare with affected list in Qualcomm advisory.
Check Version:
Platform-specific: On Linux, use 'iwconfig' or 'lspci' for Wi-Fi details; on Android, check Settings > About Phone > Wi-Fi driver version.
Verify Fix Applied:
Verify firmware version has been updated to patched release specified by Qualcomm or device manufacturer.
📡 Detection & Monitoring
Log Indicators:
- Wi-Fi driver crash logs, kernel panics related to wireless, increased disconnection events
Network Indicators:
- Unusual beacon frame patterns, MBSSID IE anomalies in wireless packet captures
SIEM Query:
Search for events like 'wlan driver crash', 'kernel panic wlan', or wireless disconnection spikes correlated with location.