CVE-2024-45558
📋 TL;DR
This vulnerability in Qualcomm Wi-Fi drivers allows attackers to cause a denial-of-service (DoS) condition by sending specially crafted packets. The driver fails to properly validate the length of per-STA profile information elements before accessing extended element IDs, leading to system crashes. This affects devices using vulnerable Qualcomm Wi-Fi chipsets.
💻 Affected Systems
- Qualcomm Wi-Fi chipsets and associated drivers
📦 What is this software?
Snapdragon 8 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Firmware →
Snapdragon 8 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Firmware →
Snapdragon 8 Gen 3 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Firmware →
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon X65 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf Firmware →
Snapdragon X72 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X72 5g Modem Rf Firmware →
Snapdragon X75 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X75 5g Modem Rf Firmware →
Video Collaboration Vc1 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc1 Platform Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Complete system crash requiring reboot, potentially disrupting critical services on affected devices
Likely Case
Temporary Wi-Fi disconnection and system instability requiring manual intervention to restore functionality
If Mitigated
Minimal impact with proper network segmentation and intrusion prevention systems blocking malicious packets
🎯 Exploit Status
Exploitation requires crafting specific malformed Wi-Fi packets. No authentication needed if device is within Wi-Fi range.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Qualcomm January 2025 security bulletin for specific patched driver versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2025-bulletin.html
Restart Required: Yes
Instructions:
1. Check device manufacturer for security updates. 2. Apply Qualcomm-provided driver updates. 3. Reboot device after patching. 4. Verify Wi-Fi functionality post-update.
🔧 Temporary Workarounds
Disable Wi-Fi when not needed
allTurn off Wi-Fi radios on critical devices when wireless connectivity is not required
Implement network segmentation
allIsolate Wi-Fi networks from critical infrastructure using VLANs and firewalls
🧯 If You Can't Patch
- Deploy intrusion prevention systems to detect and block malformed Wi-Fi packets
- Implement strict network access controls to limit Wi-Fi exposure to trusted devices only
🔍 How to Verify
Check if Vulnerable:
Check device specifications against Qualcomm's affected products list in January 2025 bulletin
Check Version:
Device-specific commands vary; generally check Wi-Fi driver version in system settings or via 'dmesg | grep -i qualcomm' on Linux systems
Verify Fix Applied:
Verify driver version matches patched versions listed in Qualcomm advisory and test Wi-Fi connectivity
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs
- Wi-Fi driver crash messages
- Unexpected system reboots
Network Indicators:
- Unusual Wi-Fi disconnection patterns
- Malformed 802.11 packets in network captures
SIEM Query:
source="kernel" AND ("panic" OR "crash") AND ("wifi" OR "qualcomm")