CVE-2025-21446
📋 TL;DR
This vulnerability allows a denial-of-service (DoS) condition in Qualcomm wireless LAN (WLAN) chipsets when processing vendor-specific information elements in BTM (BSS Transition Management) request frames. An attacker can send specially crafted WLAN frames to cause temporary service disruption. Affected systems include devices with vulnerable Qualcomm WLAN chipsets.
💻 Affected Systems
- Qualcomm WLAN chipsets and devices using them
📦 What is this software?
Snapdragon 778g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Firmware →
Snapdragon 778g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Firmware →
Snapdragon 780g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 780g 5g Mobile Firmware →
Snapdragon 782g Mobile Firmware by Qualcomm
Snapdragon 7c\+ Gen 3 Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 7c\+ Gen 3 Compute Firmware →
Snapdragon 8 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Firmware →
Snapdragon 8 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Firmware →
Snapdragon 8 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Firmware →
Snapdragon 8 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Firmware →
Snapdragon 8 Gen 3 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Firmware →
Snapdragon 865 5g Mobile Firmware by Qualcomm
Snapdragon 865 5g Mobile Firmware by Qualcomm
Snapdragon 870 5g Mobile Firmware by Qualcomm
Snapdragon 888 5g Mobile Firmware by Qualcomm
Snapdragon 888 5g Mobile Firmware by Qualcomm
Snapdragon Auto 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Firmware →
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon X32 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X32 5g Modem Rf Firmware →
Snapdragon X35 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X35 5g Modem Rf Firmware →
Snapdragon X55 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf Firmware →
Snapdragon X62 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X62 5g Modem Rf Firmware →
Snapdragon X65 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf Firmware →
Snapdragon X72 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X72 5g Modem Rf Firmware →
Snapdragon X75 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X75 5g Modem Rf Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Complete wireless network disruption for affected devices, requiring reboot or reconnection to restore functionality.
Likely Case
Temporary wireless connectivity loss or degraded performance on affected devices until the malformed frame processing completes.
If Mitigated
Minimal impact with proper network segmentation and wireless intrusion prevention systems in place.
🎯 Exploit Status
Exploitation requires sending malformed WLAN frames to target devices. No authentication needed but requires wireless network access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Qualcomm July 2025 security bulletin for specific chipset firmware versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2025-bulletin.html
Restart Required: Yes
Instructions:
1. Check Qualcomm advisory for affected chipset models. 2. Obtain updated firmware from device manufacturer. 3. Apply firmware update following manufacturer instructions. 4. Reboot device to activate new firmware.
🔧 Temporary Workarounds
Disable BTM (802.11v) capability
linuxDisable BSS Transition Management feature on wireless access points to prevent processing of vulnerable frames
# On Linux AP: iw dev wlan0 set bss_transition 0
# Check current: iw dev wlan0 info | grep bss_transition
Implement wireless intrusion prevention
allConfigure WIPS to detect and block malformed vendor-specific information elements in WLAN frames
🧯 If You Can't Patch
- Segment wireless networks to limit blast radius of potential DoS attacks
- Implement strict wireless client isolation to prevent frame propagation between devices
🔍 How to Verify
Check if Vulnerable:
Check device specifications for Qualcomm WLAN chipset and consult manufacturer security advisories
Check Version:
# Android: getprop ro.boot.wlan.chip.version
# Linux: dmesg | grep -i qualcomm
Verify Fix Applied:
Verify firmware version matches or exceeds patched version from Qualcomm bulletin
📡 Detection & Monitoring
Log Indicators:
- Wireless driver crash logs
- Unexpected WLAN disconnections
- BTM request processing errors
Network Indicators:
- Unusual vendor-specific IE in WLAN frames
- Excessive BTM request frames from single source
SIEM Query:
source="wireless_controller" AND (vendor_specific_ie OR btm_request) AND error