CVE-2022-33237: Buffer over-read in WLAN in Qualcomm, Inc. Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
Transient DOS due to buffer over-read in WLAN firmware while processing PPE threshold. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
AI Analysis
Technical Summary
CVE-2022-33237 is a medium-severity vulnerability affecting a broad range of Qualcomm Snapdragon platforms, including Snapdragon Auto, Compute, Connectivity, Consumer Electronics Connectivity, Consumer IoT, Industrial IoT, Mobile, Voice & Music, Wearables, and Wired Infrastructure and Networking products. The vulnerability arises from a buffer over-read condition in the WLAN firmware component when processing the Packet Power Envelope (PPE) threshold. Specifically, the firmware improperly handles input data leading to reading beyond the allocated buffer boundaries (CWE-125). This flaw can cause transient denial of service (DoS) conditions by crashing or destabilizing the WLAN firmware, resulting in temporary loss of wireless connectivity. The affected devices span numerous Qualcomm chipsets and modules, including but not limited to IPQ series, QCA series, QCN series, QCS series, SD (Snapdragon) series, and WCD/WCN wireless components. The vulnerability does not require authentication or user interaction to be exploited, but it is limited to wireless network interactions targeting the vulnerable WLAN firmware. There are no known exploits in the wild as of the published date, and no patches or firmware updates have been linked or referenced in the provided information. The broad range of affected hardware indicates a widespread potential impact across multiple device categories, from mobile phones and wearables to automotive and industrial IoT devices. The transient nature of the DoS suggests that while the impact is disruptive, it is not permanent or leading to code execution or data compromise. However, the instability of wireless connectivity can have cascading effects on dependent systems and services.
Potential Impact
For European organizations, the impact of CVE-2022-33237 primarily manifests as intermittent wireless network outages or disruptions on devices using affected Qualcomm Snapdragon WLAN components. This can affect mobile devices, enterprise IoT deployments, automotive systems, and critical infrastructure relying on wireless connectivity. In sectors such as automotive manufacturing, industrial automation, healthcare, and telecommunications, transient WLAN outages could degrade operational efficiency, safety systems, or communication reliability. Given the widespread use of Qualcomm Snapdragon chipsets in consumer and enterprise devices across Europe, organizations may experience service interruptions, reduced productivity, or compromised user experience. While the vulnerability does not lead to data breaches or persistent system compromise, the denial of service could be exploited in targeted attacks to cause temporary network outages or disrupt wireless-dependent operations. This is particularly relevant for industries with high reliance on wireless connectivity and real-time data exchange. The lack of known exploits reduces immediate risk, but the broad attack surface and absence of patches necessitate proactive mitigation to prevent potential exploitation.
Mitigation Recommendations
Monitor vendor advisories from Qualcomm and device manufacturers for firmware updates or patches addressing this vulnerability and apply them promptly once available. Implement network segmentation to isolate critical systems and reduce the impact of transient WLAN outages on essential services. Deploy wireless intrusion detection and prevention systems (WIDS/WIPS) to monitor for anomalous WLAN traffic patterns that could indicate exploitation attempts targeting the PPE threshold processing. Where feasible, configure devices to use wired network connections in critical environments to mitigate reliance on vulnerable WLAN firmware. Engage with device vendors to verify the presence of updated firmware and request timelines for remediation if not yet available. Incorporate redundancy in wireless network infrastructure to maintain connectivity during transient DoS events caused by this vulnerability. Educate IT and security teams on the symptoms of WLAN firmware instability to enable rapid detection and response to potential exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland, Belgium
CVE-2022-33237: Buffer over-read in WLAN in Qualcomm, Inc. Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
Description
Transient DOS due to buffer over-read in WLAN firmware while processing PPE threshold. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
AI-Powered Analysis
Technical Analysis
CVE-2022-33237 is a medium-severity vulnerability affecting a broad range of Qualcomm Snapdragon platforms, including Snapdragon Auto, Compute, Connectivity, Consumer Electronics Connectivity, Consumer IoT, Industrial IoT, Mobile, Voice & Music, Wearables, and Wired Infrastructure and Networking products. The vulnerability arises from a buffer over-read condition in the WLAN firmware component when processing the Packet Power Envelope (PPE) threshold. Specifically, the firmware improperly handles input data leading to reading beyond the allocated buffer boundaries (CWE-125). This flaw can cause transient denial of service (DoS) conditions by crashing or destabilizing the WLAN firmware, resulting in temporary loss of wireless connectivity. The affected devices span numerous Qualcomm chipsets and modules, including but not limited to IPQ series, QCA series, QCN series, QCS series, SD (Snapdragon) series, and WCD/WCN wireless components. The vulnerability does not require authentication or user interaction to be exploited, but it is limited to wireless network interactions targeting the vulnerable WLAN firmware. There are no known exploits in the wild as of the published date, and no patches or firmware updates have been linked or referenced in the provided information. The broad range of affected hardware indicates a widespread potential impact across multiple device categories, from mobile phones and wearables to automotive and industrial IoT devices. The transient nature of the DoS suggests that while the impact is disruptive, it is not permanent or leading to code execution or data compromise. However, the instability of wireless connectivity can have cascading effects on dependent systems and services.
Potential Impact
For European organizations, the impact of CVE-2022-33237 primarily manifests as intermittent wireless network outages or disruptions on devices using affected Qualcomm Snapdragon WLAN components. This can affect mobile devices, enterprise IoT deployments, automotive systems, and critical infrastructure relying on wireless connectivity. In sectors such as automotive manufacturing, industrial automation, healthcare, and telecommunications, transient WLAN outages could degrade operational efficiency, safety systems, or communication reliability. Given the widespread use of Qualcomm Snapdragon chipsets in consumer and enterprise devices across Europe, organizations may experience service interruptions, reduced productivity, or compromised user experience. While the vulnerability does not lead to data breaches or persistent system compromise, the denial of service could be exploited in targeted attacks to cause temporary network outages or disrupt wireless-dependent operations. This is particularly relevant for industries with high reliance on wireless connectivity and real-time data exchange. The lack of known exploits reduces immediate risk, but the broad attack surface and absence of patches necessitate proactive mitigation to prevent potential exploitation.
Mitigation Recommendations
Monitor vendor advisories from Qualcomm and device manufacturers for firmware updates or patches addressing this vulnerability and apply them promptly once available. Implement network segmentation to isolate critical systems and reduce the impact of transient WLAN outages on essential services. Deploy wireless intrusion detection and prevention systems (WIDS/WIPS) to monitor for anomalous WLAN traffic patterns that could indicate exploitation attempts targeting the PPE threshold processing. Where feasible, configure devices to use wired network connections in critical environments to mitigate reliance on vulnerable WLAN firmware. Engage with device vendors to verify the presence of updated firmware and request timelines for remediation if not yet available. Incorporate redundancy in wireless network infrastructure to maintain connectivity during transient DoS events caused by this vulnerability. Educate IT and security teams on the symptoms of WLAN firmware instability to enable rapid detection and response to potential exploitation attempts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- qualcomm
- Date Reserved
- 2022-06-14T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d984ac4522896dcbf7087
Added to database: 5/21/2025, 9:09:30 AM
Last enriched: 6/21/2025, 7:09:05 PM
Last updated: 8/14/2025, 5:34:43 PM
Views: 19
Related Threats
CVE-2025-9119: Cross Site Scripting in Netis WF2419
MediumCVE-2025-8098: CWE-276: Incorrect Default Permissions in Lenovo PC Manager
HighCVE-2025-53192: CWE-146 Improper Neutralization of Expression/Command Delimiters in Apache Software Foundation Apache Commons OGNL
HighCVE-2025-4371: CWE-347: Improper Verification of Cryptographic Signature in Lenovo 510 FHD Webcam
HighCVE-2025-32992: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.