Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-33237: Buffer over-read in WLAN in Qualcomm, Inc. Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

0
Medium
Published: Tue Nov 15 2022 (11/15/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Description

Transient DOS due to buffer over-read in WLAN firmware while processing PPE threshold. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

AI-Powered Analysis

AILast updated: 06/21/2025, 19:09:05 UTC

Technical Analysis

CVE-2022-33237 is a medium-severity vulnerability affecting a broad range of Qualcomm Snapdragon platforms, including Snapdragon Auto, Compute, Connectivity, Consumer Electronics Connectivity, Consumer IoT, Industrial IoT, Mobile, Voice & Music, Wearables, and Wired Infrastructure and Networking products. The vulnerability arises from a buffer over-read condition in the WLAN firmware component when processing the Packet Power Envelope (PPE) threshold. Specifically, the firmware improperly handles input data leading to reading beyond the allocated buffer boundaries (CWE-125). This flaw can cause transient denial of service (DoS) conditions by crashing or destabilizing the WLAN firmware, resulting in temporary loss of wireless connectivity. The affected devices span numerous Qualcomm chipsets and modules, including but not limited to IPQ series, QCA series, QCN series, QCS series, SD (Snapdragon) series, and WCD/WCN wireless components. The vulnerability does not require authentication or user interaction to be exploited, but it is limited to wireless network interactions targeting the vulnerable WLAN firmware. There are no known exploits in the wild as of the published date, and no patches or firmware updates have been linked or referenced in the provided information. The broad range of affected hardware indicates a widespread potential impact across multiple device categories, from mobile phones and wearables to automotive and industrial IoT devices. The transient nature of the DoS suggests that while the impact is disruptive, it is not permanent or leading to code execution or data compromise. However, the instability of wireless connectivity can have cascading effects on dependent systems and services.

Potential Impact

For European organizations, the impact of CVE-2022-33237 primarily manifests as intermittent wireless network outages or disruptions on devices using affected Qualcomm Snapdragon WLAN components. This can affect mobile devices, enterprise IoT deployments, automotive systems, and critical infrastructure relying on wireless connectivity. In sectors such as automotive manufacturing, industrial automation, healthcare, and telecommunications, transient WLAN outages could degrade operational efficiency, safety systems, or communication reliability. Given the widespread use of Qualcomm Snapdragon chipsets in consumer and enterprise devices across Europe, organizations may experience service interruptions, reduced productivity, or compromised user experience. While the vulnerability does not lead to data breaches or persistent system compromise, the denial of service could be exploited in targeted attacks to cause temporary network outages or disrupt wireless-dependent operations. This is particularly relevant for industries with high reliance on wireless connectivity and real-time data exchange. The lack of known exploits reduces immediate risk, but the broad attack surface and absence of patches necessitate proactive mitigation to prevent potential exploitation.

Mitigation Recommendations

Monitor vendor advisories from Qualcomm and device manufacturers for firmware updates or patches addressing this vulnerability and apply them promptly once available. Implement network segmentation to isolate critical systems and reduce the impact of transient WLAN outages on essential services. Deploy wireless intrusion detection and prevention systems (WIDS/WIPS) to monitor for anomalous WLAN traffic patterns that could indicate exploitation attempts targeting the PPE threshold processing. Where feasible, configure devices to use wired network connections in critical environments to mitigate reliance on vulnerable WLAN firmware. Engage with device vendors to verify the presence of updated firmware and request timelines for remediation if not yet available. Incorporate redundancy in wireless network infrastructure to maintain connectivity during transient DoS events caused by this vulnerability. Educate IT and security teams on the symptoms of WLAN firmware instability to enable rapid detection and response to potential exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2022-06-14T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d984ac4522896dcbf7087

Added to database: 5/21/2025, 9:09:30 AM

Last enriched: 6/21/2025, 7:09:05 PM

Last updated: 2/7/2026, 8:21:43 PM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats