Skip to main content

CVE-2022-33237: Buffer over-read in WLAN in Qualcomm, Inc. Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Medium
Published: Tue Nov 15 2022 (11/15/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Description

Transient DOS due to buffer over-read in WLAN firmware while processing PPE threshold. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

AI-Powered Analysis

AILast updated: 06/21/2025, 19:09:05 UTC

Technical Analysis

CVE-2022-33237 is a medium-severity vulnerability affecting a broad range of Qualcomm Snapdragon platforms, including Snapdragon Auto, Compute, Connectivity, Consumer Electronics Connectivity, Consumer IoT, Industrial IoT, Mobile, Voice & Music, Wearables, and Wired Infrastructure and Networking products. The vulnerability arises from a buffer over-read condition in the WLAN firmware component when processing the Packet Power Envelope (PPE) threshold. Specifically, the firmware improperly handles input data leading to reading beyond the allocated buffer boundaries (CWE-125). This flaw can cause transient denial of service (DoS) conditions by crashing or destabilizing the WLAN firmware, resulting in temporary loss of wireless connectivity. The affected devices span numerous Qualcomm chipsets and modules, including but not limited to IPQ series, QCA series, QCN series, QCS series, SD (Snapdragon) series, and WCD/WCN wireless components. The vulnerability does not require authentication or user interaction to be exploited, but it is limited to wireless network interactions targeting the vulnerable WLAN firmware. There are no known exploits in the wild as of the published date, and no patches or firmware updates have been linked or referenced in the provided information. The broad range of affected hardware indicates a widespread potential impact across multiple device categories, from mobile phones and wearables to automotive and industrial IoT devices. The transient nature of the DoS suggests that while the impact is disruptive, it is not permanent or leading to code execution or data compromise. However, the instability of wireless connectivity can have cascading effects on dependent systems and services.

Potential Impact

For European organizations, the impact of CVE-2022-33237 primarily manifests as intermittent wireless network outages or disruptions on devices using affected Qualcomm Snapdragon WLAN components. This can affect mobile devices, enterprise IoT deployments, automotive systems, and critical infrastructure relying on wireless connectivity. In sectors such as automotive manufacturing, industrial automation, healthcare, and telecommunications, transient WLAN outages could degrade operational efficiency, safety systems, or communication reliability. Given the widespread use of Qualcomm Snapdragon chipsets in consumer and enterprise devices across Europe, organizations may experience service interruptions, reduced productivity, or compromised user experience. While the vulnerability does not lead to data breaches or persistent system compromise, the denial of service could be exploited in targeted attacks to cause temporary network outages or disrupt wireless-dependent operations. This is particularly relevant for industries with high reliance on wireless connectivity and real-time data exchange. The lack of known exploits reduces immediate risk, but the broad attack surface and absence of patches necessitate proactive mitigation to prevent potential exploitation.

Mitigation Recommendations

Monitor vendor advisories from Qualcomm and device manufacturers for firmware updates or patches addressing this vulnerability and apply them promptly once available. Implement network segmentation to isolate critical systems and reduce the impact of transient WLAN outages on essential services. Deploy wireless intrusion detection and prevention systems (WIDS/WIPS) to monitor for anomalous WLAN traffic patterns that could indicate exploitation attempts targeting the PPE threshold processing. Where feasible, configure devices to use wired network connections in critical environments to mitigate reliance on vulnerable WLAN firmware. Engage with device vendors to verify the presence of updated firmware and request timelines for remediation if not yet available. Incorporate redundancy in wireless network infrastructure to maintain connectivity during transient DoS events caused by this vulnerability. Educate IT and security teams on the symptoms of WLAN firmware instability to enable rapid detection and response to potential exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2022-06-14T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d984ac4522896dcbf7087

Added to database: 5/21/2025, 9:09:30 AM

Last enriched: 6/21/2025, 7:09:05 PM

Last updated: 8/14/2025, 5:34:43 PM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats