Skip to main content

CVE-2022-33238: Loop with unreachable exit condition in WLAN in Qualcomm, Inc. Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Medium
Published: Tue Dec 13 2022 (12/13/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Description

Transient DOS due to loop with unreachable exit condition in WLAN while processing an incoming FTM frames. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

AI-Powered Analysis

AILast updated: 06/21/2025, 17:23:41 UTC

Technical Analysis

CVE-2022-33238 is a vulnerability identified in the WLAN component of a broad range of Qualcomm Snapdragon platforms, including Snapdragon Auto, Compute, Connectivity, Consumer Electronics Connectivity, Consumer IoT, Industrial IoT, IoT, Mobile, Voice & Music, Wearables, and Wired Infrastructure and Networking products. The issue arises from a loop with an unreachable exit condition during the processing of incoming Fine Timing Measurement (FTM) frames. This flaw causes a transient denial-of-service (DoS) condition by causing the affected WLAN subsystem to enter an infinite loop, effectively halting normal WLAN processing. The vulnerability affects a very extensive list of Qualcomm chipsets and modules, spanning many generations and device types, including mobile SoCs (e.g., SD 8 Gen1 5G, SDX55), IoT modules, automotive platforms, and connectivity chips (e.g., QCA series). The root cause is classified under CWE-835, which relates to loops with unreachable exit conditions, indicating a logic flaw in the WLAN firmware or driver code that fails to properly handle malformed or maliciously crafted FTM frames. No known exploits have been reported in the wild, and Qualcomm has not published official patches at the time of this report. The vulnerability does not require authentication or user interaction to be triggered, as it is triggered by the reception of specific WLAN frames. The impact is primarily a transient DoS affecting the WLAN functionality on vulnerable devices, potentially disrupting network connectivity until the device is rebooted or the WLAN subsystem recovers. Given the wide range of affected platforms, this vulnerability could impact numerous device categories, including smartphones, automotive infotainment and telematics systems, IoT devices, and enterprise networking equipment using Qualcomm chipsets.

Potential Impact

For European organizations, the impact of CVE-2022-33238 can be significant due to the widespread use of Qualcomm Snapdragon chipsets across multiple device categories. Enterprises relying on mobile devices for critical communications may experience temporary loss of WLAN connectivity, affecting productivity and communications. Industrial and automotive sectors, which increasingly depend on connected IoT and automotive platforms powered by Snapdragon chips, could face disruptions in operational technology networks or vehicle telematics systems, potentially impacting safety or operational efficiency. Consumer electronics and wearable devices used by employees may also be affected, leading to intermittent connectivity issues. Although the DoS is transient and does not lead to permanent device compromise or data leakage, the inability to maintain stable WLAN connections can degrade service availability and user experience. In environments with high security requirements, such as financial institutions or critical infrastructure operators, even transient network outages can have cascading effects on business continuity and incident response capabilities. The lack of known exploits reduces immediate risk, but the broad attack surface and ease of triggering the vulnerability (no authentication or user interaction required) mean attackers could potentially leverage this flaw in targeted denial-of-service campaigns or as part of multi-stage attacks to disrupt network access.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement several practical mitigations beyond generic advice: 1) Network segmentation: Isolate critical devices and systems using Qualcomm Snapdragon chipsets on separate WLAN segments or VLANs to limit exposure to potentially malicious FTM frames. 2) WLAN frame filtering: Deploy advanced WLAN intrusion prevention systems (WIPS) or access point firmware capable of detecting and blocking malformed or suspicious FTM frames to prevent triggering the infinite loop. 3) Firmware and driver updates: Monitor Qualcomm and device vendor advisories closely and prioritize timely deployment of firmware or driver updates once patches become available. 4) Device inventory and risk assessment: Maintain an accurate inventory of devices using affected Qualcomm chipsets and assess their criticality to prioritize mitigation efforts. 5) Incident response readiness: Prepare to respond to transient WLAN outages by establishing fallback communication channels and procedures to minimize operational impact. 6) Vendor engagement: Engage with device and equipment vendors to confirm patch availability timelines and request interim mitigations or workarounds. 7) Network monitoring: Increase monitoring of WLAN traffic for anomalies or repeated DoS attempts targeting WLAN subsystems. These targeted mitigations address the specific nature of the vulnerability and its exploitation vector, reducing the risk of successful denial-of-service attacks while awaiting official patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2022-06-14T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d984ac4522896dcbf7633

Added to database: 5/21/2025, 9:09:30 AM

Last enriched: 6/21/2025, 5:23:41 PM

Last updated: 8/6/2025, 6:31:57 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats