Skip to main content

CVE-2023-43533: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon

High
VulnerabilityCVE-2023-43533cvecve-2023-43533cwe-126
Published: Tue Feb 06 2024 (02/06/2024, 05:47:28 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Transient DOS in WLAN Firmware when the length of received beacon is less than length of ieee802.11 beacon frame.

AI-Powered Analysis

AILast updated: 07/04/2025, 18:41:47 UTC

Technical Analysis

CVE-2023-43533 is a high-severity buffer over-read vulnerability (CWE-126) found in the WLAN firmware of a wide range of Qualcomm Snapdragon platforms and related wireless connectivity products. The vulnerability occurs when the firmware processes IEEE 802.11 beacon frames whose length is shorter than expected. Specifically, if the length of a received beacon frame is less than the length defined by the standard, the firmware performs a buffer over-read, reading beyond the allocated memory buffer. This flaw can cause a transient Denial of Service (DoS) condition, where the WLAN firmware crashes or becomes unresponsive temporarily. The vulnerability affects an extensive list of Qualcomm products, including numerous Snapdragon mobile platforms (from older models like SD 660 to the latest Snapdragon 8 Gen 3), FastConnect wireless subsystems, IoT modems, automotive platforms, wearable platforms, and various other Qualcomm chipsets and modules. The CVSS 3.1 base score is 7.5, indicating a high severity level. The attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and has low attack complexity (AC:L). The impact is limited to availability (A:H) with no confidentiality or integrity impact. No known exploits are currently reported in the wild, and no patches have been linked yet. However, due to the broad range of affected devices, including many consumer and enterprise mobile devices, IoT, automotive, and wearable platforms, the vulnerability poses a significant risk of WLAN service disruption. Attackers can exploit this remotely by sending malformed beacon frames to vulnerable devices, causing temporary WLAN outages. This could impact device connectivity, user experience, and potentially disrupt critical wireless communications in enterprise or industrial environments relying on Qualcomm WLAN components.

Potential Impact

For European organizations, the impact of CVE-2023-43533 could be substantial given the widespread use of Qualcomm Snapdragon-based devices and wireless modules across consumer, enterprise, automotive, and industrial sectors. Enterprises relying on mobile devices for communication, IoT deployments for automation, or automotive systems using Qualcomm chipsets could experience transient WLAN outages, leading to operational disruptions. In sectors such as manufacturing, logistics, healthcare, and smart city infrastructure, where wireless connectivity is critical, this vulnerability could cause temporary loss of network access, affecting productivity and safety. Additionally, the transient DoS could be leveraged as part of a broader attack to cause denial of service in wireless networks, potentially impacting remote workforces or critical communications. Although the vulnerability does not compromise confidentiality or integrity, the availability impact alone can cause significant business interruptions. The lack of required privileges or user interaction makes exploitation easier, increasing the risk profile. European organizations with large deployments of Qualcomm-based devices should prioritize awareness and mitigation to prevent service disruptions.

Mitigation Recommendations

1. Monitor Qualcomm and device vendor advisories closely for firmware updates or patches addressing CVE-2023-43533 and apply them promptly once available. 2. Implement network-level filtering to detect and block malformed or suspicious IEEE 802.11 beacon frames, potentially using advanced wireless intrusion prevention systems (WIPS) or access point firmware with anomaly detection capabilities. 3. Segment wireless networks to isolate critical systems and reduce exposure to potential attacks exploiting this vulnerability. 4. Employ robust wireless network monitoring to detect unusual WLAN disruptions or beacon frame anomalies indicative of exploitation attempts. 5. For enterprise-managed devices, enforce policies to update device firmware regularly and restrict use of vulnerable devices until patched. 6. In environments with IoT or automotive deployments, coordinate with vendors to ensure timely firmware updates and consider fallback connectivity options to maintain availability during remediation. 7. Educate security teams and network administrators about this vulnerability to enhance incident response readiness for transient WLAN outages. 8. Where possible, disable or limit reception of beacon frames from untrusted or external wireless sources, especially in sensitive or high-security environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2023-09-19T14:48:15.092Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec317

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 6:41:47 PM

Last updated: 7/30/2025, 5:57:24 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats