Description
Transient DOS when processing a malformed Fast Transition response frame with an invalid header structure during wireless roaming.
Published: 2026-05-04
Score: 6.5 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A buffer over‑read occurs in the firmware that processes Fast Transition response frames during wireless roaming. When a malformed frame with an invalid header structure is received, the firmware reads beyond the bounds of the supplied data, leading to a transient denial of service. This flaw does not provide direct code execution but can disrupt network connectivity and service continuity for affected devices.

Affected Systems

Qualcomm, Inc. Snapdragon devices that run the affected WLAN firmware. No specific firmware versions are listed in the advisory, so any device using recent Snapdragon wireless stacks may be vulnerable. System administrators should verify the firmware version against Qualcomm’s security bulletin to determine if the device is impacted.

Risk and Exploitability

The CVSS score of 6.5 indicates a medium severity weakness, and the EPSS score is not available, so the likelihood of exploitation is unknown. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector involves an attacker broadcasting a crafted Fast Transition response frame within a victim’s local wireless network; no special privilege or additional credentials are required. The flaw induces a service interruption rather than providing confidential data exposure or privilege escalation. Administrators should treat this as a patchable defect that could be abused by a nearby attacker to temporarily disable Wi‑Fi connectivity on affected devices.

Generated by OpenCVE AI on May 4, 2026 at 18:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Qualcomm firmware patch that addresses the Fast Transition header validation bug.
  • If a patch has not yet been released, consider disabling Fast Transition (or Wi‑Fi roaming) in the device’s wireless settings to prevent processing of potentially malicious frames.
  • Continuously monitor device logs for repeated crash events and ensure that network traffic does not contain abnormal Fast Transition frames.

Generated by OpenCVE AI on May 4, 2026 at 18:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 04 May 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 04 May 2026 17:15:00 +0000

Type Values Removed Values Added
Description Transient DOS when processing a malformed Fast Transition response frame with an invalid header structure during wireless roaming.
Title Buffer Over-read in WLAN Firmware
Weaknesses CWE-126
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: qualcomm

Published:

Updated: 2026-05-04T17:17:18.716Z

Reserved: 2025-05-06T08:33:16.277Z

Link: CVE-2025-47403

cve-icon Vulnrichment

Updated: 2026-05-04T17:17:05.861Z

cve-icon NVD

Status : Received

Published: 2026-05-04T17:16:20.400

Modified: 2026-05-04T17:16:20.400

Link: CVE-2025-47403

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T19:00:07Z

Weaknesses