Impact
A buffer over‑read occurs in the firmware that processes Fast Transition response frames during wireless roaming. When a malformed frame with an invalid header structure is received, the firmware reads beyond the bounds of the supplied data, leading to a transient denial of service. This flaw does not provide direct code execution but can disrupt network connectivity and service continuity for affected devices.
Affected Systems
Qualcomm, Inc. Snapdragon devices that run the affected WLAN firmware. No specific firmware versions are listed in the advisory, so any device using recent Snapdragon wireless stacks may be vulnerable. System administrators should verify the firmware version against Qualcomm’s security bulletin to determine if the device is impacted.
Risk and Exploitability
The CVSS score of 6.5 indicates a medium severity weakness, and the EPSS score is not available, so the likelihood of exploitation is unknown. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector involves an attacker broadcasting a crafted Fast Transition response frame within a victim’s local wireless network; no special privilege or additional credentials are required. The flaw induces a service interruption rather than providing confidential data exposure or privilege escalation. Administrators should treat this as a patchable defect that could be abused by a nearby attacker to temporarily disable Wi‑Fi connectivity on affected devices.
OpenCVE Enrichment