<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-21367 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-21367/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 06 Apr 2026 16:16:29 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-21367/feed.xml" rel="self" type="application/rss+xml"/><item><title>Qualcomm Transient Denial-of-Service via FILS Discovery Frames (CVE-2026-21367)</title><link>https://feed.craftedsignal.io/briefs/2026-04-qualcomm-dos/</link><pubDate>Mon, 06 Apr 2026 16:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-qualcomm-dos/</guid><description>CVE-2026-21367 describes a transient denial-of-service vulnerability in Qualcomm products that occurs when processing nonstandard FILS Discovery Frames with out-of-range action sizes during initial scans, potentially leading to service disruption.</description><content:encoded><![CDATA[<p>CVE-2026-21367 is a vulnerability affecting Qualcomm products that results in a transient denial-of-service (DoS). The vulnerability stems from the processing of nonstandard Fine Timing Measurement (FTM) Initial Link Setup (FILS) Discovery Frames which contain out-of-range action sizes during the initial network scanning phase. This issue can be triggered remotely, potentially disrupting the availability of services provided by the affected Qualcomm devices. The vulnerability was disclosed in the Qualcomm security bulletin for April 2026. Successful exploitation leads to temporary service unavailability, impacting user experience and potentially network stability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious FILS Discovery Frame with out-of-range action sizes.</li>
<li>The attacker transmits the crafted FILS Discovery Frame to a Qualcomm device during its initial network scan.</li>
<li>The Qualcomm device receives the malicious frame and attempts to process the out-of-range action size.</li>
<li>Due to improper bounds checking, the processing of the frame triggers a buffer over-read condition (CWE-126).</li>
<li>The buffer over-read leads to a temporary system instability.</li>
<li>The device experiences a transient denial-of-service condition.</li>
<li>The affected service becomes temporarily unavailable to legitimate users.</li>
<li>After a short period, the device recovers, and the service resumes normal operation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-21367 leads to a transient denial-of-service condition on affected Qualcomm devices. The specific impact depends on the role of the device. This vulnerability has a CVSS v3.1 score of 7.6, indicating a high severity. While the DoS is transient, repeated exploitation could create a prolonged disruption, hindering user access and potentially affecting critical device functionalities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for malformed FILS Discovery Frames, specifically those with unusually large action sizes, using network monitoring tools (network_connection log source).</li>
<li>Apply the patches or updates provided by Qualcomm as detailed in the April 2026 security bulletin to remediate CVE-2026-21367 (reference: <a href="https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2026-bulletin.html)">https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2026-bulletin.html)</a>.</li>
<li>Implement rate limiting on FILS Discovery Frame processing to mitigate the impact of malicious frames (network_connection log source).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>dos</category><category>qualcomm</category><category>cve-2026-21367</category></item></channel></rss>