Skip to main content

CVE-2021-47028: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2021-47028cvecve-2021-47028
Published: Wed Feb 28 2024 (02/28/2024, 08:13:39 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: mt76: mt7915: fix txrate reporting Properly check rate_info to fix unexpected reporting. [ 1215.161863] Call trace: [ 1215.164307] cfg80211_calculate_bitrate+0x124/0x200 [cfg80211] [ 1215.170139] ieee80211s_update_metric+0x80/0xc0 [mac80211] [ 1215.175624] ieee80211_tx_status_ext+0x508/0x838 [mac80211] [ 1215.181190] mt7915_mcu_get_rx_rate+0x28c/0x8d0 [mt7915e] [ 1215.186580] mt7915_mac_tx_free+0x324/0x7c0 [mt7915e] [ 1215.191623] mt7915_queue_rx_skb+0xa8/0xd0 [mt7915e] [ 1215.196582] mt76_dma_cleanup+0x7b0/0x11d0 [mt76] [ 1215.201276] __napi_poll+0x38/0xf8 [ 1215.204668] napi_workfn+0x40/0x80 [ 1215.208062] process_one_work+0x1fc/0x390 [ 1215.212062] worker_thread+0x48/0x4d0 [ 1215.215715] kthread+0x120/0x128 [ 1215.218935] ret_from_fork+0x10/0x1c

AI-Powered Analysis

AILast updated: 06/30/2025, 19:40:55 UTC

Technical Analysis

CVE-2021-47028 is a vulnerability identified in the Linux kernel, specifically related to the mt76 wireless driver for the mt7915 chipset. The issue pertains to improper handling and validation of the txrate reporting mechanism within the driver. The vulnerability arises from inadequate checking of the rate_info data structure, which leads to unexpected or incorrect reporting of transmission rates. The kernel call trace indicates the flaw occurs during the calculation of bitrates and the update of wireless metrics, involving components such as cfg80211, mac80211, and the mt7915e driver. This improper validation could potentially cause erroneous behavior in wireless transmission status reporting, which might be exploited to disrupt normal wireless communication or cause kernel instability. However, there is no indication that this vulnerability allows for privilege escalation or remote code execution. The vulnerability has been resolved by implementing proper checks on the rate_info data to prevent unexpected reporting. The affected versions are specific Linux kernel commits identified by their hashes, and no known exploits are currently reported in the wild. The vulnerability was published on February 28, 2024, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2021-47028 primarily concerns systems utilizing Linux kernels with the affected mt76 wireless driver, particularly those using the mt7915 wireless chipset. This includes enterprise environments relying on Linux-based wireless infrastructure or embedded devices with this chipset. Potential impacts include degraded wireless network performance, inaccurate transmission rate reporting, and possible kernel instability or crashes affecting availability. While the vulnerability does not appear to allow direct unauthorized access or data compromise, disruption of wireless communication can impact operational continuity, especially in critical infrastructure sectors such as manufacturing, healthcare, and telecommunications. Organizations with extensive Linux deployments in wireless networking roles may experience intermittent connectivity issues or require urgent patching to maintain network reliability. Since no known exploits exist, the immediate risk is moderate, but the presence of a kernel-level flaw warrants timely remediation to prevent future exploitation attempts.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel versions to include the patch that fixes CVE-2021-47028. Specifically, they should identify systems running the affected mt76 driver with the mt7915 chipset and apply kernel updates from trusted Linux distributions or backport patches if using long-term support kernels. Network administrators should audit wireless infrastructure to detect usage of the mt7915 chipset and monitor for unusual wireless transmission anomalies or kernel logs indicating related errors. Employing kernel live patching solutions can reduce downtime during remediation. Additionally, organizations should implement strict change management and testing procedures to validate wireless driver updates in their environments. For embedded or IoT devices using this chipset, coordinate with vendors to obtain firmware updates or mitigations. Network segmentation and limiting access to critical wireless infrastructure can reduce the attack surface. Finally, maintain up-to-date intrusion detection systems tuned to detect anomalies in wireless traffic patterns that could indicate exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-27T18:42:55.961Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9834c4522896dcbe9abf

Added to database: 5/21/2025, 9:09:08 AM

Last enriched: 6/30/2025, 7:40:55 PM

Last updated: 8/11/2025, 8:48:13 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats