CVE-2021-47028: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: mt76: mt7915: fix txrate reporting Properly check rate_info to fix unexpected reporting. [ 1215.161863] Call trace: [ 1215.164307] cfg80211_calculate_bitrate+0x124/0x200 [cfg80211] [ 1215.170139] ieee80211s_update_metric+0x80/0xc0 [mac80211] [ 1215.175624] ieee80211_tx_status_ext+0x508/0x838 [mac80211] [ 1215.181190] mt7915_mcu_get_rx_rate+0x28c/0x8d0 [mt7915e] [ 1215.186580] mt7915_mac_tx_free+0x324/0x7c0 [mt7915e] [ 1215.191623] mt7915_queue_rx_skb+0xa8/0xd0 [mt7915e] [ 1215.196582] mt76_dma_cleanup+0x7b0/0x11d0 [mt76] [ 1215.201276] __napi_poll+0x38/0xf8 [ 1215.204668] napi_workfn+0x40/0x80 [ 1215.208062] process_one_work+0x1fc/0x390 [ 1215.212062] worker_thread+0x48/0x4d0 [ 1215.215715] kthread+0x120/0x128 [ 1215.218935] ret_from_fork+0x10/0x1c
AI Analysis
Technical Summary
CVE-2021-47028 is a vulnerability identified in the Linux kernel, specifically related to the mt76 wireless driver for the mt7915 chipset. The issue pertains to improper handling and validation of the txrate reporting mechanism within the driver. The vulnerability arises from inadequate checking of the rate_info data structure, which leads to unexpected or incorrect reporting of transmission rates. The kernel call trace indicates the flaw occurs during the calculation of bitrates and the update of wireless metrics, involving components such as cfg80211, mac80211, and the mt7915e driver. This improper validation could potentially cause erroneous behavior in wireless transmission status reporting, which might be exploited to disrupt normal wireless communication or cause kernel instability. However, there is no indication that this vulnerability allows for privilege escalation or remote code execution. The vulnerability has been resolved by implementing proper checks on the rate_info data to prevent unexpected reporting. The affected versions are specific Linux kernel commits identified by their hashes, and no known exploits are currently reported in the wild. The vulnerability was published on February 28, 2024, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2021-47028 primarily concerns systems utilizing Linux kernels with the affected mt76 wireless driver, particularly those using the mt7915 wireless chipset. This includes enterprise environments relying on Linux-based wireless infrastructure or embedded devices with this chipset. Potential impacts include degraded wireless network performance, inaccurate transmission rate reporting, and possible kernel instability or crashes affecting availability. While the vulnerability does not appear to allow direct unauthorized access or data compromise, disruption of wireless communication can impact operational continuity, especially in critical infrastructure sectors such as manufacturing, healthcare, and telecommunications. Organizations with extensive Linux deployments in wireless networking roles may experience intermittent connectivity issues or require urgent patching to maintain network reliability. Since no known exploits exist, the immediate risk is moderate, but the presence of a kernel-level flaw warrants timely remediation to prevent future exploitation attempts.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel versions to include the patch that fixes CVE-2021-47028. Specifically, they should identify systems running the affected mt76 driver with the mt7915 chipset and apply kernel updates from trusted Linux distributions or backport patches if using long-term support kernels. Network administrators should audit wireless infrastructure to detect usage of the mt7915 chipset and monitor for unusual wireless transmission anomalies or kernel logs indicating related errors. Employing kernel live patching solutions can reduce downtime during remediation. Additionally, organizations should implement strict change management and testing procedures to validate wireless driver updates in their environments. For embedded or IoT devices using this chipset, coordinate with vendors to obtain firmware updates or mitigations. Network segmentation and limiting access to critical wireless infrastructure can reduce the attack surface. Finally, maintain up-to-date intrusion detection systems tuned to detect anomalies in wireless traffic patterns that could indicate exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2021-47028: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: mt76: mt7915: fix txrate reporting Properly check rate_info to fix unexpected reporting. [ 1215.161863] Call trace: [ 1215.164307] cfg80211_calculate_bitrate+0x124/0x200 [cfg80211] [ 1215.170139] ieee80211s_update_metric+0x80/0xc0 [mac80211] [ 1215.175624] ieee80211_tx_status_ext+0x508/0x838 [mac80211] [ 1215.181190] mt7915_mcu_get_rx_rate+0x28c/0x8d0 [mt7915e] [ 1215.186580] mt7915_mac_tx_free+0x324/0x7c0 [mt7915e] [ 1215.191623] mt7915_queue_rx_skb+0xa8/0xd0 [mt7915e] [ 1215.196582] mt76_dma_cleanup+0x7b0/0x11d0 [mt76] [ 1215.201276] __napi_poll+0x38/0xf8 [ 1215.204668] napi_workfn+0x40/0x80 [ 1215.208062] process_one_work+0x1fc/0x390 [ 1215.212062] worker_thread+0x48/0x4d0 [ 1215.215715] kthread+0x120/0x128 [ 1215.218935] ret_from_fork+0x10/0x1c
AI-Powered Analysis
Technical Analysis
CVE-2021-47028 is a vulnerability identified in the Linux kernel, specifically related to the mt76 wireless driver for the mt7915 chipset. The issue pertains to improper handling and validation of the txrate reporting mechanism within the driver. The vulnerability arises from inadequate checking of the rate_info data structure, which leads to unexpected or incorrect reporting of transmission rates. The kernel call trace indicates the flaw occurs during the calculation of bitrates and the update of wireless metrics, involving components such as cfg80211, mac80211, and the mt7915e driver. This improper validation could potentially cause erroneous behavior in wireless transmission status reporting, which might be exploited to disrupt normal wireless communication or cause kernel instability. However, there is no indication that this vulnerability allows for privilege escalation or remote code execution. The vulnerability has been resolved by implementing proper checks on the rate_info data to prevent unexpected reporting. The affected versions are specific Linux kernel commits identified by their hashes, and no known exploits are currently reported in the wild. The vulnerability was published on February 28, 2024, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2021-47028 primarily concerns systems utilizing Linux kernels with the affected mt76 wireless driver, particularly those using the mt7915 wireless chipset. This includes enterprise environments relying on Linux-based wireless infrastructure or embedded devices with this chipset. Potential impacts include degraded wireless network performance, inaccurate transmission rate reporting, and possible kernel instability or crashes affecting availability. While the vulnerability does not appear to allow direct unauthorized access or data compromise, disruption of wireless communication can impact operational continuity, especially in critical infrastructure sectors such as manufacturing, healthcare, and telecommunications. Organizations with extensive Linux deployments in wireless networking roles may experience intermittent connectivity issues or require urgent patching to maintain network reliability. Since no known exploits exist, the immediate risk is moderate, but the presence of a kernel-level flaw warrants timely remediation to prevent future exploitation attempts.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel versions to include the patch that fixes CVE-2021-47028. Specifically, they should identify systems running the affected mt76 driver with the mt7915 chipset and apply kernel updates from trusted Linux distributions or backport patches if using long-term support kernels. Network administrators should audit wireless infrastructure to detect usage of the mt7915 chipset and monitor for unusual wireless transmission anomalies or kernel logs indicating related errors. Employing kernel live patching solutions can reduce downtime during remediation. Additionally, organizations should implement strict change management and testing procedures to validate wireless driver updates in their environments. For embedded or IoT devices using this chipset, coordinate with vendors to obtain firmware updates or mitigations. Network segmentation and limiting access to critical wireless infrastructure can reduce the attack surface. Finally, maintain up-to-date intrusion detection systems tuned to detect anomalies in wireless traffic patterns that could indicate exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-27T18:42:55.961Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9834c4522896dcbe9abf
Added to database: 5/21/2025, 9:09:08 AM
Last enriched: 6/30/2025, 7:40:55 PM
Last updated: 8/11/2025, 8:48:13 AM
Views: 11
Related Threats
CVE-2025-43201: An app may be able to unexpectedly leak a user's credentials in Apple Apple Music Classical for Android
HighCVE-2025-8959: CWE-59: Improper Link Resolution Before File Access (Link Following) in HashiCorp Shared library
HighCVE-2025-44201
LowCVE-2025-36088: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM Storage TS4500 Library
MediumCVE-2025-43490: CWE-59 Improper Link Resolution Before File Access ('Link Following') in HP, Inc. HP Hotkey Support Software
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.