Skip to main content

CVE-2023-52829: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2023-52829cvecve-2023-52829
Published: Tue May 21 2024 (05/21/2024, 15:31:32 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix possible out-of-bound write in ath12k_wmi_ext_hal_reg_caps() reg_cap.phy_id is extracted from WMI event and could be an unexpected value in case some errors happen. As a result out-of-bound write may occur to soc->hal_reg_cap. Fix it by validating reg_cap.phy_id before using it. This is found during code review. Compile tested only.

AI-Powered Analysis

AILast updated: 07/01/2025, 07:27:28 UTC

Technical Analysis

CVE-2023-52829 is a medium-severity vulnerability identified in the Linux kernel's ath12k wireless driver, which handles Qualcomm Atheros Wi-Fi 6 chipsets. The flaw arises in the function ath12k_wmi_ext_hal_reg_caps(), where the reg_cap.phy_id field is extracted from a Wireless Module Interface (WMI) event. Due to insufficient validation, reg_cap.phy_id can hold unexpected values if errors occur during event processing. This can lead to an out-of-bounds write to the soc->hal_reg_cap array, potentially corrupting kernel memory. The vulnerability is classified under CWE-787 (Out-of-bounds Write). It was discovered during a code review and has been addressed by adding proper validation of reg_cap.phy_id before its use. The CVSS v3.1 base score is 6.2, reflecting a medium severity with an attack vector of local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to availability (A:H), with no confidentiality or integrity loss. No known exploits are reported in the wild, and the fix involves validating input to prevent memory corruption. This vulnerability affects specific Linux kernel versions identified by commit hashes, primarily impacting systems using the ath12k driver for Wi-Fi 6 hardware. Since the vulnerability requires local access and no privileges, an attacker with local access but no privileges could trigger a denial-of-service by crashing the kernel or causing instability through this out-of-bounds write.

Potential Impact

For European organizations, the impact of CVE-2023-52829 is primarily related to availability disruptions on Linux systems using Qualcomm Atheros Wi-Fi 6 chipsets supported by the ath12k driver. This includes servers, desktops, and embedded devices running vulnerable Linux kernel versions. A successful exploitation could cause kernel crashes or system instability, leading to denial-of-service conditions. While the vulnerability does not compromise confidentiality or integrity, availability issues can disrupt business operations, especially in environments relying on stable wireless connectivity or Linux-based infrastructure. Organizations in sectors with high dependence on Linux servers or embedded Linux devices with affected Wi-Fi hardware—such as telecommunications, manufacturing, and critical infrastructure—may experience operational interruptions. However, since exploitation requires local access without privileges, the threat is mitigated by controlling physical or local network access. Remote exploitation is not feasible, limiting the scope of impact. The absence of known exploits in the wild further reduces immediate risk but does not eliminate the need for timely patching.

Mitigation Recommendations

To mitigate CVE-2023-52829, European organizations should: 1) Identify Linux systems running kernel versions containing the vulnerable ath12k driver code, focusing on those with Qualcomm Atheros Wi-Fi 6 chipsets. 2) Apply the latest Linux kernel updates or patches that include the fix validating reg_cap.phy_id to prevent out-of-bounds writes. 3) Restrict local access to critical systems by enforcing strict physical security controls and limiting local user accounts to trusted personnel. 4) Monitor system logs and kernel crash reports for signs of instability or crashes related to the ath12k driver. 5) For embedded or specialized devices where kernel updates are delayed, consider disabling or limiting the use of affected Wi-Fi hardware if feasible. 6) Incorporate this vulnerability into vulnerability management and patching workflows to ensure timely remediation. 7) Educate system administrators about the local access requirement to exploit this vulnerability, emphasizing the importance of access controls. These steps go beyond generic advice by focusing on hardware-specific identification, local access restrictions, and monitoring for early detection.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-21T15:19:24.251Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9830c4522896dcbe76b0

Added to database: 5/21/2025, 9:09:04 AM

Last enriched: 7/1/2025, 7:27:28 AM

Last updated: 7/31/2025, 6:38:33 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats