CVE-2024-26693: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: fix a crash when we run out of stations A DoS tool that injects loads of authentication frames made our AP crash. The iwl_mvm_is_dup() function couldn't find the per-queue dup_data which was not allocated. The root cause for that is that we ran out of stations in the firmware and we didn't really add the station to the firmware, yet we didn't return an error to mac80211. Mac80211 was thinking that we have the station and because of that, sta_info::uploaded was set to 1. This allowed ieee80211_find_sta_by_ifaddr() to return a valid station object, but that ieee80211_sta didn't have any iwl_mvm_sta object initialized and that caused the crash mentioned earlier when we got Rx on that station.
AI Analysis
Technical Summary
CVE-2024-26693 is a denial-of-service (DoS) vulnerability identified in the Linux kernel's wireless driver stack, specifically within the Intel wireless driver (iwlwifi) component that manages Wi-Fi stations. The vulnerability arises due to improper handling of station allocation in the firmware when the system runs out of available station slots. When a large number of authentication frames are injected by an attacker, the Access Point (AP) crashes because the function iwl_mvm_is_dup() attempts to access per-queue duplication data (dup_data) that was never allocated. This occurs because the firmware has exhausted its station capacity and did not add the station, yet mac80211 (the Linux kernel's Wi-Fi subsystem) incorrectly assumes the station exists and marks sta_info::uploaded as 1. Consequently, ieee80211_find_sta_by_ifaddr() returns a valid station object, but the associated iwl_mvm_sta object is uninitialized. When the system receives packets (Rx) for this station, it triggers a kernel crash due to dereferencing uninitialized structures, resulting in a DoS condition. This vulnerability affects Linux kernel versions containing the affected commit hashes referenced, and it was publicly disclosed on April 3, 2024. No known exploits are reported in the wild yet, and no CVSS score has been assigned. The root cause is a logic flaw in station management between the firmware and mac80211, leading to inconsistent state and kernel panic under attack conditions.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to infrastructure relying on Linux-based wireless access points or devices using the Intel iwlwifi driver. The DoS attack can disrupt wireless network availability by crashing APs, potentially causing widespread connectivity outages in corporate, public, or industrial environments. This can affect critical services, especially in sectors like finance, healthcare, manufacturing, and government, where reliable wireless connectivity is essential. The disruption could lead to operational downtime, loss of productivity, and increased support costs. Additionally, in environments where wireless networks are used for security monitoring or IoT device connectivity, the DoS could indirectly impact safety and security systems. Although no data confidentiality or integrity compromise is indicated, the availability impact is significant. The lack of authentication or user interaction requirements for the attack vector (injection of authentication frames) means attackers within wireless range can exploit this vulnerability with relative ease, increasing the threat level for organizations with exposed or poorly segmented wireless networks.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating their Linux kernel to versions where this issue is patched as soon as updates become available. Since the vulnerability stems from the iwlwifi driver and mac80211 interaction, kernel updates from trusted Linux distributions that include the fix should be applied promptly. Network administrators should also implement wireless network segmentation and access controls to limit exposure to untrusted devices and reduce the attack surface. Deploying wireless intrusion detection/prevention systems (WIDS/WIPS) can help detect and block abnormal authentication frame injection attempts. Additionally, organizations should monitor kernel logs for signs of crashes or unusual station allocation errors to identify potential exploitation attempts. For critical environments, consider temporarily disabling or restricting Wi-Fi access on vulnerable devices until patches are applied. Vendor coordination is essential to ensure firmware and driver updates are aligned. Finally, educating IT staff about this vulnerability and its exploitation method will improve incident response readiness.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Finland
CVE-2024-26693: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: fix a crash when we run out of stations A DoS tool that injects loads of authentication frames made our AP crash. The iwl_mvm_is_dup() function couldn't find the per-queue dup_data which was not allocated. The root cause for that is that we ran out of stations in the firmware and we didn't really add the station to the firmware, yet we didn't return an error to mac80211. Mac80211 was thinking that we have the station and because of that, sta_info::uploaded was set to 1. This allowed ieee80211_find_sta_by_ifaddr() to return a valid station object, but that ieee80211_sta didn't have any iwl_mvm_sta object initialized and that caused the crash mentioned earlier when we got Rx on that station.
AI-Powered Analysis
Technical Analysis
CVE-2024-26693 is a denial-of-service (DoS) vulnerability identified in the Linux kernel's wireless driver stack, specifically within the Intel wireless driver (iwlwifi) component that manages Wi-Fi stations. The vulnerability arises due to improper handling of station allocation in the firmware when the system runs out of available station slots. When a large number of authentication frames are injected by an attacker, the Access Point (AP) crashes because the function iwl_mvm_is_dup() attempts to access per-queue duplication data (dup_data) that was never allocated. This occurs because the firmware has exhausted its station capacity and did not add the station, yet mac80211 (the Linux kernel's Wi-Fi subsystem) incorrectly assumes the station exists and marks sta_info::uploaded as 1. Consequently, ieee80211_find_sta_by_ifaddr() returns a valid station object, but the associated iwl_mvm_sta object is uninitialized. When the system receives packets (Rx) for this station, it triggers a kernel crash due to dereferencing uninitialized structures, resulting in a DoS condition. This vulnerability affects Linux kernel versions containing the affected commit hashes referenced, and it was publicly disclosed on April 3, 2024. No known exploits are reported in the wild yet, and no CVSS score has been assigned. The root cause is a logic flaw in station management between the firmware and mac80211, leading to inconsistent state and kernel panic under attack conditions.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to infrastructure relying on Linux-based wireless access points or devices using the Intel iwlwifi driver. The DoS attack can disrupt wireless network availability by crashing APs, potentially causing widespread connectivity outages in corporate, public, or industrial environments. This can affect critical services, especially in sectors like finance, healthcare, manufacturing, and government, where reliable wireless connectivity is essential. The disruption could lead to operational downtime, loss of productivity, and increased support costs. Additionally, in environments where wireless networks are used for security monitoring or IoT device connectivity, the DoS could indirectly impact safety and security systems. Although no data confidentiality or integrity compromise is indicated, the availability impact is significant. The lack of authentication or user interaction requirements for the attack vector (injection of authentication frames) means attackers within wireless range can exploit this vulnerability with relative ease, increasing the threat level for organizations with exposed or poorly segmented wireless networks.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating their Linux kernel to versions where this issue is patched as soon as updates become available. Since the vulnerability stems from the iwlwifi driver and mac80211 interaction, kernel updates from trusted Linux distributions that include the fix should be applied promptly. Network administrators should also implement wireless network segmentation and access controls to limit exposure to untrusted devices and reduce the attack surface. Deploying wireless intrusion detection/prevention systems (WIDS/WIPS) can help detect and block abnormal authentication frame injection attempts. Additionally, organizations should monitor kernel logs for signs of crashes or unusual station allocation errors to identify potential exploitation attempts. For critical environments, consider temporarily disabling or restricting Wi-Fi access on vulnerable devices until patches are applied. Vendor coordination is essential to ensure firmware and driver updates are aligned. Finally, educating IT staff about this vulnerability and its exploitation method will improve incident response readiness.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-19T14:20:24.155Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982ac4522896dcbe3842
Added to database: 5/21/2025, 9:08:58 AM
Last enriched: 6/29/2025, 5:26:12 PM
Last updated: 8/5/2025, 10:22:54 PM
Views: 14
Related Threats
CVE-2025-8983: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8982: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8981: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-50862: n/a
MediumCVE-2025-50861: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.