CVE-2024-35946: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: fix null pointer access when abort scan During cancel scan we might use vif that weren't scanning. Fix this by using the actual scanning vif.
AI Analysis
Technical Summary
CVE-2024-35946 is a vulnerability identified in the Linux kernel specifically within the WiFi driver component 'rtw89'. The issue arises during the process of aborting a WiFi scan operation. The vulnerability is caused by a null pointer dereference due to the kernel using a virtual interface (vif) pointer that was not actively scanning when attempting to cancel a scan. This improper handling can lead to a null pointer access, which typically results in a kernel crash (denial of service) or potentially other undefined behaviors. The root cause is that the code did not correctly track or verify the vif that was actually performing the scan, leading to the use of an invalid or null vif pointer during scan cancellation. The fix implemented involves ensuring that the kernel uses the actual scanning vif when aborting the scan, preventing null pointer dereferences. This vulnerability affects Linux kernel versions containing the referenced commit (e3ec7017f6a20d12ddd9fe23d345ebb7b8c104dd) and likely earlier versions where this code path exists. No CVSS score has been assigned yet, and there are no known exploits in the wild at the time of publication (May 19, 2024). The vulnerability is specific to the rtw89 WiFi driver, which supports certain Realtek wireless chipsets.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential for denial of service on Linux systems using the affected rtw89 WiFi driver. This could manifest as system crashes or kernel panics when WiFi scanning is aborted, leading to service interruptions. Organizations relying on Linux servers, workstations, or embedded devices with affected Realtek WiFi chipsets may experience instability or downtime. While the vulnerability does not appear to allow privilege escalation or remote code execution directly, the denial of service could disrupt critical network connectivity, especially in environments where WiFi is essential for operations. This could affect sectors such as telecommunications, manufacturing, healthcare, and public services that use Linux-based systems with these wireless drivers. Since no known exploits exist yet, the immediate risk is moderate, but the vulnerability should be addressed promptly to prevent potential future exploitation or accidental service disruptions.
Mitigation Recommendations
European organizations should take the following specific actions: 1) Identify Linux systems using the rtw89 WiFi driver, particularly those with Realtek chipsets supported by this driver. 2) Apply the latest Linux kernel updates or patches that include the fix for CVE-2024-35946 as soon as they become available from their Linux distribution vendors or kernel maintainers. 3) If immediate patching is not possible, consider disabling WiFi scanning or the affected wireless interface temporarily to avoid triggering the vulnerability. 4) Monitor system logs for kernel panics or crashes related to WiFi scanning operations to detect potential exploitation or accidental triggers. 5) For embedded or specialized devices, coordinate with device vendors to obtain firmware or kernel updates addressing this issue. 6) Incorporate this vulnerability into vulnerability management and incident response processes to ensure timely detection and remediation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2024-35946: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: fix null pointer access when abort scan During cancel scan we might use vif that weren't scanning. Fix this by using the actual scanning vif.
AI-Powered Analysis
Technical Analysis
CVE-2024-35946 is a vulnerability identified in the Linux kernel specifically within the WiFi driver component 'rtw89'. The issue arises during the process of aborting a WiFi scan operation. The vulnerability is caused by a null pointer dereference due to the kernel using a virtual interface (vif) pointer that was not actively scanning when attempting to cancel a scan. This improper handling can lead to a null pointer access, which typically results in a kernel crash (denial of service) or potentially other undefined behaviors. The root cause is that the code did not correctly track or verify the vif that was actually performing the scan, leading to the use of an invalid or null vif pointer during scan cancellation. The fix implemented involves ensuring that the kernel uses the actual scanning vif when aborting the scan, preventing null pointer dereferences. This vulnerability affects Linux kernel versions containing the referenced commit (e3ec7017f6a20d12ddd9fe23d345ebb7b8c104dd) and likely earlier versions where this code path exists. No CVSS score has been assigned yet, and there are no known exploits in the wild at the time of publication (May 19, 2024). The vulnerability is specific to the rtw89 WiFi driver, which supports certain Realtek wireless chipsets.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential for denial of service on Linux systems using the affected rtw89 WiFi driver. This could manifest as system crashes or kernel panics when WiFi scanning is aborted, leading to service interruptions. Organizations relying on Linux servers, workstations, or embedded devices with affected Realtek WiFi chipsets may experience instability or downtime. While the vulnerability does not appear to allow privilege escalation or remote code execution directly, the denial of service could disrupt critical network connectivity, especially in environments where WiFi is essential for operations. This could affect sectors such as telecommunications, manufacturing, healthcare, and public services that use Linux-based systems with these wireless drivers. Since no known exploits exist yet, the immediate risk is moderate, but the vulnerability should be addressed promptly to prevent potential future exploitation or accidental service disruptions.
Mitigation Recommendations
European organizations should take the following specific actions: 1) Identify Linux systems using the rtw89 WiFi driver, particularly those with Realtek chipsets supported by this driver. 2) Apply the latest Linux kernel updates or patches that include the fix for CVE-2024-35946 as soon as they become available from their Linux distribution vendors or kernel maintainers. 3) If immediate patching is not possible, consider disabling WiFi scanning or the affected wireless interface temporarily to avoid triggering the vulnerability. 4) Monitor system logs for kernel panics or crashes related to WiFi scanning operations to detect potential exploitation or accidental triggers. 5) For embedded or specialized devices, coordinate with device vendors to obtain firmware or kernel updates addressing this issue. 6) Incorporate this vulnerability into vulnerability management and incident response processes to ensure timely detection and remediation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-17T13:50:33.133Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9828c4522896dcbe2234
Added to database: 5/21/2025, 9:08:56 AM
Last enriched: 6/29/2025, 8:26:11 AM
Last updated: 7/29/2025, 7:03:50 PM
Views: 11
Related Threats
CVE-2025-9002: SQL Injection in Surbowl dormitory-management-php
MediumCVE-2025-9001: Stack-based Buffer Overflow in LemonOS
MediumCVE-2025-8867: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in iqonicdesign Graphina – Elementor Charts and Graphs
MediumCVE-2025-8680: CWE-918 Server-Side Request Forgery (SSRF) in bplugins B Slider- Gutenberg Slider Block for WP
MediumCVE-2025-8676: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in bplugins B Slider- Gutenberg Slider Block for WP
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.