CVE-2024-42125: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: fw: scan offload prohibit all 6 GHz channel if no 6 GHz sband We have some policy via BIOS to block uses of 6 GHz. In this case, 6 GHz sband will be NULL even if it is WiFi 7 chip. So, add NULL handling here to avoid crash.
AI Analysis
Technical Summary
CVE-2024-42125 is a vulnerability identified in the Linux kernel specifically within the Realtek rtw89 WiFi driver firmware handling code. The issue arises when the system BIOS policy disables the use of the 6 GHz frequency band, which is relevant for WiFi 7 capable chips. In such cases, the 6 GHz sub-band (sband) pointer is set to NULL. The vulnerable code did not properly handle this NULL pointer scenario, leading to a potential kernel crash when the scan offload feature attempts to prohibit all 6 GHz channels without verifying the presence of a valid 6 GHz sband. This lack of NULL pointer handling can cause a denial of service (DoS) condition by crashing the kernel, impacting system stability and availability. The vulnerability affects Linux kernel versions identified by the commit hash 4ba24331c973eb1df0d3b67b0e3f8b7cde7765a7. No known exploits are currently reported in the wild, and no CVSS score has been assigned. The fix involves adding proper NULL pointer checks to prevent the kernel from crashing when the 6 GHz sband is unavailable due to BIOS policy restrictions.
Potential Impact
For European organizations, this vulnerability primarily poses a risk of system instability and denial of service on Linux systems utilizing Realtek WiFi 7 chipsets with the rtw89 driver, especially where BIOS policies disable 6 GHz WiFi bands. Organizations relying on Linux servers, workstations, or embedded devices with affected WiFi hardware could experience unexpected kernel crashes, leading to service interruptions or downtime. This could impact critical infrastructure, enterprise networks, or industrial control systems that depend on stable wireless connectivity. Although the vulnerability does not appear to allow privilege escalation or remote code execution, the potential for DoS could disrupt business operations, particularly in environments where high availability is required. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or targeted triggering of the crash condition.
Mitigation Recommendations
European organizations should promptly apply the Linux kernel patch that addresses this vulnerability by adding NULL pointer handling in the rtw89 WiFi driver firmware code. System administrators should verify that their Linux distributions have incorporated this fix or manually update the kernel to a patched version. Additionally, organizations should audit BIOS configurations to understand policies related to 6 GHz WiFi band usage and consider enabling the 6 GHz band if compatible and secure. Monitoring system logs for kernel crashes related to WiFi scanning can help detect attempts to trigger this vulnerability. For critical systems, implementing redundancy and failover mechanisms can mitigate the impact of potential DoS conditions. Finally, maintaining an up-to-date inventory of devices using Realtek WiFi 7 chipsets and the rtw89 driver will help prioritize patching efforts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2024-42125: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: fw: scan offload prohibit all 6 GHz channel if no 6 GHz sband We have some policy via BIOS to block uses of 6 GHz. In this case, 6 GHz sband will be NULL even if it is WiFi 7 chip. So, add NULL handling here to avoid crash.
AI-Powered Analysis
Technical Analysis
CVE-2024-42125 is a vulnerability identified in the Linux kernel specifically within the Realtek rtw89 WiFi driver firmware handling code. The issue arises when the system BIOS policy disables the use of the 6 GHz frequency band, which is relevant for WiFi 7 capable chips. In such cases, the 6 GHz sub-band (sband) pointer is set to NULL. The vulnerable code did not properly handle this NULL pointer scenario, leading to a potential kernel crash when the scan offload feature attempts to prohibit all 6 GHz channels without verifying the presence of a valid 6 GHz sband. This lack of NULL pointer handling can cause a denial of service (DoS) condition by crashing the kernel, impacting system stability and availability. The vulnerability affects Linux kernel versions identified by the commit hash 4ba24331c973eb1df0d3b67b0e3f8b7cde7765a7. No known exploits are currently reported in the wild, and no CVSS score has been assigned. The fix involves adding proper NULL pointer checks to prevent the kernel from crashing when the 6 GHz sband is unavailable due to BIOS policy restrictions.
Potential Impact
For European organizations, this vulnerability primarily poses a risk of system instability and denial of service on Linux systems utilizing Realtek WiFi 7 chipsets with the rtw89 driver, especially where BIOS policies disable 6 GHz WiFi bands. Organizations relying on Linux servers, workstations, or embedded devices with affected WiFi hardware could experience unexpected kernel crashes, leading to service interruptions or downtime. This could impact critical infrastructure, enterprise networks, or industrial control systems that depend on stable wireless connectivity. Although the vulnerability does not appear to allow privilege escalation or remote code execution, the potential for DoS could disrupt business operations, particularly in environments where high availability is required. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or targeted triggering of the crash condition.
Mitigation Recommendations
European organizations should promptly apply the Linux kernel patch that addresses this vulnerability by adding NULL pointer handling in the rtw89 WiFi driver firmware code. System administrators should verify that their Linux distributions have incorporated this fix or manually update the kernel to a patched version. Additionally, organizations should audit BIOS configurations to understand policies related to 6 GHz WiFi band usage and consider enabling the 6 GHz band if compatible and secure. Monitoring system logs for kernel crashes related to WiFi scanning can help detect attempts to trigger this vulnerability. For critical systems, implementing redundancy and failover mechanisms can mitigate the impact of potential DoS conditions. Finally, maintaining an up-to-date inventory of devices using Realtek WiFi 7 chipsets and the rtw89 driver will help prioritize patching efforts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-07-29T15:50:41.179Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682cd0f71484d88663aeb050
Added to database: 5/20/2025, 6:59:03 PM
Last enriched: 7/4/2025, 12:12:45 PM
Last updated: 8/18/2025, 11:34:44 PM
Views: 11
Related Threats
CVE-2025-9356: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-9355: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-43761: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-24902: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
CriticalCVE-2025-52451: CWE-20 Improper Input Validation in Salesforce Tableau Server
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.