CVE-2024-46672: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: cfg80211: Handle SSID based pmksa deletion wpa_supplicant 2.11 sends since 1efdba5fdc2c ("Handle PMKSA flush in the driver for SAE/OWE offload cases") SSID based PMKSA del commands. brcmfmac is not prepared and tries to dereference the NULL bssid and pmkid pointers in cfg80211_pmksa. PMKID_V3 operations support SSID based updates so copy the SSID.
AI Analysis
Technical Summary
CVE-2024-46672 is a vulnerability identified in the Linux kernel's wireless networking stack, specifically affecting the brcmfmac driver which supports Broadcom FullMAC Wi-Fi chips. The issue arises from improper handling of SSID-based PMKSA (Pairwise Master Key Security Association) deletion commands sent by wpa_supplicant version 2.11 and later. Since commit 1efdba5fdc2c, wpa_supplicant sends SSID-based PMKSA deletion commands to the driver to handle SAE (Simultaneous Authentication of Equals) and OWE (Opportunistic Wireless Encryption) offload cases. However, the brcmfmac driver was not prepared to handle these SSID-based commands and attempts to dereference NULL pointers for BSSID and PMKID in the cfg80211_pmksa function. This leads to potential kernel null pointer dereference issues, which could cause system instability or crashes. The vulnerability stems from a mismatch between the wpa_supplicant's new behavior and the brcmfmac driver's handling of PMKSA operations, particularly in the context of PMKID_V3 operations that support SSID-based updates. The fix involves properly copying the SSID to prevent dereferencing NULL pointers. No known exploits are reported in the wild at the time of publication, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected brcmfmac driver and using wpa_supplicant 2.11 or later. The impact includes potential denial of service (DoS) conditions due to kernel crashes triggered by malformed or unexpected PMKSA deletion commands. This could disrupt wireless network connectivity, affecting operational continuity, especially in environments relying heavily on Wi-Fi connectivity for critical services. Confidentiality and integrity impacts are less direct but could arise if attackers leverage the DoS to facilitate further attacks or gain footholds during recovery phases. Organizations with extensive Linux-based infrastructure, including IoT devices, embedded systems, or enterprise servers using Broadcom Wi-Fi chipsets, are at higher risk. The lack of known exploits suggests limited immediate threat, but the vulnerability could be weaponized in targeted attacks or automated scanning campaigns once public details become widespread.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Identify and inventory Linux systems using the brcmfmac driver and wpa_supplicant version 2.11 or later. 2) Apply the latest Linux kernel patches that address this issue as soon as they become available from trusted sources or vendor distributions. 3) Temporarily disable or restrict the use of Wi-Fi interfaces relying on the brcmfmac driver in sensitive environments if patching is delayed. 4) Monitor network and system logs for unusual PMKSA deletion commands or kernel errors related to cfg80211_pmksa. 5) Employ network segmentation to isolate vulnerable devices and limit exposure. 6) Engage with hardware and Linux distribution vendors to ensure timely updates and guidance. 7) Consider deploying host-based intrusion detection systems (HIDS) capable of detecting kernel crashes or anomalies related to wireless driver behavior.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2024-46672: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: cfg80211: Handle SSID based pmksa deletion wpa_supplicant 2.11 sends since 1efdba5fdc2c ("Handle PMKSA flush in the driver for SAE/OWE offload cases") SSID based PMKSA del commands. brcmfmac is not prepared and tries to dereference the NULL bssid and pmkid pointers in cfg80211_pmksa. PMKID_V3 operations support SSID based updates so copy the SSID.
AI-Powered Analysis
Technical Analysis
CVE-2024-46672 is a vulnerability identified in the Linux kernel's wireless networking stack, specifically affecting the brcmfmac driver which supports Broadcom FullMAC Wi-Fi chips. The issue arises from improper handling of SSID-based PMKSA (Pairwise Master Key Security Association) deletion commands sent by wpa_supplicant version 2.11 and later. Since commit 1efdba5fdc2c, wpa_supplicant sends SSID-based PMKSA deletion commands to the driver to handle SAE (Simultaneous Authentication of Equals) and OWE (Opportunistic Wireless Encryption) offload cases. However, the brcmfmac driver was not prepared to handle these SSID-based commands and attempts to dereference NULL pointers for BSSID and PMKID in the cfg80211_pmksa function. This leads to potential kernel null pointer dereference issues, which could cause system instability or crashes. The vulnerability stems from a mismatch between the wpa_supplicant's new behavior and the brcmfmac driver's handling of PMKSA operations, particularly in the context of PMKID_V3 operations that support SSID-based updates. The fix involves properly copying the SSID to prevent dereferencing NULL pointers. No known exploits are reported in the wild at the time of publication, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected brcmfmac driver and using wpa_supplicant 2.11 or later. The impact includes potential denial of service (DoS) conditions due to kernel crashes triggered by malformed or unexpected PMKSA deletion commands. This could disrupt wireless network connectivity, affecting operational continuity, especially in environments relying heavily on Wi-Fi connectivity for critical services. Confidentiality and integrity impacts are less direct but could arise if attackers leverage the DoS to facilitate further attacks or gain footholds during recovery phases. Organizations with extensive Linux-based infrastructure, including IoT devices, embedded systems, or enterprise servers using Broadcom Wi-Fi chipsets, are at higher risk. The lack of known exploits suggests limited immediate threat, but the vulnerability could be weaponized in targeted attacks or automated scanning campaigns once public details become widespread.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Identify and inventory Linux systems using the brcmfmac driver and wpa_supplicant version 2.11 or later. 2) Apply the latest Linux kernel patches that address this issue as soon as they become available from trusted sources or vendor distributions. 3) Temporarily disable or restrict the use of Wi-Fi interfaces relying on the brcmfmac driver in sensitive environments if patching is delayed. 4) Monitor network and system logs for unusual PMKSA deletion commands or kernel errors related to cfg80211_pmksa. 5) Employ network segmentation to isolate vulnerable devices and limit exposure. 6) Engage with hardware and Linux distribution vendors to ensure timely updates and guidance. 7) Consider deploying host-based intrusion detection systems (HIDS) capable of detecting kernel crashes or anomalies related to wireless driver behavior.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-09-11T15:12:18.247Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9826c4522896dcbe0f50
Added to database: 5/21/2025, 9:08:54 AM
Last enriched: 6/29/2025, 12:10:03 AM
Last updated: 10/16/2025, 12:41:29 PM
Views: 24
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9955: Vulnerability in WSO2 WSO2 Enterprise Integrator
MediumCVE-2025-10611: Vulnerability in WSO2 WSO2 API Manager
CriticalCVE-2025-58426: Use of hard-coded cryptographic key in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-58079: Improper Protection of Alternate Path in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-55072: Cross-site scripting (XSS) in NEOJAPAN Inc. desknet's NEO
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.