CVE-2024-46827: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix firmware crash due to invalid peer nss Currently, if the access point receives an association request containing an Extended HE Capabilities Information Element with an invalid MCS-NSS, it triggers a firmware crash. This issue arises when EHT-PHY capabilities shows support for a bandwidth and MCS-NSS set for that particular bandwidth is filled by zeros and due to this, driver obtains peer_nss as 0 and sending this value to firmware causes crash. Address this issue by implementing a validation step for the peer_nss value before passing it to the firmware. If the value is greater than zero, proceed with forwarding it to the firmware. However, if the value is invalid, reject the association request to prevent potential firmware crashes. Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1
AI Analysis
Technical Summary
CVE-2024-46827 is a vulnerability identified in the Linux kernel's ath12k wireless driver, which handles Qualcomm Atheros Wi-Fi chipsets. The flaw arises when an access point receives an association request containing an Extended High-Efficiency (HE) Capabilities Information Element with an invalid Modulation and Coding Scheme - Number of Spatial Streams (MCS-NSS) value. Specifically, if the Extremely High Throughput (EHT) PHY capabilities advertise support for a certain bandwidth but the corresponding MCS-NSS set for that bandwidth is zero-filled, the driver interprets the peer_nss value as zero. Passing this zero value to the firmware causes it to crash, resulting in a denial of service condition. The root cause is the lack of validation on the peer_nss parameter before forwarding it to the firmware. The fix involves adding a validation step that rejects association requests with invalid peer_nss values, thereby preventing firmware crashes. This vulnerability was tested on Qualcomm QCN9274 hardware version 2.0 with PCI WLAN firmware version WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1. No known exploits are currently reported in the wild. The issue impacts Linux kernel versions containing the affected driver code prior to the patch. Since the vulnerability can be triggered remotely by sending crafted association requests, it poses a risk to wireless access points running vulnerable Linux kernels with affected Qualcomm chipsets.
Potential Impact
For European organizations, this vulnerability could lead to denial of service (DoS) conditions on wireless access points using affected Linux kernels with Qualcomm ath12k drivers. This could disrupt network availability, impacting business operations, especially in environments heavily reliant on Wi-Fi connectivity such as offices, manufacturing plants, or public service locations. The flaw could be exploited by an attacker within wireless range by sending malformed association requests, causing firmware crashes and potentially forcing reboots or loss of wireless connectivity. While the vulnerability does not appear to allow code execution or data compromise, the availability impact could be significant in critical infrastructure or enterprise environments. Organizations with large-scale deployments of Linux-based wireless access points or routers using Qualcomm chipsets are at higher risk. The lack of known exploits reduces immediate risk, but the ease of triggering the crash remotely without authentication means the threat should be taken seriously. Additionally, disruption to wireless networks could indirectly affect confidentiality and integrity by forcing fallback to less secure or alternative communication channels.
Mitigation Recommendations
European organizations should promptly apply the Linux kernel patches that include the validation fix for the ath12k driver to prevent invalid peer_nss values from reaching the firmware. Network administrators should audit their wireless infrastructure to identify devices running vulnerable Linux kernels with Qualcomm ath12k drivers, particularly those using QCN9274 or similar chipsets. Where patching is not immediately feasible, organizations can implement wireless network segmentation to isolate critical systems from potentially untrusted wireless clients. Monitoring wireless association requests for anomalies or malformed Extended HE Capabilities elements could help detect attempted exploitation. Additionally, organizations should ensure firmware on affected devices is updated to the latest versions provided by vendors. Employing wireless intrusion detection/prevention systems (WIDS/WIPS) to detect and block suspicious association attempts can reduce risk. Finally, maintaining robust incident response plans for wireless network outages will minimize operational impact if exploitation occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2024-46827: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix firmware crash due to invalid peer nss Currently, if the access point receives an association request containing an Extended HE Capabilities Information Element with an invalid MCS-NSS, it triggers a firmware crash. This issue arises when EHT-PHY capabilities shows support for a bandwidth and MCS-NSS set for that particular bandwidth is filled by zeros and due to this, driver obtains peer_nss as 0 and sending this value to firmware causes crash. Address this issue by implementing a validation step for the peer_nss value before passing it to the firmware. If the value is greater than zero, proceed with forwarding it to the firmware. However, if the value is invalid, reject the association request to prevent potential firmware crashes. Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1
AI-Powered Analysis
Technical Analysis
CVE-2024-46827 is a vulnerability identified in the Linux kernel's ath12k wireless driver, which handles Qualcomm Atheros Wi-Fi chipsets. The flaw arises when an access point receives an association request containing an Extended High-Efficiency (HE) Capabilities Information Element with an invalid Modulation and Coding Scheme - Number of Spatial Streams (MCS-NSS) value. Specifically, if the Extremely High Throughput (EHT) PHY capabilities advertise support for a certain bandwidth but the corresponding MCS-NSS set for that bandwidth is zero-filled, the driver interprets the peer_nss value as zero. Passing this zero value to the firmware causes it to crash, resulting in a denial of service condition. The root cause is the lack of validation on the peer_nss parameter before forwarding it to the firmware. The fix involves adding a validation step that rejects association requests with invalid peer_nss values, thereby preventing firmware crashes. This vulnerability was tested on Qualcomm QCN9274 hardware version 2.0 with PCI WLAN firmware version WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1. No known exploits are currently reported in the wild. The issue impacts Linux kernel versions containing the affected driver code prior to the patch. Since the vulnerability can be triggered remotely by sending crafted association requests, it poses a risk to wireless access points running vulnerable Linux kernels with affected Qualcomm chipsets.
Potential Impact
For European organizations, this vulnerability could lead to denial of service (DoS) conditions on wireless access points using affected Linux kernels with Qualcomm ath12k drivers. This could disrupt network availability, impacting business operations, especially in environments heavily reliant on Wi-Fi connectivity such as offices, manufacturing plants, or public service locations. The flaw could be exploited by an attacker within wireless range by sending malformed association requests, causing firmware crashes and potentially forcing reboots or loss of wireless connectivity. While the vulnerability does not appear to allow code execution or data compromise, the availability impact could be significant in critical infrastructure or enterprise environments. Organizations with large-scale deployments of Linux-based wireless access points or routers using Qualcomm chipsets are at higher risk. The lack of known exploits reduces immediate risk, but the ease of triggering the crash remotely without authentication means the threat should be taken seriously. Additionally, disruption to wireless networks could indirectly affect confidentiality and integrity by forcing fallback to less secure or alternative communication channels.
Mitigation Recommendations
European organizations should promptly apply the Linux kernel patches that include the validation fix for the ath12k driver to prevent invalid peer_nss values from reaching the firmware. Network administrators should audit their wireless infrastructure to identify devices running vulnerable Linux kernels with Qualcomm ath12k drivers, particularly those using QCN9274 or similar chipsets. Where patching is not immediately feasible, organizations can implement wireless network segmentation to isolate critical systems from potentially untrusted wireless clients. Monitoring wireless association requests for anomalies or malformed Extended HE Capabilities elements could help detect attempted exploitation. Additionally, organizations should ensure firmware on affected devices is updated to the latest versions provided by vendors. Employing wireless intrusion detection/prevention systems (WIDS/WIPS) to detect and block suspicious association attempts can reduce risk. Finally, maintaining robust incident response plans for wireless network outages will minimize operational impact if exploitation occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-09-11T15:12:18.285Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9825c4522896dcbe026a
Added to database: 5/21/2025, 9:08:53 AM
Last enriched: 6/28/2025, 6:26:21 PM
Last updated: 8/13/2025, 5:57:51 AM
Views: 15
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.