CVE-2024-46860: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7921: fix NULL pointer access in mt7921_ipv6_addr_change When disabling wifi mt7921_ipv6_addr_change() is called as a notifier. At this point mvif->phy is already NULL so we cannot use it here.
AI Analysis
Technical Summary
CVE-2024-46860 is a vulnerability identified in the Linux kernel specifically affecting the mt76 wireless driver, which supports the mt7921 Wi-Fi chipset. The issue arises in the function mt7921_ipv6_addr_change(), which is invoked as a notifier when the Wi-Fi interface is disabled. At this point, the internal pointer mvif->phy is already set to NULL, but the function attempts to access it without a proper NULL check, leading to a NULL pointer dereference. This type of vulnerability can cause a kernel panic or system crash, resulting in a denial of service (DoS). The vulnerability is rooted in improper handling of state changes within the wireless driver, specifically during IPv6 address changes on the mt7921 device. The mt76 driver is widely used in Linux distributions to support MediaTek wireless chipsets, including mt7921, which is common in many modern laptops and embedded devices. The vulnerability was published on September 27, 2024, and no known exploits are currently reported in the wild. The Linux vendor has resolved this issue by adding the necessary NULL pointer checks to prevent dereferencing a NULL pointer during the notifier call. No CVSS score has been assigned yet, but the vulnerability is classified as a kernel-level flaw affecting system stability and availability.
Potential Impact
For European organizations, this vulnerability primarily poses a risk of denial of service on systems running Linux kernels with the affected mt76 driver version and using the mt7921 Wi-Fi chipset. This could lead to unexpected system crashes or reboots when the Wi-Fi interface is disabled or IPv6 address changes occur, potentially disrupting critical network connectivity. Organizations relying on Linux-based infrastructure, including servers, workstations, or embedded devices with this chipset, may experience operational interruptions. While the vulnerability does not directly lead to privilege escalation or data leakage, the resulting instability can impact availability and productivity. In sectors such as telecommunications, manufacturing, and public services where Linux-based devices are prevalent, this could affect service continuity. Given the widespread use of Linux in European enterprises and public institutions, especially in countries with strong open-source adoption like Germany, France, and the Netherlands, the impact could be significant if unpatched systems are present. However, the absence of known exploits and the requirement for specific hardware limits the scope of immediate risk.
Mitigation Recommendations
European organizations should promptly update their Linux kernels to the latest patched versions that include the fix for CVE-2024-46860. Specifically, ensure that the mt76 driver and related wireless firmware are updated to versions released after the vulnerability disclosure date. Network administrators should audit their device inventories to identify systems using the mt7921 chipset and verify kernel versions. For embedded devices or appliances where kernel updates are not straightforward, consider vendor firmware updates or workarounds such as disabling IPv6 on affected interfaces if feasible. Additionally, implement monitoring to detect unexpected system crashes or reboots that could indicate exploitation attempts or instability. Where possible, isolate critical systems from untrusted networks to reduce exposure. Maintain regular backups and incident response plans to quickly recover from potential denial of service events. Finally, stay informed through Linux kernel mailing lists and security advisories for any emerging exploit developments or additional patches.
Affected Countries
Germany, France, Netherlands, United Kingdom, Sweden, Finland
CVE-2024-46860: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7921: fix NULL pointer access in mt7921_ipv6_addr_change When disabling wifi mt7921_ipv6_addr_change() is called as a notifier. At this point mvif->phy is already NULL so we cannot use it here.
AI-Powered Analysis
Technical Analysis
CVE-2024-46860 is a vulnerability identified in the Linux kernel specifically affecting the mt76 wireless driver, which supports the mt7921 Wi-Fi chipset. The issue arises in the function mt7921_ipv6_addr_change(), which is invoked as a notifier when the Wi-Fi interface is disabled. At this point, the internal pointer mvif->phy is already set to NULL, but the function attempts to access it without a proper NULL check, leading to a NULL pointer dereference. This type of vulnerability can cause a kernel panic or system crash, resulting in a denial of service (DoS). The vulnerability is rooted in improper handling of state changes within the wireless driver, specifically during IPv6 address changes on the mt7921 device. The mt76 driver is widely used in Linux distributions to support MediaTek wireless chipsets, including mt7921, which is common in many modern laptops and embedded devices. The vulnerability was published on September 27, 2024, and no known exploits are currently reported in the wild. The Linux vendor has resolved this issue by adding the necessary NULL pointer checks to prevent dereferencing a NULL pointer during the notifier call. No CVSS score has been assigned yet, but the vulnerability is classified as a kernel-level flaw affecting system stability and availability.
Potential Impact
For European organizations, this vulnerability primarily poses a risk of denial of service on systems running Linux kernels with the affected mt76 driver version and using the mt7921 Wi-Fi chipset. This could lead to unexpected system crashes or reboots when the Wi-Fi interface is disabled or IPv6 address changes occur, potentially disrupting critical network connectivity. Organizations relying on Linux-based infrastructure, including servers, workstations, or embedded devices with this chipset, may experience operational interruptions. While the vulnerability does not directly lead to privilege escalation or data leakage, the resulting instability can impact availability and productivity. In sectors such as telecommunications, manufacturing, and public services where Linux-based devices are prevalent, this could affect service continuity. Given the widespread use of Linux in European enterprises and public institutions, especially in countries with strong open-source adoption like Germany, France, and the Netherlands, the impact could be significant if unpatched systems are present. However, the absence of known exploits and the requirement for specific hardware limits the scope of immediate risk.
Mitigation Recommendations
European organizations should promptly update their Linux kernels to the latest patched versions that include the fix for CVE-2024-46860. Specifically, ensure that the mt76 driver and related wireless firmware are updated to versions released after the vulnerability disclosure date. Network administrators should audit their device inventories to identify systems using the mt7921 chipset and verify kernel versions. For embedded devices or appliances where kernel updates are not straightforward, consider vendor firmware updates or workarounds such as disabling IPv6 on affected interfaces if feasible. Additionally, implement monitoring to detect unexpected system crashes or reboots that could indicate exploitation attempts or instability. Where possible, isolate critical systems from untrusted networks to reduce exposure. Maintain regular backups and incident response plans to quickly recover from potential denial of service events. Finally, stay informed through Linux kernel mailing lists and security advisories for any emerging exploit developments or additional patches.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-09-11T15:12:18.293Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9825c4522896dcbe036e
Added to database: 5/21/2025, 9:08:53 AM
Last enriched: 6/28/2025, 6:56:15 PM
Last updated: 11/23/2025, 6:05:35 PM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13561: SQL Injection in SourceCodester Company Website CMS
MediumCVE-2025-54515: CWE-1284 Improper Validation of Specified Quantity in Input in AMD Versal™ Adaptive SoC Devices
LowCVE-2025-48507: CWE-1284 Improper Validation of Specified Quantity in Input in AMD Kria™ SOM
HighCVE-2025-13560: SQL Injection in SourceCodester Company Website CMS
MediumCVE-2025-13557: SQL Injection in Campcodes Online Polling System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.