CVE-2024-48873: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: check return value of ieee80211_probereq_get() for RNR The return value of ieee80211_probereq_get() might be NULL, so check it before using to avoid NULL pointer access. Addresses-Coverity-ID: 1529805 ("Dereference null return value")
AI Analysis
Technical Summary
CVE-2024-48873 is a vulnerability identified in the Linux kernel specifically within the WiFi driver component rtw89. The issue arises from improper handling of the return value of the function ieee80211_probereq_get(), which is used to retrieve probe request frames in the 802.11 wireless protocol stack. The function may return a NULL pointer under certain conditions, but the vulnerable code does not check for this NULL return before dereferencing it. This leads to a potential NULL pointer dereference, which can cause a kernel crash (denial of service) or potentially be leveraged for further exploitation depending on the context. The vulnerability was discovered through static analysis (Coverity ID 1529805) and has been addressed by adding proper NULL checks before using the return value. The affected versions are specific Linux kernel commits identified by their hashes, indicating that this is a recent and targeted fix. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. The vulnerability is categorized as a stability and reliability issue in the kernel's wireless networking stack, which could be triggered by crafted WiFi probe requests.
Potential Impact
For European organizations, this vulnerability primarily poses a risk to systems running vulnerable Linux kernels with the rtw89 WiFi driver enabled, which is common in many laptops, embedded devices, and servers using WiFi connectivity. Exploitation could lead to kernel crashes causing denial of service, impacting availability of critical systems, especially those relying on wireless connectivity for operations. While no known exploits exist yet, attackers could potentially craft malicious WiFi probe requests to trigger the vulnerability remotely without authentication or user interaction, making it a concern for public-facing or wireless-enabled infrastructure. This could affect enterprises, public institutions, and critical infrastructure operators who use Linux-based systems with vulnerable WiFi drivers. The impact on confidentiality and integrity is likely limited unless combined with other vulnerabilities, but availability disruption could have operational consequences. Given the widespread use of Linux in Europe across various sectors, the vulnerability warrants prompt attention.
Mitigation Recommendations
Organizations should promptly update their Linux kernel to the fixed versions that include the patch for CVE-2024-48873. Since the vulnerability involves a WiFi driver, disabling or restricting WiFi interfaces on critical systems where wireless connectivity is not essential can reduce exposure. Network segmentation and monitoring for unusual WiFi probe request traffic can help detect potential exploitation attempts. For embedded or IoT devices using the rtw89 driver, vendors should be contacted for firmware updates or mitigations. Additionally, applying kernel hardening techniques such as enabling kernel lockdown modes, using SELinux/AppArmor policies to restrict driver behavior, and maintaining up-to-date intrusion detection systems can further reduce risk. Organizations should also review their wireless network security posture and consider limiting the range or access to WiFi networks to trusted devices only.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Finland
CVE-2024-48873: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: check return value of ieee80211_probereq_get() for RNR The return value of ieee80211_probereq_get() might be NULL, so check it before using to avoid NULL pointer access. Addresses-Coverity-ID: 1529805 ("Dereference null return value")
AI-Powered Analysis
Technical Analysis
CVE-2024-48873 is a vulnerability identified in the Linux kernel specifically within the WiFi driver component rtw89. The issue arises from improper handling of the return value of the function ieee80211_probereq_get(), which is used to retrieve probe request frames in the 802.11 wireless protocol stack. The function may return a NULL pointer under certain conditions, but the vulnerable code does not check for this NULL return before dereferencing it. This leads to a potential NULL pointer dereference, which can cause a kernel crash (denial of service) or potentially be leveraged for further exploitation depending on the context. The vulnerability was discovered through static analysis (Coverity ID 1529805) and has been addressed by adding proper NULL checks before using the return value. The affected versions are specific Linux kernel commits identified by their hashes, indicating that this is a recent and targeted fix. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. The vulnerability is categorized as a stability and reliability issue in the kernel's wireless networking stack, which could be triggered by crafted WiFi probe requests.
Potential Impact
For European organizations, this vulnerability primarily poses a risk to systems running vulnerable Linux kernels with the rtw89 WiFi driver enabled, which is common in many laptops, embedded devices, and servers using WiFi connectivity. Exploitation could lead to kernel crashes causing denial of service, impacting availability of critical systems, especially those relying on wireless connectivity for operations. While no known exploits exist yet, attackers could potentially craft malicious WiFi probe requests to trigger the vulnerability remotely without authentication or user interaction, making it a concern for public-facing or wireless-enabled infrastructure. This could affect enterprises, public institutions, and critical infrastructure operators who use Linux-based systems with vulnerable WiFi drivers. The impact on confidentiality and integrity is likely limited unless combined with other vulnerabilities, but availability disruption could have operational consequences. Given the widespread use of Linux in Europe across various sectors, the vulnerability warrants prompt attention.
Mitigation Recommendations
Organizations should promptly update their Linux kernel to the fixed versions that include the patch for CVE-2024-48873. Since the vulnerability involves a WiFi driver, disabling or restricting WiFi interfaces on critical systems where wireless connectivity is not essential can reduce exposure. Network segmentation and monitoring for unusual WiFi probe request traffic can help detect potential exploitation attempts. For embedded or IoT devices using the rtw89 driver, vendors should be contacted for firmware updates or mitigations. Additionally, applying kernel hardening techniques such as enabling kernel lockdown modes, using SELinux/AppArmor policies to restrict driver behavior, and maintaining up-to-date intrusion detection systems can further reduce risk. Organizations should also review their wireless network security posture and consider limiting the range or access to WiFi networks to trusted devices only.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-01-09T09:50:31.765Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9825c4522896dcbe072f
Added to database: 5/21/2025, 9:08:53 AM
Last enriched: 6/28/2025, 8:39:44 PM
Last updated: 8/17/2025, 10:19:27 PM
Views: 12
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.