CVE-2024-56723: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: mfd: intel_soc_pmic_bxtwc: Use IRQ domain for PMIC devices While design wise the idea of converting the driver to use the hierarchy of the IRQ chips is correct, the implementation has (inherited) flaws. This was unveiled when platform_get_irq() had started WARN() on IRQ 0 that is supposed to be a Linux IRQ number (also known as vIRQ). Rework the driver to respect IRQ domain when creating each MFD device separately, as the domain is not the same for all of them.
AI Analysis
Technical Summary
CVE-2024-56723 is a vulnerability identified in the Linux kernel specifically related to the mfd (multi-function device) driver for the Intel SoC PMIC (Power Management Integrated Circuit) BXTWC. The vulnerability arises from the improper handling of IRQ (Interrupt Request) domains within the driver. The driver was redesigned to use the hierarchy of IRQ chips, which is conceptually correct, but the implementation inherited flaws. These flaws became apparent when the function platform_get_irq() began issuing warnings on IRQ 0, which is expected to be a valid Linux IRQ number (also known as a virtual IRQ or vIRQ). The root cause is that the driver does not correctly respect the IRQ domain when creating each MFD device separately, as the IRQ domain is not uniform across all devices. This mismanagement of IRQ domains can lead to incorrect interrupt handling, potentially causing system instability, improper device operation, or denial of service conditions. Although no known exploits are currently reported in the wild, the vulnerability affects Linux kernel versions identified by the given commit hashes, and it has been officially published and reserved as of late December 2024. The lack of a CVSS score indicates that the vulnerability is newly disclosed and not yet fully assessed for severity.
Potential Impact
For European organizations, the impact of CVE-2024-56723 could be significant, especially for those relying on Linux-based systems running on Intel SoC platforms that utilize the affected PMIC BXTWC driver. The improper IRQ domain handling could lead to device malfunctions or system crashes, impacting availability and reliability of critical infrastructure, embedded systems, or enterprise servers. This is particularly relevant for sectors such as telecommunications, manufacturing, automotive, and IoT deployments where Linux is prevalent on embedded devices. The vulnerability could disrupt operations, cause downtime, or require emergency patching, leading to operational and financial consequences. Since the vulnerability affects kernel-level code, it could also be leveraged as a stepping stone for privilege escalation or further exploitation if combined with other vulnerabilities, although no such exploits are currently known.
Mitigation Recommendations
To mitigate CVE-2024-56723, organizations should promptly apply the official Linux kernel patches once available from trusted sources such as the Linux kernel maintainers or their Linux distribution vendors. It is critical to ensure that the kernel version in use includes the fix that correctly respects IRQ domains for the Intel SoC PMIC BXTWC driver. For environments where immediate patching is not feasible, organizations should monitor system logs for IRQ warnings or anomalies related to the PMIC devices and consider isolating affected hardware or limiting exposure. Additionally, implementing robust kernel update policies and testing patches in staging environments before production deployment will reduce risk. Vendors and integrators should verify that their hardware platforms are not using outdated or custom kernel versions lacking this fix. Finally, maintaining comprehensive system monitoring and incident response capabilities will help detect any abnormal behavior stemming from this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Sweden, Finland, Poland
CVE-2024-56723: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: mfd: intel_soc_pmic_bxtwc: Use IRQ domain for PMIC devices While design wise the idea of converting the driver to use the hierarchy of the IRQ chips is correct, the implementation has (inherited) flaws. This was unveiled when platform_get_irq() had started WARN() on IRQ 0 that is supposed to be a Linux IRQ number (also known as vIRQ). Rework the driver to respect IRQ domain when creating each MFD device separately, as the domain is not the same for all of them.
AI-Powered Analysis
Technical Analysis
CVE-2024-56723 is a vulnerability identified in the Linux kernel specifically related to the mfd (multi-function device) driver for the Intel SoC PMIC (Power Management Integrated Circuit) BXTWC. The vulnerability arises from the improper handling of IRQ (Interrupt Request) domains within the driver. The driver was redesigned to use the hierarchy of IRQ chips, which is conceptually correct, but the implementation inherited flaws. These flaws became apparent when the function platform_get_irq() began issuing warnings on IRQ 0, which is expected to be a valid Linux IRQ number (also known as a virtual IRQ or vIRQ). The root cause is that the driver does not correctly respect the IRQ domain when creating each MFD device separately, as the IRQ domain is not uniform across all devices. This mismanagement of IRQ domains can lead to incorrect interrupt handling, potentially causing system instability, improper device operation, or denial of service conditions. Although no known exploits are currently reported in the wild, the vulnerability affects Linux kernel versions identified by the given commit hashes, and it has been officially published and reserved as of late December 2024. The lack of a CVSS score indicates that the vulnerability is newly disclosed and not yet fully assessed for severity.
Potential Impact
For European organizations, the impact of CVE-2024-56723 could be significant, especially for those relying on Linux-based systems running on Intel SoC platforms that utilize the affected PMIC BXTWC driver. The improper IRQ domain handling could lead to device malfunctions or system crashes, impacting availability and reliability of critical infrastructure, embedded systems, or enterprise servers. This is particularly relevant for sectors such as telecommunications, manufacturing, automotive, and IoT deployments where Linux is prevalent on embedded devices. The vulnerability could disrupt operations, cause downtime, or require emergency patching, leading to operational and financial consequences. Since the vulnerability affects kernel-level code, it could also be leveraged as a stepping stone for privilege escalation or further exploitation if combined with other vulnerabilities, although no such exploits are currently known.
Mitigation Recommendations
To mitigate CVE-2024-56723, organizations should promptly apply the official Linux kernel patches once available from trusted sources such as the Linux kernel maintainers or their Linux distribution vendors. It is critical to ensure that the kernel version in use includes the fix that correctly respects IRQ domains for the Intel SoC PMIC BXTWC driver. For environments where immediate patching is not feasible, organizations should monitor system logs for IRQ warnings or anomalies related to the PMIC devices and consider isolating affected hardware or limiting exposure. Additionally, implementing robust kernel update policies and testing patches in staging environments before production deployment will reduce risk. Vendors and integrators should verify that their hardware platforms are not using outdated or custom kernel versions lacking this fix. Finally, maintaining comprehensive system monitoring and incident response capabilities will help detect any abnormal behavior stemming from this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-12-27T15:00:39.858Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9822c4522896dcbde656
Added to database: 5/21/2025, 9:08:50 AM
Last enriched: 6/28/2025, 7:25:25 AM
Last updated: 8/4/2025, 8:16:32 AM
Views: 13
Related Threats
CVE-2025-8834: Cross Site Scripting in JCG Link-net LW-N915R
MediumCVE-2025-55159: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in tokio-rs slab
MediumCVE-2025-55161: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.