Skip to main content

CVE-2024-57990: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-57990cvecve-2024-57990
Published: Thu Feb 27 2025 (02/27/2025, 02:07:13 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7925: fix off by one in mt7925_load_clc() This comparison should be >= instead of > to prevent an out of bounds read and write.

AI-Powered Analysis

AILast updated: 06/27/2025, 22:57:49 UTC

Technical Analysis

CVE-2024-57990 is a vulnerability identified in the Linux kernel, specifically within the mt76 wireless driver for the mt7925 chipset. The issue stems from an off-by-one error in the function mt7925_load_clc(), where a boundary check uses a '>' comparison instead of '>=' leading to an out-of-bounds read and write. This type of vulnerability can cause memory corruption by accessing memory locations beyond the allocated buffer, potentially leading to system instability, crashes (denial of service), or even arbitrary code execution if exploited properly. The vulnerability affects certain versions of the Linux kernel containing the mt76 driver implementation for the mt7925 Wi-Fi chipset. The mt76 driver is widely used in Linux-based systems to support MediaTek wireless chipsets, including many laptops, embedded devices, and IoT hardware. The flaw was resolved by correcting the boundary check to prevent out-of-bounds memory access. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. However, the nature of the vulnerability—out-of-bounds read/write in kernel space—indicates a potentially serious security risk if exploited by an attacker with local access or through crafted wireless frames. The vulnerability requires detailed understanding of the driver internals and likely local or network proximity to the vulnerable device to exploit. It does not appear to require user interaction but may require the attacker to be within wireless range or have local system access to trigger the flaw.

Potential Impact

For European organizations, the impact of CVE-2024-57990 could be significant, especially for those relying on Linux-based systems with MediaTek mt7925 wireless chipsets. Potential impacts include system crashes leading to denial of service, which could disrupt critical business operations, especially in sectors like finance, healthcare, and manufacturing where uptime is crucial. More severe exploitation could allow privilege escalation or arbitrary code execution in kernel space, compromising confidentiality and integrity of sensitive data. Since many European enterprises and government agencies use Linux servers, desktops, and embedded devices, this vulnerability could be leveraged to gain unauthorized access or disrupt services. The risk is heightened in environments with wireless connectivity where attackers could attempt remote exploitation via crafted wireless frames. Industrial control systems and IoT devices using affected chipsets could also be targeted, impacting operational technology environments. The absence of known exploits currently reduces immediate risk, but the vulnerability should be treated proactively due to its potential severity.

Mitigation Recommendations

Organizations should promptly apply the official Linux kernel patches that fix the off-by-one boundary check in the mt76 driver for the mt7925 chipset. Since the vulnerability is in the kernel driver, updating the Linux kernel to a patched version is the most effective mitigation. For systems where immediate patching is not feasible, disabling or restricting the use of the affected wireless interface (mt7925) can reduce exposure. Network segmentation and strict wireless access controls should be enforced to limit attacker proximity. Monitoring wireless traffic for anomalies and unusual driver behavior can help detect exploitation attempts. Additionally, organizations should ensure that endpoint security solutions are up to date and capable of detecting kernel-level exploits. For embedded or IoT devices using this chipset, coordinate with vendors for firmware updates or mitigations. Regular vulnerability scanning and asset inventory to identify affected devices is critical for targeted remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-27T02:04:28.914Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9820c4522896dcbdd246

Added to database: 5/21/2025, 9:08:48 AM

Last enriched: 6/27/2025, 10:57:49 PM

Last updated: 7/29/2025, 4:19:46 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats